VOLUME IV ISSUE II

Lamia Bouchhima, Mohamed Jamel Rouis, Mohamed Choura February 2015 Page No.: 01-05

Phosphogypsum (calcium sulfate) is a naturally occurring part of the process of creating phosphoric acid (H3PO4), an essential component of many modern fertilizers. For every tonne of phosphoric acid made, from the reaction of phosphate rock with acid, commonly sulfuric acid, about 3 t of phosphogypsum are created. There are three options for managing phosphogypsum: (i) disposal or dumping, (ii) stacking, (iii) use-in, for example, agriculture, construction, or landfill.The need to reduce solid waste volume has caused scientists to invent new construction materials produced using waste materials. The present work focuses on the ultrasonic pulse velocity of wade sand –lime-cement-phosphogypsum building bricks produced under a static compaction of 20MPa. It is observed that these bricks have sufficient Ultrasonic pulse velocity Tests were also conducted to study the relationship between ultrasound pulse velocity (UPV) with strength of bricks.. The results suggest that compressive and flexural strength values of phosphogypsum-wase sand-lime-cement-building bricks produced undera static compaction of 20 MPa, may approximately be determined without a destructive testing by using the non-destructive UPV measurements.

  •  Page(s): 01-05
  •  Date of Publication: February 2015
  •  Lamia Bouchhima
    Unit of Oesearch Environmental Geotechnique and Civil Materials,
    Institute of The Engineers of Sfax, Road Sokra, Km3.5, B.P1173-3038 Sfax, Tunisia
  •  Mohamed Jamel Rouis
    Unit of Oesearch Environmental Geotechnique and Civil Materials,
    Institute of The Engineers of Sfax, Road Sokra, Km3.5, B.P1173-3038 Sfax, Tunisia
  •  Mohamed Choura
    Unit of Oesearch Environmental Geotechnique and Civil Materials,
    Institute of The Engineers of Sfax, Road Sokra, Km3.5, B.P1173-3038 Sfax, Tunisia

References

 

[1] Lamia Bouchhima, Mohamed Jamel Rouis, Mohamed Choura: A STUDY OF PRESSURE INFLUENCES OF PHOSPHOGYPSUMBASED BRICKS, International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 3, May – June (2013), pp. 143-154
[2] Popovics, S., Rose, J.L., Popovics, J.S., “The behavior of ultrasonic pulse in concrete”, Cement and Concrete Research, 20: 259–270 (1990).
[3] Vasconcelos, G., Lourenço. P.B., Alves, C.A., Pamplona, J., “Ultrasonic evolution of the physical properties of granites”, Ultrasonic, 48: 453-466 (2008).
[4] Yaman, I.O., Aktan, H., Hearn, N., “Active and nonactive porosity in concrete-part II: evaluation of existing models”, Mater. Struct., 35: 110–116 (2002).
[5] Philippidis, T.P., Aggelis, D.G., “Experimental study of wave dispersion and attenuation in concrete”, Ultrasonics, 43: 584–595 (2005).
[6] Aggelis, D.G., Polyzos, D., Philippidis, T.P., “Wave dispersion and attenuation in fresh mortar: theoretical predictions vs. experimental results”, J. Mech. Phys. Solids, 53: 857–883 (2005).
[7] Demirboğa, R., Türkmen, İ., Karakoç, M.B., “Relationship between ultrasonic velocity and compressive strength for high-volume mineraladmixtural concrete”, Cement and Concrete Research 34: 2329-2336 (2004).
[8] Mishra, S.R., Kumar, A., Park, A., Rho, J., LosbyHoffmeister, B. K., ”Ultrasonic characterization of the curing process of PCC fly ash-cement composites”, Materials Characterization 50: 317-323 (2003).
[9] Raman, S.N., Safiuddin, M.D., Zain, M.F.M., “Nondestructive evaluation of flowing concretes in cooperating quarry waste”, Asian journal of civil engineering (Building and Housing), 8(6): 597- 614 (2007).
[10] Lourenço, P.B., Feio, A., Machado, J.S., “Chestnuts wood in compression perpendicular to the grain: non-destructive correlation for news and oldwood”, Construction and Building Materials 21(8): 1617-1627 (2007).
[11] Feio, A., Lourenço, P.B., Machado, J.S., “New and old chestnut wood parallel to the grain: mechanical behavior and non-destructive evaluation”, International Journal of Architectural Heritage 3(1): 272-292 (2007).
[12] Postacıoğlu, B., Yapı Malzemesi Esasları (The Principles of Building Materials, Section 1: General Features of Materials), İstanbul Technical University, 141 (1966).
[13] De Belie, N., Grosse, C., Baert, G., “Ultrasonic Transmission to Monitor Setting and Hardening of Fly Ash Concrete”, ACI Material Journal, 105 (3): 221-226 (2008).
[14] Labouret, S., Looten-Baquest, I., Bruneel, C., Forhly, J., “Ultrasound method for monitoring rheology properties evolution of cement”, Ultrasonic 36: 205-208 (1998).
[15] Faiz, B., Maze, G., Decultot, D., Moudden, A., Assif, E.H., Ezzaidi, M., “Ultrasonic characterization of the quality of an epoxy resin polymerization”, IEEE Trans Ultrasound Ferroelectr Freq. Control, 46: 188-196 (1999).
[16] Yazıcıoğlu, S., Demirel, B., “The effect of the Elazığ Region used as a pozzolanic additive on the compressive strength of concrete increasing cure ages”, Journal of Fırat Univ. Science and Eng. 18(3): 367-374 (2006).
[17] Ahmadi BH. (1989) Use of high strength by product gypsum bricks in masonry construction. PhD dissertation, University of Miami, Coral Gables, Florida, USA. 245p.
[18] BS 1881. Recommendations for measurement of pulse velocity through concrete. London: British Standards Institute; 1997 (Part 203).
[19] Paki Turgut.2012, Manufacturing of building bricks without Portland cement. Journal of Cleaner Production 37, 361-367
[20] Lafhaj, Z., Goueygou, M., Djerbi, A., Kaczmarek, M., “Correlation between porosity, permeability and ultrasonic parameters of mortar with variable water/cement ratio and water content”, Cement and Concrete Research, 36: 625–633 (2006).
[21] Hernández, M.G., Izquierdo, M.A., Ibanez, A., Anaya, J.J., Gomez-Ullate L., “Porosity estimation of concrete by ultrasonic NDT”, Ultrasonics, 38: 531–536 (2000).

Lamia Bouchhima, Mohamed Jamel Rouis, Mohamed Choura “Correlation of Ultrasound Pulse Velocity with Mechanical Properties and Water Absorption in Phosphogypsum- wade Sand-Lime-Cement Building Bricks produced under a static compaction of 20MPa.” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.01-05 2015

For Full Text Click here
pdf download

Md. Jafir Alam , Garima Saini February 2015 Page No.: 06-09

This paper is a detail survey of the ICI reduction technique for OFDM systems using combining weight technique. The paper reviews a lot of combining weight techniques as well as compare different types of combining weight technique based on ICI reduction performance and cost constraint. In ICI reduction, optimum combining and near-optimum combing methods are reviewed. These methods are highly compatible with most existing data detection, equalization, and channel estimation methods. It has also very low complexity.

  •  Page(s): 06-09
  •  Date of Publication: February 2015
  •  Md. Jafir Alam
    Student, ME (Modular), Department of Electronics & Communication Engineering,
    National Institute of Technical Teachers’ Training and Research, Chandigarh, India
  •  Garima Saini
    Assistant Professor, Department of Electronics & Communication Engineering,
    National Institute of Technical Teachers’ Training and Research, Chandigarh, India

References

 

[1] S. Hara and R. Prasad, Multicarrier techniques for 4G Mobile Communication, Artech House, 2000.
[2] U. S. Jha and R. Prasad, OFDM towards Fixed and Mobile Broadband Wireless Access, Artech House, 2000
[3] R. Prasad, “OFDM for Wireless Communication Systems”, Artech House 2004
[4] Van Nee, R, and R.Prasad, OFDM for Wireless Multimedia Communications, Norwod, MA: Artech House, 2000
[5] L. Wei and C. Schlegel, Synchronization requirement for multiuser OFDM on Satellite mobile and two-path Rayleigh-fading channels, IEEE trans.Communi;43(2/3/4): 887-895, 1995
[6] Ch-Ying Ma, Chun-Yen Wu, and Chia-Chi un Huang, “A Simple ICI Suppression Method Utilizing Cyclic Prefix for OFDM Systems in the Presence of Phase Noise”, EEE Transactions on Communications, vol.61, no. 11,pp. 4539-4550, 2013
[7] Chun-Ying Ma, Sheng-Wen Liu, and Chia-Chi Huang, “Low Complexity ICI Suppression Methods Utilizing Cyclic Prefix for OFDM Systems in High-Mobility Fading Channels”, IEEE Transaction Vehicular Technology, vol.63, no.2, pp.718-730, 2014
[8] N. N Tchamov, V. Syrjala, J. RINNE, M. Valkama, Y. Zou, and M. Renfors, “System-and circuit-level optimization of PLL designs for DVB-T/H receivers,” Springer J. Analog Integrated Circuits and Signal process., vol.73,no. 1, pp. 185-200, 2012
[9] N. N. Tchamov, A. Hazmi, J. Rinne, M. Valkama, and M. Renfors, “Performance comparison of DVB-T and DVB-T2 in the presence of phase noise,” in proc.2010 International OFDM-Workshop, pp. 1-4, 2010

Md. Jafir Alam , Garima Saini “ICI Reduction Technique for OFDM Systems using Combining Weight Technique: A Survey” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.06-09 2015

For Full Text Click here
pdf download

U. K. Sinha, Monika, S. P. Sharma, S. B. L. Seksena, Swapnil Saurav February 2015 Page No.: 10-21

The heat extraction from the lower convective zone or storage zone of salinity gradient solar pond with corrugated bottom is investigated with the aim of increasing the overall efficiency of collecting solar radiation, storing heat and delivering this heat to different applications. The energy balance equations for each zone have been used to develop the expression of temperature distribution in the solar pond. Then this equation has been used to develop the equation for efficiency of the solar pond. The analysis is based on the boundary conditions at the interface between the zones and the matching conditions. In this method, heat is extracted from the storage zone of the solar pond. A theoretical analysis is conducted to obtain expression for the variation of temperature with depth of solar pond. The dependence of the energy efficiency of the solar pond on the thickness of storage zone, temperature of delivered heat, variation combinations of the pond and storage zone heat extraction only explored. The theoretical analysis suggests that heat extraction from the storage zone has the potential to increase the overall efficiency of a solar pond delivering heat at a relatively high temperature by up to 50 %, compared with the conventional solar pond method of heat extraction solely from the storage zone. The potential gain in efficiency using storage zone heat extraction is attributed to the storage zone that can be achieved with this method. The results are then obtained by computer simulation. The effects of system and operating parameters of the solar pond like area enhancement factor (β), heat extraction rate, heat capacity rate and depth of the pond on the temperature distribution and efficiency have been developed. It has been found that the temperature distribution in the solar pond is a strong function of system and operating parameters.

  •  Page(s): 10-21
  •  Date of Publication: February 2015
  •  U. K. Sinha
    Electrical Engineering Department,
    National Institute of Technology Jamshedpur, India
  •  Monika
    National University of Singapore, Singapore, India
  •  S. P. Sharma
    Electrical Engineering Department, National Institute of Technology Jamshedpur, India
  •  S. B. L. Seksena
    Mechanical Engineering Department,
    National Institute of Technology Jamshedpur, India
  •  Swapnil Saurav
    Loyola School, Jamshedpur, India

References

 

[1] Jaefarzadeh, M. R., “Thermal Behavior of Large Salinity Gradient Solar Pond in the City of Mashhad.” Iranian Journal of Science and Technology, Transaction B, Engineering, Vol. 29, No. B2, Printed in The Islamic Journal of Iran, 2005.
[2] Atkinson, J. R. and Harleman, D. r., “A wind-mixed layer mode for Solar Ponds.” Solar Energy, 31, 243-259, 1983.
[3] Schladow, S. G., “The upper mixed zone of a Salt Gradient Solar Pond: Its dynamics and Control.”Solar Energy, 33, 417-426, 1984.
[4] Tabor, H., “Solar Ponds: Reviewed.” Solar Energy, 27, 181-191, 1981.
[5] Nielsen, C. E., “Non-convective Salt Gradient Solar Ponds.” In: W. C. Dikinson and P. N. Chereminoff (eds.), Solar Energy Technology Handbook, Part A, pp. 345-376, Marcel Dekker, New York, 1980.
[6] Rubin, H. and Bemporad, G. A., “The Advanced Solar Pond (ASP): Basic theoretical aspects.” Solar Energy, 43, 33-34, 1989.
[7] Rubin, H. and Bemporad, G. A., “Analysis of turbulent flow in thermal layers of a advanced solar pond (ASP).” Solar Energy, 43, 25-33, 1989.
[8] Keren, Y., Bemporad, G. A. and Rubin, H., “Basic experiments related to the advanced solar pond performance.” Transaction of ASME, J. Fluids Engineering, 113, 116-123, 1991.
[9] Rubin, H., Keren, Y. and Bemporad, G. A., “Feasibility of the advanced solar pond (ASP) according to Osdor method: Feasibility experiments.” Coastal and Marine Engineering Research Institute(CAMERI) Report, June, 1990.
[10] Mohammed, A. D., “Computer Simulation Yearly or Seasonally Optimum Salt –gradient of Solar Pond in Jordan „Dead Sea‟.” Australian journal of Basic and Applied Sciences, 2(4), pp. 1172-1185, 2008.
[11] Angeli, C., Leonardi, E. and Maciocco, L., “A Computational Study of Salt Diffusion and Heat extraction in Solar Pond Plants.” Solar Energy, 80, 1498-1508, 2006.

U. K. Sinha, Monika, S. P. Sharma, S. B. L. Seksena, Swapnil Saurav “Comparison of Thermal Behavior of Solar Ponds with Flat and Corrugated Bottom” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.10-21 2015

For Full Text Click here
pdf download

Prabha R, Chandana D K February 2015 Page No.: 22-25

Advances in information and communications technology have enabled the adoption of wireless communication techniques in all sectors for the transmission of information in all forms between any two points. Wireless communications and distributed computing have promoted the development of vehicle health monitoring (VHM) systems. These have the potential for use in the monitoring of railway signalling systems and rail tracks. This paper surveys existing wireless techniques used in the railway industry for both communications and monitoring purposes. This paper proposes different railway monitoring applications and new protocol, named E-BMA, which achieves even better energy efficiency for low and medium traffic by minimizing the idle time during the contention period.

  •  Page(s): 22-25
  •  Date of Publication: February 2015
  •  Prabha R
    Associate Professor,
    Dr. AIT, Bangalore, India
  •  Chandana D K
    PG student, M Tech, CNE,
    Dr.AIT, Bangalore,India

References

 

[1] G.M. Shafiulla,Salahuddin A.Azad, A.B.M Shawkat Ali, ”Energy Efficient MAC protocol for railway monitoing applications”.
[2] Aboelela et al., 2006. Aboelela, E., Edberg, W., Papakonstantinou, C., and Vokkarane, V. (2006). Wireless sensor network based model for secure rail- way operations. Performance, Computing, and Communications Conference, 2002. 21st IEEE International, 0:83.
[3] G.M. Shafiullah, A. Thompson, P. Wolfs, and S. Ali, “Energy-efficient TDMA MAC protocol for wireless sensor networks applications,” in Proc.5th ICECE, Dhaka, Bangladesh, Dec. 24–27, 2008, pp. 85–90.
[4] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proc. IEEE INFOCOM, New York, Jun. 2002, pp. 1567–1576.
[5] V. Raghunathan, C. Schurgers, S. Park, and M. B. Srivastava, “Energyaware wireless microsensor networks,” IEEE Signal Process. Mag., vol. 19, no. 2, pp. 40–50, Mar. 2002.
[6] G.M. Shafiullah, A. Gyasi-Agyei, and P. Wolfs, “A survey of energyefficient and QoS-aware routing protocols for wireless sensor networks,” in Proc. Int. Joint Conf. CISSE, Dec. 2007, pp. 352–357.
[7] Whelan et al., 2007. Whelan, M. J., Fuchs, M., Gangone, M. V., and Janoyan, K. D. (2007). Development of a wireless bridge monitoring system for condition assess-ment using hybrid techniques. In Proceedings of SPIE, the International Society for Optical Engineering, pages 28–32.

