Safety and stability analysis of civil structures have become one of the most important research areas in Geotechnical Earthquake Engineering. This has become imperative due to the increasing stability failures of foundations and embankment slopes as a result of the occurrence of unexpected ground shakes. In this research the dynamic response analysis of highway embankment under different ground modifications was carried out using 2D FEM CAD based software (Geo-Studio) to run numerical model of the highway embankment. The main objective of the present research is to determine the maximum and minimum permanent displacements at the crest, middle and near toe part of the highway embankment body that is subjected to the peak acceleration of an earthquake record. A conceptual model was made of the highway embankment configuration and the engineering properties of the materials modelled are by far large estimates which were refined by data reported by various researchers. Mohr-Coulomb linear elastic model was used for the embankment materials in establishing the initial static stress-strain conditions. The Equivalent elastic constitutive model was used to establish the stress-strain relationship in the dynamic model. Different scenarios of embankment fill modifications were considered. These included normal fill embankment, normal fill embankment with geogrid reinforcement, fly ash fill embankment, fly ash fill embankment with geogrid reinforcement. The maximum vertical and horizontal displacements occur at the crest of the embankment in all three cases of fill material modifications. The maximum vertical displacement of 22cm was observed in normal fill embankment followed by 17.9cm in normal + fly ash fill embankment. In the normal fill geogrid reinforced embankment, 6.8cm of vertical displacement was observed. The least vertical displacement of 5cm was observed in normal + fly ash fill with geogrid reinforced embankment. The fly ash fill with geogrid reinforced embankment prove to be the best performer in seismically active zones.
- Page(s): 01-06
- Date of Publication: 31 October 2015
- Sunu Cecil EdemDepartment of Civil Engineering JNTU College of Engineering, Hyderabad, India
- M. PadmavathiDepartment of Civil Engineering JNTU College of Engineering, Hyderabad, India
- V. PadmavathiDepartment of Civil Engineering JNTU College of Engineering, Hyderabad, India
References
[1]. Terzaghi K. (1950) Mechanisms of Landslides. Engineering Geology (Berkeley) Volume, Geological Society of America, New York USA. [2]. Sabahat A. Khan and Syed M. Abbas (2014) Numerical Modelling Of Highway Embankment by Different Ground ImprovementTechniques, Intl. Jl. of Innovative Research in Advanced Engineering 2349-2163 Volume 1 Issue 10. [3]. Parish Y. and NajaeiAbadi F. (2009), Dynamic Behaviour of Earth Dams for Variation of Earth Material Stiffness, Jl. of International Scholarly and Scientific Research & Innovation 3(2), 446-451. [4]. Krahn, J. (2004). “Stability Modelling with SLOPE/W. An Engineering Methodology,” Published by GeoSlope International. [5]. T. Tanchaisawat (2008), Numerical Simulation Of Geogrid Reinforced Lightweight Geomaterials On Soft Ground Area, Proceeding of the 4th Asian Regional Conference on Geosynthetics, June 17 - 20, 2008, Shanghai, China. [6]. K. Banyopadhyay, S. Bhattacharjee and S. Ghosh. (2011), Numerical Approach for analysis of highway fly ash embankment, Proceedings of Indian Geotechnical Conference December 15-17, 2011, Kochi, Paper No. N-277. [7]. Fabio Santos et al (2011), Geotechnical properties of Fly Ash and Soil mixtures for use in highway embankments, World of Coal Ash (WOCA) Conference, May 9-12, 2011, Denver, CO, USA.
Sunu Cecil Edem, M. Padmavathi, V. Padmavathi "Dynamic Response Analysis of Highway Embankment with Different Fill Material Modifications." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.01-06 2015
For a social and economic standpoint prawn farming will remain an important part of the rural economy. From an environmental standpoint impacts of intensive prawn culture will only become exacerbated if the discharge of untreated effluent continues. This could have severe consequences for the industry in the future. Alternative systems, such as nutrient recycling systems, or alternative water treatment strategies are necessary to mitigate negative impacts in the future. The potential for higher farm income through remediation of currently idle ponds will provide a significant incentive for farmers to make them back on scampi farming. Factors encouraging prawn farming expansion are compatibility with agriculture, small farmers can practice in their own land, opportunities for women’s involvement, no interference with mangrove or environment. Revive the scampi industry can made it a major contributor in earning foreign exchange for our country and at the same time play a crucial role to the employment generation and socio-economic upliftment of a major portion of coastal rural fisher folk.
- Page(s): 07-11
- Date of Publication: 31 October 2015
- S. SahuHOD, Department of Fisheries Economics & Statistics FFSc, WBUAFS, 5, Buderhat Road, Panchasayar, Kolkata, India
References
[1] New, M.B., 2002. Farming Freshwater Prawns- A Manual for the Culture of the Giant River Prawn (Macrobranchium rosenbergii). FAO Fisheries Technical Paper 428, FAO, Rome. [2] New, M.B. 2005. Freshwater prawn farming: global status, recent research and a glance at the future. Aquaculture Research 36:210-230. [3] Rahman, M.A., M.R. Rahman and M.S. Rahman 2007. Evaluation of growth and production of the mahseer, Tor putitora (Ham.) in polyculture with indigenous major carps. pp. 161-175. In: Mahseer: The Biology and conservation (Eds. S.S. [4] Sagi A. & Aflalo E.D. (2005) The androgenic gland and monosex culture of Macrobrachium rosenbergii (De Man): a biotechnological perspective. Aquaculture Research36, 231-237. [5] Mitra, G., D.N. Chattopadhyay and P.K. Mukhopadhyay 2005. Nutrition and feeding in freshwater prawn (Macrobrachium rosenbergii) farming. Aqua feeds: formulation and Beyond 2: 17-19. [6] Miltner, M., A. Dranodos, A.R. Romaire, J.W. Avault,Z. Ra'anan and D. Chohen 1983. Polyculture of prawn, Macrobrachium rosenbergii, with fingerlings of adult catfish, Ictalurus punctatus and Chinese carp, Hypophthalmichthys molitrix and Ctenopharyngodon idella in earthen ponds in south Lousiana. Journal of the World Mariculture Society 14: 127-134.
S. Sahu "Econometrics of Scampi (Macrobrachium Rosenbergii) Polyculture in Selected Ponds at Sandeshkhali - I Development Block in North 24 Parganas District of Coastal West Bengal over the Year 2014" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.07-11 2015
Electricity which forms the life blood of any industry was introduced in the then United Province (U.P.) quite late. A plant having a capacity of 855 KW was setup and made operational in Kanpur on December 23, 1906. This was the first power plant established in the United Provinces. But this sector witnessed a very slow progress in the Province and till 1926-27 only nine towns could be energised. But the British for running their own establishments in India needed supply of electricity. The growth and development in this sector witnessed two distinct phases between 1906-27 and 1928-1947. In the first phase coal based thermal power stations were established and secondly after the digging of the Ganga canals switching over to the generation hydro electricity became possible along the banks of the river Ganga and Yamuna. The motive behind establishment of these power stations was not general public welfare. Low potential supply with limited coverage area left the state power starved till the Independence of India in 1947.
- Page(s): 12-15
- Date of Publication: 31 October 2015
- B.B.BandyopadhyayAMITY University, Noida (UP), India
- Arundhatee DebAMITY University, Noida (UP), India
- Dr. Roumi DebAMITY University, Noida (UP), India
References
[1]. Majumdar,S (1986). The Indian Electricity manual, P.68 [2]. Bharucha, Naushin (1948). The Electricity (Supply), Act no. 54 of Bombay,1961, P. 1 [3]. Techno Economic Survey Report of Uttar Pradesh (1965), P. 147-48. [4]. Saini Santosh Kumar (2011), The Rihand Dam: A Historical Study published in the Indian Journal of Research 5,39-44. Advanced Access Publication, 31 October, 2010 [5]. www.uttarakhandjalvidyut.com/cms_ujvn1/pathri.php [6]. Power Sector Reforms – Indian Experience and Global Trends, Economic and Political weekly, March 18, 2000. P. 1024-28
B.B.Bandyopadhyay, Arundhatee Deb, Dr. Roumi Deb "Growth of Power Sector in United Provinces (Undivided Uttar Pradesh) during the British rule-Issues and Shortcomings." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.12-15 2015
Introduction: Benjamin Franklin once wrote that failing to have a plan is planning for failure. These wise words echo as true today as they did over 200 years ago. "Failing to PLAN is planning to FAIL" Just like an architect who makes elaborate and detailed blue prints before building any structure or work of art. Nurses' use Nursing Process - a patient centered, problem-solving approach, goal oriented method of caring, that enables the nurse to provide care in an organized scientific manner. Material & Methods: a quasi-experimental, one group pre-test, post-test design was adopted to measure the effectiveness nursing process in providing quality nursing care to cardiac patients in selected hospitals of Gwalior.The study was conducted on 200nurses who were providing care to cardiac patients in cardiac patients. Data was collected from October 2014 to December 2014.A structured questionnaire was used to assess the knowledge about nurses about cardiac disease, Knowledge of nursing process and use of nursing process by nurses in providing care to cardiac patients. And aPlan Teaching Program (PTP) was prepared to provide pertinent information about the same. Results: The data revealed that, there is significant difference in mean of pre-test score (3.815) and mean of post-test score (5.67) of nurses about use of nursing process in providing quality patient care. Major findings of study revealed that Plan Teaching Program (PTP) is effective in enhancement of nurses’ knowledge.Use of nursing processbynurses about quality patient careto cardiac patient was significantlyassociated with qualification of nurse. Conclusion: After the detailed analysis of this study shows that effective use of nursing process help in providing quality patient care to cardiac patients, that could also be used for other disease also in hospital as well as community setting.
- Page(s): 16-21
- Date of Publication: 31 October 2015
- MadhusoodanResearch Scholar, IIS University, Jaipur (Raj.), India
- Dr. S. C. SharmaS.K.I.M.H. & R. Nursing College, Jaipur (Raj.), India
- Dr. Mahipal SinghPrincipal, Akhil Bharati Vidyapeeth College of Nursing, Sikar (Raj.), India
[1]. Carstens, J. (1984). The effects of an in-service program on nurses' ability to identify valid nursing diagnosis. In M. J. Kim & D. A. Moritz (Eds.), Classification of nursing diagnoses: Proceedings of the third and fourth national conferences. New York: McGraw-Hill. [2]. Cunning, B., &Pflederer, D. (1986).Taking the nursing process gamely. Nursing Management, 17(5), 49-50. [3]. Kim, M. J., Suhayda, R., Waters. L., &Yocum, C. (1984). The effect of using nursing diagnosis in nursing care planning. In M. J. Kim & D. A. Moritz (Eds.), [4]. Steffenino G, et.al. (2003). Nurses' Observational Study on the Practice of Secondary Prevention in a Cardiovascular Department. Italian Heart Journal. 4(7):473-8. [5]. Ulmer D (1996). Stress Management for the Cardiovascular Patient: A Look at Current Treatment and Trends. Program Cardiovascular Nursing. 11(1):21-9. [6]. Yura. H., & Walsh, M. B. (1998) (Eds.). The nursing process: Assessing, planning, implementing, and evaluating (5th Ed.). East Norwalk, CT: Appleton and Lange.
