The paper examined the performance of power generation efforts at Shiroro hydropower station located in Nigeria since its establishment. Power generated for 26 years within its existence was used in this analysis. The autocorrelation function was also deployed in the development of an Auto-regressive model for futuristic prediction for planning and management of the power production system. The result showed the production trend across each month of the year, over these years and furthermore, the predictability of the power output. The R2 value of 0.05 was obtained and MAPE of 11% of forecast. The developed model will be used in forecasting for power output from that power station. It also forms a useful information for willing investors in this area of investment and equally suggested ways for increased productivity.
- Page(s): 01-05
- Date of Publication: 09 August 2018
- Okechukwu Chiedu EzeanyimDepartment of Industrial/Production Engineering Nnamdi Azikiwe University, P.M.B. 5025 Awka, Anambra State, Nigeria
- Charles Chikwendu OkpalaDepartment of Industrial/Production Engineering Nnamdi Azikiwe University, P.M.B. 5025 Awka, Anambra State, Nigeria
- Patrick Sunday AguhDepartment of Industrial/Production Engineering Nnamdi Azikiwe University, P.M.B. 5025 Awka, Anambra State, Nigeria
References
[1]. Joseph I.(2014), “Issues and Challenges in the Privatised Power Sector in Nigeria” Journal of Sustainable Development Studies Vol 6, Number 1 [2]. Ramani V. and Rom M.(2007), “Fuzzy Logic Model on Operation and control of Hydropower dams in Malaysia” ICCES VOL. 4. [3]. Verma, H., and Kurma, A. (2007), “Performance Testing and Evaluation of Small Hydropower Plants” International Conference on Small Hydropower, Sri Lanka, [Online].Assessed on 27 July 2018, fromhttps://ahec.org.in/links/International%20conference%20on%20SHP%20Kandy%20Srilanka%20All%20Details/Papers/Technical%20Aspects-A/A24.pdf [4]. Zoby, M. and Yanagihara, A. (2009), “Analysis of the Primary Control System of a Hydropower Plant in Isolated Model” Journal of Brazilian Society of Mechanical Sciences and Engineering, vol. 31, no. 1 [5]. Priyadarshana, P. (2014), “Maximization of Energy Generation from Small Hydropower Plant in Sri Lanka” [Online]. Assessed on 27 July 2018, from https://www.diva-portal.org/smash/get/diva2:714288/FULLTEXT01.pdf [6]. Feng, D., Wang, Z., Ma, P., and Wang, W. (2013), “Analysis and Application of Hydropower Real-time Performance Calculation” Energy and Power Engineering, Assessed on 27 July 2018, from https://file.scirp.org/pdf/EPE_2013101413254982.pdf [7]. Jarry-Bolduc, D., and Cote, E. (2014), “Hydro Energy Generation and Instrumentation and Measurement: Hydropower Plant Efficiency Testing” IEEE Instrumentation and Measurement magazine, April 2014
Okechukwu Chiedu Ezeanyim, Charles Chikwendu Okpala, and Patrick Sunday Aguh "Power Generation Performance Analysis of a Hydropower Station in Nigeria" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.01-05 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/01-05.pdf
Shape memory alloys have the ability to regain its original shape, after the removal of external load or temperature. The characteristics were due to the austenite to martensite transformation. The aim of the present work is to fabricate Mn-Cu shape memory alloys, by powder metallurgy technique. Also the present investigation aims to characterize the SMAs by conducting mechanical test. The findings from the investigation will be helpful in utilizing the Mn-Cu SMAs for special applications. The tensile strength of the SMA was found to be 210 Mpa. The hardness of the samples was found to be 198 VHN.
- Page(s): 06-07
- Date of Publication: 09 August 2018
- G. Antony Wilbert SinghAssistant Professor, Department of Mechanical Engineering, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur- 628 215, Tamilnadu, India
References
[1]. R.J. Goodwin, The Metals and Metallurgy Trust, 1968, Vol. 2, pp. 121. [2]. J.A. Hedley, The Metals and Metallurgy Trust, 1968, Vol. 2, pp. 129. [3]. E.Z. Vintaykin, V.B. Dmithiyev, V. A. Udovenko, Phys. Met. Metallurgy. 44 (1977) 107. [4]. L.M. Schetky, J. Perkins, Machine Design 50, (1978) 202. [5]. J. Vitek, H. Warlimont, Mater. Sci. Eng. (1976) 7. [6]. G.V. Markova, Mater. Sci. Eng. A. 370 (2004) 473. [7]. F. Yin, Y. Ohsawa, A. Sato, K. Kawahara, Acta Mater. 48 (2000) 1273. [8]. S.I. Arkhangelskiy, L.V. Labzova, G.V. Markova, I.V. Chukanov, Russian Federation patent 92538. [9]. G.V. Markova, E.S. Klyueva, Mater. Sci. Forum 738-739 (2013) 183. [10]. E.Z. Vintajkin, G.I. Nosova, Met. Sci. Heat Treat. 38 (1996) 404.