Prabha R, Chandana D K “Survey on Different Railway Monitoring Applications using Wireless MAC Protocols ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp. 22-25 2015

For Full Text Click here
pdf download

V.S. Shali, T.H. Freeda, N. Neelakanda Pillai February 2015 Page No.: 26-29

TGSxP1-x binary mixed crystals were grown from an aqueous solution by slow evaporation technique. The grown crystals were characterized structurally and chemically by taking XRD, EDAX, FTIR and measuring the density. The XRD data shown that the mixed crystals belong to monoclinic structure. The lattice parameter calculated obeys both Vegard’s law and Retger’s rule. The FTIR spectra confirms the functional groups.

  •  Page(s): 26-29
  •  Date of Publication: February 2015
  •  V.S. Shali
    Department of Basic Engineering,
    Cape Polytechnic College, Aralvoimozhi, Tamilnadu, India.
  •  T.H. Freeda
    Physics Research Centre,
    S.T. Hindu College, Nagercoil, Tamilnadu, India.
  •  N. Neelakanda Pillai
    Department of Physics,
    Arignar Anna College, Aralvoimozhi, Tamilnadu, India

References

 

[1] N. Nakatani, JPn. J. Appl. Phy. 29 (1990) 2774.
[2] G. Ravi, S. Anbu Kumar, P. Rama Samy, Mat. Chem. Phys. 37 (1994) 180.
[3] P. Manoharan and N. Neelakanda Pillai, Scholars Research Library, Archives of Applied Science Research, 2013, 5(1): 93-97.
[4] R. Mohan Kumar et al ‘Proceeding Recend Trends in crystal growth’, Anna University.
[5] L. Vegard (1921), Z. Physik 5, 17
[6] J. Retgers (1889), Z. Phys. Che 3, 497.

V.S. Shali, T.H. Freeda, N. Neelakanda Pillai “Growth and Structural Studies of TGSxP1-x Single Crystals ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp. 26-29 2015

For Full Text Click here
pdf download

Thanuja M N , Dr. Neelakanda Pillai N February 2015 Page No.: 30-33

Mixed crystals of alkali halides find their applications in optical, opto electronics and electronic devices. Binary mixed crystals of NaBr and KBr were grown by the slow evaporation method. Densities and refractive indices of all the grown crystals were determined and also used for the estimation of the bulk composition in crystal lattice parameters and hardness values were determined by XRD and Vicker’s micro hardness measurements respectively. The detailed results are reported in this paper.

  •  Page(s): 30-33
  •  Date of Publication: February 2015
  •  Thanuja M N
    B.T. Assistant,
    GHSS Devarshola, The Nilgiris,India
  •  Dr. Neelakanda Pillai N
    Associate Professor, Department of Physics,
    Arignar Anna College, Aralvoimozhi, India

References


[1] D. S. Sirdeshmukh, K. Srinivas, Physical Properties of mixed crystals of alkali halides, J. Mater. Sci 21(1986) 4117-4130
[2] V. Haribabu, V. Subbarao, Growth and characterization of alkali halide mixed crystals, Prog. Crystal Growth Charact. 8(1984) 189-260
[3] I.R. Nair, C.T. Walker, Raman scattering and X-ray scattering studies on KBr1-xIx, KCl1-x and K1-xRbxCl.
[4] J.B. Thompson Jr., D.R. Waldbaum, Analysis of the two-phase region halite-sylvite in the system NaCl-KCl. Geochim, Cosmochim, Acta 33 (1969) 671-690.
[5] Jayanthi T. S & N. Neelakanda Pillai. The Board of IJLTEMAScience Volume III(2014) P 28-29.
[6] S. Sivananthan and N. Neelakanda Pillai, Scholars Research Library Archives of Physics Research 2012, 3(3) : 239 -244
[7] C. V. Somasundari and Neelakanda Pillai IOSR Journal of Applied Physics (IOSR-JP) e – ISSN: 2278-4891. Volume 3, Issue 5(Mar-Apr 2013) PP01-07
[8] Lesly Fathima & N Neelakanda Pillai, Scholars Research Library Archives of Physics Research, 2012, 3(5):407-410
[9] A.E.H Tutton, Crystallography and Practical Crystal Measurement, Vol II, Today and Tomorrow’s Book Agency, New Delhi, 1965. P 1014
[10] H. Lipson, H Steeple, Interpenetration of X-ray Powder Diffraction Patterns, Macmillan, New York 1970
[11] N.H. Ashby(1951), J. Nad. Engg. 6,33
[12] B.W. Mott (1956), Micro indentation Hardness Testing (Butterworth’s, London)
[13] N.A. Wooster (1953), Ref. Progr. Phys. 16, 62
[14] J.H. Westbrook (1958), flow in rock salt structure (Report 58 RL 2003 of the G.E. Research Laboratory, USA)
[15] J.H. Westbrook and H Conard [Edn] 919730, The Science of Hardness testing and its Research Applications.
[16] A.V. Tobolsky, J.Chem. Phys. 10 (1942), 187.
[17] Onitch E.M [1947]Microscopic 2,131

Thanuja M N & Dr. Neelakanda Pillai N. “Lattice Parameter, Density and Microhardness Studies on Naxk1-Xbr Crystals Grown from Aqueous Solution ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.30-33 2015

For Full Text Click here
pdf download

Smitha Sasi, Dr. L. Swarna Jyothi February 2015 Page No.: 34-38

Public key cryptosystem or the asymmetric crypto system is more secure than secret key method because a pair of related key is being used by both sender and receiver. The problem occurring in most of the cryptosystem is plain text being considered as an integer number that leads to poor security. In this paper we propose an efficient polynomial based public key cryptography technique over Galois field GF(p) and extended to GF(2m), which considers plaint text as a (x,y) coordinate elements derived from the polynomial.

  •  Page(s): 34-38
  •  Date of Publication: February 2015
  •  Smitha Sasi
    Assistant Professor, Department of Telecommunication Engineering,
    Dayananda Sagar College of Engineering, Bangalore, Karnataka, India
  •  Dr. L. Swarna Jyothi
    Principal,
    Jnana Vikas Institute of Technology, Bangalore, Karnataka, India

References

 

[1] H. Caglar and A. N. Akansu, “A Generalized Parametric PRQMF Design Technique Based on Bernstein Polynomial Approximation,” IEEE Transactions on Signal Processing, vol. 41, no. 7, pp. 2314–2321, July 1993.
[2] Online geometric modeling notes: Bernstein; Visualization and graphics research group; department of computer science, University of California
[3] https://mathworld.wolfram.com
[4] William Stallings, ―Cryptographyand Network Security‖, Principles and Practices, 3rd Edition, Prentice Hall 2003.
[5] Interpolation and approximation of polynomials by Philips, G.M.ISBN:978-0-387-00215-6 https://www.springer.com/978-0-387-00215-6;
[6] The Encyclopedia of design theory: Galois fields by Peter J. Cameron May 30, 2003
[7] Error Control Coding by Shu Lin, Daniel J Costello; 2nd edition.

Smitha Sasi, Dr. L. Swarna Jyothi “A Heuristic Cryptosystem Based on Bernstein Polynomial on Galois Fields GFP and GF(2m)” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.34-38 2015

For Full Text Click here
pdf download

Diptendu Datta, Sagar Biswas February 2015 Page No.: 39-46

In the present study, adsorption of phenol from synthetic wastewater was investigated on metal impregnated activated carbon derived from coconut shell. Carbonized coconut shell mixed with appropriate metal salts was pyrolyzed at 850°C under inert N2 atmosphere to develop metal impregnated activated carbon. In order to evaluate the performance of activated carbon thus prepared batch adsorption experiments were conducted at a fixed temperature (27°C) and pH (6.0) for different initial phenol concentration ranging from 100 to 500 mg.l-1, with adsorbent loading of 0.2 gm in 200 ml adsorbate solution. The maximum adsorption capacity was found to be highest for 1% Zn-2% Fe-AC which was as high as 402 mg.g-1. The adsorption isotherms were in conformation to both Langmuir and Freundlich isotherm model. Kinetic evaluation indicated that phenol adsorption on developed activated carbon followed pseudo-second-order rate reaction. Diffusion controlled kinetic model on the system showed that removal rate was controlled not only by intra-particle diffusion but also film diffusion.

  •  Page(s): 39-46
  •  Date of Publication: February 2015
  •  Diptendu Datta
    Department of Chemical Engineering,
    Heritage Institute of Technology, Kolkata-107, India
  •  Sagar Biswas
    Department of Chemical Engineering,
    Heritage Institute of Technology, Kolkata-107, India

References

 

[1] A. Bhatnagar, Removal of bromophenols from water using industrial wastes as low cost adsorbents, J. Hazard. Mater. 139 (2007) 93–102.
[2] ATSDR (Agency for Toxic Substances and Disease Registry), Toxicological Profile for Phenol, US Department of Health and Human Services, USA, 1998.
[3] V.K. Gupta, S. Sharma, I.S. Yadav, D. Mohan, Utilization of bagasse fly ash generated in the sugar industry for the removal and recovery of phenol and p-nitrophenol from wastewater, J. Chem. Technol. Biotechnol. 71 (1998) 180–186.
[4] USEPA, Technical Support Document for Water Quality Based Toxics Control. EPA/440/485032, United States Environmental Protection Agency, Washington, DC, USA 1985.
[5] K. Juttner, U. Galla, H. Schmieder, Electrochemical approaches to environmental problems in the process industry, Electrochim. Acta 45 (2000) 2575–2594.
[6] M. Tomaszewska, S. Mozia,W. Morawski, Removal of organic matter by coagulation enhanced with adsorption on PAC, Desalination 162 (2004) 79–87.
[7] A. Agrios, K. Gray, E. Weitz, Photocatalytic transformation of 2,4,5- trichlorophenol on TiO2 under sub-band-gap illumination, Langmuir 19 (2003) 1402–1409.
[8] LD. Buchanan, J.A. Micell, Peroxidase catalyzed removal of aqueous phenol, Biotechnol. Bioeng. 54 (1997) 251-261.
[9] M.C. Burleigh, M.A. Markowitz, M.S. Spector, B.P. Gaber, Porous polysilsesquioxanes for the adsorption of phenols, Environ. Sci. Technol. 36 (2002) 2515-2518.
[10] J.E.G. van Dam., Coir processing technologies, Improvement of drying, softening, bleaching and dyeing coir fibre/yarn and printing coir floor coverings, Technical Paper No. 6, Wageningen, Netherlands, FAO and CFC 2002.
[11] Z. Hu, H. Guo, M.P. Srinivasan, N. Yaming, A simple method for developing mesoporosity in activated carbon, Sep. Purif. Technol. 31 (2003) 47–52.
[12] Z. Hu, M.P. Srinivasan, Mesoporous high-surface-area activated carbon from fir wood by KOH etching and CO2 gasification for adsorption of dyes and phenols from water, J. Colloid Interface Sci. 294 (2006) 21-30.
[13] Al. Vogel, A Text Book of Quantitative Chemical Analysis, ELBS Publication, London, England, 1991.
[14] G. McKay, Use of Adsorbents for the Removal of Pollutants from Wastewater, CRC Press, Boca Raton, FL, 1995.
[15] A.T. Mohd Din, B.H. Hameed, A.L. Ahmed, Batch adsorption of phenol onto physiochemical-activated coconut shell, J. Hazard. Mater. 161 (2009) 1522-1529.
[16] W.J. Weber Jr., J.C. Morris, Kinetics of adsorption on carbon from solution, J. Sanit Eng. Div. ASCE 89 (1963) 31–59.
[17] N. Khalid, S. Ahmad, A. Toheed, J. Ahmad, Potential of rice husk for antimony removal, Appl. Radiat. Isotopes 52 (2000) 30–38.
[18] Mall L.D., Srivastava V.C. and Agarwal N.K. (2006). Removal of orange-G and methyl violet dyes by adsorption onto bagasse fly ash-kinetic study and equilibrium isotherm analyses, Dyes and Pigments, 69: 210-233.
[19] Srivastava V.C., Mall L.D. and Srivastava L.M. (2006). Equilibrium modellng of single and binary adsorption cadmium and nickel onto baggase fly ash, Chemical Engineering Journal, 117: 79-91.
[20] Allen S.J., Gan Q., Matthews R. and Johnson P.A. (2005). Kinetic modelling of the adsorption of basic dyes by kudzu, Journal of Colloid and Interface Science, 286: 101–109.
[21] Malik P.K. (2003). Use of activated carbons prepared from sawdusts and rice-husk for adsorption of acid dyes: a case study of acid yellow 36, Dyes and Pigments, 56: 239–249. [22] Hall K.R., Eagleton L.C., Acrivos A. and Vermeulen T. (1966). Pore- and solid-diffusion kinetics in fixed-bed adsorption under constant-pattern conditions, Industrial and Engineering Chemistry fundamentals, 5: 212-223.
[23] Weber Jr. W.J. and Morris J,C. (1963). Kinetics of adsorption on carbon from solution, Journal of Sanitary Engineering Division, 89: 31–59.

Diptendu Datta, Sagar Biswas “Study on Phenol Adsorption by Activated Carbon Derived from Coconut Shell” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.39-46 2015

For Full Text Click here
pdf download

Mita Behera February 2015 Page No.: 47-50

This research paper presents decentralized control scheme for Load Frequency Control in a multi-area Power System by appreciating the performance of the methods in a single area power system. A number of modern control techniques as well as the classical methods and optimization algorithm are adopted to implement a reliable stabilizing controller. A serious attempt has been undertaken aiming at investigating the load frequency control problem in a power system consisting of two power generation unit and multiple variable load units. The robustness and reliability of the various control schemes is examined through simulations and Mat-Lab programming. The design is determined an optimization problem and a novel cost function is derived for increasing the performance of convergence to the solution. To optimize the parameters of the cost functions and the PID-controller, the Ziegler-Nichols method of PID tuning also used here. The results show that the proposed control method is provided better performance for dynamic responses of the power system.