Madhusoodan, Dr. S. C. Sharma, Dr. Mahipal Singh, "Effectiveness of Nursing Process in Providing Quality Care to Cardiac Patients." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.16-21 2015
The East Kolkata Wetlands provide a range of ecosystem services which form the base of ecological security of the entire region and livelihoods of dependent communities. Being a dynamic ecosystem, the bheri is also subject to influence from various natural as well as human factors. Integrated management of the East Kolkata bheris and its catchments is crucial for maintaining the rich productivity of the wetland ecosystem as well as achieving wise use of resources by communities. It is essential to implement conservation measures for proper management of the aquatic resources and suitable measure to be taken for up-gradation of breeding ground, feeding zones and migration area. The bheri fisheries can take a role in the development of fisheries in the state as well as contribute towards the socio economic up liftment of the poor people of the area.
- Page(s): 22-26
- Date of Publication: 31 October 2015
- S. SahuHOD, Department of Fishery Economics and Statistics, Faculty of Fishery Sciences,WBUAFS, Kolkata, India
- A. MondalAssociate Professor, Department of Fishery Economics and Statistics, FFSc, WBUAFS, Kolkata, India
- A. AzizPG Student, Department of Fishery Economics and Statistics, FFSc, Kolkata, India
- B. K. DasProfessor & Dean, Faculty of Fishery Sciences, WBUAFS, Kolkata, India
- S. ChowdhuryAssistant Professor, Department of Fish Processing Technology, FFSc, WBUAFS, Kolkata, India
References
[1] FAO (1995). Aquaculture production statistics. FAO Fisheries Circular 815, Rev. 7. FAO, Rome: Fishery Information, Data and Statistics Service. 1984–1993. [2] Handbook on Fisheries Statistics, Ministry of Agriculture, Government of India and unpublished data from Department of Animal Husbandry and Dairying, Ministry of Agriculture, Government of India. 2000. [3] Kumar, Anjani, P.K. Joshi and Badruddin.. Export performance of Indian fisheries sector: Strengths and challenges ahead, Working Paper 3, National Centre for Agricultural Economics and Policy Research, New Delhi. 2002 [4] Chattopadhyay, B., A. Chatterjee and S.K. Mukhopadhyay, Bioaccumulation of metals in the East Calcutta Wetland Ecosystem. Aquatic Ecosyst. Health Manage., 5: 191-203. DOI: 10.1080/14634980290031848. 2002.
S. Sahu, A. Mondal, A. Aziz, B. K. Das, S. Chowdhury, "Bio-Economic Analysis of Bheri Fisheries in and Around Topsia Canal of East Kolkata Region in West Bengal during 2014-’15." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.22-26 2015
Speaker recognition has become an important tool in crime investigation, since the use of the human voice as an instrument in commission of crime is ever-increasing due to increase in communication. We can identify a person on the basis of acoustical analysis of his/her voice but as we all know there are some limitations against expert in forensic speaker recognition and for this reason the voice evidence is usually accepted as the secondary evidence supporting other scientific facts in the court of law, but in offenses such as kidnapping, extortion, Blackmail threats, obscene calls, harassment calls, ransom calls etc. where the criminal catch aid of telephone or mobile phone for accomplishing their illicit tasks, voice automatically becomes the primary and most valuable evidence for linking the suspect and the crime. One limitation against expert in forensic speaker recognition is the variation in distance between recorder and the mouth of speaker during questioned voice and control voice recording.In this paper, we present a study of variations in mean fundamental frequency and mean energy of the voice recording of a speaker with respect to the distance. We analyzed the range of variation in energy and fundamental frequency for above situation which may further useful to forensic expert to overcome the limitations and achieve precise and accurate results. The results show a very strong influence of the distance variation between speaker and recording device upon mean energy.
- Page(s): 27-34
- Date of Publication: 31 October 2015
- Shital k. ParmarStudent, IFS Gujarat Forensic Sciences University Gandhinagar, Gujarat, India
- Surbhi Mathur*Assistant Professor Jr., Gujarat Forensic Sciences University, Gandhinagar Gujarat, India
- Dr. M.S.DahiyaDirector, IFS, Gujarat Forensic Sciences University, Gandhinagar Gujarat, India
- Dr. J. M. VyasDirector General, Gujarat Forensic Sciences University, Gandhinagar Gujarat, India
References
[1]. Eric Keller; Fundamentals of speech synthesis and speech recognition: basic concepts, state of the art, and future challenges; John Wiley and Sons Ltd. Chichester, UK; 1994 [2]. Philip Rose; Forensic Speaker Identification , Hardcover – July 1, 2002; ISBN-13: 978-0415271820 [3]. Raichel Daniel R.; The science and application of acoustics; Hardcover – May 11; ISBN-13: 978-0387989075 [4]. Harry Hollien; Forensic Voice Identification; Hardcover – October 9, 2001; ISBN-13: 978-0123526212 [5]. Ray D. Kent, Charles Read The Acoustic Analysis of Speech; Paperback – December 21, 2001; ISBN-13: 978-0769301129 [6]. Neustein, Amy, Patil and Hemant A.; Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism; Hardcover – Import, 6 Oct 2011 [7]. Molly L. Erickson et al: “ A Comparison of Two Methods of Formant Frequency Estimation for High-Pitched Voices”Published in Journal of voice, volume 16, issue 2, June 2002, page 147-171 [8]. Surbhi Mathur,et al: “Speaker Recognition System and Its Forensic Implications: A Review, Volume III, Issue IV, April 2014 IJLTEMAS ISSN 2278 - 2540 [9]. Marco Guzman et al: “Influence on Spectral Energy Distribution of Emotional Expression”; Journal of voice, volume 27, issue 1, January 2013, page 129.e1-129.e. [10]. Dimitar D. Deliyski et al: “Adverse Effects of Environmental Noise on Acoustic Voice Quality Measurements”; Journal of voice, volume 19, issue 1, March 2005, page 15-28 [11]. Erkki Vikman et al; “Effects of prolonged oral reading on F0, SPL, subglottal pressure and amplitude characteristics of glottal flow waveforms”; Journal of voice, volume 3, issue 2, June 1999, page 303-312 [12]. Theresa A. Burnett et al: “Voice F0 responses to pitch-shifted auditory feedback: a preliminary study” Journal of voice, volume 11, issue 2, June 1997, page 202-211 [13]. Sungbok Lee, et al: “Study of Acoustic Correlates Associated with Emotional Speech”; 148th ASA Meeting, San Diego, CA [14]. Lieberman,et al: “Fundamental frequency of phonation and perceived emotional stress”; J Acoust Soc Am. 1997 Apr; 101(4):2267-77. [15]. Marius Vasile, et al.: “A Study of the Effect of Emotional State upon the Variation of the Fundamental Frequency of a Speaker”; Journal of Applied Computer Science & Mathematics, no.7 – Special Issue. [16]. Sirisha Duvvuru et al:“The Effect of Change in Spectral Slope and Formant Frequencies on the Perception of Loudness”; Journal of voice, volume 27, issue 6, November 2013, page 691-697 [17]. S.Mwangi,et al.: “Effect of Vocal Aging on Fundamental Freque ncy and Formants”; NAG/DAGA 2009-Rotterdam.
Shital k. Parmar, Mrs. Surbhi Mathur, Dr. M.S.Dahiya, Dr. J. M. Vyasd "Study of Variations in Mean Fundamental Frequency and Mean Energy of the Voice Recording of a Speaker with Respect to the Distance" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.27-34 2015
Geological domains in North-Eastern India evolved though time after the rupture of the Gondwanaland. Collision of the Indian and the Burmese plates took place during the middle part of Cretaceous. Evolution of the Palaeogene Barail trough, Neocene Surma and Tipam Groups took place gradually. The Barail trough originated at the active margin of the Indo-Burmese plate convergence. The present study evaluates the petrographical studies of sandstone samples from Barail Group occurring in Kohima, Nagaland. It provides informations about mineralogical variations, and provenance of the area. Through the modal analysis it is clear that the sandstone samples fall mostly in the field of Quartz arenite, and point out a continental block provenance field. Framework grains are sand-sized to siltsized particles of mainly detrital origin. The most common detrital grains are monocrystalline quartz (39.0-58.0%); polycrystalline quartz (1.8-9.6%); K-feldspar (2.7-7.2%); plagioclase (1.4-8.5%); collophane (0-3-3.1%); muscovite (0- 1.5%); lithic fragments (2.1-10.4%); heavy minerals (trace). Lithic fragments are predominantly highly siliceous and finely textured. Among the main detrital framework grains, quartz constitutes. Sandstones encountered in the studied Sections have been classified as Quartz arenite, Laminated siltstone, Argillaceous Silstone and Lithic Glauconitic arenite in order of abundance.Further this study supports a humid climate during the deposition of the Barail Group of sediments.
- Page(s): 35-41
- Date of Publication: 31 October 2015
- A RamamoorthyDepartment of Geology School of Earth Sciences, India.
- S RamasamyUniversity of Madras Guindy Campus, Chennai, India.
References
[1]. Basu, A., Young, S.W., Suttner,L.G.,James,W.C.,And Mack,G.W., (1975). Re – evaluation of the use of undulatory extinction and polycrystalline detrital quartz in provenance interpretation. Jour. Sed. Pet., 45, pp. 873 – 882.56 (5), pp. 157. [2]. Blatt, H., And Christie, J. M., 1963, Undulatory extinction in quartz of igneous and metamorphic rocks and its significance in provenance studies of sedimentary rocks: Jour. Sedimentary Petrology, v.23, p. 559- 57 [3]. Dasgupta, P.K., Chakraborty, P.K. And Dutta, D. (1991). Basinward migrating submarine fan environments from the Barail Group in the North Cachar Hills, Assam-Arakan Orogen, India. In: A.H. Bouma and R.M. Carter (Eds.), Facies Models in Exploration and Development of Hydrocarbon and OreDeposits: VSP, Utrecht, The Netherlands, 254p [4]. Dickinson, W.R. And Suczek, C.A. (1979). Plate tectonics and sandstone composition. Bull. Amer. Assoc. Petrol. Geologists, v.63, pp.2164-2182. [5]. Dickinson, W.R., (1985). Interpreting relations of detrital modes of sandstone, In provenance of Arenite, G.G. Zuffa (Ed.), Redil Dovedrect, Boston, Lancaster, pp. 333-361 [6]. Dott, R.H., (1964). “Wacke, Graywacke and Matrix- What Approach to Immature Sandstone Classification?” J.Sed.Petrol., 34: 625-632. [7]. Evans, P. (1964). Tectonic framework of Assam. Jour. Geol. Soc. India, v.5, pp.80-96. [8]. Folk, R.L. (1980). Petrology of Sedimentary Rocks. Hamphills, Austin, Texas, 182p sandstones. Journal of Sedimentary Petrology, 32: 440–450. [9]. Gleria Js ,Rajkumar Hs , Mehorotra Rc ,Soibam I And Rajkumar K (2005 ) palaeocene plant fossils of Manipur and their Palaeological Significance Palaeobotanist 4-61-77. [10]. James , W.C., Wilmar,G.C., And Davidson, B.C., (1986). Role of quartz type and grain size in silica diagenesis of Nugget sandstone, South Central Wyoming, Jour. Sed. Pet., 56 (5), pp. 157. [11]. Krynine (1943). The tourmaline group in sandstones. Jour. Geol.,v.54,pp-65-87. [12]. Lindsay, J.F., Holiday D.W. And Hulbert, A.G. (1991). Sequence stratigraphy and the evolution of the Ganges-Bramhaputra delta complex; Amer. Assoc. Petrol. Geol. Bull., v.75, pp.1233-1254. [13]. Mathur, L.P. And Evans, P. (1964). Oil in India. 22nd session, Int. Geol. Cong. New Delhi, India, 85p. [14]. Pandey, N. And Srivastava, S.K. (1998) Preliminary report on Disang-Barail Transition, North West of Kohima,Nagaland,(abs.). Workshop on Geo-dynamics and Natural resources of North East India, Dibrugrah, p.24 [15]. Pettijohn,F.J., Potter,P.E. ,And Siever,R.,(1972). Sand and Sandstones. NewYork (Springer-Verlag), p.158. [16]. Pettijohn, F.J. (1975). Sedimentary Rocks. Harper and Row, New York. [17]. Suttner, L.J., Basu, A. And Mack, G.H. (1981). Climate and the origin of quartz arenites. Jour. Sed. Petrol., v.51, pp.1235-1246. [18]. Suttner, L.J And Dutta, P.K. (1986). Alluvial sandstones composition and palaeoclimate framework mineralogy, Jour. Sed. Petrol, vol.56, pp.329-345
A Ramamoorthy, S Ramasamy "Petrography and Provenance of Surface Barail Sandstones, Kohima, Nagaland, India" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.35-41 2015
With more and more disposable income available with the people working in the various sectors and with many investment opportunities available, each individual wants to invest in the share market and want to have a sizeable portfolio. The stock brokers and other various intermediary agencies play a vital role in the capital market. The investor may not be aware of the working of the stock market and the stock broking agencies have to take the responsibility of the buying and selling of shares on their behalf. The agencies inform the investors about the various products and services so that they can invest in alternatives that are more profitable and also provide them with wealth maximization products. On many occasions, the investor may not know how to operate the De-mat account, or may not be a computer user nor may have the time and resources to analyze the stock market. In such a situation , the advisory services of the stock broker becomes very essential because it is very difficult for a new comer to predict a particular stock performance as the stock market is most of the time very volatile. The present study is an attempt to study the present relevance of stock brokers and scope for stock broking Industry in the capital market. For this study, secondary data has been used to find out the importance and scope of broking industry.