G. Antony Wilbert Singh "Mechanical Characterization of Mn-Cu Shape Memory Alloys" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.06-07 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/06-07.pdf
Renewable energy resources (RES) are being increasingly connected in distribution systems utilizing power electronic converters. This paper presents a novel control strategy for achieving maximum benefits from these grid -interfacing inverters when installed in 3-phase 4-wire distribution systems. The inverter is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as power converter to inject power generated from RES to the grid, and as a shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. This new control concept is demonstrated with extensive MATLA B/Simulation.
- Page(s): 08-12
- Date of Publication: 09 August 2018
- Y. Rajesh BabuAssistant Professor, Department of Electrical Electronics Engineering,
KKR & KSR Institute of Technology and Sciences, Guntur, AP, India. - B. BharadwajUG Student, Department of Electrical Electronics Engineering,
KKR & KSR Institute of Technology and Sciences, Guntur, AP, India. - Rupesh.B.FondeM.E Student, D Y Patil Institute of Engineering and Technology Ambi, Pune, Maharashtra, India
References
[1]. J. M. Guerrero, L. G. de Vicuna, J. Matas, M. Castilla, and J. Miret, “A wireless controller to enhance dynamic performance of parallel inverters in distributed generation systems,” IEEE Trans. Power Electron., vol. 19, no. 5, pp. 1205–1213, Sep. 2004. [2]. J. H. R. Enslin and P. J. M. Heskes, “Harmonic interaction between a large number of distributed power inverters and the distribution network,” IEEE Trans. Power Electron., vol. 19, no. 6, pp. 1586–1593, Nov. 2004. [3]. U. Borup, F. Blaabjerg, and P. N. Enjeti, “Sharing of nonlinear load in parallel-connected three-phase converters,” IEEE Trans. Ind. Appl., vol. 37, no. 6, pp. 1817–1823, Nov./Dec. 2001. [4]. P. Jintakosonwit, H. Fujita, H. Akagi, and S. Ogasawara, “Implementation and performance of cooperative control of shunt active filters for harmonic damping throughout a power distribution system,” IEEE Trans. Ind. Appl., vol. 39, no. 2, pp. 556–564, Mar./Apr. 2003. [5]. J. P. Pinto, R. Pregitzer, L. F. C. Monteiro, and J. L. Afonso, “3-phase 4-wire shunt active power filter with renewable energy interface,” presented at the Conf. IEEE Renewable Energy & Power Quality, Seville, Spain, 2007. [6]. F. Blaabjerg, R. Teodorescu, M. Liserre, and A. V. Timbus, “Overview of control and grid synchronization for distributed power generation systems,” IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1398–1409, Oct. 2006 [7]. J. M. Carrasco, L. G. Franquelo, J. T. Bialasiewicz, E. Galván, R. C. P. Guisado, M. Á. M. Prats, J. I. León, and N. M. Alfonso, “Power-electronic systems for the grid integration of renewable energy sources: A survey,” IEEE Trans. Ind. Electron., vol. 53, no. 4, pp. 1002–1016, Aug. 2006. [8]. B. Renders, K. De Gusseme, W. R. Ryckaert, K. Stockman, L. Vandevelde, and M. H. J. Bollen, “Distributed generation for mitigating voltage dips in low-voltage distribution grids,” IEEE Trans. Power. Del., vol. 23, no. 3, pp. 1581–1588, Jul. 2008. [9]. V. Khadkikar, A. Chandra, A. O. Barry, and T. D. Nguyen, “Application of UPQC to protect a sensitive load on a polluted distribution network,” in Proc. Annu. Conf. IEEE Power Eng. Soc. Gen. Meeting, 2006, pp. 867–872. [10]. M. Singh and A. Chandra, “Power maximization and voltage sag/swell ride-through capability of PMSG based variable speed wind energy conversion system,” in Proc. IEEE 34th Annu. Conf. Indus. Electron. Soc., 2008, pp. 2206–2211. [11]. P. Rodríguez, J. Pou, J. Bergas, J. I. Candela, R. P. Burgos, and D. Boroyevich, “Decoupled double synchronous reference frame PLL for power converters control,” IEEE Trans. Power Electron, vol. 22, no. 2, pp. 584–592, Mar. 2007
Y. Rajesh Babu, B. Bharadwaj "Grid Interconnection of Solar Energy System with Power Quality Improvement" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.08-12 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/08-12.pdf