  •  Page(s): 47-50
  •  Date of Publication: February 2015
  •  Mita Behera
    Department of Electrical Engineering,
    College of Engineering and Technology, Bhubaneswar, Odisha, India

References

 

[1] O.I. Elgerd, Electric Energy Systems Theory: An Introduction. New York: McGraw-Hill, 1982.
[2] P. Kundur, Power system stability and control, McGraw–Hill, Inc.,1994
[3] Ibrahim, Prabhat Kumar, and Dwarka P. Kothari, “Recent philosophies of automatic generation control strategies in power Systems,” IEEE Transactions on Power Systems, Vol. 20, No. 1, February 2005, 20(1): 346-57.
[4] S.P Ghosal,‟Optimizations of PID Gains by particle swarm Optimization in Fuzzy based Automatic Generation Control” „Electrical Power systems Research,Vol.70,No.3,pp.203-212,2004.
[5] G. Zarighavar, H. Shayeghi, A. Sakhavati and S.H. Hosseini, “PID Type LFC Design Consideration Uncertainties and Nonlinearities in Power System using PSO”, Proc. of the 24th International Power Systems Conference, pp. 1-6, Tehran, Iran, 2010.
[6] R.Shankar Naik, K.ChandraSekhar, K.Vaisakh “Adaptive PSO Based Optimal Fuzzy Controller Design for AGC Equipped with SMES and SPSS”, Journal of Theoretical and Applied Information Technology. pp. 8 – 16.
[7] V. Donde, M. Pai, I. Hiskens,(2001). Simulation and Optimization in an AGC System after Deregulation. IEEE Transactions on Power Systems, 16(3): 481–488,
[8] El-Zonkoly AM (2006). “Optimal Tuning of Power Systems Stabilizers and AVR Gains using Particle Swarm Optimization.” Expert Syst.Appl. 31:551-557.and AVR Gains using Particle Swarm Optimization.” Expert Syst.Appl. 31:551-557.
[9] Hadi Saadat:”Power system analysis ” Tata McGraw Hill 2002 Edition, New Delhi
[10] M. Kothari, N. Sinha and M. Rafi, “Automatic Generation Control of an Interconnected Power System under Deregulated Environment,” Power Quality, vol. 18, pp. 95–102,
[11] Donde, M. A. Pai, and I. A. Hiskens, “Simulation and Optimization in an AGC System after Deregulation,” IEEE Transactions on Power Systems, vol. 16, pp. 481– 489, Aug. 200
[12] Z. Gao, Y. Huang, and J. Han, “An Alternative Paradigm for Control System Design,” Proceedings of IEEE Conference on Decision and Control, vol. 5, no. 4–7, pp. 4578–4585, Dec. 2001.
[13] A. Kumar, O.P.Malik, G.S.Hope, Variablestructure- system control Applied to AGC of an interconnected power system, IEEE Proceedings, Vol. 132, Pt. C, No. 1, pp. 23-29, January 1985.
[14] J. Kennedy and R. C. Eberhart, “Particle swarm optimization,” Proceedings of IEEE International Conference on Neural Networks (ICNN‟95), Vol. IV, pp. 1942-1948, Perth, Australia, 1995.
[15] J. Kennedy and R. C. Eberhart, Swarm Intelligence, San Francisco, CA:Morgan Kaufmann Publishers, 200
[16] O.I.Elgerd, C.E.Fosha, “Optimum megawatt-frequency control of multiarea electric energy systems”, IEEE Transactions on Power Apparatus and Systems, vol.pas89, No.4, April 1970.
[17] I.P.Kumar, D.P. Kothari, “Recent philosophies of automatic generation control strategies in power systems”, IEEE Transactions on Power Systems, vol. 20, No.1, February 2005.
[18] B.Yang, Y.Chen, Z.Zhao, “Survey on applications of particle swarm optimization in electric power systems”, IEEE International Conference on Control and Automation, Guangzhou-China, pp. 481-486., May 30 to June 1, 2007.S., Chang, Weihui Fu

Mita Behera “Optimization of Controller Values of Interconnected Power System” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.47-50 2015

For Full Text Click here
pdf download

Sella Kumaraswamy February 2015 Page No.: 51-54

Dwelling is an encompassing one in the series of three essential commodities of human lives. In which food is consuming and changeable according to the requirement of health and taste. Clothing is also changeable with our thoughts and appearance at very low cost, Whereas the Dwellings requires a huge amount of investment and a permanent place and such type of investment is possible once in a life time of an ordinary person. It is common to all except the technical persons and experts, that constructing the shelters by keeping the requirement of living space and final appearance in mind, and with absence of quality, workmanship, and stability of the building. All these lead the age of the building and protects from natural calamities. Most probably major part in the shelter constructions are dependent of financial institution and these institutions are granting the loans based on the valuation certificate given by the practicing valuers. It is possible to bring the stable construction practice in the society using the valuers and their valuation report as a tool by giving certain weightage for the Earth quake resistant designs in the construction and the structure becomes suitable for long life and safe against other natural calamities too. Hence in a view to insist the valuers and the bankers to give their contribution in making stable structures and safe to the society, this article is prepared with descriptive effects of earth quake and its consequences and put forth for publication.

  •  Page(s): 51-54
  •  Date of Publication: February 2015
  •  Sella Kumaraswamy
    Department of Civil Engineering,
    P.A College of Engineering and Technology, Pollachi, Coimbatore, India.

References

 

[1] PankajAgarwal, Manish Shrikhande 2009, “Earthquake Resistant Design of Structures” PHI Learning Private Limited, New Delhi-110001.
[2] Indian standard code of practice IS 1893 (part-I) – 2002, „Seismic zones of India” bureau of Indian standard, New Delhi

Sella Kumaraswamy “Earthquake and It’s Influences on the Valuation of Immovable Properties” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.51-54 2015

For Full Text Click here

J.P. Shubha, Y. Madhusudhan, R. Raveesha , Puttaswamy February 2015 Page No.: 55-62

The kinetics of oxidative decolorization of disperse orange 13 (DO13) by chloramine-T (CAT) and bromamine-T (BAT) in acid medium has been investigated spectrophotometrically (λmax = 427 nm) at 298 K. UV-visible spectrophotometry was used as a basic analytical approach in the present kinetic study. Kinetic runs were performed under pseudo first-order conditions of [oxidant]o >> [DO13]o. Under identical experimental conditions, reactions with both the oxidants follow identical kinetics with a first-order dependence on each [oxidant]o and [DO13] and a fractional-order dependence on [HClO4]. Stoichiometry of the reaction was found to be 1:4 and the oxidation products were identified. The reaction was studied at different temperatures and various activation parameters have been computed. Effects of p-toluenesulfonamide, halide ions, ionic strength and dielectric constant of the medium have been investigated. Reaction mixture fails to induce polymerization of acrylonitrile. The rate of oxidation of DO13 is about 2 times faster with BAT as compared to CAT. This may be attributed to the difference in electrophilicities of Cl+ and Br+ ions and also the van der Waal’s radii of chlorine and bromine. Plausible mechanism and related rate law have been deliberated for the observed kinetics.

  •  Page(s): 55-62
  •  Date of Publication: February 2015
  •  J.P. Shubha
    Department of Chemistry,
    Don Bosco Institute of Technology, Kumbalagodu, Bangalore, India
  •  Y. Madhusudhan
    Department of Chemistry,
    Don Bosco Institute of Technology, Kumbalagodu, Bangalore, India
  •  R. Raveesha
    Q C Department,
    Apotex pharmachem Ind. Pvt. Ltd., Bommasandra Industrial area, Jigani Link Road, Bangalore, India
  •  Puttaswamy
    Department of Chemistry,
    Central College Campus, Bangalore University, Bangalore, India

References

 

[1] Zollinger, H; Colour chemistry: Synthesis, properties and applications of organic dyes and pigments, New York, VCH, 1981
[2] Perkowski, J; Ledakowicz, S. Fibres Text East Eur. 2002, 10, 68-72.
[3] Waters, B.D.; Colour in Dyehouse Effluent, Cooper, P. Ed. Society of Dyers and Colourists, Bradford, 1995.
[4] Pearce, C.I.; Lloyd, J.R.; Guthrie, J.T. Dyes Pigments 2003, 58, 179-196.
[5] Umbuzeiro, G.D.A.; Freeman, H.S.; Warren, S.H.; De Oliveira, D.P.; Terao, Y.;Watanabe, T.; Claxton, L.D. Chemosphere 2005, 60, 55-64.
[6] Oakes, J.; Gratton, P. J. Chem. Soc. Perkin Trans 2 1998, 2201-2206.and references therein.
[7] Abrahat, E.N.; Dyes and their intermediates, London, UK Edward AQrnolds Ltd. 1977.
[8] Ligrini, O.; Oliveros, E. Braun, A. Chem Rev 1993, 93, 671-698.
[9] Roxon, J.J.; Ryan, A.J.; Wright, S.E.; Food Cosmet Toxicol 1967, 5, 367-369.
[10] Jennings, V.J. Critical Rev Anal-Chem 1947, 407-419.
[11] Campbell, M.M.; Johnson, G. Chem Rev 1978, 78, 65-79.
[12] Banerji, K.K.; Jayaram, B.; Mahadevappa, D.S. J Sci Ind Res 1987, 46, 65-76.
[13] Kolvari, E.; Ghorbani-Choghamarani, A.; salehi, P.; Shirini, F.; Zolfigol, M.A. J Iran Chem Soc 2007, 4(2), 126-174.
[14] Rangappa, K.S. J Indian Chem Soc 2004, 81, 1025-1037.
[15] Puttaswamy, Anuradha, T.M.; Ramachandrappa, R.; Gowda, N.M.M. Int J Chem Kinet 2000, 32, 221-230.
[16] Agarwal, M.C.; Upadhyay, S.K. J Sci Ind Res 1990, 49, 13-18.
[17] Ramachandra, H.; Rangappa, K.S.; Mahadevappa, D.S.; Gowda, N.M.M. Monatsh Chem 1996, 127, 241-255.
[18] Kambo, N.; Upadhyay, S.K. Indian J chem 2004, 43A, 1210-1215.
[19] Puttaswamy, Jagadeesh, R.V. Ind Eng Chem Res 2006, 45, 1563-1570.
[20] Puttaswamy, Shubha, J.P. Transition Met Chem 2008, 33, 1003-1011.
[21] Naidu, H.M.K.; Yamuna, B.; Mahadevappa, D.S. Indian J Chem 1987, 26A, 114-117.
[22] Rangappa, K.S.; Ramachandra, H.; Mahadevappa, D.S.; Gowda, N.M.M. Int J Chem Kinet 1996, 28, 265-274.
[23] Puttaswamy, Jagadeesh, R.V. Int J Chem Kinet 2006, 38, 48-56.
[24] Nair, C.G.R.; Lalithakumari, R.; Indrasenan, P. Talanta 1978, 25, 525-527.
[25] Feigl F, Spot Tests in OrganicAanalysis, 7th Edn (Elsevier, Amsterdam) 1966.
[26] Hardy, F.F.; Johnston, J.P. J Chem Soc Perkin Trans II 1973, 742-750.
[27] Saldanha R.J.D.; Ananda, S.; Venkatesha, B.M.; Gowda, N.M.M. J Mol Struct 2002, 606- 147.
[28] Bishop, E.; Jennings, V.J. Talanta 1958, 1, 197-199.
[29] Murthy, A.R.V.; Rao, B.S. Proc Indian Acad Sci 1952, 35, 69-72.
[30] Morris, J.C.; Salazar, J.A.; Wineman, M.A. J Am Chem Soc 1948, 70, 2036-2041.
[31] Pryde, B.G.; Soper, F.D. J Chem Soc 1931, 1510-1512.
[32] Higuchi,T.; Hasegawa, T. J Phy Chem 1965, 69, 796-799.
[33] Moelwyn-Hughes, E.A. The kinetics of reaction in solutions, Oxford, Clarender Press, 374-381, 1947.
[34] Frost, A.A.; Pearson, R.G. Kinetics and Mechanism, New York, Wiley 135-149, 1961.
[35] Amis, E.S. Rates Anal Chem 1955, 27, 1672-1679.
[36] Laidler, K.J. Chemical kinetics New Delhi, Tata Mc Graw-Hill, 211-228,1955
[37] Reichardt, C. Solvent and Solvent Effects in Organic Chemistry New York, Wiley- Vctt, 219-237, 2003.
[38] Collins CJ, Bowman NS Isotope Effects in Chemical Reactions New York, Van- Nostrand, 267, 1970.
[39] Kohen, A, Limbach, H.H. Isotope Effects in Chemistry and Biology. Florida, CRC Press, 827-844, 2006.
[40] Puttaswamy, Mahadevappa, D.S.; Rangappa, K.S. Bull Chem Soc Jpn. 1989, 62, 3343-3348.
[41] Puttaswamy, Jagadeesh, R.V. Appl Catal A Gen. 2005, 2923, 259-271.
[42] Puttaswamy, Shubha, J.P. AIChE, 2009, 55(12), 3234-3240.

J.P. Shubha, Y. Madhusudhan, R. Raveesha and Puttaswamy “Spectrophotometric Kinetics and Mechanistic Chemistry of Oxidative Decolorization of Disperse Orange 13 by Sodium N-halo-p-toluenesulfonamides in Acid Medium” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.55-62 2015

For Full Text Click here
pdf download

Kapadia Fatema, Dr. K.B.Parikh, M.A.Jamnu February 2015 Page No.: 63-64

In this paper, an attempt has been made to study the possibilities to make the transmission line more cost effective by changing the bracings, configuration and type of transmission line structure for optimizing the weight of transmission tower. Due to the increasing demand of electrical energy, the tower should be made economical by developing different light weight structures. The present literature study has been carried out for optimizing the geometry for different sections; type of bracings, different configurations and for different supply of voltage and necessary conclusions for optimizing the geometry has been drawn out.

  •  Page(s): 63-64
  •  Date of Publication: February 2015
  •  Kapadia Fatema
    ME Scholar, Applied Mechanics Department,
    Government Engineering College, Dahod (Gujarat), India
  •  Dr. K.B.Parikh
    Assistant Professor, Applied Mechanics Department,
    Government Engineering College, Dahod (Gujarat), India
  •  M.A.Jamnu
    Assistant Professor, Applied Mechanics Department,
    Government Engineering College, Dahod (Gujarat), India

References

 

[1] “Analysis and Design of transmission towers” by Gopi Sudam Punse , international journal of modern engineering research 2014
[2] “Analysis and design of three legged 400KV double circuit steel transmission line towers” by Y. M Ghugal, U. S. Salunkhe, International Journal of Science and Engineering 2013
[3] “Analysis of transmission towers with different configurations” by C. Preeti and K. Jagan Mohan, Jordan Journal of Civil Engineering 2013
[4] “Analysis and design of 220KV transmission line tower in different zone I & V with different base widths – a comparative study” by Sudheer, K.Rajashekar, P.P.Reddy, and Y.B.Gopi Krishna, international journal of technology enhancement and emerging engineering research 2013
[5] Overview of the transmission line design process by Robert. D. Castro, Electric Power Systems Research, 1995
[6] “Performance of power transmission tower in PMA under earthquake ground motion” by Jonathan Z. Liang and Hong Hao, World Conference on Earthquake Engineering 2008
[7] “Wind load assessment for steel lattice tower with different codes” by Prof. Meen Bahadur Poudyal Chhetri and Anil Shakya,
[8] “Optimum design of transmission towers subjected to wind and earthquake loading” by Alaa C. Galeb and Ahmed Mohammed Khayoon, Jordan Journal of Civil Engineering 2013
[9] “Dynamic analysis of transmission towers under strong ground motion” by Gopiram Addala, D.Neelima, International Earthquake Symposium 2010
[10] G.Visweswara Rao:-“optimum designs for transmission line tower”, Computer & Structures
[11] “progressive collapse analysis of power transmission tower under earthquake excitation” by Li Tian, Ruisheng Ma, Wenming Wangand Lei Wang, The Open Civil Engineering Journal 2013
[12] “Dynamic analysis of transmission line towers” by Srikanth L., Neelima Satyam, International Journal of Civil, Architectural, Structural and Construction Engineering 2014
[13] Alan R. Kemp· and Roberto H. Behncke:- “Behaviour of crossbracings in latticed towers”.
[14] J.G.S. da Silva, P.C.G. da S. Vellasco, S.A.L. de Andrade, M.I.R. de Oliveira:-“Structural assessment of current steel design models for transmission and telecommunication towers”, Journal of Constructional Steel Research
[15] “Accurate modeling of joint effects in lattice transmission towers” by W.Q. Jiang , Z.Q. Wang, G. McClure, G.L. Wang, J.D. Geng
[16] Toshinaga Okamura, Takeshi Ohkuma, Eijiro Hongo, Hajime Okada:-“ Wind response analysis of a transmission tower in a mountainous area”, Journal of Wind Engineering and Industrial Aerodynamics
[17] “Research on the Optimal Layout of High-strength Steel in the Transmission Tower” by WEI Chunming, SU Tingting, MA Bin, Gong Jing, international conference of medical physics and biomedical engineering, 2012
[18] “ The response of an overhead electrical power transmission line to two types of wind forcing” by W.E. Lin, E. Savory , R.P. McIntyre , C.S. Vandelaar , J.P.C. King, Journal of Wind Engineering and Industrial Aerodynamics
[19] F.Albermani and M. Mahendran: – “Upgrading of transmission towers using diaphragm bracing system”, International Journal of Civil and Structural Engineering
[20] “Experimental study on corrosion of transmission line tower foundation and its rehabilitation” by S.Christian Johnson, G.S.Thirugnanam, International Journal of Civil and Structural Engineering“effect of medium wind intensity on 21m high 132kv transmission tower” by V. Lakshmi, A. Rajagopala Rao, International Journal of Earth Sciences and Engineering
[21] “Cyclic loading test of friction-type reinforcing members upgrading wind-resistant performance of transmission towers” by Ji-Hun Parka, Byoung-Wook Moonb, Kyung-Won Minb, Sung-Kyung Leeb, Chee Kyeong Kimc.
[22] “The influence of the design methodology in the response of transmission towers to wind loading” by A.M. Loredo-Souza, A.G. Davenport, Journal of Wind Engineering and Industrial Aerodynamics.