- Page(s): 42-47
- Date of Publication: 31 October 2015
- Dr. K. Prabhakar RajkumarAssistant Professor, Dept. of Commerce Periyar University, Salem-11, Tamil Nadu, India
- N. Lakshmi KavithaPh.D Research Scholar, Dept. of Commerce Bharathiar University, Coimbatore-46, Tamil Nadu, India
References
[1]. Aggarwal, "Business Statistics,"(2010) Ane Books Pvt. Ltd , New Delhi. [2]. Avadhani, " Investment Management “,(2014) Himalaya Publishing House ,8th edition , p.p 3-52. [3]. Anurag Bansal, Current state of Indian Equity Broking industry and way forward, Forum View, Vol.3, No.1, p.p 46-47. [4]. Balla,V.K."Investment Management" (2012) S.Chand and Company Ltd,New Delhi, 18th Revised Edition, p.p. 83-109. [5]. Broking industry outlook, Forum Views, Vol.4, No.1, p.p 56-59 [6]. Chandra P. "Investment Analysis and Portfolio Management" (2008), Tata Macgraw - Hill Publishing Company Ltd , New Delhi. 3rd Edition. [7]. Gordon J. Alexander, William F.Sharpe and Jeffrey G. Bailey, Fundamentals of Investments(2013) PHL learning Pvt. Ltd, Delhi, 3rd edition, p.p 2-13 [8]. Gordan and Natarajan, "Financial Markets and services " Himalaya Publishing House, 2014, p.p. 107-176. [9]. Gupta, Kumar Shomik. (2011).,Brokers in India assisting investor across. ICFAI Journals. Prime publication. [10]. Hanson, Lynn Jennifer, Internet stock broker advantage cheap online stock investing,(2009) ICFAI Journals. Prime Publication. [11]. Kothari ,C.R, "Research Methodology ,(2014)Wishwa Prakarshan , Banglore , 3rd Edition. [12]. Krishnan and Booker. D.M.,"Investors use of Analyst Recommendations," (2014),Behavioural Research in Accounting, p. p. 129-158. [13]. Madhumita Gosh , “IPOs: More Misses Than Hits”, (2011) Dalal Street Investment Journal, Vol. 26. No. 9, Page 70. [14]. Priti R.Majhi and Prafull k.khatua,"Research Methodology",(2013) Himalaya Publishing House, 2nd edition. [15]. Robertson, Chris,Benefits of using a stock broker as a new investor, (2006) ICFAI Journals. Prime Publication. [16]. Shivakumar Deene and Satyanarayan Pathi,"Investor' awareness about capital market Investments: A study with reference to Karnataka state”, (2013) International Journal of Advance Research in Management (IJARM),volume 4,Issue 3, ,pp.1-17. [17]. Victor, J. The brokers role in Investing,(2011) ICFAI Journals. Prime Publication. [18]. www.sebi.gov.in [19]. www.bse.com [20]. www.nse.com [21]. www.cdslindia.com.
Dr. K. Prabhakar Rajkumar, N. Lakshmi Kavitha "Relevance of Stock Broking Industry in Capital Market with Special Reference to BSE, Mumbai" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.42-47 2015
Calculating the minimum spanning tree of the graph is one of the most important fundamental problem , the least weight minimum spanning tree based on compute (construct) a minimum weight spanning tree that has the least weight edges by using weight matrix. In this paper we have proposed a new method and its corresponding algorithm to construct least weight minimum spanning tree.
- Page(s): 48-51
- Date of Publication: 31 October 2015
- Abhishek kumarDepartment of Commerce Ramadheen singh girls degree college, Lucknow – U.P, India
- Gaurav KumarDepartment of Mathematics Bbdniit, Lucknow – U.P, India
References
[1]. Mandal, Dutta and Pal ,( October-2012) “A new efficient technique to construct A minimum spanning tree “, International Journal of Advance research in computer science and software engineering 2(10), , pp 93-97 [2]. Nirav J. Patel, Prof. Manoj Patel,( may-2014) “ A new approach to solve minimum spanning tree problem : maximum cost pruning method”, International Journal for technological research in engineering volume 1, issue 9, [3]. Dr.D vijayalakshmir , R.kalaivani,( September 2014) “Minimum cost spanning tree using matrix algorithm”, International Journal of Scientific and research publication, Volume 4, issue9. [4]. Neetu rawat, (20 april-2014) “An algorithm approach to grapg theory”proceeding of International conference on Advance in Engineering &Technology, goa , India, [5]. M.R.Hassan , (2012) “An efficient method to solve least cost minimum spanning tree (LC-MST)problem”. Journal of King saud University – Computer and information sciences 24,101-105 [6]. Sunny Dagar,( 2012) “Modified prim’s algorithm” IJCIT VOLUME 03, ISSUE 02 [7]. CuK neyt F. Bazlamac7cm, Khalil S. Hindi, (2001) “Minimum-weight spanning tree algorithms A survey and empirical study” Computers & Operations Research 28 767}785 [8]. Abhilasha R., (June 2013) “Minimum Cost Spanning Tree Using Prim’s Algorithm” International Journal of Advance Research in Computer Science and Management Studies Volume 1, Issue 1, [9]. G. Anandhi1, S. K. Srivatsa,( May 2014) “Relative Merits of Minimum Cost Spanning Trees and Steiner Trees” International Journal of Science and Research (IJSR) Volume 3 Issue 5. [10]. Graham, R.L., Hell, Pavol, On the history of the minimum spanning tree problem. Annals of the History of Computing 7 (1), 1985. 44–57. [11]. Cambos, Rui, Ricardo, Manuel,( 2008). A fast algorithm for computing minimum routing cost spanning trees. Computer Networks 52, 3229– 3247. [12]. Narsing Deo, Graph theory with application to engineering and computer science ,prentice – Hall of India private limited, New Delhi, 2007 [13]. https://en.wikipedia.org/wiki/miminum_spanning_tree
Abhishek Kumar, Gaurav Kumar "An Efficient Method to Construct Minimum Spanning Tree" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.48-51 2015
We live in the world of digital era of social networking and online information exchange. There are different online services used by users. Digital footprint help web service provider to target appropriate user for their web content and services. In this paper we are going to see what is digital footprint is and its classifications. What are privacy issues it leads to? Role of social networking site in context of generating digital footprint.
- Page(s): 52-56
- Date of Publication: 31 October 2015
- Prof. Anjana R. ArakerimathMCA Department Pimpri Chinchwad College of Engineering, Savitribai Phule Pune University Pune, Maharashtra, India
- Pramod Kumar GuptaMCA Department Pimpri Chinchwad College of Engineering, Savitribai Phule Pune University Pune, Maharashtra, India
References
[1]. Digital footprint [Online]. Available: https://en.wikipedia.org/wiki/Digital_footprint. [2]. Tony Fish, My Digital Footprint: A two-sided digital business model where your privacy will be someone else's business! [3]. Facebook Open Graph API [Online]. Available: https://developers.facebook.com/docs/graph-api/overview, https://ogp.me/ [4]. Michal Kosinskia,1, David Stillwella, and Thore Graepelb, “Private traits and attributes are predictable from digital records of human behavior” [5]. 2013 Privacy Survey Results [Online]. Available: https://www.microsoft.com/en-us/twc/privacy/data-privacy-day.aspx [6]. AVG Digital Diaries Campaign Survey Report [Online]. Available: https://www.avg.com/digitaldiaries/2010 [7]. Digital Birth: Welcome to the Online World [Online]. Available: https://www.businesswire.com/news/home/20101006006722/en/Digital-Birth-Online-World#.Ve_2ohGeDGd
Prof. Anjana R. Arakerimath, Pramod Kumar Gupta "Digital Footprint: Pros, Cons, and Future" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.52-56 2015
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is cost effective because of the multiplexing of resources. Cloud computing is technical and social reality today, at the same time it is the emerging technology. Application data is stored in a manner that is device and location independent. Security of the cloud based applications and Data is the key concerns of the cloud computing. The principles of the security are the Confidentiality, Integrity and Availability. Cloud security is a broad topic and any combination of policies, technologies, and controls to protect data, infrastructure and services from possible attacks. This paper presents the Analysis of the Data Security using RSA Algorithm, RSA is public key based Asymmetric Cryptosystem.
- Page(s): 57-59
- Date of Publication: 31 October 2015
- Soumya.N.SM.Tech Student, Computer Network Engineering Dr. AIT, Bangalore, India
- Prabha.RAssociate Professor, Department of Information Technology Dr. AIT, Bangalore, India.
References
[1]. Peter Mell, and Tim Grance, “The NIST Definition of Cloud Computing,” Version15,10-7-09, https://www.wheresmyserver.co.nz/storage/media/faq-files/cloud-def-v15.pdf. [2]. Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. In: First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, [3]. https://www.cloudsecurityalliance.org [4]. Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. [5]. Bhadauria, Rohit, and Sugata Sanyal. "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques." International Journal of computer applications 47 (2012). [6]. “Data Security in Cloud Computing” T V Sathyanarayana 978-1-4673-6126-2/13/c 2013 IEEE [7]. “Data Security Frameworks In Cloud” by Devi T School of Computing Sciences and Engineering International Conference on Science, Engineering and Management Research (ICSEMR 2014) 978-1-4799-7613-3/14/ ©2014 IEEE. [8]. Subashini S and Kavitha V, "A survey on security issues in service delivery models of Cloud computing", Journal of Network and Computer Applications, Vol.34, No.1, pp. 1-11, 2011. [9]. “Cryptography and Network Security: principle and practices” by Wiiliam Stallings sixth edition published by Pearson Education Inc@2014.