Social Media is growing dynamically, but in academics social media is considered to be the deteriorating agent. Social Media has deep rooted in almost all industries including Higher education and have been adopted it. Social Media has become a Buzz word among the people in the society due to its immense and pool of benefits of it. Through Social Media platform like Face book, Twitter, LinkedIn etc. the younger generation is getting engaged with their peer group in order to share their views towards the happenings in the Society as well as to generate, dissipate the knowledge, content to others. Social Media has made remarkable footprints in terms to connecting new people and sharing knowledge. Among all Platforms, face book has won the trust of large sector of people. These social media offers the Academicians with lots of opportunities to deliver the knowledge to the students in classroom and virtually. This makes many premier educational institutions across the nation to offer Online Classes by Industry experts and Professors to their students and even Open Universities’ Distance Education is effectively reaching the students .via Social Media Platforms particularly YouTube Videos. This study is conducted to know the perception of Academicians towards the use of SNS in Higher educational institutions. It is found that the large numbers of academicians are using Social Media Networking and had left a positive impact on delivering a quality and effective teaching. Also it is learnt that the there would be exponential growth in the usage of SNS in future.
- Page(s): 13-20
- Date of Publication: 12 August 2018
- Dr. Priyanka AroraProfessor, Indian Academy Degree College-Autonomous, Bengaluru, Karnataka, India
References
[1]. Merriam Webster Dictionary [2]. Dr. Ritesh Chugh, (2018), The Role and Use of Social Media in Higher Education Higher Education Review - Magazine -July-2018 issue [3]. Mangala Vadivu Vivakaran (2018) Utilization of Social Media Platforms for Educational Purposes among the Faculty of Higher Education with Special Reference to Tamil Nadu https://doi.org/10.1177/2347631117738638 [4]. Adam Peruta &Alison B. Shields (2016) Social media in higher education: understanding how colleges and universities use Face book, Journal of Marketing for Higher Education Volume 27, 2017 - Issue 1 Pages 131-143 | Received 06 Mar 2016, Accepted 21 May 2016, Published online: 28 Jul 2016 [5]. C. R. Kothari (2009)"Research Methodology: Methods & Techniques" (Second Revised Edition), New Age International Publishers, New Delhi.
Dr. Priyanka Arora "“Study on Usage of Social Networking Sites by Academicians in Higher Education”" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.13-20 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/13-20.pdf
Due to recent technological development, a huge amount of data generated by social networking, sensor networks, Internet, healthcare applications and many other companies, which could be structured, semi-structured or unstructured, adds more challenges when performing data storage and processing tasks. During Privacy Preserving Data Processing (PPDP), the collected data may contain sensitive information about the data owner. Directly releasing this information for further processing may violate the privacy of the data owner, hence data modification is needed in such a way that it does not disclose any personal information about the owner. On the other hand, the modified data should still be useful, not to violate the original purpose of data publishing. The privacy and utility of data are inversely related to each other. Existing privacy preserving techniques like k-anonymity, t-closeness are focusing on anonymization of data which have a fixed scheme with a small number of dimensions. There are various types of attacks on the privacy of data like linkage attack, homogeneity attack and background knowledge attack. To provide an effective technique in big data to maintain data privacy and preventing linkage attacks, this paper proposes a privacy preserving protocol - UNION, for multi-party data provider with KCL anonymization. Experiments show that this technique provides a better data utility to handle high dimensional data, and scalability with respect to the data size compared with existing anonymization techniques.