Kapadia Fatema, Dr. K.B.Parikh, M.A.Jamnu “Optimization of Power Transmission Tower” – A Critical Review International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.63-64 2015

For Full Text Click here
pdf download

Sumati Pati February 2015 Page No.: 65-67

Nano crystalline ZnO particles were synthesized using a wet chemical synthesis route. The synthesized particles were pressed and sintered at higher temperature (at 700oC for 2 h) in order to study the effect of sintering on grain growth in these nano particles. The as dried and the sintered particles were characterized by X-ray diffraction and FESEM. A noticeable change in the structural and morphological parameters was observed between as dried and sintered particles. The X-ray diffraction patterns showed highly intense peaks for sintered particles as compared with the as dried ones showing increase in crystallite size after sintering. FESEM images also confirmed the grain growth due to sintering. So it can be said that ZnO nano particles of varying size as desired can be synthesized using this low cost wet chemical synthesis technique for its potential application in various fields.

  •  Page(s): 65-67
  •  Date of Publication: February 2015
  •  Sumati Pati
    Vikram Dev (A) College, Jeypore, India

References

 

[1] Janotti, A. and Walle, C. G Van de (2009), Fundamentals of Zinc Oxide as a Semiconductor, Reports on Progress in Physics, Vol. 72, pp. 126501 (29).
[2] Thomas, D. G. (1960), The Exciton Spectrum of Zinc Oxide, Journal of Physics and Chemistry of Solids, Vol. 15, pp. 86-96.
[3] Reynolds, D.C., Look, D. C. and Jogai, B. (1996), Optically Pumped Ultraviolet Lasing from ZnO, Solid State Communications, Vol. 99, pp. 873-875.
[4] Look, D.C. (2001), Recent Advances in ZnO Materials and Devices, Materials Science and Engineering B, Vol. 80, pp. 383-387.
[5] Ozgur, U., Alivov, Y. I., Liu, C., Teke, A., Reshchikov, M. A., Dogan, S., Avrutin, V., Cho, S.-J. and Morkoc¸ H. (2005), A Comprehensive Review of ZnO Materials and Devices, Journal of Applied Physics, Vol. 98, pp. 041301(103).
[6] Minami, T. (2000), New n-Type Transparent Conducting Oxides, MRS Bulletin, Vol. 25, pp. 38-43.
[7] Nuruddin, A. and Abelson, J.R. (2001), Improved Transparent Conductive Oxide/p+ /i Junction in Amorphous Silicon Solar Cells by Tailored Hydrogen Flux During Growth, Thin Solid Films, Vol. 394, pp. 49-63.
[8] Brankovic, z., Milosevic, O., Poleti, D., Karanovic, L. and Uskokovic, D. (2000), ZnO Varistors Prepared by Direct Mixing of Constituent Phases, Materials Transactions, JIM, Vol. 41, pp. 1226-1231.
[9] Wager, J. F. (2003), Transparent Electronics, Science, Vol. 300, pp. 1245-1246.
[10] Prinz, G. A. (1998), Magnetoelectronics, Science, Vol. 282, pp.1660-1663.
[11] Shewale, P. S., Agawane, G.L., Shin, S.W., Moholkar, A.V, Lee, J.Y., Kim, J.H and Uplane, M. D. (2013), Thickness Dependent H2S Properties of Nanocrystalline ZnO Thin Films Derived by Advanced Spray Pyrolysis, Sensors and Actuators B, Vol. 177, pp. 695– 702.
[12] Wang, M., Hahn, S. H., Kim, E. J., Kim, J. S., Kim, S., Park, C. and Koo, K.-K. (2008), Chemical Solution Deposition of ZnO Thin Films with Controlled Crystallite Orientation and Intense Ultraviolet Emission, Thin Solid Films, Vol. 516, pp. 8599–8603.
[13] Shewale, P. S., Agawane, G. L., Shin, S. W., Moholkar, A. V., Lee, J. Y., Kim, J.H. and Uplane, M. D. (2013), Thickness Dependent H2S Sensing Properties of Nanocrystalline ZnO Thin Films Derived by Advanced Spray Pyrolysis, Sensors and Actuators B, Vol. 177, pp. 695–702.
[14] Castanedo-Pe´ rez, R., Jime´nez-Sandoval, O., Jime´nez-Sandoval, S., Ma´rquez-Marı´n, J., Mendoza-Galva´ n, A., Torres-Delgado, G. and Maldonado-Alvarez, A. (1999), Influence of annealing temperature on the formation and characteristics of sol-gel prepared ZnO films, J. Vac. Sci. Technol. A, Vol. 17 (4), pp. 1811-1816
[15] Wang, Y., Wang, H., Li, S., Zhou, S., Hang, Y., Xu, J., Ye, J., Gu, S. and Zhang, R. (2005) Annealing effect on properties of ZnO thin films grown on LiNbO3 substrates by MOCVD, Journal of Crystal Growth, Vol. 284, pp. 319–323.
[16] Raoufi, D. and Raoufi, T. (2009), The effect of heat treatment on the physical properties of sol–gel derived ZnO thin films, Applied Surface Science, Vol. 255, pp. 5812–5817.

Sumati Pati “Sintering and Grain Growth in Nanocrystalline ZnO Particles ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.65-67 2015

For Full Text Click here
pdf download

Jubin Jain, Vijendra Maurya, Anu Mehra February 2015 Page No.: 68-71

Due to the rising trends of technologies which are highly inclined towards the low voltage & low power consumption of silicon chip devices which are being developing exponentially due to the rising demand of smaller sized devices which are needed to be operated at lower voltage so that it can support longer battery life which can be used in portable applications such as in marketing segments including telecommunications, biomedical, computers and consumer electronics. It has become major concern that while designing any chip, power consumption is required to be kept in mind especially when it is concerned to biomedical devices. The supply voltage is being scaled down to reduce overall power consumption of the system. The objective of this project is to design ultra low powered operational amplifier which is operated at lower voltage 1.8V. As the voltage is lowered some of the parameters are sacrificed but still it is tried to satisfy the major parameters .It is also not possible to reduce the size of battery upto certain extent due to some chemical limitations, so a pathway is proposed to make the architectural changes. This project showcase the operational amplifier schematic implementation, simulation results with the 0.18μm technology designed in Tanner EDA 14.1. The operational amplifier is used to implement the ADC circuit. The op-amp specially designed for biomedical application (Pacemaker) on an account to improve the battery life of pacemaker.
The Project will briefly showcase the performance parameter of OPAMP with compensation at input.

  •  Page(s): 68-71
  •  Date of Publication: February 2015
  •  Jubin Jain
    Department of Electronics & Communication Engineering ,
    Geetanjali Institute of Technical Studies, Udaipur, India
  •  Vijendra MaurIya
    Department of Electronics & Communication Engineering ,
    Geetanjali Institute of Technical Studies, Udaipur, India
  •  Anu Mehra
    Department of Electronics & Communication Engineering ,
    ASET Amity University, Noida, India

References

 

[1] A very low power CMOS Mixed-Signal IC for implantablepacemaker applications by Louis S. Y. Wong, Raymond Okamoto.
[2] Design of low power SAR ADC in Biomedical ApplicationsInternational Journal of Advanced Research in Computer Engineering& Technology (IJARCET) Volume 2, Issue 7, July 2013.
[3] Design of Low Power Successive Approximation Analog to DigitalConverter Mr. J A. Waghmare et al Int. Journal of EngineeringResearch and Applications www.ijera.com ISSN : 2248-9622, Vol. 4,Issue 5( Version 7), May 2014, pp.62-66
[4] Mesgarani, M. N. Alam, F. Z. Nelson, and S. U. Ay, “Supplyboosting technique for designing very low-voltage mixed-signalcircuits in standard CMOS,” in Proc. IEEE Int. Midwest Symp.Circuits Syst.Dig. Tech. Papers, Aug. 2010.
[5] Euisoo Yoo,Roberts, G.W. “Optimizing CMOS amplifier designdirectly in SPICE without the need for additional mathematicalmodels”, IEEE International Symposium on Circuits and Systems,24-27 May 2009.
[6] CMOS Analog Circuit Design, Philip E Allen & Douglas RHolberg, 2nd Edition,Oxford University Press

Jubin Jain, Vijendra Maurya, Anu Mehra “Bio-Inspired Ultra Low Power Design of Op-amp with Input Compensation for Biomedical Application (Pacemaker)” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.68-71 2015

For Full Text Click here
pdf download

Caroline .A, Padmavati .R February 2015 Page No.: 72-76

Hard candies with natural colorant and high medicinal property are rare to be found. C. ternatea is a well known ayur-vedic plant with high health benefits. These are commonly found ornamental plants with flowers in blue and white color. C. ternatea was a blue colored -flower with high amount of polyphenol compound. These compounds act as source of free radical sca-venging. Quantitative analysis shows the presence of phytocons-tituents such as flavanoids, phlobatannins, reducing sugars, pro-teins and carbohydrates. The free radical scavenging property of C. ternatea flower extract showed the highest level of 59.3 % .The microbial activity of C. ternatea extract was carried out against common food pathogens which include E.coli, Bacillus cereus and Salmonella species by measuring their ZOI (zone of inhibi-tion).Blue colored-hard candies were prepared using the C. ternatea extract with and without preservative for shelf life study. The physicochemical characteristics of the extract and extract based candies were carried which includes analysis of carbohy-drates, proteins, fats and moisture contents. Sensory evaluation of the extract based candy was based on taste, color, flavor and appearance of the product. The shelf life of the candy with pre-servative was carried on till the 57th day while the shelf life of candy without preservative was carried on till the 30th day. Stu-dies based on shelf life were evaluated based on room tempera-ture. All the parameters of candy were compared with the level of C. ternatea extract.

  •  Page(s): 72-76
  •  Date of Publication: February 2015
  •  Caroline .A
    Dept. of Food Process Engineering,
    SRM University, Chennai, India.
  •  Padmavati .R
    Dept. of Food Process Engineering,
    SRM University, Chennai, India.

References

[1] Neelmani Chauhan*, Sourabh Rajvaidhya and B. K. Dubey (2012).“pharmacognostical, phytochemical and pharmacological review on C. ternatea for antiasthmatic activity”. IJPSR Vol. 3(2): 398-404. [2] Varsha jadhav, Swati deshmukh and shivprasad mahadkar (2013) .evaluation of antioxidant potential of C. ternatea ternatea. In-ternational Journal of Pharmacy and Pharmaceutical Sciences ISSN- 0975-1491 Vol 5, Suppl 2. [3] ŠMÍDOVÁ,ČOPÍKOVÁ, MARYŠKA and A. COIMBRA(2003). Crystals in Hard Candies. Czech J. Food Sci. Vol. 21, No. 5: 185–191.. [4] Neda, G. D., Rabeta, M. S. and Ong, M. T. (2013). Chemical composition and anti-proliferative properties of flowers of C. ternatea Ternatea. In-ternational Food Research Journal 20(3): 1229-1234. [5] Obasi, n. E., okorocha, c. And orisakwe, o. F.(2013).production and evaluation of velvet tamarind (dialium guineese wild) candy. European Journal of Food Science and Technology Vol.1, No.1, pp.1-8. [6] Prashant R. Verma, Prakash R. Itankar*, Sumit K. Arora, (2013).Evaluation of antidiabetic antihyperlipidemic and pancreatic re-generation, potential of aerial parts of C. ternatea ternatea.Rev Bras Farmacogn 23:819-829. [7] Rabeta, M. S. and An Nabil, Z ((2013).Total phenolic compounds and scavenging activity in C. ternatea and Vitex negundo linn. International Food Research Journal 20(1): 495-500 . [8] Sarumathy.k, .Dhana Rajan.MS, Vijay,J.Jayakanthi.T. (2011).Evaluation of phytoconstituents, nephro-protective and antioxidant activities of C. ternatea ternatea. Journal of Applied Pharmaceutical Science 01 (05); 164-172. [9] Subramanian.M.S and P.Prathyusha(1987).Pharmaco Phytochemical Characterization of C. ternatea Linn. International Journal of Pharm-Tech Research CODEN (USA): IJPRIF ISSN : 0974-4304 Vol. 3, No.1, pp 606-612740–741. [10] Manalwasha Deka, A.K.Medhi2, J.C.Kalita, K.K.Sarm and Leena Deka (2013).Proximate Analysis of Primary Metabolites in Different Parts of C. ternatea L. A Comparative Study. IAAST; Vol 4 [3] September: 62-67. [11] Manju Lata Zingare1, *, Prasanna Lata Zingare1, Ashwash Ku Dubey2, Md. Aslam Ansari(2013).C. ternatea (APARAJITA): A REVIEW OF THE ANTIOXIDANT, ANTIDIABETIC AND HEPATOPROTECTIVE POTENTIALS. IJPBS |Volume 3| Issue 1 . [12] Sudhir Sharma1*, Neelima Rathi1, Barkha Kamal2, Dipika Pundir3, Baljinder Kaur4 and Sarita Arya (2010).Conservation of biodiversity of highly important medicinal plants of India through tissue culture tech-nology- a review.AGRICULTURE AND BIOLOGY JOURNAL OF NORTH AMERICAWASSN Print: 2151-7517, ISSN Online: 2151-7525, doi:10.5251/abjna. 1.5.827.833. [13] Kuntapas Kungsuwan, Kanjana Singh, Somchai Phetkao and Niramon Utama-ang(2014).Effects of pH and anthocyanin concentration on color and antioxidant activity of C. ternatea extract. Food and Applied Bios-cience Journal, 2 (1): 31-46. [14] L. Kamilla, a S.M. Mnsor, a S. Ramanathan,a and S. Sasidharan (2009).Antimicrobial Activity of C. ternatea (L.) Extracts. Pharmaco-logyonline 1: 731-738. [15] Hiremath,J.B and Rokhade,A.K.( 2012).Preparation of sapota candy. International Journal of Food, Agriculture and Veterinary Sciences. ISSN: 2277-209X; Vol. 2 (1) January-April, pp.107-112 [16] Gowd M. J. S Pratap, Kumar M. G. Manoj.(2012).Evaluation of three medicinal plants for anti-microbial activity. www.ncbi.nlm.nih.gov/pubmed/23723653 [17] Daisy.P, Kanakappan Santosh and M. Rajathi.(2009). Antihyperglycemic and antihyperlipidemic effects of C. ternatea Linn. in alloxan-induced diabetic rats. African Journal of Microbiology Research Vol. 3 (5) pp. 287-291. [18] Anis Alam Siddiqui, M. H. R. Bhuiyanand M. Easdani (2003).Ginger (Zingiber officinale) reserve and candy development. Bangladesh re-search publications journal ISSN:Volume: 7, Issue: 3, Page: 283-290. [19] S. P. Anand., A.Doss and v. Nandagopalan (2011).Antibacterial studies on leaves of C. ternatea linn. IJABPT;volume: 2: issue-3: july-sept ; Issn 0976-4550. [20] Angkana Tantituvanont*, Pornpen Werawatganone, Pacharaporn, Ka-sornManopakdee (2008) .Preparation and stability of butterfly pea color extract loaded in microparticles prepared by spray drying. Thai J. Pharm. Sci. 32 59-69. [21] Babu uma, (2009).Phytochemical analysis and antimicrobial activity of clitorea ternatea linn against extended spectrum betalactamase produc-ing enteric and urinary pathogen. Asian Journal of Pharmaceutical and Clinical Research, Vol.2 Issue 4, ISSN 0974-2441. [22] Marion m. Bradford (1976). A Rapid and Sensitive Method for the Quantitation of Microgram Quantities of Proteins Utilizing the Principle of Proteins-Dye Binding. ANALYTICAL BIOCHEMISTRY 72, 248-254. [23] Van Handel E. (1985): Rapid determination of total lipids in mosquitos. J. Am. Mosq. Control .Assoc. 1: 302-304 [24] Rai (1982). Indian standard method for determination of crude fibre content in food product. WAS 10226-2. [25] Perez, C., Pauli, M. and Bazerque, P. (1990). An antibiotic assay by agar-well diffusion method. Acta Biologiae et Medicine Experimental, 15:113-115. [26] Von Gadow, A.; Joubert E.; Hansmann C. F. 1997.Comparwason of the antioxidant activity of rooibostea (Aspalathus linearis) with green, oo-long and black tea. Food Chemistry 60, 73-77. [27] Helga Hoffmann, Andrea Felgne (2009).Determination of Water Content in Candies” AnalytiX Volume 10 Article 4-sigmaaldrich . [28] Bhushan Pahune*, Kamlesh Niranjane, Kishor Danao, Megha Bodhe and Vijayashree Rokade ( 2013).Antimicrobial activity of clitoria ternatea l. Flower extract and use as a natural indicator in acid base titration. J. Nat. Prod. Plant Resour., 3 (2):48-51. [29] Jayachithra and Krithiga. (2012).Study on antioxidant property of se-lected medicinal plants. Int.J.Med.Arom.Plants, Vol.2,No.3,pp.495-500.