Soumya.N.S, Prabha.R "Cloud Computing: Data Security Using RSA" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.57-59 2015
INTRODUCTION
The paper “A Study of Impact of Information
Technology on Industries to Develop Business- to-
Business Relationships” highlights on the fact in which
the various communication tools and methods influences
the internal management of any company for doing
Business-to-Business Relationships. The result of the
present research work/paper suggests that both the Buyers
& Suppliers in a Marketing Chain uses Information
Technology for developing and maintaining business
relationships on large scale. The noticeable thing is that
suppliers adopt the IT based methods of communication
more quickly than the buyers. The growth in the
Information Technology sector has really affected the
management of developing business relationships in
industries. Managers, therefore, need to be known and
understand the affect and impact of IT on the nature of
communication in order to develop a strong relationship
with outsiders..
- Page(s): 60-64
- Date of Publication: 31 October 2015
- Prof. Shubhangi Vitthal GaikwadAssistant Professor & Head, Department of Commerce MAEER’S Arts, Commerce & Science College Pune, India
References
BIBLIOGRAPHY/WEBLIOGRAPHY
I: References:-
[1]. Andrus D (2000); “E-commerce Strategies and Innovative Companies”; Seminar at the University of Birmingham.
[2]. Ford D (1980); “The Development of Buyer-seller Relationship in Industrial Markets”; European Journal of Marketing; Vol.14 (5/6); pp. 339-53.
[3]. Naude P and Holland C P (1996); “Business –to- Business Relationships”; in, Buttle F; Editor; The Relationship Marketing; Great Britain; Paul Chapman Publishing.
II: Journals:-
[1]. E.N.Murthy; GRK Murty; The icfai Journal of “Supply Chain Management”; Volume IV; No. 04; Hyderabad; December 2006.
[2]. E.N.Murthy; GRK Murty; The icfai Journal of “Supply Chain Management”; Volume IV; No. 01; Hyderabad; March 2007.
III: Publications:-
[1]. Publisher: Elsevier B.V. Publication Name: The Industrial Marketing Management Subject: Business International ISSN: 0019-8501 Year: 1995 Beliefs, Opinions and Attitudes, Selling, Consumers, Bankers, Attitudes.
[2]. Author: Ricard, Line, Filiatrault, Pierre, Perrien, Jean Publisher: Elsevier B.V. Publication Name: The Industrial Marketing Management Subject: Business, International ISSN: 0019-8501 Year: 1993 Bank Marketing.
IV. Others:- Web (Internet):-
A. www.google.com
B. www.yahoo.com
C. www.icfaipress.org
D. https://www.businessindia.com
Prof. Shubhangi Vitthal Gaikwad "A Study of Impact of Information Technology on the Industries to Develop Business Relationships" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.60-64 2015
In the present study, physico-chemical properties of fenugreek seeds were evaluated. Physical properties were evaluated for storage and equipment design whereas chemical properties were evaluated for nutritional study and product development. The average length, width, thickness, seed mass and geometric mean of the seed ranged as 3.461 mm, 2.061 mm, 1.067 mm, 0.0177 g and 1.990 mm respectively. The average sphericity, 1000 seed mass, bulk density, kernel density, porosity and angle of repose were ranged as 55.81%, 14.40 g, 6.51 (g/ml), 1.190(g/ml), 42.51% and 13.530 respectively. Chemical properties such as moisture, fat, protein and ash content (% dry basis) were found to be 11.21%, 07%, 23.30% and 03% respectively in raw fenugreek seeds where as 13.50%, 6.24%, 24.12% and 3.14% respectively in germinated fenugreek seeds. Germinated fenugreek seeds have higher moisture, protein and ash content where as low fat content as compared to raw fenugreek seeds.
- Page(s): 68-70
- Date of Publication: 31 October 2015
- Agrawal R.S.Department of Food Chemistry and Nutrition CFT, VNMKV, Parbhani, (MS), India
- Shirale D.O.Department of Agricultural Engineering MIT, Aurangabad,(M.S), India
- Syed H.M.Department of Agricultural Engineering MIT, Aurangabad,(M.S), India
- Syed Ayesha Abdul RasheedDepartment of Agricultural Engineering MIT, Aurangabad,(M.S), India
References
[1]. Parthasarathy, V. A., Chempakam, B., and Zachariah, T. J. (2008). "Chemistry of Spices". CAB International. [2]. Murlidhar, M. and Goswami, T. K., (2012). “A Review on the functional properties, nutritional content, medicinal utilization and potential application of fenugreek”. Journal of food processing technology, 3(9), 1-10. [3]. Mohsenin, N. N., (1970). Text book of “Physical Properties of plant and animal materials”, Gordon and Breach Publishers. [4]. Shakuntala, S., Naik, J. P., Jeyarani, T., Naidu, M. M. and Shrinivas, P. (2011). Characterisation of germinated fenugreek (Trigonella foenum-graecum L.) seed fractions, International journal of Food Science and Technology , 46,2337-2343. [5]. NIN Report (1987). Use of fenugreek seed powder in the management of non-insulin dependant diabetes mellitus. NIN, ICMR, Hydrabad, India. [6]. Altuntas, E., Ozgoz, E. and Taser, O. F., (2005). “Some physical properties of fenugreek (Trigonella foenum-graceum L.) seeds”, Journal of food engineering. 71, 37-43. [7]. A.O.A.C. (1990). Official Method of Analysis Volume II, Association of Official Analytcial Chemists, Washington DC. [8]. Ebubekir Altuntas, Engin Ozgoz, O. Faruk Taser (2005). Some physical properties of fenugreek (Trigonella foenum-graceum L.) seeds”, Journal of food engineering 71, 37-43 [9]. Shalini Hooda and Sudesh Jood (2003) Effect of soaking and germination on nutrient and antinutrient contents of fenugreek (Trigonella foenum-graceum L.) Journal of Food Biochemistry 27, 165-176.
Agrawal R.S., Shirale D.O., Syed H.M. and Syed Ayesha Abdul Rasheed "Physico-Chemical Properties of Fenugreek (Trigonella Foenum - Graceum L.) Seeds." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.68-70 2015
This paper presents a Model to conduct automated regression testing. The model is evaluated for Java software. The efficiency of the model is evaluated from code coverage information. The effectiveness is measured by taking cost model into account. A cost model for automated regression test model is suggested by taking different cost component into considerations. In software industry , test automation is the use of special software, different from software being tested to control the execution of tests and comparison of actual outcomes with predicted outcomes. Test automation can automate some repetitive but necessary tasks in a formalized testing manner or add additional testing the would be difficult to conduct manually.
- Page(s): 71-74
- Date of Publication: 31 October 2015
- Swarna Lata PatiCollege of Engg & Tech , BBSR, Bhubaneswar, Orissa, India
- Manojranjan NayakSOA University , BBSR, Bhubaneswar, Orissa, India
References
[1]. Regression test selection for C++ software G Rothermel Marry J Harrold Jeinay Dedhia. [2]. https://www.xoriant.com [3]. Prioritizing JUnit test cases G Rothermel, A Kinneer ,Hyunsook Do [4]. Evaluating the efficacy of Test Driven development bT. Bhat and N Nagappan. [5]. Kaner Cem “ Architecture of Test automation” August 2000. [6]. Elfriede Dustin et al. “ Implementing automated software Testing “ Addision Welley ISBN 0-291 [7]. Software Engineering a Practioner’s Approach. Roger S Pressman, Tata McGraw Hill. [8]. Fundamental of Software Engineering by Ian Sommerville. Pearson Edition. [9]. Fundamentals of Software Engineering by Rajib Mall, PHI edition. [10]. Bas Vodde and Lasse Koskela , IEEE Software Vol 24 issue 3, 2007 [11]. Mark Fewster and Dorothy Graham (1999)” Software Test Automation “ ACM press ISBN 978-0-6-23372-7.
Swarna Lata Pati, Manojranjan Nayak "Automated Regression Test Model with Cost Estimation" International Journal of Latest Technology in Engineering,Management & Applied Science vol.4 issue 10, pp.71-74 2015
Milk has been a good source of various nutrients including different vitamins. In this paper quality of milk and comparative study of various vitamins present in the milk is done. Various milk samples was analyzed and found that vitamin A has in negligible as compared to its World Health Origin value while vitamins C and D were found absent.