- Page(s): 21-26
- Date of Publication: 13 August 2018
- Prasad S PAsst. Professor, Dept. of ISE, DSATM, Bangalore, Karnataka, India
- Dr. Anitha JProfessor, Dept. of CSE, DSATM, Karnataka, Bangalore, India
References
[1]. J. Gantz and D. Reinsel, “Extracting Value from Chaos,'' in Proc. IDC IView, 2011. [2]. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, ``Privacy-preservingdata publishing: A survey of recent developments,'' ACM Comput. Surv.,vol. 42, no. 4, Jun. 2010, Art. no. 14.sing [3]. Anitha J and Anil Kumar, ``Detection of Intrusion through Big data Analytics for Wireless Sensor Networks,'' Int. Journal of Science, Engineering and Technology,2017 [4]. Abid Mehmood, Iynkaran Natgunanathan, Yong Xiang, Guang Hua, “Protection of Big Data Privacy”,Theoretical Foundations For Big Data ApplicationsOpportunities, 2016. [5]. L. Sweeney, “k-anonymity: A Model for Protecting Privacy,'' Int. J. Uncertainty, Fuzziness Knowl. Based Syst., vol. 10, no. 5, pp. 557570, 2002. [6]. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam,"L-diversity: Privacy beyond k-anonymity,"TKDD, vol. 1, no. 1, 2007. [7]. Yong Xu, Tinghuai Ma, Meili Tang,Wei Tian, “A survey of Privacy Preservation Data Publishing using Generalization and Suppression”, Int. Journal Applied Mathematics & Information Sciences, 1103-1116,2014. [8]. Girish Agarwal, Pragati Patil, “Privacy Preserving for High Dimensional Data using Anonymization Techniques”, Int. Journal of Advanced Research in CS, June 2013. [9]. Snehal M Nargundi, Rashmi Phalnikar, “k-anonymization using Multidimensional Suppression for Data De-identification”, Int. Journal of computer application, 2012. [10]. Freny Presswala, Amit Thakkar, Nirav Bhatt, “Survey on Anonymization in Privacy Preserving Data Mining”, IJIERE 2015.
Prasad S P, Dr. Anitha J, "A Secure Protocol for High Dimensional Bigdata Providing Data Privacy" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.21-26 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/21-26.pdf
Bolted and riveted joints are important for machines and structure for the satisfactory performance. When such joints are used the plate or other member being joined will be weakened because of the holes needed to be drilled. The strength reduction depends on the diameter of drilled hole. Larger the diameter of holes drilled, greater will be the strength reduction. In the conventional design, irrespective of arrangement of bolts or rivets all bolts/rivets are considered to share same amount of load. During this work experimental investigation is carried out to estimate load shared by each rivets in different rivet arrangement. This paper presents the experimental results of loads shared by rivets in different joints. Experiments are conducted on four type of symmetric butt joint of different rivet orientation that is 0˚ 30˚ 60˚ and 90˚ from the horizontal axis. Test specimens are made of aluminium plates fastened by 6 mild steel rivets. Between each pair of rivets a pre-tensioned aluminium strip is fixed firmly and on the centre of the strip strain gauge is mounted and this specimen subjected to tensile load. By using the strain obtained from the strip load taken by each pair of rivet is determined. Results obtained for different rivet arrangements are compared. It is observed that load carried by each pair of rivets depends on rivet arrangement. Rivet closer to the central axis of plate take up more load and the rivets farther away takes up less load. This reduction in load carried depends on orientation arrangement of rivets. That is, when the rivets are arranged in 0˚ orientation (perpendicular to loading axis), all rivets share equal amount of load. Further when orientation angle are changed from 0˚ to 30˚, it observed that there is a 4-5% difference in load distribution among the rivets, also as the angle increases to 60˚ and 90˚, it observed that there is difference of 7-8% and 11- 12% of load distribution respectively.
- Page(s): 27-31
- Date of Publication: 13 August 2018
- Syed Sha Khalid Assistant Professor, Department of Mechanical Engineering, Dayananda Sagar Academy of Technology & Management, Bangalore, Karnataka, India
- Santosh D N Assistant Professor, Department of Mechanical Engineering, Dayananda Sagar Academy of Technology & Management, Bangalore, Karnataka, India
- Srinivas Y V Lecturer, Department of Mechanical Engineering, Arbaminch University, Arbaminch, Ethiopia
References
[1]. Jenkins E.S., Rational design of fastenings SAE journal., vol.52, no 9. [2]. Hrannikoff .A., work of rivets in riveted joints. Trens. A.S.C.E; vol.99. [3]. Batho, Cyril., the partition of the load in riveted joints, jour, Franklin inst., vol. 132, no.5. [4]. Posner, Ezra C., Riveted fastenings product engineering vol.13, no.8. [5]. Davis, Raymond.E, woodruff, Glenn B, and Davis, Harmer.E., Tension tests of large riveted joints. Trans. A.S.C.E., vol.105.