Caroline .A, Padmavati .R “Evaluation of C. Ternatea Extract and Incorporation into Hard Candy” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.72-76 2015

For Full Text Click here

Vicky Singha, S. Rajesh February 2015 Page No.: 77-81

The work is carried out to determine the feasibility of extents of using the ternary mixtures of ethanol-biodiesel-diesel(EBD) with maximum reduction of the fossil fuel(diesel) without sacrificing much of the advantages of unblended fossil fuel. Experiments are done to list off the beneficial properties that can be expected in blending the three fuels(EBD) keeping the biodiesel parameter constant at 50% and varying other components.The physical properties like Viscosity, density, Calorific Value, Flash Point, Fire Point, Cloud, Point, Pour Point are determined so as to compare with the diesel. The engine performance such as brake thermal efficiency (BTE), brake specific fuel consumption (BSFC), mechanical efficiency (ME), etc. of the blends are tested with the increase in ethanol content in the blended fuel at overall operating conditions .The emissions such as CO, HC,NOx, etc.are tested for detecting the influence of increasing ethanol andits suitability to the environmental standards without any modifications in the existing Compression ignition engines.

  •  Page(s): 77-81
  •  Date of Publication: February 2015
  •  Vicky Singha
    Department of Mechanical Engineering
    Bapuji Institute of Engineering And Technology, Davangere, India
  •  S. Rajesh
    Department of Mechanical Engineering
    Bapuji Institute of Engineering And Technology, Davangere, India

References

 

[1] M. Al-Hassan, H. Mujafet , M. Al-Shannag . “An Experimental Study on the Solubility of a Diesel-Ethanol Blend and on the Performance of a Diesel Engine Fueled with Diesel-Biodiesel – Ethanol Blends “. Volume 6, Number 2, April 2012 , ISSN 1995-6665 Pages 147 – 153.
[2] S.A. Shahir n, H.H. Masjuki, M.A. Kalam, A. Imran, I.M. Rizwanul Fattah, A. Sanjid. “Feasibility of diesel–biodiesel–ethanol/bioethanol blend as existing CI engine fuel: An assessment of properties, material compatibility, safety and combustion”. Renewable and Sustainable Energy Reviews 32 (2014) 379–395.
[3] Xiaoyan Shia, XiaobingPanga, YujingMua, Hong Hea, ShijinShuaib, JianxinWangb, Hu Chenb, Rulong Lib,” Emission reduction potential of using ethanol–biodiesel–diesel fuel blend on a heavy-duty diesel engine”. Atmospheric Environment 40 (2006) 2567–2574.
[4] D.C Rakopoulos, “Effect of ethanol–diesel fuel blends on the engine performance and emissions of heavy duty DI diesel engine”. Energy Conversion and Management, Vol. 49, No. 11, 2008, 3155–62

Vicky Singha, S. Rajesh “Stability Analysis of Biodiesel, Ethanol and Diesel Blends and Performance Testing of CI Engine with These Stable Blends” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.77-81 2015

For Full Text Click here
pdf download

Sahil Vishnu Bansal , Hem Singh , Sahil Pratap Jagdale , Rupali Shishupal February 2015 Page No.: 82-83

We present an approach that applies document clustering algorithm to forensic analysis of computer seized in police investigations. We also present a better approach in the field of forensic computing using automatic labeling and avoiding overlapping of clusters to improve response time of the search.

  •  Page(s): 82-83
  •  Date of Publication: February 2015
  •  Sahil Vishnu Bansal
    Student, Computer Department,
    Sinhgad Institute of Technology, Lonavala, India
  •  Hem Singh
    Student, Computer Department,
    Sinhgad Institute of Technology, Lonavala, India
  •  Sahil Pratap Jagdale
    Student, Computer Department,
    Sinhgad Institute of Technology, Lonavala, India
  •  Rupali Shishupal
    Assistant Professor, Computer Department,
    Sinhgad Instituteo f Technology, Lonavala, India

References

 

[1] Luís Filipe da Cruz Nassif and Eduardo Raul Hruschka;“Document Clustering for Forensic Analysis: An Approach forImproving Computer Inspection”; IEEE TRANSACTIONS ONINFORMATION FORENSICS AND SECURITY, VOL. 8,NO. 1, JANUARY 2013.
[2] Mr.Nitin S. Kharat , Prof. HarmeetKhanuja; “Role of TextClustering and Document Clustering Techniques in ComputerForensic Analysis: A Review”; International Journal ofEngineering Research and Applications (IJERA) ISSN: 2248-9622 International Conference on Industrial Automation andComputing (ICIAC- 12-13th April 2014)
[3] “Automatically Labeling Hierarchical Clusters”; https://www.firstgov.gov/
[4] “Text Clustering for Digital Forensics Analysis”; SergioDecherchi1, Simone Tacconi2, Judith Redi1, FabioSangiacomo1, Alessio Leoncini1 and Rodolfo Zunino1.
[5] B. S. Everitt, S. Landau, and M. Leese, Cluster Analysis.London,U.K.: Arnold, 2001.
[6] A. K. Jain and R. C. Dubes, Algorithms for Clustering Data.Englewood Cliffs, NJ: Prentice-Hall, 1988.
[7] A. Strehl and J. Ghosh, “Cluster ensembles: A knowledge reuseframework for combining multiple partitions,” J. Mach.Learning Res., vol.3, pp. 583–617, 2002.

Sahil Vishnu Bansal , Hem Singh , Sahil Pratap Jagdale , Rupali Shishupal “An Approach for Document Clustering in Forensic Analysis Using Labeling.” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.82-83 2015

For Full Text Click here
pdf download

Ms. Rashmita Patel. Dr. Ratna Trivedi February 2015 Page No.: 84-88

Meta analysis of heavy metal contaminated industrial sample has been done by various approaches. viz, Physical, chemical,and sophicated. Results obtained showed the following range of physico-chemical parameters pH (1.32-6.26), TS (40-170 mg/l),TDS (29-168 mg/l), TSS (2-20 mg/l), Acidity(68-154 mg/l) ,DO(1.32 -2.54 mg/l),BOD(9-44 mg/l ), COD( 534-1984 mg/l), Chloride( 2314-8167 mg/l).The samples were subjected to laboratory analysis using Atomic Absorption Spectrophotometer (AAS) to assess the levels of heavy metal pollution such as mercury (Hg), Arsinate (As) and Nickel (Ni). The pollution levels from these industries were found to be very high and alarming and hence proper care must be taken for the treatment of these effluents before they are released to the sewage.

  •  Page(s): 84-88
  •  Date of Publication: February 2015
  •  Ms. Rashmita Patel
    Department of Microbiology,
    NaranLala College of Professional and Applied science, Navsari, India.
  •  Dr. Ratna Trivedi
    Department of Environmental Science
    Shree Ram Krisna Institute of computer and applied science, Surat, India.

References

 

[1] Malik G.M.*, Joshi M.P., Zadafiya S.K. and Raval V.H., Study on Physico-Chemical Characterization of Some Lotic System of South Gujarat, India Research Journal of Chemical Sciences Vol. 2(1), 83-85, Jan. (2012).
[2] Segun Akanmu Adebisi and Kehinde Adenike Fayemiwo, PHYSIOCHEMICAL PROPERTIES OF INDUSTRIAL EFFLUENTS IN IBADAN, NIGERIA.electronic journal of environment ,agriculture and food chemistry, 10 (3), 2011 .
[3] APHA, AWWA and WPCF IN: Standard Methods for Estimation of water and waste water,American Public Health Association, Washington, 20th ed., New York, 1998.
[4] N.P. MOHABANSI, P.V. TEKADE and S.V. BAWANKAR 2011, Physico-chemical Parameters of Textile Mill Effluent,Hinganghat, Dist. Wardha (M.S.), Current World Environment: Vol. 6(1), 165-168
[5] Adriano, D. C. (1996): Trace Elements in the Terrestrial Environment. New York. Springer – Verlag Incorporation. 517pp.
[6] Fakayode, S.O. (2005): Impact Assessment of Industrial Effluent on Water Quality of the Receiving ALaro River in Ibada
[7] Avasan Maruti Y. and Ramkrishna S.Rao, Poll. Res., 20, 167(2001).
[8] Wetzel, R.G; Likens, G.E. (2006). Limnological analysis.3rd ed. Springer-Verlag, New York, 391.
[9] Ogunfowokan, A. O.; Okoh, E. K.; Adenuga, A. A.; Asubiojo, O. I., (2005). Assessment of the impact of point source pollution from a University sewage treatment oxidation pond on the receiving stream-a preliminary study. J. App. Sci., 6 (1), 36-43 (7 pages).(Hodgson and Manus, 2006).
[10] COO GAN T.P., LATTA D.M., SNOW E.T., COS TA M.Toxicity and carcinogenicity of nickel compounds. Crit. Rev. Toxicol. 19 (4), 341,1989.
[11] WHO’s Guideline for Drinking Water Quality, set up in Geneva, are the International reference point for Standard Setting and Drinking Water Safety (1993).
[12] Bureau of Indian Standards (BIS), Standards for Disposal of Treated Effluents on Inland Surface Water, IS: 2490(I), Bureau of Indian Standards, New Delhi, 1981.
[13] World Health Organization, Water Pollutants: Biological Agents Dissolved Chemicals, Non-dissolved Chemicals, Sediments, Heat, WHO CEHA, Amman, Jordan, 2002.
[14] I.S. AKOTEYON* and O. SOLADOYE(2011), Statistical Study of Physicochemical Characteristicsof Wastewater in Odogunyan, Lagos, Nigeria, E-Journal of Chemistry,2011, 8(4), 2010-2015

Ms. Rashmita Patel. Dr. Ratna Trivedi “Meta Analysis of Heavy Metal Contaminated Industrial Effluent from South Gujarat” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.84-88 2015

For Full Text Click here
pdf download

Shubhangi Kumbhar, Shital Garje, Runali Jadhav, V.N.Dhawas February 2015 Page No.: 89-91

Database tampering is one of the big and important role in Database Management system. Database security is very important requirement of today’s database application system. The Main Objective of this Paper is to identify different technique and detection of different contents in Database. Here we are using the cryptographic hash algorithm to detect the tampering of a Database. Consequently the Tiled Bitmap Forensic analysis algorithm helps to find at what time and possibly finally why and who had tampered the Database. Here we are using separate audit log validator to observe and inspect the database along with the extra information and state of the data. Audit log play a central role in database. A notarizer is used to create notary id of each hashed value of database transaction.

  •  Page(s): 89-91
  •  Date of Publication: February 2015
  •  Shubhangi Kumbhar
    Department of Computer Engineering
    Sinhgad Institute of Technology, Lonavala, Maharashtra, India
  •  Shital Garje
    Department of Computer Engineering,
    Sinhgad Institute of Technology, Lonavala, Maharashtra, India
  •  Runali Jadhav
    Department of Computer Engineering,
    Sinhgad Institute of Technology, Lonavala, Maharashtra, India
  •  V.N.Dhawas
    Department of Computer Engineering,
    Sinhgad Institute of Technology, Lonavala, Maharashtra, India

References

 

[1] International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013) 439 Database Tampering and Detection of Data Fraud by Using the Forensic Scrutiny Technique Piyush P. Gawali1, Dr. Sunil R. Gupta2 Prof. Ram Meghe institute of technology & research, Amravati, Maharashtra, India.
[2] SELECT Triggers For Data Auditing Daniel Fabbri #1, Ravi Ramamurthy _2, Raghav Kaushik _3#Electrical Engineering & Computer Science, University of Michigan2260 Hayward Street, Ann Arbor MI 48109 USA1dfabbri@umich.edu_Microsoft Research One Microsoft Way, Redmond WA 98052 USA.
[3] Harmeet Kaur Khanuja, D.S. Adane , “DATABASE SECURIT THREATS AND CHALLANGES IN DATABASE FORENSIC:A SURVEY” 2011 International Conference on Advancement in Information technology with workshop of ICBMG 2011, Singapore IPCSIT vol. 20(2011),
[4] Harmeet Kaur Khanuja, D.S. Adane,”A FRAMEWORK FOR DATABASE FORENSIC ANALYSIS “Computer Science & Engineering : an International Journal(CSEIJ),vol.2,no.3,June 2012.

Shubhangi Kumbhar, Shital Garje, Runali Jadhav, V.N.Dhawas “Forensic Analysis of Database using Secure Audit Log” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.89-91 2015

For Full Text Click here
pdf download

Poonam Mishra, Isha Talati February 2015 Page No.: 92-97

In this paper, a mathematical model is developed to study significance of various critical factors in the presence of lot size dependent ordering cost for an inventory model. Items in the inventory are subject to time dependent deterioration with associated salvage value. In this model lot size and cycle time are considered decision variables. Our main objective is to minimize total inventory cost to increase profitability for retailer. In this paper Genetic algorithm is used to minimize objective function which works very well with non-linear functions where conventional optimization methods stuck with local optimum. This model is validated with empirical data and sensitivity analysis is also carried out.