- Page(s): 75-77
- Date of Publication: 31 October 2015
- Dadasaheb NavaleSinhgad Jr. college Vadgaon. Pune, India
- Shelley GuptaParvatibai Genba Moze Engineering College Wagholi. Pune, India
References
[1]. Gombart, A.F. The vitamin D-antimicrobial peptide pathway and its role in protection against infection. Future Microbiol. 2009, 4, 1151–1165. [2]. Webb, A.R.; Pilbeam, C.; Hanafin, N.; Holick, M.F. An evaluation of the relative contributions of exposure to sunlight and of diet to the circulating concentrations of 25-hydroxyvitamin D in an elderly nursing home population in Boston. Am. J. Clin. Nutr. 1990, 51, 1075–1081. [3]. Adami, S.; Romagnoli, E.; Carnevale, V.; Scillitani, A.; Giusti, A.; Rossini, M.; Gatti, D.; Nuti, R.; Minisola, S. Guidelines on prevention and treatment of vitamin D deficiency. Reumatismo 2011, 63, 129–147. [4]. Caroli, A.; Poli, A.; Ricotta, D.; Banfi, G.; Cocchi, D. Invited review: Dairy intake and bone health: A viewpoint from the state of the art. J. Dairy Sci. 2011, 94, 5249–5262. [5]. DeLuca, H.F. The vitamin D story: A collaborative effort of basic science and clinical medicine.FASEB J. 1988, 2, 224–236. [6]. Reichel, H.; Koeffler, H.P.; Norman, A.W. The role of vitamin D endocrine system in health and disease. N. Engl. J. Med. 1989, 320, 980–991. [7]. Nagpal, S.; Na, S.; Rathnachalam, R. Noncalcemic actions of vitamin D receptor ligands. Endocr. Rev. 2005, 26, 662–687. [8]. FAO/WHO (2002). Vitamin C. In: Human Vitamin and Mineral Requirements.Report of a Joint FAO/WHO Expert Consultation. FAO, Rome; pp 73-86. [9]. Hallberg L (1987) Wheat fiber, phytates and iron absorption. Scand J Gastroenterol (Suppl)129:73-79. [10]. IOM (2000). Ascorbic acid. In: Dietary Reference Intakes for Ascorbic acid, Vitamin E, Selenium, and Carotenoids.Food and Nutrition Board, Institute of Medicine. National Academy Press, Washington DC; chapter 5, pp 95-185.108 [11]. Levine M, Conry-Cantilena C, Wang Y, Welch RW, Washko PW, Dhariwal KR, Park JB, Lazarev A & Graumlich JK (1996) Ascorbic acid pharmacokinetics in healthy volunteers:evidence for a Recommended Dietary Allowance. Proc Natl Acad Sci93:3704-3709. [12]. Levine M, Rumsey SC, Dhariwal KR, Park J & Wang Y (1999) Criteria andrecommendation for ascorbic acid intake. J Amer Med Assoc281: 1415-1423. [13]. Jakobsen, J. Bioavailability and bioactivity of vitamin D3 active compounds—Which potency should be used for 25-hydroxyvitamin D3? Int. Congr. Ser. 2007, 1297, 133–142. [14]. FDA. PMO 2007: Appendix O: Vitamin fortification of fluid milk products. Available online:https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/Milk/ ucm089032.htm (accessed on 24 June 2013). [15]. Fulgoni, V., III; Nicholls, J.; Reed, A.; Buckley, R.; Kafer, K.; Huth, P.; Dirienzo, D.; Miller, G. Dairy consumption and related nutrient intake in African-American adults and children in the United States: Continuing survey of food intakes by individuals 1994–1996, 1998, and theNational Health and Nutrition Examination Survey 1999–2000. J. Am. Diet. Assoc. 2007, 107, 256–264. [16]. Reeve, L.E.; Jorgensen, N.A.; DeLuca, H.F. Vitamin D compounds in cows’ milk. J. Nutr. 1982, 112, 667–672. [17]. National Research Council. Nutrient Requirements of Dairy Cattle, 5th ed.; National Academy of Sciences: Washington, DC, USA, 1978. [18]. National Research Council. Nutrient Requirements of Dairy Cattle, 7th ed.; National Academy of Sciences: Washington, DC, USA, 2001. [19]. Horst, R.L.; Goff, J.P.; Reinhardt, T.A. Calcium and vitamin D metabolism in the dairy cow. J. Dairy Sci. 1994, 77, 1936–1951. [20]. National Research Council. Nutrient Requirements of Dairy Cattle, 6th ed.; National Academy of Sciences: Washington, DC, USA, 1989. [21]. Littledike, E.T.; Horst, R.L. Problems with vitamin D injections for prevention of milk fever: Toxicity of large doses and increased incidence of small doses. J. Dairy Sci. 1980, 63, 89. Molecules 2013, 18 10131 [22]. Ali, A.K.A.; Shook, G.E. An optimum transformation for somatic cell concentration in milk. J. Dairy Sci. 1980, 63, 487–490. [23]. Zecconi, A. Le cellule somatiche nel latte influenzano sanità e qualità. L’Informatore Agrario 2007, 8, 66–69. [24]. Farrell, H.M., Jr; Jimenez-Flores, R.; Bleck, G.T.; Brown, E.M.; Butler, J.E.; Creamer, L.K.; Hicks, C.L.; Hollar, C.M.; Ng-Kwai-Hang, F.; Swaisgood, H.E. Nomenclature of the proteins of cows’ milk-sixth edition. J. Dairy Sci. 2004, 87, 1641–1674. [25]. Caroli, A.M.; Chessa, S.; Erhardt, G.J. Milk protein polymorphisms in cattle: Effect on animal breeding and human nutrition. J. Dairy Sci. 2009, 92, 5335–5352. [26]. Cerbulis, J.; Farrell, H.M., Jr. Composition of milks of dairy cattle. I. Protein, lactose, and fat contents and distribution of protein fraction. J. Dairy Sci. 1975, 58, 817–827. [27]. Wang, Q.; Allen, J.C.; Swaisgood, H.E. Binding of vitamin D and cholesterol to beta-lactoglobulin. J. Dairy Sci. 1997, 80, 1054–1059. [28]. Forrest, S.A.; Yada, R.Y.; Rousseau, D. Interactions of vitamin D3 with bovine β-lactoglobulin A and β-casein. J. Agric. Food Chem. 2005, 53, 8003–8009. [29]. Erhardt, G.; Juszczak, J.; Panicke, L.; Krick-Saleck, H. Genetic polymorphism of milk proteins in Polish Red Cattle: A new genetic variant of beta-lactoglobulin. J. Anim. Breed. Genet. 1998, 115,63–71.
Dadasaheb Navale, Shelley Gupta "Comparative Study of Buffalo and Cow milk Samples Containing Different Vitamins" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.75-77 2015
Refactoring is a crucial process to improve the quality of software. Refactoring is part of software engineering that improves more readability of program and maintainability of the software. Refactoring is a most widely used technique that gives the code simpler, cleaner, reusable, extendable, maintainable or other characteristics by transforming a program. In programming languages, bad smell or code smell is a code or design problem that makes the software hard to understand and maintain the code. Basically, bad smells are structured characteristics of software that indicate a problem, may be need it refactoring of code. In this paper some refactoring techniques discussed that are used to remove code smells from code or program. Simulation has been done for some refactoring techniques like Rename method, Extract method, Move method, Pull up method using Eclipse tool. Eclipse refactoring tool supports the java development language. It has been observed that pull up method is better as compared to other refactoring methods because pull up method dispose the complexity and duplicate code from program.
- Page(s): 78-83
- Date of Publication: 31 October 2015
- Sukhdeep KaurDepartment of Computer Engineering, Punjabi University, Patiala, India
- Dr. Raman MainiDepartment of Computer Engineering, Punjabi University, Patiala, India
References
[1]. M. Fowler, K. Beck “Refactoring: Improving the Design of Existing Code” Addison Wesley, 2002 [2]. Alejandra Garrido, Gustavo Rossi, Damiano Distante “Refactoring for usability in web applications” IEEE Software Vol.28, No. 3, 2011. [3]. Mesfin Abebe, Cheol-Jung Yoo ” Trends, Opportunities and Challenges of Software Refactoring: A Systematic Literature Review” International Journal of Software Engineering and Its Applications Vol.8, No.6, pp.299-318, 2014. [4]. T. Mens, T. Tourwe. “A Survey of Software Refactoring,” IEEE Transactions on Software Engineering, Vol. 30, No.2, 2004. [5]. J. Fields, S. Harvie, M.Fowler, K. Beck; “Refactoring in Ruby”, Addison Wesley, 2009 [6]. Mr. Karnam Sreenu, Mr. D. B. Jagannadha Rao “Detection of Bad Smells In Code for Refactoring Methods“ International Journal of Modern Engineering Research(IJMER)Vol.2, No.5, pp-3727-3729, 2012. [7]. Francesca Arcelli Fontana, Pietro Braione, Marco Zanoni “Automatic detection of bad smells in code” In Journal of Object Technology, vol. 11, no. 2, 2012, pp 1–38, 2012. [8]. Piyush Chandi “A survey of code optimization using refactoring” International Journal on Computer Science and Engineering (IJCSE),Vol. 5 No.4, 2013 [9]. David Gallardo “Refactroing for everyone” How and Why use Eclispe’s automated refactoring features, IBM. [10]. https://www.integralist.co.uk/posts/refactoring-techniques.html.
Sukhdeep Kaur , Dr. Raman Maini "A Comprehensive Review of Refactoring Techniques" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.78-83 2015
Genetic algorithms (GA’s) uses the best approach with a structured yet randomized information exchange to form a search algorithm. High overhead involved in flooding while route creation is a limiting factor of Dynamic Source Routing (DSR) protocol applied for mobile ad hoc networks. During data delivery, it seems that DSR provides best route if the route is not long enough. The GA’s efficiently exploiting the historical information to speculate on new search points with the improved performance. GA’s have been applied on two parameters in routing in the network hop count and queue length i.e. number of packets queued up on router’s lines waiting for transmission or forwarding. For better performance of any network path which is selected for transmission should be with lowest hop count and shortest queue length [8].
- Page(s): 84-88
- Date of Publication: 31 October 2015
- Haridas Kataria, Lecturer CSE, Govt. Polytechnic for Women, Sirsa, India
- Ravinder Singh SheoranLecturer CSE, Govt. Polytechnic for Women, Sirsa, India
References
[1]. A, Selamat and M. H. Selamat, “Routing algorithm of mobile agents for query retrieval using genetic algorithm,” Malaysian Journal of Computer Science, Vol. 17 No. 2 December 2004. [2]. C. W. Ahn and R. S. Ramakrishna, “A genetic algorithm for shortest path routing problem and the sizing of populations” IEEE Transaction on Evolutionary Computation, VOL. 6, NO. 6, December 2002. [3]. C. Davies and P. Lingras, “Genetic algorithms for rerouting shortest paths in dynamic and stochastic networks,” European Journal of Operational Research, vol.144 pp. 27–38, 2003. [4]. H. Zlatokrilov and H. Levy, “Navigation in distance vector spaces and its use for node avoidance routing” [5]. H.Huang, G. Chen, F.C.M. Lau and L. Xi, “A distance vector routing protocol for networks with unidirectional links,” HKU CSIS Tech report TR-99-03, March 1999. [6]. J .J. G. L Aceves, “A unified approach to loop free routing using distance vectors or link states,” ACM, vol.89, No. 9, pp.212-223, 1989. [7]. L. Zhu, R. L. Wainwright and D. A. Schoenefeld, “A genetic algorithm for the point to multipoint routing problem with varying number of requests,” O-7803-4869-9/98 IEEE, 1998 [8]. M. Gen, A. Kumar and J. R. Kim, “Recent network design techniques using evolutionary algorithms,” International Journal of Production Economics vol.98 pp.251–261, 2005. [9]. M. R. Masillamani, A. V. Suriyakumar, R. Ponnurangam, and G.V.Uma, “Genetic algorithms for distance vector routing technique,” AIML 06 International Conference, pp.160-163, Sharm El Sheikh, Egypt.15 June 2006 [10]. T. Wan E.Kranakis and P.C. van Oorschot,” Securing the destination-sequenced distance vector routing protocol (S-DSDV),” Proceedings of the 6th International Conference on Information and Communications Security, LNCS vol. 3269, pp.358-374. Malaga, Spain. October 27-29, 2004. [11]. T. Wan, E. Kranakis and P.C. van Oorschot, ”S-RIP: A secure distance vector routing protocol,” Proceedings of Applied Cryptography and Network Security (academic track), Yellow Mountain, China.. LNCS vol. 3089, pp.103-119. Springer-Verlag, June 8-11 2004 [12]. Z. Xu , S. Dai and J .J. G.L. Aceves,” A more efficient distance vector routing algorithms,” 0-7803-4249-6/97 IEEE,1997 [13]. Niaz Morshed Chowdhury, Syed Murtoza Baker and Ershadhul H. Choudhury “Ant Navigation-based Adaptive Routing Technique for Mobile Ad hoc Networks ”, 2006. [14]. H. Kumar, “Effectiveness of Distance Vector Routing Using Genetic Algorithm”, Dissertation, Computer Dept., Chaudhary Devi Lal University, Sirsa, 2011. [15]. K. Sunita, “Performance Analysis of Distance Vector Routing Using Genetic”, Dissertation, Department of Computer Science & Engineering Guru Jambheshwar University of Science & Technology, Hisar, 2007. [16]. M. Gen, R. Cheng, D. Wang, Genetic algorithms for solving shortest path problems, in: Proceedings of 1997 IEEE International Conference on evolutionary Computing, 1997, pp. 401–406. [17]. J.H. Holland, Adaptation in Natural and Artificial Systems, University of Michigan Press, Ann Arbor, 1975. [18]. B.P. Buckles, F.E. Petry, Genetic Algorithms, IEEE Computer Press, Los Alamitos, CA, 1994 [19]. J. Inagaki, M. Haseyama, and H. Kitajima, “A genetic algorithm for determining multiple routes and its applications,” in Proc. IEEE Int. Symp. Circuits and Systems, 1999, pp. 137–140. [20]. Y. Leung, G. Li, and Z. B. Xu, “A genetic algorithm for the multiple destination routing problems,” IEEE Trans. Evol. Comput., vol. 2, pp. 150–161, Nov. 1998. [21]. Z. Xiawei, C. Changjia, and Z. Gang, “A genetic algorithm for multicasting routing problem,” in Proc. Int. Conf. Communication Technology (WCC-ICCT 2000), 2000, pp. 1248–1253. [22]. Q. Zhang and Y.W. Leung, “An orthogonal genetic algorithm for multimedia multicast routing,” IEEE Trans. Evol. Comput., vol. 3, pp. 53–62,Apr. 1999. [23]. H. Pan and I. Y. Wang, “The bandwidth allocation of ATM through genetic algorithm,” in Proc. IEEE GLOBECOM’91, 1991, pp. 125–129.