Syed Sha Khalid, Santosh D N, Srinivas Y V "Experimental Investigation on Loads Shared by Rivets in Different Joint Orientation" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.27-31 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/27-31.pdf
In the modern time, Bessel’s functions appear in solving many problems of sciences and engineering together with many equations such as heat equation, wave equation, Laplace equation, Schrodinger equation, Helmholtz equation in cylindrical or spherical coordinates. In this paper, we determine Mahgoub transform of Bessel’s functions. Some applications of Mahgoub transform of Bessel’s functions for evaluating the integral, which contain Bessel’s functions, are given.
- Page(s): 32-36
- Date of Publication: 15 August 2018
- Sudhanshu AggarwalAssistant Professor, Department of Mathematics, National P.G. College Barhalganj, Gorakhpur, U.P., India
- Nidhi SharmaAssistant Professor, Department of Mathematics, Noida Institute of Engineering & Technology, Greater Noida, U.P., India
- Raman ChauhanAssistant Professor, Department of Mathematics, Noida Institute of Engineering & Technology, Greater Noida, U.P., India
References
[1]. Mclachlan, N.W. Bessel functions for engineers, Longman, Oxford (1955). [2]. Bell, W.W. Special functions for scientists and engineers, D. Van Nostrand Company LTD London. [3]. Korenev, B.G. Bessel functions and their applications, Chapman & Hall/CRC. [4]. Farrell, O.J. and Ross, B. Solved problems in analysis: As applied to Gamma, Beta, Legendre and Bessel function, Dover Publications Inc. Mineola, New York. [5]. Watson, G.N. A treatise on the theory of Bessel functions, Cambridge University Press, Cambridge (1944). [6]. Mahgoub, M.A.M. The new integral transform “Mahgoub Transform”, Advances in theoretical and applied mathematics, 11(4), 391-398, (2016). [7]. Mahgoub, M.A.M. and Alshikh,A.A. An application of new transform “Mahgoub Transform” to partial differential equations, Mathematical theory and Modeling, 7(1), 7-9, (2017) . [8]. Fadhil, R.A. Convolution for Kamal and Mahgoub transforms, Bulletin of mathematics and statistics research, 5(4), 11-16, (2017). [9]. Taha, N.E.H., Nuruddeen, R.I., Abdelilah, K. and Hassan, S. Dualities between “Kamal & Mahgoub Integral Transforms” and “Some Famous Integral Transforms”, British Journal of Applied Science & Technology, 20(3), 1-8, (2017). [10]. Raisinghania, M.D. Advanced differential equations, S.Chand & Company PVT LTD Ramnagar, New-Delhi. [11]. Lokenath Debnath and Bhatta, D. Integral transforms and their applications, Second edition, Chapman & Hall/CRC (2006). [12]. Aggarwal, S., Chauhan, R. and Sharma, N. A new application of Mahgoub transform for solving linear Volterra integral equations, Asian Resonance, 7(2), 46-48, (2018) [13]. Aggarwal, S., Sharma, N. and Chauhan, R. Solution of linear Volterra integro-differential equations of second kind using Mahgoub transform, International Journal of Latest Technology in Engineering, Management & Applied Science, 7(5), 173-176, (2018).
Sudhanshu Aggarwal, Nidhi Sharma, Raman Chauhan "Mahgoub Transform of Bessel’s Functions" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.32-36 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/32-36.pdf
The organization's overall situation at a decent position. Especially the present year's position is well because of bring up in the benefit than the earlier year. It's better for the association to differentiate the assets to various divisions in the present market situation. the A STUDY OF FINACIAL PERFORMANCE IN KARANATAKA SILK INDUSTRY LIMITED IN MYSORE the objective of the study are mainly focused on ascertaining the financial performance of previous five years in 2012- 2016. The data collected both primary and secondary data we are calculated financial tools day to day they increasing the profit. the operational ratio shows better sales position of the firm And there is a slight variation in the ratios of the firm. Especially the present year's position is well because of bring up in the benefit than the earlier year. It's better for the association to differentiate the assets to various divisions in the present market situation. The computation of present and fluid proportion will empower the lenders to get to the current money related position of the worry in connection to their obligations KSIC ltd is increasing a sign of confident repayment of creditors by the firm.