  •  Page(s): 92-97
  •  Date of Publication: February 2015
  •  Poonam Mishra
    Department of Mathematics and Computer Science,
    School of Technology, Pandit Deendayal Petroleum University, Raisan, Gandhinagar – 382007, India
  •  Isha Talati
    Department of Mathematics and Computer Science, School of Technology,
    Pandit Deendayal Petroleum University, Raisan, Gandhinagar – 382007, India

References

 

[1] Berrotoni, J. N., (1962). Practical application of Weibulldistribution, ASQC Technical Conference Transactions,303-323.
[2] Covert, R. P. and Philip, G. C.; (1973): An EOQ modelwith Weibul deterioration, AIIE Transactions, 5, 323-326.
[3] Dave, U. and Patel , L.K,; (1981). (T, Si) – Policyinventory model for deteriorating items with timeproportional demand. Journal of the Operation ResearchSociety, 32, 137-142.
[4] Ghare, P. M. and Schrader, G. P.; (1963) : A Model for anexponentially inventory. Journal of IndustrialEngineering, 14, 238-243
[5] Goyal, S. K. and Giri ,B. C.; (2001) : Recent trends inmodeling of deteriorated inventory. European Journal ofOperational Research, 134, 116.
[6] Goldberg, D. E.: & J. J. Richardson (1987). Geneticalgorithms with sharing for multimodal functionoptimization, Proceedings of the 2nd Internationalconference on Genetic algorithm, 41-47
[7] Hariga, M.A.; (1996) : Optimal EOQ models fordeteriorating items with time varying demand. Journal ofthe Operational Research Society, 47, 1228-1246.
[8] Heng, K. J., Labban, J and Linn, R. J. (1991) : An order –level lot size inventory model for deteriorating items withfinite replenishment rate Computers and IndustrialEngineering, 20(2),187-197.
[9] Höllier, R. H. and Mak, K. L.; (1983) : Inventoryreplenishment policies for deteriorating items in adeclining market. International Journal of ProductionResearch, 21(4), 813-826.
[10] Misra, R. B.; (1975) : Optimum production lot size modelfor a system with deteriorating inventory. InternationalJournal of Production Recearch 13, 495-505.
[11] Murata, T., H. Ishibuchi, and H. Tanaka, (1996). Multi –objective algorithm and its applications to Flow shopSheduling, Computers and IndustrialEngineering, 30(4),954 – 968.
[12] Narmadha. S, Selladurai. V, Sathish. G, (2010).Multiproduct Inventory Optimization using Uniformcrossover Genetic algorithm, IJCSIS, Vol 7, No. 1.
[13] Radhakrishnan. P, Prasad V. M. and Jeyanthi. N, (2010).Design of Genetic Algorithm based supply chainInventory Optimization with Lead Time, Journal ofComputer Science and Network security, vol 10, No.3,1820 – 1826.
[14] Raafat, F,; (1991) : Survey of literature on continuouslydeteriorating inventory models . Journal of theOperational Research Society 40 , 27-37.
[15] Shah Y. K.; (1977) : An order level lot size inventorymodel for deteriorating items. AIIE Tranctions, 9, 13-18
[16] Shah, Nita H. and Shah Y. K.; (2000) : Literature survey on inventory models for deteriorating items. Economic Annuals, 44, 221-237.
[17] Shah & Mishra.(2008): Inventory Management of Time Dependent Deteriorating Items with Salvage Value. Applied Mathematical Sciences, Vol. 2, 2008, no. 16, 793 – 798
[18] Srinivas C. et al. (2014). Sensitivity analysis to Determine the Parameters of Genetic algorithm for Machine layout. 3rd International conference on Materials Processing andcharacterisation. Procedia Materials Science 6, 866 – 876.
[19] Wee, H. M.; (1995) : A deterministic lot size inventory model for deteriorating items with shortage and a declining market. Computers and Operational Research , 22(3),345-356
[20] Whitin , T. M.; (1957) : Theory of inventory Management, Princeton university , New Jersely, 62-72.

Poonam Mishra, Isha Talati “A Genetic Algorithm Approach for an Inventory Model when Ordering Cost is Lot Size Dependent” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp. 92-97 2015

For Full Text Click here
pdf download

Aishwarya Kashyup, Ravina Kothari, Himanshu Kothari, Geetika Narang February 2015 Page No.: 98-101

In this era of internet, the Online Social Networks (OSNs) are the platform to build social relations among people who share interests, activities, backgrounds or real life connections. OSNs have gained a ubiquitous status and this has led to security issues of posting unwanted messages on user wall. Therefore, in order to make the OSN user wall a secured wall, we are introducing a flexible- rule based system which provides users to control the messages that are posted on their walls and allows user to customise the filtering criteria to be applied on their walls. This system exploits machine learning based soft classifier for automatically labelling messages in support of content based filtering.

  •  Page(s): 98-101
  •  Date of Publication: February 2015
  •  Aishwarya Kashyup
    Department of Computer Engineering,
    Savitribai Phule Pune University, Sinhgad Institute of Technology, Lonavala, India
  •  Ravina Kothari
    Department of Computer Engineering,
    Savitribai Phule Pune University, Sinhgad Institute of Technology, Lonavala, India
  •  Himanshu Kothari
    Department of Computer Engineering,
    Savitribai Phule Pune University, Sinhgad Institute of Technology, Lonavala, India
  •  Geetika Narang
    Department of Computer Engineering,
    Savitribai Phule Pune University, Sinhgad Institute of Technology, Lonavala, India

References

 

[1] Ms. Shruti C. Belsare, Prof. R.R. Keole, “OSN user filtered walls for unwanted messages using content mining”, IJCSMC, vol.3, issue 3, march-2014, pg 97-103.
[2] Dipali D. Vidhate, Ajay P. Thakare,”to avoid unwanted messages from osn user wall: content based filtering approach”, IJCSMC, VOL.3, Issue.4, april 2014,pg 688-692.
[3] R. J. Mooney and L. Roy, “Content-based book recommending using learning for text categorization,” in Proceedings of the Fifth ACM Conference on Digital Libraries New York: ACM Press, 2000, pp. 195–204.
[4] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, “Content-based filtering in on-line social networks,” in Proceedings of ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning (2010)
[5] F. Sebastiani, “Machine learning in automated text categorization,” ACM Computing Surveys, vol. 34, no. 1, pp. 1–47, 2002.
[6] H. Sch¨utze, D. A. Hull, and J. O. Pedersen, “A comparison of classifiers and document representations for the routing problem,” in Proceedings of the 18th Annual ACM/SIGIR Conference on Resea. Springer Verlag, 1995, pp. 229–237.
[7] R. E. Schapire and Y. Singer, “Boostexter: a boosting-based system for text categorization,” Machine Learning, vol. 39, no. 2/3, pp. 135– 168, 2000.
[8] A. Adomavicius, G.and Tuzhilin, “Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions,” IEEE Transaction on Knowledge and Data Engineering, vol. 17, no. 6, pp. 734–749, 2005.
[9] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas, “Short text classification in twitter to improve information filtering,” in Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, 2010, pp. 841–842.
[10] V. Bobicev and M. Sokolova, “An effective and robust method for short text classification,” in AAAI, D. Fox and C. P. Gomes, Eds. AAAI Press, 2008, pp. 1444–1445.
[11] J. Golbeck, “Combining provenance with trust in social networks for semantic web content filtering,” in Provenance and Annotation of Data, ser. Lecture Notes in Computer Science, L. Moreau and I. Foster, Eds. Springer Berlin / Heidelberg, 2006, vol. 4145, pp. 101–108.
[12] M. Carullo, E. Binaghi, and I. Gallo, “An online document clustering technique for short web contents,” Pattern Recognition Letters, vol. 30, pp. 870–876, July 2009.

Aishwarya Kashyup, Ravina Kothari, Himanshu Kothari, Geetika Narang “Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF Content Based Message Filtering” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.98-101 2015

For Full Text Click here
pdf download

Baldev Singh February 2015 Page No.: 102-104

Supply chain in automobile sector has four step .First from tier3 to tier 2, tier 2 to tier 1, tier 1 to original equipment manufacturer and similarly demand generated from original equipment manufacturer to tier 1 supplier, tier 1 supplier to tier 2 suppliers, tier 2 suppliers to tier 3 suppliers and so on. Automation helps to minimize risk market demand flucation by fast communication to supplier, free from human error in material schedule planning and quick decision. Automation of complete supply from OE to tier3 cannot be implemented without collective approach called collaborative relationship. This paper focuses on scenario of collaborative relationship in Indian Industry. This research objective is to find out collaborative relationship existence and its evaluation level. This work carried out on supply chain of Gear manufacturing plant through questionnaire techniques. There are 52 suppliers as chain partner and all are included in research. Result of research work is that collaborative relationship exists at moderate level in tier 1 to original equipment manufacturer, but on other stages it is not existing even at preliminary level. Conclusion is that collaborative relationship is an essential ingredient in automation of supply chain. In this approach both (supplier to supplier or supplier to buyer) have common vision and can accomplish more together. Indian industry has to develop this concept of relationship so that loss of natural resources due to failure in supply chain can be avoided. This loss can be in form of energy loss, man hour loss, process loss during unproductive hours.

  •  Page(s): 102-104
  •  Date of Publication: February 2015
  •  Baldev Singh
    Department of Management,
    Shri JJT University Jhujhnu, Rajasthan, India

References

 

[1] Boddy D Macbeth D & Wagner B ,2000 ―Implementing Collaboration Between Organizations: An Empirical Study Of Supply Chain Partnering‖, Journal of Management Studies, Vol. 37 issue 7,PP 1003-1018.(Published)
[2] Eisenhardt K M,1989 ―Agency theory: An assessment and review, Academy of Management Review‖, vol. 14 , PP 57-74.
[3] Fawcett S E, Osterhaus P, Magnan G M, Brau J C & McCarter M W ,2007, ― Information sharing and supply chain performance: the role of connectivity and willingness.‖ Supply Chain Management: An International Journal,vol.12 issue 5 PP 358-368.(published)
[4] Ford, D ,1980 ―The development of buyer-seller relationship in industrial markets ,‖ European Journal of Marketing,, Vol. 14 issue 5/6, PP 339-53.(Published)
[5] Gunasekaran A, Lai K, & Cheng T C E ,2008, ― Responsive supply chain: A competitive strategy in a networked economy,‖ Omega: International Journal of Management Science,vol. 36 issue 4, PP 549-564.(published)
[6] Kalwani MU,NarayandasN,1995, ― Long term manufacturer-supplier relationship: do they pay off for supplier firms?‖ Journal of marketing,vol. 59, PP 1-16.(published)
[7] Li,S, Ragu-Nathan B, Raghu Nathan TS, Rao SS,2006, ― The impact of supply chain management on competitive advantage and organizational performance ―Omega vol.34,PP107-124.(published)
[8] Sahay, B S ,2003 ― Understanding trust in supply chain relationships. Industrial Management & Data Systems‖,vol 103 issue (8), PP 553-563.(published)
[9] Shin H, Collier D A, Wilson DD, 2000, ―Supply management orientation and supplier/buyer performance .‖ Journal of Operation Management ,2000,vol.18, PP 317-333.(published)

Baldev Singh “Scenario of Collaborative Relationship in Indian Automotive Industry: Essential Ingredient in Supply Chain Automation” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.102-104 2015

For Full Text Click here
pdf download

Jigisha D. Pardesi February 2015 Page No.: 105-107

Traditionally, paper-made registers (musters) were used by almost all organizations for employee attendance; eventually some of them started implementing paper-made time cards called punch cards for the purpose. However, more the paper work, more the slaughter of trees. In other terms, more the use of paper, lesser the trees and consequently higher the rate of global warming. In order to save trees and to put an effort towards greener globe, organizations should switch to a technology called biometrics for employee attendance. Biometrics is an advanced technology wherein the employee’s face scan or fingerprint is used for his/her attendance. All he/she has to do is stand in front of a camera or place his/her finger on a reader for signing in and out. Thus attendance can go digital resulting in saving of thousands of trees on earth every year. My attempt through the paper is to explain the concept of biometrics, its main types, their working and finally put forth some instances where some concerned organizations are doing their bit towards a greener globe.

  •  Page(s): 105-107
  •  Date of Publication: February 2015
  •  Jigisha D. Pardesi
    STES’s RMD Sinhgad School of Computer Studies, India

References

 

[1] Atikh Rashid (October 2010) Agriculture college staff flout government fiat biometric system, Indian Express, Pune
[2] Cutler, Fetherstone, (2001) Researchers Seek New Methods of Identification, The State News
[3] Frost and Sullian, (2004) Biometrics to Guard against Fraud: Identification Security on the Horizon, Forensic-Evidence.com
[4] Ghatnekar, Gauri, (2002) Practically Foolproof Security for Bank, Maharashtra Herald
[5] Jarvis, A., (2004) Facial Recognition Systems: Are Privacy Rights of Citizens being Eroded Wholesale?, Identification Evidence:Forensic Evidence.com
[6] O’Sullivan, O., (Jan 1997) Biometrics Comes to Life, ABA Banking Journal
[7] Patrick, O’Connell (Dec 2011) For Sustainability use your hand, Center for Energy Efficiency and Sustainability, Schlage Ingersoll Rand
[8] Sarkar, Dibya, (2002) Biometrics Awareness still Low, Federal Computer Week
[9] Kudesia, S., (Feb 2005) Face Recognition: Your Identity under Lock and Key, Information Technology
[10] [Woodword,,J.D.,Orlans N. M., Higgins, P.T. (2003) Biometrics: The Ultimate Reference, New Delhi: Dreamtech Press
[11] Nanavati, S.,Thieme, M., Nanavati, R., (2002) Biometrics: Identity Verification in a Networked World, Wiely-Dreamtech India Pvt. Ltd.
[12] https://www.thehindubusinessline.com/industry-and conomy/banking/csb-unveils-first-biometric-atm/article2484893.ece
[13] https://www.articles.economictimes.indiatimes.com/2007-09-0/news/27667067_1_atm-facility-biometric-canara-bank

Jigisha D. Pardesi “Biometrics – Steps towards Greener Globe” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.105-107 2015

For Full Text Click here
pdf download

Parag Vade, VaidehiRahangdale, Saurabh Veer February 2015 Page No.: 108-112

Providing authentication to any system leads to provide more security to that system. There are many authentication techniques available, such as Textual password, Graphical password, etc. but each of this individually having some limitations & drawbacks. To overcome the drawbacks of previously existing authentication technique new improved authentication technique is used, this authentication scheme is called as 3D password. The 3D password is multi-password & multi-factor authentication system as it uses various authentication techniques such As textual password, graphical password etc. Most important part of 3d password scheme is inclusion of 3d virtual environment. 3d virtual environment is virtual environment which is consisting of real time object scenarios. It is not actual real time environment, it is just user interface provided to scheme which looks like same as real environment. 3d password is more secure authentication scheme than any other authentication techniques. Because this authentication scheme is more advanced than any other schemes. Also this scheme is hard to break & easy to use. In this paper we have introduced our contribution towards 3D password to become more secure & more user friendly to users of all categories. This paper also explaining about what is 3D password?, working of 3D password scheme, some mathematical concept related to 3D password, applications of scheme etc. all these concepts are briefly introduced & explained in this paper as per section wise.

  •  Page(s): 108-112
  •  Date of Publication: February 2015
  •  Parag Vade
    Department of Computer Engineering,
    Sinhgad Institute of Technology, Pune, India
  •  VaidehiRahangdale
    Department of Computer Engineering,
    Sinhgad Institute of Technology, Pune, India
  •  Saurabh Veer
    Department of Computer Engineering,
    Sinhgad Institute of Technology, Pune, India

References

 

[1] Alsulaiman, F.A.; El Saddik, A., “Three- for Secure,” IEEE Transactions on Instrumentation and measurement, vol.57, no.9, pp 1929-1938.Sept. 2008.
[2] VidyaMhaske et al, Int.J.Computer Technology & Applications, Vol 3 (2), ISSN: 2229-6093, 510-519.
[3] TejalKognule and YugandharaThumbre and SnehalKognule, ―3D password‖, International Journal of Computer Applications (IJCA), 2012.
[4] A.B.Gadicha , V.B.Gadicha , ―Virtual Realization using 3D Password‖, in International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N2-216-222.
[5] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D Graphical Password Schema‖, IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems, July 2006.
[6] DuhanPooja, Gupta Shilpi ,SangwanSujata, &Gulati Vinita, ―SECURED AUTHENTICATION: 3D PASSWORD‖, I.J.E.M.S., VOL.3(2),242 – 245, 2012.
[7] Grover Aman, NarangWinnie, ―4-D Password: Strengthening the Authentication Scene‖, International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-2012.