Haridas Kataria , Ravinder Singh Sheoran "Improving Network Performance in DSR using Genetic Algorithms" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.84-88 2015
This paper presents the study of bidirectional DC to DC converter and comparing with the various existing method techniques. The proposed converter is designed in the manner of closed loop control. By using a controller, we can obtain a high output voltage and high gain by controlling the duty cycle of switches. The DC/DC converter is constructed by a buck-boost circuit, which is operated as a buck circuit when charging and a boost circuit when discharging. So we can use many power related systems, which improves efficiency, lower losses and higher performance.
- Page(s): 89-93
- Date of Publication: 31 October 2015
- Sasikumar SResearch Scholar, Department of Electrical Engineering Sona College of Technology, India
- Krishnamoorthy KAssociate Professor, Department of Electrical Engineering Sona College of Technology, India
References
[1]. J.-S. Lai and D. J. Nelson, “Energy management power converters in hybrid electric and fuel cell vehicles,” in Proc. IEEE Ind. Electron., Taipei, Taiwan, Volume 95,Issue 4, April 2007, pp. 766 – 777. [2]. H. Tao, A. Kotsopoulos, J.L. Duarte, and M.A.M. Hendrix, “Multi-input bidirectional dc-dc converter combining dc-link and magnetic-coupling for fuel cell systems,” in Proc. IEEE IAS, Hong Kong, China, Volume 3, Oct. 2005, pp. 2021 –2028. [3]. H. Tao, J. L. Duarte, and M. A. M. Hendrix, “High-power three-port three-phase bidirectional dc-dc converter,” in Proc. IEEE IAS, Manchester, UK, Sept. 2007, pp.2022 – 2029. [4]. H.-J. Chiu, H.-M. Huang, L.-W. Lin, and M.-H. Tseng, “A multiple-input dc/dc converter for renewable energy systems,” in Proc. IEEE ICIT, Hong Kong, China, Dec. 2005, pp. 1304 – 1308. [5]. G.-J. Su, J. P. Cunningham, and L. Tang, “A Reduced-part, triple-voltage dc-dc converter for electric vehicle power management,” in Proc. IEEE PESC, Orlando, FL, June 2007, pp. 1989 – 1994. [6]. T. Mishima, E. Hiraki, T. Tanaka, and M. Nakaoka, “A new soft-switched bidirectional dc-dc converter topology for automotive high voltage dc Bus architectures,” in Conf. Rec. of IEEE VPPC, Windsor, UK, Sept. 2006, pp. 1 – 6. [7]. H. Matsuo, W. Lin, F. Kurokawa, T. Shigemizu, and N. Watanabe, “Characteristics of the multiple-input dc-dc converter,” IEEE Trans. Ind. Electron., Vol.51, No.3, June 2004, pp. 625-630. [8]. Y. Hu, J. Tatler, and Z. Chen, “A bidirectional dc-dc power electronic converter for an energy storage device in an autonomous power system,” in Proc. IEEE IPEMC, Xi’an, China, Volume 1, August 2004, pp. 171 – 176. [9]. S. Jalbrzykowski, and T. Citko “A bidirectional DC-DC converter for renewable energy systems” in Bulletin of the Polish Academy of Sciences,Technical sciences Vol. 57, No. 4, 2009 [10]. H. Matsuo and F. Kurokawa, “New solar cell power supply system using a Boost type bidirectinal dc-dc converter,” IEEE Trans. Ind. Electron., Volume IE-31, Issue 1, Feb. 1984, pp. 51 – 55. [11]. H.-J. Chiu and L.-W. Lin, “A bidirectional dc-dc converter for fuel cell electric vehicle driving system,” IEEE Trans. Power Electron., Volume 21, Issue 4, July 2006, pp. 950 – 958. [12]. G. Chen, D. Xu, and Y.-S. Lee, “A family of soft-switching phase-shift bidirectional dc-dc converters: synthesis, analysis, and experiment,” in Proc. the Power Conversion Conference, Osaka, Japan, Volume 1, 2-5 April 2002, pp. 122 – 127. [13]. G. Chen, D. Xu, Y. Wang, Y.-S. Lee, “A new family of soft-switching phase-shift bidirectional dc-dc converters,” in Proc. IEEE PESC, Vancouver, British Columbia, Canada, Volume 2, June 2001, pp. 859 – 865. [14]. H. Fan, D. Xu, “A family of PWM plus phase-shift bidirectional dc-dc converters,”in Proc. IEEE PESC, Aachen, Germany, Volume 2, 20-25 June 2004, pp. 1668 –1674. [15]. P. Jose and N. Mohan, “A novel bidirectional dc-dc converter with ZVS and interleaving for dual voltage systems in automobiles,” in Proc. IEEE IAS, Pittsburg, Pennsylvania, Volume 2, Oct. 2002, pp. 1311 – 1314.
Sasikumar S, Krishnamoorthy K "A Literature Survey on Bidirectional DC to DC Converter" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.89-93 2015
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords, credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
- Page(s): 94-96
- Date of Publication: 31 October 2015
- Priyanka MoreDepartment of Computer Engineering Savitribai Phule Pune University, Pune, India
- Pooja TiwariDepartment of Computer Engineering Savitribai Phule Pune University, Pune, India
- Leena WaingankarDepartment of Computer Engineering Savitribai Phule Pune University, Pune, India
- Vivek KumarDepartment of Computer Engineering Savitribai Phule Pune University, Pune, India
References
[1]. Souvik Roy and P. Venkateswaran, "Online Payment System using Steganography and Visual Cryptography," Proceeding of IEEE Students’ Conference on Electrical, Electronics and Computer Science , Jadavpur University, Kolkata-700032, India, 2014. [2]. Thiyagarajan, P. Venkatesan, V.P. Aghila, G. "Anti-Phishing Technique using Automated Challenge Response Method", in Proceedings of IEEE- International Conference on Communications and Computational Intelligence, 2010. [3]. N. Chou, R. Ledesma, Y. Teraguchi, and D. Boneh, “Client-side defense against web-based identity theft,” in Proc. 11th Annu. Netw. Distribut. Syst. Secure. Symp., San Diego, CA, Feb. 2005. [4]. Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3,n 4, October/December 2006. [5]. M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994.
Priyanka More, Pooja Tiwari, Leena Waingankar, Vivek Kumar "Online Payment System using Steganography and Visual Cryptography" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.94-96 2015
The existence of wireless technology and the emergence of mobile devices enable a simple yet powerful infrastructure for business application like restaurant management system. Technology can be deployed efficiently to manage all the day-to-day tasks in restaurants. By using a new software-oriented approach we can eliminate a number of counters leading to a savings in space as well as staff for a restaurant .This new approach is a one-time investment as we don’t have to pay salaries to a very large staff. The new system is useful at places where it is difficult to find employees and where labor rates are skyrocketing as the day passes. Moreover in the present day environment where numbers are a measure of progress, there is a need for tools to analyze patterns which can be exploited for designing new sales strategies. The "Wireless customizable food recommendation system using Apriori and K-means algorithm." is a system where we are using Apriori and k-means algorithms for analysis. The Apriori algorithm forms the core of the recommendation system, prompting customers to try popular dishes . The purpose of using k-means is to classify the customers according to their expenditure. Therefore, the proposed system provides automation along with analysis. The proposed system provides automation for Kitchen order ticket (KOT), billing and Customer Relation Management (CRM) as will be seen in the later sections of the paper.
- Page(s): 97-100
- Date of Publication: 31 October 2015
- Nilam KadaleAssistant Professor, Department of Computer Engineering Savitribai Phule Pune University, NBN SSOE Pune ,Maharashtra, India
- Pranjali BansodB.Tech, Department of Computer Engineering Savitribai Phule Pune University, NBN SSOE Pune ,Maharashtra, India
- Reshma PillaiB.Tech, Department of Computer Engineering Savitribai Phule Pune University, NBN SSOE Pune ,Maharashtra, India
- Shivangi SaneB.Tech, Department of Computer Engineering Savitribai Phule Pune University, NBN SSOE Pune ,Maharashtra, India
- Snehal PratapeB.Tech, Department of Computer Engineering Savitribai Phule Pune University, NBN SSOE Pune ,Maharashtra, India
- Swati PawarB.Tech, Department of Computer Engineering Savitribai Phule Pune University, NBN SSOE Pune ,Maharashtra, India
References
[1]. Jiawei Han and Micheline Kamber, “Data Mining: Concept and Techniques”, University of Illinois. [1] [2]. K. J. Patel, et al., "PDA-based Wireless Food Ordering System for Hospitality Industry - A Case Study ofBoxHill Institute," in Wireless Telecommunications Symposium 2007, Pomona, CA, 2007, pp. 1-8. [2] [3]. K. Kamarudin, et al., "The Application of Wireless Food Ordering System," MASAUM Journal of Computing, vol. 1, pp. 178-184, 2009.\[3] [4]. B. B. L. Lim, "Teaching Web Development Technologies in CS/IS Curricula," in Proceedings of SIGCSE, Atlanta, GA, 1998, pp. 107-111. [4] [5]. Noor Azah Samsudin, Shamsul Kamal Ahmad Khalid, Mohd Fikry Akmal Mohd Kohar, Zulkifli Senin, Mohd Nor Ihkasan “ A customizable wireless food ordering system with realtime customer feedback” Universiti Tun Hussein Onn Malaysia, UTHM [5]. [6]. thefullwiki.org/Apriori_algorithm [6] [7]. people.revoledu.com/kardi/tutorial/kMean/Whatis.htm.[7]
Nilam Kadale, Pranjali Bansod, Reshma Pillai, Shivangi Sane, Snehal Pratape, Swati Pawar "Wireless Customizable Food Recommendation System using Apriori and K-Means Algorithm" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.97-100 2015
The Wireless Sensor Networks consists of small huge number of sensing nodes which have the sensing, computational and transmission power. Due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels, these networks are vulnerable to internal and external attacks. The security plays an important role in the ability to deploy and retrieve trustworthy data from a wireless sensor network. The proper operations of many WSNs rely on the knowledge of routing algorithms. This paper represents that the current routing protocols assume the networks to be benevolent and cannot cope with misbehaviour of nodes. The misbehaviour may be due to node being malicious to save the battery power. Whenever any device comes within the frequency range can get the access to the transmitting data and may affect the transmission. Thus, this work has significant importance, to build a highly secure system through frequency hopping.