Parag Vade, VaidehiRahangdale, Saurabh Veer “3D Password for Secured Authentication” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.108-112 2015

For Full Text Click here
pdf download

Edward Janwadkar, Pallavi Pasnur February 2015 Page No.: 113-116

Purlins, girts and eave struts are secondary structural members used to support the wall and roof panels. Purlins are used on the roof; girts are used on the walls and eave struts are used at the intersection of the sidewall and the roof. Secondary members have two other functions: they act as struts that help in resisting part of the longitudinal loads that are applied on the building such as wind and earthquake loads, and they provide lateral bracing to the compression flanges of the main frame members thereby increasing frame capacity.
The attempt is made to study the comparison of cold formed sections as a secondary members & hot rolled members those which are used in conventional building system.

  •  Page(s): 113-116
  •  Date of Publication: February 2015
  •  Edward Janwadkar
    Department of Civil Engineering,
    Dr. D.Y. Patil School of Engineering & Technology, Savitribai Phule University, Knowledge City, Charoli (BK), Lohegaon, Pune-412105 Maharashtra, India
  •  Pallavi Pasnur
    Department of Civil Engineering,
    Dr. D.Y. Patil School of Engineering & Technology, Savitribai Phule University, Knowledge City, Charoli (BK), Lohegaon, Pune-412105 Maharashtra, India

References

 

[1] Anbuchezian A, Dr. Baskar. G, Experimental Study on Cold Formed Steel Purlin Section, IRACST – Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498, Vol.3, No.2, April 2013
[2] Roshan Satpute & Dr. Valsson Varghese, Building design using cold formed steel sections, International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 1, Issue 2 (October 2012), PP.01-16
[3] Shantosh Kumar. D, G Mohan Ganesh, Experimental Investigation of Composite Steel-Concrete Column, International Journal of Mechanical And Production Engineering, ISSN: 2320-2092, Volume- 2, Issue- 5, May-2014.
[4] Vaibhav B. Chavan, Vikas N. Nimbalkar, Abhishek P. Jaiswal, Economic Evaluation of Open and Hollow Structural Sections in Industrial Trusses, International Journal of Innovative Research in Science, Engineering and Technology; Vol. 3, Issue 2, February 2014
[5] Wen-bin Zhao, Behaviour and Design of Cold-formed Steel Sections with Hollow Flanges, School of Civil Engineering, Queensland University of Technology.
[6] Wei-Wen Yu, Cold Form Steel Structure, Mc-Graw Hill Book Company, 1973, pp. 25-46.
[7] IS 800-1984 Indian standard code of practice for general construction in steel.
[8] IS : 801-1975 : Code of practice for use of Cold
[9] IS: 875 (Part 2) 1987: Imposed loads.
[10] IS: 875 (Part 3) 1987: Wind loads

Edward Janwadkar, Pallavi Pasnur “Cold Formed Sections as Secondary Framing” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.113-116 2015

For Full Text Click here
pdf download

Madhankumar, R. Padmavati February 2015 Page No.: 117-121

Vegetable omelette mix is a rich nutritious food with high protein content and less fat content which is highly suita-ble for dietary purposes. The main ingredient moong dal used in this product was proved to have reduced risks of blood pressure and prevent hypertension. Moong dal and gram dal were taken in three different proportions and processed by two methods namely frying and soaking method. Also, the other ingredients used were all rich in nutrional value. The an-ti-microbial property and physiochemical property of the samples were tested. Since there was a very low content of moisture in the product, there was no growth of bacteria and fungi resulting in the extended shelf life of the product. Sample obtained using frying method was found to be devoid of any microbial contamination even after a long period of time be-cause of the low moisture content than that of the sample ob-tained using soaking method. Also, the protein content in the frying method sample was analysed to be higher than the sam-ple obtained using the soaking method. Thus, this study shows that frying method gives better taste, texture and flavour compared to the soaking method.

  •  Page(s): 117-121
  •  Date of Publication: February 2015
  •  M. Madhankumar
    Food and Nutritional Biotechnology
    SRM University, Chennai, India.
  •  R. Padmavati
    Food and Nutritional Biotechnology
    SRM University, Chennai, India.

References

 

[1] Unika D, A study on consumer behaviour towards instant food products in Tamilnadu, International Journal of Business and Administration Research Review, Vol.3, Issue.5, April – June, 2014.
[2] Achaya, K. T. Indian food- A historical companion. Oxford University Press, Delhi, 1994.
[3] Achaya, K. T. Foods of the Gods. In Indian food historical companion. Pp.28-40.
[4] Ammu, Radhakrishna K, Subramanian K, Sharma V, T.R. & Nath H (1977) Storage behavior of freeze-driedjuice powders. Journel Food Technol., 12, 541-53.
[5] Arya S S, Traditional foods-some recent developments. Def Sci. J., (1984), 34, 173-82.
[6] Arya S S, Convenience foods-emerging scenario, Indian Food Ind., (1992), 11(4), 31-41.
[7] Arya S S, Vidyasagar K, & Parihar D B, (1997) Preservation qfchapaties. Lebensm. Wiss. Technol., 10, 208-13.-368
[8] Arya S S, Vidyasagar K, & Premavalli K S. (1989) Studies on development, storage stability and acceptability of Insta nutro cereal mix. DFRL, Mysore, Report No. SI-Pl-84/DFR-179.
[9] Arya, S.S.; Premavalli, K.S.; Siddhaiah, C.H. & Sharma, T.R. Storage behaviour of freeze-dried watermelon juice powder. J. Food Technol., 1985, 20, 351-57.
[10] Ghosh, K.G.; Krishnappa, K.G.; Srivatsava, A.N.; Eapen, K.C. & Vijayaraghavan, P.K. Inpack processing of ready-to-eat foods in indigenous flexible packaging materials, Part III :Studies on newer packaging materials.
[11] Jayaraman, K.S. Development of instant foods and emerging survival rations for Service use. Del Sci. J., 1984. 34, 161- 72.
[12] Jayaraman, K.S.; Ramanuja, M.N.; Venugopal, M.K.; Leela, R.K. & Bhatia, B.S. Studies on preparation of intermediate moisture pineapple. J. Food Sci.Technol., 1975, 12, 309-12.
[13] Kannur, S.B.; Premavalli, K.S.; Arya, S.S.; Parihar, D.B. & Nath, H. Studies on flavouring compounds of chapaties -carbonyls. J. Food.Sci. Technol., 1974, 11, 5-9
[14] .Khare, R.S. The Hindu health and home. Vikas Publishing House Ltd., India, 1976.
[15] Khare, R.S. Culture and realisty. Indian Institute of Advanced Study, Simla, 1976.
[16] Kodkol, S.B. Ramanathan, L.A.; Pitchamuthu, AFST (I), 10 June 1995. Hotel Ashoka, Bangalore. P. & Bhatia, B.S. Canning of idlis. Indian Food Packer, 1973, 27(3), 17-19. 22
[17] Kodkol, S.B.; Ramanathan, L.A.; Das, S.A.; Pitchamuttu, P.; Gopinathan, V.K. & Bhatia, B.S. Convenience mixes based on dehydrated mutton and vegetables. Indian Food Packer 1973, 27(3), 15-16.
[18] Lothar, Leistner & Leon, G.M. Gorris. Food preservation by hurdle technology. Trends Food Sci. Technol., 1995, 6, 41-45.
[19] Mathur, V.K.; Siddhaiah, C.H.; Bhatia, B.S. & Vijayaraghavan, P.K. Canning of conventional Indian meals for Defence re-quirements: Indian Food Packer, 1973, 27(2), 46-51.
[20] Nagarathnamrna, Krishnamurthy & Siddappa, G.S. Canning of rice. J. Food Sci. Technol, 1965, 2, 128-31.
[21] Pasricha, Swaran & Rebello. Common Indian recipes and their nutritive value. Indian Council of Medical Research, Hyderabad, 1991
[22] Premavalli, K.S.; Madhura, C. V.; Mohan, M.S.; Srihari, P. & Arya, S.S. Application of hurdle technology for tradition-al-based cereal products.
[23] Paper presented at the symposium on Hurdle Technology Ap-plications, 29-30 December 1997. DFRL, Mysore.
[24] Precursors ofcarbonyls in chapaties. J.Food Technol., 1976, II, 543-47.
[25] Premavalli, K.S.; Vidyasagar, K & Arya, 5.5. Studies on tradi-tional Indian Foods-part II: Development and storage stability of upam mix. Indian Food Packer, 1987, 39, 23-30.
[26] Premavalli,K.S. Preserved foods for mountaineering expedi-tions. Paper presented at the symposium on Mountaineering Food, 17 November 1996
[27] Premavalli,K .S. Cereal products-emerging scenario, 1995.
[28] Premavalli, K.S. Quality assurance of processed cereal and ce-real products. Paper presented at the symposium on Food Qual-ity Assessment, February 1997. UAS, Bangalore
[29] Premavalli, K.S. Present scenario oil the preservation of tradi-tional foods. Paper presented in the symposium on Traditional Foods, 5-6 November 1997. Food Science and Nutritional De-partment, University of Mysore.
[30] Premavalli, K.8. & Arya, 8.8. Physical and chemical changes during roasting of semolina. J. Food Technol., 1983, 18, 469-79.
[31] Shasrabuddhe, Y.D. Procurement, storage and distribution of food stuff in the Armed Forces.
[32] Thakur, B.R. & Arya, 5.5. Packaging requirement and storage stability of fried wheat snacks. I. Food Sci. Technol., 1990, 27, 76-80.
[33] Shasrabuddhe, Y.D. Procurement, storage and distribution of food stuff in the Armed Forces.
[34] Thakur, B.R. & Arya, 5.5. Packaging requirement and storage stability of fried wheat snacks. I. Food Sci. Technol., 1990, 27, 76-80.

Madhankumar, R. Padmavati “Development of Vegetable Omelette Mix” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.117-121 2015

For Full Text Click here
pdf download

Renoy Zachariah, Rahul Jadhav, Rohit Mishra, Prem Kishan February 2015 Page No.: 122-124

Path finding algorithms are widely used to find the shortest optimal path from a starting point to a destination point. The complexity of such an algorithm greatly depends on whether the target is in motion while the optimal path is being calculated or if the target is static. Finding the optimal path wherein the hunter and prey are stationary is easy, however pursuing a moving target is difficult as it poses challenges such as search space optimization, limited computational resources, partial knowledge about the environment and real time response. There has been a lot of research in this regard, each following a different approach towards finding the optimal path. In this paper we present an overview of the different approaches.

  •  Page(s): 122-124
  •  Date of Publication: February 2015
  •  Renoy Zachariah
    Computer Department,
    University of Pune/ Sinhgad Institute of Technology Lonavla, India
  •  Rahul Jadhav
    Computer Department,
    University of Pune/ Sinhgad Institute of Technology Lonavla, India
  •  Rohit Mishra
    Computer Department,
    University of Pune/ Sinhgad Institute of Technology Lonavla, India
  •  Prem Kishan
    Computer Department,
    University of Pune/ Sinhgad Institute of Technology Lonavla, India

References

 

[1] Mingliang Xu, Zhigeng Pan, Hongxing Lu, Yangdong Ye, Pei Lv, and Abdennour El Rhalibi. “Moving Target Pursuit Algorithm Using Improved Tracking Strategy.” IEEE Transactions on Computational Intelligence and AI in Games, VOL. 2, NO. 1, MARCH 2010
[2] L. Leenen, A. Terlunen, and W. le Roux, “A Constraint Programming Solutionfor the Military Unit Path Finding Problem”, ser. Mobile IntelligentAutonomous Systems: Recent Advances. Bota Raton, USA: Taylor &Francis Group, 2012.
[3] E. W. Dijkstra, “A note on two problems in connexion with graphs,”NumerischeMathematik, vol. 1, pp. 269–271, 1959
[4] P. Hart, N. Nilsson, and B. Raphael, “A formal basis for the heuristicdetermination of minimum cost paths,” IEEE Trans. Syst. Sci. Cybern.,vol. 4, no. 2, pp. 100–107, Jul. 1968
[5] A. Stenz, “The focused D* algorithm for real-time replanning,” in Proc.Int. Joint Conf. Artif. Intell., 1995, pp. 652–1659
[6] A. Stentz, “Optimal and efficient path planning for partially-knownenvironments,” in Proceedings of the IEEE International Conference onRobotics and Automation (ICRA), vol. 4, 1994, pp. 3310–3317
[7] S. Koenig, M. Likhachev “Real-Time Adaptive A*” in Proc. Int.Joint Conf. Autonom. Agents Multiagent Syst., 2006, pp. 281–288
[8] D. C. Pottinger, “Terrain analysis in realtime strategy games,” in Proc.Comput. Game Develop. Conf., 2000, pp. 763–782
[9] S. Koenig, “Agent-centered search,” AI Mag., vol. 22, no. 4, pp.109–132, 2001
[10] V. Bulitko, M. Lˇustrek, J. Schaeffer, Y. Bjornsson, and S. Sigmundarson,“Dynamic control in real-time heuristic search,” J. Artif.Intell. Res., vol. 32, pp. 419–452, 2008
[11] S. Koenig, M. Likhachev, and X. Sun, “Speeding up moving-targetsearch,” in Proc. 6th Int. Joint Conf. Autonom. Agents Multiagent Syst.,Honolulu, HI, 2007, article no. 188
[12] S.Koenig, X. Sun, and Y.William, “Generalized adaptive A*,” in Proc.7th Int. Conf. Autonom. Agents Multiagent Syst., 2008, pp. 469–476
[13] X. Sun, W. Yeoh, and S. Koenig, “Efficient incremental search formoving target search,” in Proc. Int. Joint Conf. Artif. Intell., 2009, pp.615–620

Renoy Zachariah, Rahul Jadhav, Rohit Mishra, Prem Kishan “A Survey on Optimal Path Finding Algorithms for Pursuing a Moving Target” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.122-124 2015

For Full Text Click here
pdf download

Sanjeev Kumar Rajoria , Bharat Modi February 2015 Page No.: 125-130

This is a well-known fact that during a transformer-rectifier combination undesirable harmonic line currents may be generated. The rectification of alternating current power to direct current power itself may produce undesirable current harmonics. The non-linear loads cause the severe current harmonics that can not be tolerated. These harmonic currents can cause either a shutdown of the device or the unacceptable powering of the devices. The non-isolated multi-pulse converters and the Multi-pulse converters in general can be applied to achieve the clean power which is of major priority in higher power rating applications. Generally, by increasing the number of pulses in a multi-pulse converter THD (total harmonic distortion) can be reduced up to the allowable limits.
Thepresentwork istoanalyses the differentmulti-pulse AC toDC (18-pulse, 24-pulse, 36-pulse, and 48-pules) converters insolvingthe harmonic problem in athree-phase converter system. The effect of increasing the number of pulses on the performance of ac-dc converters is analyzed. THD is the major factor considered for the performance comparison of various converters.

  •  Page(s): 125-130
  •  Date of Publication: February 2015
  •  Sanjeev Kumar Rajoria
    M.Tech. Scholar, Power System,
    SKIT, Jaipur, India
  •  Bharat Modi
    Reader, Department of EE,
    SKIT, Jaipur, India

References

 

[1] Paice, Derek A. “Auto-connected hexagon transformer for a 12-pulse converter.” U.S. Patent No. 5,148,357. 15 Sep. 1992.
[2] Choi, Sewan, Prasad N. Enjeti, and Ira J. Pitel. “Autotransformer configurations to enhance utility power quality of high power AC/DC rectifier systems.” aa 5 (1996): 7.
[3] Seixas, F. J., and Ivo Barbi. “A new three-phase low THD power supply with high-frequency isolation and 60V/200A regulated DC output.” IEEE POWER ELECTRONICS SPECIALISTS CONFERENCE.Vol. 3. 2001.
[4] Kim, Sikyung, et al. “A new approach to improve power factor and reduce harmonics in a three phase diode rectifier type utility interface.” Industry Applications Society Annual Meeting, 1993., Conference Record of the 1993 IEEE. IEEE, 1993.
[5] Chen, Chern-Lin, and Guo-Kiang Horng. “A new passive 28-step current shaper for three-phase rectification.” Industrial Electronics, IEEE Transactions on 47.6 (2000): 1212-1219.
[6] Wu, Bin. High-power converters and AC drives. John Wiley & Sons, 2006.

Sanjeev Kumar Rajoria, Bharat Modi “Power Quality Improvement by Input Current Harmonic Reduction Using Three-Phase Multi-Pulse AC-DC Converter” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.125-130 2015

For Full Text Click here
pdf download

Dipty Rani Dhal , Dr. P.K.Mishra February 2015 Page No.: 131-133

Theorem 1. Let EN (T, Φ’, Φ’’) denote the average number of real roots of the random trigonometric polynomial T= Tn (θ,ω) = Sum limit-> k-=1 to 0 { ak (ω)coskθ} in the interval (Φ’, Φ’’). Clearly, T can have at most 2n zeros in the interval (0, 2π). Assuming ak(w)s to be mutually independent and identically distributed normal random variables. Dunnage has shown that in the interval 0 < θ < 2π all save a certain exceptional set of the functions (Tn(θw) have (2n / √3) {n(11/13) (log n)(3/13) } zeros when n is large.
We consider the same family of trigonometric polynomials and use the Kac-Rice formula for the exception of the number of real roots and obtain that EN( T;0,2π ) ~ (2n/√6)+0(log n). (1)
The result is better than that of Dunnage since our constants is (1/√2) times his constant and our error term is smaller. The proof is base on the convergence of an integral of which an asymptotic estimation is obtained.

  •  Page(s): 131-133
  •  Date of Publication: February 2015
  •  Dipty Rani Dhal
    Department of Mathematics,
    ITER, SOA, BBSR, Odisha, India
  •  Dr. P.K.Mishra
    Department of Mathematics,
    CET, BPUT, BBSR, Odisha, India

References

 

[1] DUNNAGE, J.E.A., 1966, Proc. London math. Soc., 16, 53.
[2] DAS, M., 1968, Proc. Comb. Phil. Soc., 64, 721.
[3] QUALLS, C., 1970, J. London math. Soc., 2, 216.
[4] LOGAN, B.F. and SHEEP, L.A., 1968, Proc. London math.Soc. 18, 308.

Dipty Rani Dhal , Dr. P.K.Mishra “Level Crossings of a Random Trigonometric Polynomial” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.131-133 2015

For Full Text Click here
pdf download

Sameer S. Gajmal, Prof. Santosh Rane, Prof. Sudhir.G Bhatwadekar February 2015 Page No.: 134-138

File manufacturing industry is having a tremendous scope in the market. There is a large variety of files which are manufactured in mass production. Out of 11 nos. of operations, one of the operation is tang forging operation. The raw material is heated and is made undergo through open die forging process. In the present paper a case study of an small scale industry is discussed. For the tang forging operation the source used for heating the raw material was Gas heating. Special Purpose Resistance Heating Furnace was replaced instead of Gas heating. It was found that the cost of tang forging operation was reduced to almost 80%. Also it was found that the operator was put into a comfortable and safe work environment due to replacement of Gas Fired Furnace by Resistance heating Furnace.

  •  Page(s): 134-138
  •  Date of Publication: February 2015
  •  Sameer S. Gajmal
    Assistant Professor, Department of Mechanical Engineering,
    Gharda Institute of Technology, Lavel, India
  •  Prof. Santosh Rane
    Associate Professor, Department of Mechanical Engineering,
    SPCE, Mumbai, India
  •  Prof. Sudhir.G Bhatwadekar
    Associate Professor, Department of Production Engineering,
    K.I. T.’s college of Engineering, Kolhapur, India

References

 

[1] Professor em. Dr.-Ing. Klaus Ehrlenspiel, Dr.-Ing. Alfons Kiewert, Professor Dr.-Ing. Udo Lindemann, “Cost-Efficient Design”, Springer Berlin Heidelberg, 2007 ,pp 143-384.
[2] Philip K. Freakley, “Rubber Processing and Production Organization” , Springer US, 1985, pp 353-395
[3] P. Selvaraj, P. Radhakrishnan , M. Adithan, “An integrated approach to design for manufacturing and assembly based on reduction of product development time and cost”, International Journal of Advance Manufacturing technology, June 2008,pp 13-29
[4] Sanjay Sharma, “ Effects of an increase in manufacturing rate in the context of cyclic production”, The International Journal of Advanced Manufacturing Technology, November 2008, Volume 39, Issue 7-8, pp 821-827.

Sameer S. Gajmal, Prof. Santosh Rane, Prof. Sudhir.G Bhatwadekar “Cost Reduction in File Manufacturing by using Special Purpose Resistance Heating: A Case Study” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.134-138 2015

For Full Text Click here
pdf download

Surendra Kumar, Satish Alaria, Dr. Vijay Kumar February 2015 Page No.: 139-144

MANET is a collection of mobile, decentralized, and self-organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. It suffers from a variety of security attacks and threats such as: Denial of Service (DoS), flooding attack, impersonation attack, selfish node misbehaving, routing table overflow attack, wormhole attack, blackhole attack etc. MANET is open to vulnerabilities as a result of its basic characteristics like no point of network management; topology changes vigorously, resource restriction, no certificate authority or centralized authority. This paper objective is to summarize different types of attacks over MANET, and concerns with studying sleep deprivation attack. Our objective is to design an artificial immune system to secure from sleep deprivation attack and is based on biological Danger Theory and we imply the concept of using two thresholds on the basis of throughput. In this paper we count on the number of requests sent by a particular node in a given interval of time twice, once for minor threshold and later for major threshold.

  •  Page(s): 139-144
  •  Date of Publication: February 2015
  •  Surendra Kumar
    Research Scholar,
    Kautilya Institute of Technology and Engineering, Jaipur, Rajasthan, India
  •  Satish Alaria
    Assistant Professor,
    Kautilya Institute of Technology and Engineering, Jaipur, Rajasthan, India
  •  Dr. Vijay Kumar
    Professor,
    Kautilya Institute of Technology and Engineering, Jaipur, Rajasthan, India

References

 

[1] X. Hu, J. Wang, and C. Wang, ―Routing in Mobile AdHocNetworks,IEEE conference.
[2] P. Albers et al., ―Security in Ad Hoc Networks: A GeneralIntrusion Detection Architecture Enhancing TrustBasedApproaches,1st Int‘l. Wksp. WL Info. Sys. 4th Int‘l. Conf.Enterprise Info. Sys. 2002
[3] L. Venkatraman and D. P. Agrawal, ―Strategies forEnhancing Routing Security in Protocols for Mobile Ad HocNetworks,‖ J. Parallel Distrib. Comp., 2002.
[4] Aickelin, U., Bentley, P., Cayzer, S., Kim, J., and McLeod,J.: Danger Theory: The Link between AIS and IDS? In:Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003.LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003).
[5] Matzinger, P.: Tolerance, Danger, and the Extended Family.Annual Review of Immunology 12, 991–1045 (1994).
[6] Greensmith, J., Aickelin, U., and Tedesco, G.: InformationFusion for Anomaly Detection with the Dendritic CellAlgorithm. Information Fusion. 11, 21–34.Elsevier (2010).
[7] Abdelhaq, M., Hassan, R., and Saqour, R.: Using DendriticCell Algorithm to detect the Resource Consumption Attackover MANET. In Proceedings of the 2nd internationalconference of software engineering and computer systems(ICSECS2011). LNCS, vol. 181, pp. 429-442, Springe-Verlag (2011).
[8] Kim, J., Bentley, P., Wallenta, C., Ahmed, M.,andHailes, S.: Danger Is Ubiquitous:Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol. 4163, pp.390–403. Springer, Heidelberg (2006).
[9] Wang, D., Hu M., and Zhi, H.: A survey of Secure Routing in Ad Hoc Networks. In: 9th IEEE International Conference on Web Age Information Management, pp. 482-486. IEEE Press, Zhangjiajie Hunan (2008).
[10] Cayirci, E., and Rong, C.: Security in Wireless Ad Hoc and Sensor Networks.WILEY, United Kingdom (2009).
[11] Su, X.: Integrated prevention and detection of byzantine Attacks in mobile ad hoc networks. Phd. Thesis. The University of Texas at San Antonio.USA (2009).
[12] Sarafijanovic, S., and Le Boudec, J.Y.: An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Transactions on Neural Networks 16(5), 1076–1087 (2005).
[13] Drozda, M., Schaust, S., and Szczerbicka, H.: Immuno-inspired Knowledge Management for Ad Hoc Wireless Networks. E. Szczerbicki& N.T. Nguyen (eds.). 260, 1—26. Springer, Heidelberg (2010).

Surendra Kumar, Satish Alaria, Dr. Vijay Kumar “Prevention in Sleep Deprivation Attack in MANET” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.139-144 2015

For Full Text Click here
pdf download

Sanjivani Patil, Kajal Thombare, Ankita Shelar, Pooja Ugale February 2015 Page No.: 145-150

As mobile applications become extremely popular composed into our workaday, mobile applications interactions obligation to be quick and sensitive’s unluckily, even the essential backwards of producing a mobile application is unfortunately slothful. In as much as humano -central environment (e.g., close/ open,, driving/walking) have been widely investigated, few acquires have been learn from phones’ appearance (e.g., on table/bed, in pocket/bag/hand). In micro-environment sensor (Sherlock) observe both energy managing and user kindly. In micro-environment sensor on Android operating system and taxonomically examining its execution with data composed. Definitive conclusive results displays that micro-environment sensor achieves low energy capacity, quick system distributions and co-operative sensing exemptions. The investigation and operating system and hardware seller establish the methods of increasing the battery time of smart phones.

  •  Page(s): 145-150
  •  Date of Publication: February 2015
  •  Sanjivani Patil
    Department of Computer Engineering
    Skn-Sits Lonavala, Maharashtra, India
  •  Kajal Thombare
    Department of Computer Engineering
    Skn-Sits Lonavala, Maharashtra, India
  •  Ankita Shelar
    Department of Computer Engineering
    Skn-Sits Lonavala, Maharashtra, India
  •  Pooja Ugale
    Department of Computer Engineering
    Skn-Sits Lonavala, Maharashtra, India

References

 

[1] J. Yang, S. Sdhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan,Y. Chen, M. Gruteser and R. Martin, Detecting Driver Phone Use Leveraging Car Speakers. In MOBICOM’11, 2011.
[2] S. Nath. ACE: Exploiting Correlation for Energy-Efficient andContinuous Context Sensing. In MobiSys’12, 2012.
[3] T. Yan, D. Chu, D. Ganesan, A. Kansal, and J. Liu. Fast app launching for mobile devices using predictive user context. In MobiSys’12, 2012.
[4] C. Qin, X. Bao, R. Roy Choudhury, and S. Nelakuditi. Tagsense: a smartphone-based approach to automatic image tagging. In MobiSys’11, 2011.
[5] H. Lu, W. Pan, N. D. Lane, T. Choudhury, and A. T. Campbell. Soundsense: scalable sound sensing for people-centric applications on mobile phones. In MobiSys’09, 2009.
[6] H. Lu, J. Yang, Z. Liu, N. D. Lane, T. Choudhury, and A. T. Campbell. The jigsaw continuous sensing engine for mobile phone applications. In SenSys’10, 2010.
[7] M. Azizyan, I. Constandache, and R. Choudhury. SurroundSense: Mobile phone localization via ambience fingerprinting. In MOBICOM’ 09, 2009.
[8] A. Rai, K. Chintalapudi, V. Padmanabhan, and R. Sen. Zee: Zero-Effort Crowdsourcing for Indoor Localization. In MOBICOM’12, 2012.
[9] P. Zhou, Y. Zheng, Z. Li, M. Li, and G. Shen. IODetector: A Generic Service for Indoor Outdoor Detection. In SenSys’12, 2012.
[10] X. Zhu, Q. Li, G. Chen. APT: Accurate Outdoor Pedestrian Tracking with Smartphones. In INFOCOM’13, 2013.
[11] P. Mohan, V. Padmanabhan, and R. Ramjee. Rich Monitoring of Roads and Traffic Using Mobile Smartphones. In SenSys’08, 2008.
[12] A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, and J. Eriksson. Vtrack: accurate, energyaware road traffic delay estimation using mobile phones. In Sen- Sys’09, 2009.
[13] C. Tacconi, S. Mellone, L. Chiari. Smartphone-based applications for investigating falls and mobility. In PervasiveHealth’11, 2011.
[14] J. Dai, X. Bai, Z. Yang, Z. Shen, D. Xuan. PerFallD: A Pervasive Fall Detection System Using Mobile Phones. In PervasiveHealth’10, 2010.

Sanjivani Patil, Kajal Thombare, Ankita Shelar, Pooja Ugale “Energy Management in Modern Mobile Handsets through Micro Environment Sensor” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.145-150 2015

For Full Text Click here
pdf download

Sonia Sinhmar February 2015 Page No.: 151-152

In this paper, we will explain about marketing as marketing is a process to sell some product or we can say to convince someone to buy your product.
Marketing mix is a concept in marketing as there are four P’s involve in marketing

A Product
B Price
C Place
D Promotion

  •  Page(s): 151-152
  •  Date of Publication: February 2015
  •  Sonia Sinhmar

References

 

[1] McCarthy, Jerome E. (1964). Basic Marketing. A ManagerialApproach. Homewood, IL: Irwin.
[2] Booms, Bernard H.; Bitner, Mary Jo (1981). “MarketingStrategies and Organization Structures for ServiceFirms”. Marketing of Services. American Marketing Association:47–51.
[3] Mindtools.com/pages/article/newSTR_94.
[4] Needham, Dave (1996). Business for Higher Awards. Oxford,England: Heinemann.
[5] Kotler, Philip (2012). Marketing Management. PearsonEducation. p. 25.
[6] Borden, Neil. “The Concept of the Marketing Mix”. SumanThapa. Retrieved 24 April 2013.
[7] Borden, Neil H. (1965). “The Concept of the Marketing Mix”. InSchwartz, George. Science in marketing. Wiley marketing series.Wiley. p. 286ff. Retrieved 2013-11-04.
[8] Banting, Peter; Ross, Randolph E. “The marketing mix: ACanadian perspective”. Journal of the Academy of MarketingScience (Springer Link) 1 (1). Retrieved 2010-11-12.
[9] Kerin, Hartley and Rudelius “Marketing, The Core,” 4th Edition,McGraw Hill Publishing 2001.
[10] “The 7 Ps of Marketing”. Retrieved 2011-11-12.
[11] Kotler, P. and Keller, K. (2006), Marketing and Management,Pearson Prentice Hall, Upper Saddle River, NJ, USA
[12] McLean, R. (October 19, 2002). The 4 C’s versus the 4 P’s ofmarketing. Custom Fit Online. Retrievedfrom https://www.customfitonline.com/news/2012/10/19/4-csversus-the-4-ps-of-marketing/
[13] bSchultz, Don E; Tannenbaum, Stanley I; Lauterborn, Robert F(1993), Integrated marketing communications, NTC BusinessBooks, ISBN 978-0-8442-3363-5
[14] Koichi Shimizu (2014) “Advertising Theory andStrategies,”18th edition, Souseisha Book Company. (Japanese)
[15] Koichi Shimizu (2003)”Symbiotic Marketing Strategy,”4thedition, Souseisha Book Company.(Japanese)
[16] Brian Solis(2011) Engage!: The Complete Guide for Brands andBusinesses to Build, Cultivate, and Measure Success in the NewWeb, John Wiley & Sons, Inc. pp. 201–202.
[17] E. Jerome McCarthy (1975)”Basic Marketing: A ManagerialApproach,” fifth edition, Richard D. Irwin, Inc., p. 37.

Sonia Sinhmar “Marketing Mix (Four P’s)” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 2, pp.151-152 2015

For Full Text Click here
pdf download

GET OUR MONTHLY NEWSLETTER