- Page(s): 101-104
- Date of Publication: 31 October 2015
- Haridas KatariaLecturer CSE Govt. Polytechnic for Women, Sirsa, India
- Ravinder Singh SheoranLecturer CSE Govt. Polytechnic for Women, Sirsa, India
References
[1]. Brian Hill, “The Complete Reference, CISCO”, TATA MCGRAW-Hill Publishing Ltd., N.Delhi, 3rd reprint, 2004. [2]. James Irvine, David Harle,” Data Communication and networks”, John Wiley & Sons Ltd.,NewYork, USA,2002. [3]. William Stallings, “Data and Computer Communications”, PHI Pvt. Ltd. N.Delhi, 7th Edition , 2003. [4]. Routing Basics https://www.cisco.com/ univercd/cc/ td/ doc/ cisintwk/ito-doc/ routing.htm. [5]. Srinivas Vutukury, J.J. Garcia-Luna-Aceves, “A Traffic Engineering [6]. Approach based on Minimum Delay Routing”, Proceedings, Ninth International Conference on Computer Communications and Networks, 2000. [7]. “PRTG Traffic Grapher V6 user manual”,available at www.paessler.com/prtg/ download. [8]. Srinidhi Varadarjan, Naren Ramakrishnan, Muthukumar Thirunavukkarasu, “Reinforcing reachable routes”, Vol 43, PP. 389-416, Computer Networks, 2003. [9]. Johnny chen, Peter Drushel,Devika Subramania “ An efficient multi-path forwarding method”, Proceedings of IEEE INFOCOM, SAN Francisco, CA, March,1998. [10]. The Network Simulator NS-2, https://www.isi.edu/ nsnam/ns/ ns-documentation. [11]. T. Wan, E. Kranakis and P.C. van Oorschot”, S-RIP: A secure distance vector routing protocol,” Proceedings of Applied Cryptography and Network Security (academic track), Yellow Mountain, China. LNCS vol.3089, pp.103-119. Springer-Verlag, June 8-11 2004 [12]. Z. Xu , S. Dai and J .J. G.L. Aceves,” A more efficient distance vector routing algorithms,” 0-7803-4249-6/97 IEEE,1997 [13]. Niaz Morshed Chowdhury, Syed Murtoza Baker and Ershadhul H. Choudhury “Ant Navigation-based Adaptive Routing Technique for Mobile Ad hoc Networks”, 2006. [14]. H. Kumar, “Effectiveness of Distance Vector Routing Using Genetic Algorithm”, Dissertation, Computer Dept., Chaudhary Devi Lal University, Sirsa, 2011. [15]. K. Sunita, “Performance Analysis of Distance Vector Routing Using Genetic”, Dissertation, Department of Computer Science & Engineering Guru Jambheshwar University of Science & Technology, Hisar, 2007.
Haridas Kataria, Ravinder Singh Sheoran "Secure Routing in Wireless Sensor Networks" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.101-104 2015
An ad hoc network is combination of mobile nodes that dynamically make the network which are temporarily in nature. There is no need of any central administration hence more chance to attackers. There are various types of protocols used in Ad hoc network like AODV (Ad-hoc on demand distance vector) protocol, DSR protocol. In this attack, a malicious node advertises itself of having the shortest path to the node whose packets it want to intercept. This works analysis the Watchdog mechanism, comparing destination sequence number, detection of black hole using IDS method, and detection of black hole using DRI are different kinds of black hole detection techniques. DRI is the better technique as compared to other techniques as it can detect more than one malicious node in network.
- Page(s): 105-107
- Date of Publication: 31 October 2015
- Gurpreet SinghDepartment of Computer Science Engineering Punjabi University Patiala, Punjab, India
- Dr. Raman MaininProfessor Punjabi University Patiala, Punjab, India
References
[1]. Shradhha Raut & SD Chede,”Detection and removal of black hole in mobile Ad hoc network (manets)”, VOL-1, ISSUE-4, 2231-5284, 2012 [2]. Yashpal Singh, Dr.P.K.Singh, Jay prakash, ”A survey on detection and prevention of black hole attack in AODV based manets”, VOL-02,ISSUE-02,2013 [3]. Romia Sharma, Rajesh Sharma,”Modified AODV Protocol to prevent black hole attack in mobile Ad-hoc network”,VOL-14,ISS-3,2014 [4]. Heta Changela, Amit Lathigara, ”A survey on different existing techniques for detection of black-hole attack in manets”, VOL-4,ISS-1,2015 [5]. Sakshi Jain, ”Review of prevention and detection methods of black hole attack in AODV based on mobile ad-hoc network”, VOL-4,ISSUE-4,PP:381-388,2014 [6]. M.Mohanapriya,IIango Krishnamurthy, “Modified DSR protocol for detection and removal of selective black hole attack in manets”,2013 [7]. Marjan Kuchaki Rafsanjani, Zahra Zahed Anvari, Shahla Ghasemi, “ Methods of preventing and detecting black , gray hole attack on AODV-based manets”,2011 [8]. Ms.Gayatri Wahane, Prof.Ashok kanthe, “Techniques of detection of cooperative Black hole attack in manets.” 2014 [9]. Robinpreet Kaur & Mritunjay Kumar Rai, A novel review on routing protocols in MANETS, Undergraduate academic research journal, VOL-1,ISSUE-1,2278-1129, [10]. Swati saini and Vinod sarona,”Analysis and detection of black-hole attack in manets”, International journal of science & research, VOL-2, ISSUE-5, 2013. [11]. A.S.Mulla&Dr.B.T.Jadhav,”Networksecurity parameter analysis using simulation approach”, VOL-4, ISSUE-4, 2015. [12]. T.Manikandan,S.shitharth,C.Senthilkumar,C.Sebastinalbina,N.Kamraj,”Removal of selective black hole attack in MANET by AODV protocol”,VOL-3,ISSUE-3,2014
Gurpreet Singh, Dr. Raman Maini "Comparative Analysis of Various Black Hole Detection Techniques" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.105-107 2015
Internet of Things is an emerging technology and is being developing nowadays. Therefore the communication between the devices is an important factor in IoT. Devices will communicate with each other intelligently, without any centralized control and gather, share and forward the information in a multihop manner, ultimately, the quality of gathered information depends on the achieving device to device communication. In device to device communication, the devices can communicate with each other by using the Bluetooth controller which can be used for establishment of the communication between the devices. The devices interact with physical world using internet protocols and standards in order to collect data from the environment. Thus we are going to present an overview of how intelligent device to deice communication can be achieved in the IoT system.
- Page(s): 108-109
- Date of Publication: 31 October 2015
- Madhuri MoreDepartment of Computer Engineering, NBN Sinhgad School of Engineering, Savitribai Phule Pune University, Pune, India
- Snehal MoteDepartment of Computer Engineering, NBN Sinhgad School of Engineering, NBN Sinhgad School of Engineering, Pune Savitribai Phule Pune University, Pune, India
- Amruta NeelDepartment of Computer Engineering, NBN Sinhgad School of Engineering, Savitribai Phule Pune University, Pune, India
- Poonam NerkarDepartment of Computer Engineering, NBN Sinhgad School of Engineering, NBN Sinhgad School of Engineering, Pune Savitribai Phule Pune University, Pune, India
- Prof. P. S. HanwateDepartment of Computer Engineering, NBN Sinhgad School of Engineering, Savitribai Phule Pune University, Pune, India
References
[1]. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw, vol. 54, no. 15, pp. 2787–2805, Oct. 2010. [2]. P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer et al., “TinyOS: An operating System for sensor networks,” Ambient intelligence, vol. 35, 2005. [3]. A. Dunkels, B. Gronvall, and T. Voigt, “Contiki - a lightweight and Flexible operating system for tiny networked sensors,” in Local ComputerNetworks, 2004. 29th Annual IEEE International Conference on, 2004, pp. 455–462. [4]. J. Krikke, “T-Engine: Japan’s ubiquitous computing architecture is ready for prime time,” Pervasive Computing, IEEE, vol. 4, no. 2, pp. 4–9, 2005.
Madhuri More, Snehal Mote, Amruta Neel, Poonam Nerkar, Prof. P. S. Hanwate "Intelligent Device TO Device Communication Using IoT" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.108-109 2015
Flow stress is an instantaneous yield stress needed to remove chip area and depends on strain, strain-rate, and temperature. The flow stress is an important input in metal forming and metal cutting processes. The relation of flow stress with strain, strain-rate, and temperature with some unknown constants is known as flow stress model or constitutive model of work material. Johnson and Cook (JC) flow stress model that considers the effect of strain, strain-rate, and temperature on material property is widely used nowadays in finite element method simulation and analytical modeling due to its simple form and easy to use. The constants of Johnson and Cook flow stress model can be obtained by two methods, which are direct and indirect. In the present study, orthogonal cutting in conjunction with an analytical- based computer code are used to determine flow stress data as a function of the high strains, strain rates and temperatures encountered in metal cutting. The automated technique for flow stress determination, developed in the present study, is easier and less expensive than other techniques such as the Hopkinson’s bar method. The constants of the JC flow stress model can be determine by utilizing an inverse solution of Oxley’s machining theory.
- Page(s): 110-116
- Date of Publication: 31 October 2015
- Prakash NaikMechanical Engineering Department UTU, Bardoli, India
- Ravinder Singh SheoranMechanical Engineering Department JHD, Palsana, India
References
[1]. P.L.B. Oxley, Mechanics of Machining, An Analytical Approach to Assessing Machinability, Ellis Horwood Limited, 1989. [2]. P. L. B. Oxley., (1998): "Development And Application Of A Predictive Machining Theory, Machining Science and Technology" 2:2, 165-189. [3]. Lalwani D.I, Mehta N.K., Jain P.K., (2009): "Extension of Oxley‘s Predictive theory for Johnson & cook flow stress model", 209 (2009) 5305–5312. [4]. Ozel Tugrul, Altan Taylan (2000): "Determination of workpiece flow stress and friction at tool-chip contact for high-speed cutting", 40 (2000) 133–152. [5]. Shatla M., Kerk Christian, Altan Taylan (2001): "Process modeling in machining part 1: determination of flow stress data", 41 (2001) 1511–1534. [6]. Kristyanto B., Mathew P. & Arsecularatne J. A., (2002): "Development Of A Variable Flow Stress Machining Theory For Aluminium Alloys"., Machining Science And Technology: An International Journal, 6:3, 365-378. [7]. Adibi-Sedeh A.H., Madhavan V., Bahr B., (2003): "Extension of Oxley‘s analysis of machining to use different material models"., ASME Journal of Manufacturing Science and Engineering, (2003), 125, 656-666. [8]. Sartkulvanich Partchapol, Koppka Frank, Altan Taylan (2004), "Determination of flow stress for metal cutting simulation." 146 (2004) 61–71. [9]. Tugrul ozel and Erol zeren., (2004):"A Methodology to Determine Work Material Flow Stress and Tool-Chip Interfacial Friction Properties by Using Analysis of Machining" Manufacturing Engineering Division of ASME for publication in the Journal of manufacturing science and engineering. Volume- 128.
Prakash Naik, Ankit Naik "Determination of Flow Stress Constants by Oxley's Theory" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.110-116 2015
Indian Automotive industry is under considerable strain to make their products more environmentally sound. Not only the automobile themselves, but also the whole production process has to become more sustainable to Achieve India's pledge to stop climate change at world forum. The Automobile industry is one of the major industries in India which have huge energy requirements in the form of both thermal and electrical energy. Manufacturing of automobiles and auto components involves many steps such as casting, forging, painting and electroplating etc that require heat or steam. Thermal energy in form of heat or steam accounts for around 70% of all automobile industry's total energy consumption and while solar collectors can provide a large share of this industrial process heat, the collector technology used depends upon a great deal on the temperatures involved. The use of an appropriate solar thermal technology can have a positive impact on the energy and environmental scenario of Automobile industry at a large. There are various solar thermal technologies including CST technologies that are available for Automobile industries. Flat plate collectors and evacuated tube collectors can be used with a reasonable level of efficiency at temperatures of up to around 130°C but for temperatures higher than this, concentrating collector systems such as Fresnel-Collectors, parabolic dishes and Parabolic-Trough-Collectors can give greater efficiency.
- Page(s): 117-123
- Date of Publication: 31 October 2015
- Anubhav UppalMasters in Renewable Energy Technology, Delhi Technological University, Delhi, India
- Dr. J P KesariAssociate professor, Delhi Technological University, Delhi, India
References
[1]. Society of Indian Automobiles Manufacturers, https://www.siamindia.com/statistics.aspx?mpgid=8&pgidtrail=9. [2]. Society of Indian Automobile Manufacturers, https://www.siamindia.com/statistics.aspx?mpgid=8&pgidtrail=13 [3]. India cleantech summit presentations on day 3, https://www.indiacleantechsummit.com/presentations/day3/ParallelSessionV_RETThermalApps/Veena_Sinha.pdf [4]. Automotive manufacturing solutions for paint shops, https://www.automotivemanufacturingsolutions.com/process-materials/solar-process-heat-for-paintshops [5]. Clique solar solution for automobile, https://www.cliquesolar.com/AutomobileSolution.aspx [6]. Concentrated solar heat India, https://www.cshindia.in/images/pdf/M&M_1.pdf [7]. Solar heat conference 2012, https://cms.shc2012.org/program/displayattachment/48e7fc94032?filename=26617.pdf&mode=abstract [8]. Sopro India , https://www.soproindia.in/wheelsindia-proj01.html [9]. Concentrated solar heat India , https://www.cshindia.in/images/pdf/SKF.pdf
Anubhav Uppal, Dr. J P Kesari "Solar Industrial Process Heat in Indian Automobile Industry" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.117-123 2015
In this study, an attempt has been made to devise a methodology to integrate the WQI with C++ program for an effective interpretation of the quality status of River water. River Kuakhai has been taken as a case study and the physical, chemical and microbial analysis has been interpreted using WQI. From WQI analysis it was found that the water quality of the river is deteriorating each year. It was found that WQI is below 100 in winter in all locations. In summer and rainy seasons the WQI increases many fold making the water not suitable for drinking and other purposes. It was also found that all the parameters are in increasing trend towards D/S as compared to U/S except DO content. It shows the water quality of river is deteriorating towards D/S. Also decrease of DO content indicates the increase in pollution load towards D/S. From the above study it was observed that the water quality towards D/S is deteriorating due to discharge of domestic waste and waste water into the river Kuakhai. The present status shows that the water towards D/S is not meeting the prescribed standard for drinking water quality for river water (Class-A).
- Page(s): 124-131
- Date of Publication: 31 October 2015
- G. Sunpriya AcharyAssistant Professor, Dept of Chemistry, KIST, Jatni, Bhubaneswar, India
- S.K.PandaStudent, Biotechnology, KIIT, Bhubaneswar, India
- R. B. PandaProfessor and Head, Dept of Chemistry VSSUT, BURLA, India
References
[1]. Bhuvaneswaran N.G. and Rajeswari S., Water quality of river Adyar in Chennai city-The River a Boon or Bane, Indian J. Environ Prote., 19(6), 412-415 (1999) [2]. Haribhau M.G., Trace Metals Contamination of Surface Water Samples in and Around Akot City in Maharashtra, India, Res. J. Recent Sci., 1(7), 5-9 (2012) [3]. Patil S.G., Chonde S.G., Jadhav A.S. and Raut P.D., Impact of Physico-Chemical Characteristics of Shivaji University lakes on Phytoplankton Communities, Kolhapur, India, Res. J. Recent Sci., 1(2), 56-60 (2012) [4]. Manimaran D., Groundwater Geochemistry Study Using GIS in and Around Vallanadu Hills, Tamil Nadu, India, Res. J. Recent Sci., 1(7), 52-58 (2012) [5]. Parihar S.S., Kumar A., Kumar Ajay, Gupta R.N., Pathak Manoj, Shrivastav Archana and Pandey A.C., PhysicoChemical and Microbiological Analysis of underground Water in and Around Gwalior City, MP, India, Res. J. Recent Sci., 1(6), 62-65 (2012) [6]. Ranjan R., Water Quality Monitoring of Groundwater Resources around Sugar Factory, Near East-West Champaran Border, Bihar, India, Res. J. Recent Sci., 2(7), 79-81 (2012) [7]. Gleick P.H., Water in crisis: A guide to the world’s fresh water resources, Oxford University press, New York., (1993) [8]. H. Schildt, “C++ The Complete Reference Third Edition,” Osborne McGraw-Hill, 1998, pp. 23-28. [9]. B. Stroustrup, “C++ Faq: When Was C++ Invented,” 7 March 2010, Retrieved 16 September 2010, pp. 11-19. https://www2.research.att.com/~bs/bs_faq.html#invention [10]. “Programming Language Popularity,” 2009, Retrieved 16 January 2009, pp. 2-9. https://www.langpop.com/ [11]. “TIOBE Programming Community Index,” 2009, Retrieved 3 August 2011, pp. 1-2. https://www.tiobe.com/index.php/content/paperinfo/tpci/index.html [12]. C++ Applications, “What’s CvSDL?” Retrieved 8 March 2010, pp. 2-3. https://www.cvsdl.com/:cvsdl. https://www.cvsdl.com/ [13]. ISO, “ISO/IEC 14882:2011,” Retrieved 3 September 2011. https://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?ics1=35&ics2=60&ics3=&csnumber=50372 [14]. “Most Popular Programming Languages,” Retrieved 7 September 2011, pp. 2-4. https://langpop.com/ [15].Mohanty S.K.PhD Thesis on strategies to control Environmental Pollution in major industries at Koraput District-2001.
G.Sunpriya Achary, S.K.Panda , R.B.Panda "Evaluation of Water quality of Kuakhai River by Water Quality Index Analysis using C++ Program" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.124-131 2015
Large amounts of data are being generated and stored every day in Organizational computer database systems. Data mining is to discover knowledge from large amounts of data and is widely used in business world. Mining association rules from transactional data is becoming a popular and important knowledge discovery technique. Association rule mining is a data mining task that discovers relationships among items in a transactional database. One of the branches of data mining is Associative Classification (AC). AC algorithms integrate association rules discovery and classification to build a classifier from a training data for predicting the class of unforeseen test data. AC algorithms typically build a classifier by discovering the full set of Class Association Rules (CARs) from the training dataset and then select a subset to form a classifier. CARs are association rules of the form A => c, where A is an itemset and c is a class. Despite achieving high accuracy compared to other classification approaches such as Decision Tree, the approach suffers from the overhead of exhaustive search through a large pool of candidate rules. Moreover, the rule discovery process in traditional AC algorithms is not well integrated with the classification process.
- Page(s): 132-134
- Date of Publication: 31 October 2015
- Dr. P. DevaraajuAssistant Professor, Dept. of Computer Science and Technology S K University, Anantapuramu - AP, India
References
[1]. Rakesh Agrawal, Tomasz Imielinski, and Arun Swami. Mining association rules between sets of items in large databases. In SIGMOD-93, pages 207–216, May 1993. [2]. R. Agrawal and R. Srikant. Fast algorithm for mining association rules in large databases. In Proceedings 20th International Conference on Very Large Data Bases, pages 478–499, September 1994. [3]. G. Dong, X. Zhang, L. Wong, and J. Li. CAEP: Classification by Aggregating Emerging Patterns. In Proceedings of Discovery-Science-99, 1999. [4]. B. Liu, W. Hsu, Y. Ma, Integrating Classification and Association Rule Mining, in: A. Press. (Ed.), In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD’98). (Menlo Park, CA, 80–86, 1998) 443 - 447. [5]. M.-L. Antonie, O.R. Z, An Associative Classifier based on Positive and Negative Rules, in: Proceedings of the 9th ACM SIGMOD workshop on Research issues in data [6]. J. R. Quinlan. C4.5: Program for Machine Learning. Morgan Kaufmann, 1992 [7]. K. Ali, S. Manganaris and R. Srikant. Partial Classification Using Association Rules. In Proceedings of KDD-97, 115-118, 1997. [8]. X. Yin, J. Han, CPAR: Classification based on Predictive Association Rules, in: Proceedings of the Third SIAM International Conference on Data Mining, , . SIAM 2003, (San Francisco, CA, USA, 2003). [9]. Wang J, Karypis G. HARMONY: Efficiently Mining the Best Rules for Classification. In: Proceedings of the 5th SIAM International Conference on Data Mining, Newport Beach, USA, 2005. 205-216.
Dr. P. Devaraaju "A Framework for Integrating Association and Classification Rules in Data Mining" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.132-134 2015
The aim of our present work is to develop a model for capillary tissue fluid exchange system and to investigate the effect of permeability of the tissue and the parameters related to the casson’s fluid model for the blood on the fluid filtration and capillary and tissue pressure. The model consists of single capillary surrounded by porous tissue. The blood in capillary is modeled by casson’s fluid with peripheral layer. The governing equations in the tissue as well as in capillary region are solved using analytical method and computational results have been obtained. It has been observed that filtration decreases as the viscosity of the peripheral layer increases.
- Page(s): 135-141
- Date of Publication: 31 October 2015
- Rekha BaliDepartment of Mathematics, Harcourt Butler Technological Institute, Kanpur, India
- Swati MishraDepartment of Mathematics, Harcourt Butler Technological Institute, Kanpur, India
- P. N. TandonDepartment of Mathematics, Harcourt Butler Technological Institute, Kanpur, India
References
[1]. Secomb, T.W. and Skalak, R. A two dimensional model for the capillary flow of an axisymmetric cell. Microvasc. Res., (1982) Vol. 24, pp 194-203. [2]. Secomb,T.W., Skalak, R., Ozakaya, N. and Gross, J.F. Flow of axisymmetric red cells in narrow capillaries. J. Fluid Mech., (1986). Vol. 163, pp 405-423. [3]. Secomb, T.W., R. Hsu & Pries, A.R. A model for red blood cell motion in glycocalyx-lined capillaries. Am. J. Physiol. Heartcirc. Physiol. (1998). Vol. 274, pp. H 1016- H 1022. [4]. Secomb, T.W., Hsu, R. & Pries, A.R. Motion of red blood cell in a capillary with an endothelial surface layer: effect of flow velocity. Am. J. Physiol. Heart Circ. Physiol. (2001) Vol. 28, pp. H 629- H 636.\ [5]. Sugihara-Seki M. and Bingmei M. Fu .Blood Flow and permeability. Fluid dynamics Research, (2005), Vol. 37, pp. 82-132. [6]. Salathe, E.P. & Venkatraman, R. Role of extracellular protien in capillary tissue fluid exchange. AJP-Heart and Circulatory Physiology, (1978) Vol. 234, Issue 1, pp. 52-H58. [7]. Salathe, E.P. & Venkatraman, R.Interaction of fluid movement and particle diffusion across capillary walls. J. Biomech. Eng., (1982) Vol. 104, pp. 57-62. [8]. Salathe, E. P. Mathematical studies of capillary tissue exchange, Bulletin of Mathematical Biology. (1988), Vol. 50, No.3, pp.289-311. [9]. Fibich, G., Lanir, Y. and Liron, N. Mathematical model of blood flow in a coronary capillary. AJP-Heart and Circulatory Physiology, (1993) Vol. 265, Issue 5, pp.1829-H1840. [10]. Gore, R. W. and Mcdonaugh, Fluid exchange across single capillary, Ann. Rev. of Physiol. 42 (1980), 337-357.
Rekha Bali, Swati Mishra and P.N. Tandon "A Study of Fluid Filtration in Capillary Tissue Fluid Exchange System" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.4 issue 10, pp.135-141 2015