- Page(s): 37-40
- Date of Publication: 19 August 2018
- Kruthika K Research Student, Department of Management and Science, Maharaja Institute of Technology Mysore, Karnataka, India
- Dr. Manoj Kumar N V Associate Professor, Department of Management and Science, Maharaja Institute of Technology Mysore, Karnataka, India
References
[1]. SIDRA ALIMIZA& ATTIYA JAVED [2013] determinants of financial performance of a firm:case of Pakistani stock market vol5[2],pp.43-52 DOI 10.5897\JEIF12.043 [2]. M D AMINUL ISLAM [2014] an analysis of the financial performance of national bank limited using financial ratio, journal of behavioural economics, finance, enterprenurship ,accounting & transport 204,vol.2,no.5,121-129 [3]. VIJAYALAKSHMI &M.SRIVIDYA[2014] a study on financial performance of pharmaceutical industry in india journal of management and science, ISSN:2249-1260\e-ISSN:2250-1819\V0L.4,NO.3 [4]. B.SUREKHA, K.RAMA KRISHNA[2015] A study on financial analysis of TATAmotors ISSN: 2319-2828, VOL 4, NO 4. [5]. NEETA MAHESHWARI NEHAAGARWAL[2013]evaluating financial performance of SBI through financial ratios . associated management consultants private limited vol.7,issue 10, 0ctober 2013 [6]. K.P.VENUGOPALA RAO,FARHAIBRAHIM[2017] financial performance analysis of banks in IDBI bank, international journals of research in IT&MANAGEMENT vol.7, issue 1, jan-2017,pp 64-72 [7]. SHVETA SINGH, ANITA MAKKAR [2017] analysis of financial performance of selected commercial banks in india. Vol.07, no.7 articles ID-80991,18pages [8]. RAMANAN[2015] a study on financial performance of reliance industries limited vol5, issue-2 april 2015 page 665-669 [9]. PETER S.K [1999]financial performance and survival of multinational corporation in china vol. 20, issue 4, april, pages 359-374 [10]. ZHAOYANGLI [ may 2015]the impact of economics crisis on the financial performance of multinational corporations vol.37,pages.55-68 [11]. EVA MALICHOVA , MARIA DURISOVA [2015]business economics and management & management 2015 conference , BEM2015 evaluation of financial performance of in IT sector procedia economics and finance 34[2015]238-243 [12]. www.ksic .com [13]. Ksic annual report [14]. google.com [15]. Articles of different authors [16]. financial management book
Kruthika K, Dr. Manoj Kumar N V "Financial Performance" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.37-40 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/37-40.pdf
This paper provides a review on the OFDM (Orthogonal Frequency Division Multiplexing) technology in wireless communication system. In this paper, OFDM technique is proposed in AWGN channel and the analysis is done on the basis of FFT size and the number of OFDM symbols at extremely high values. The OFDM performance in terms of symbol error rate vs SNR is discussed. Here analysis and behaviour is studied at extremely high values. Here analysis is done about how values behave at high values and how the symbol error rate increases or decreases in comparison to signal to noise ratio.
- Page(s): 41-45
- Date of Publication: 19 August 2018
- Abhishek Kumar Srivastava Student of Electronics and Communication, Kanpur Institute of Technology, Kanpur, Uttar Pradesh, India
- Pratyush TripathiAssistant Professor, Department of Electronics and Communication, Kanpur Institute of Technology, Kanpur, Uttar Pradesh, India
References
[1]. L.Ping, L. Liu, K. Wu, and W.K. Leung, “Interleave-Division Multiple-Access,” IEEE Trans. Wireless Commun., Vol.5,No. 4, pp.938-947, Apr.2006. [2]. P.Wang, J. Xiao, and L. Ping, “Comparison of orthogonal and non-orthogonal approaches to future wireless cellular systems,” IEEE Veh. Technol. Mag., vol.1, no. 3, pp.4-11, Sept.2006. [3]. Peter Hammarberg and Fredrik Rusek. “Channel Estimation algorithm for OFDM-IDMA: complexity and performance”, IEEE Transactions on wireless communication, vol.-11, pp.1723-1734, no.5, may 2012. [4]. Ruchir Gupta, B.K. Kanauji a, R.C.S. Chauhan, M.Shukla Member IEEE, “Prime Interleaver for Multiuser Iterative IDMA Systems’’ in International Conference on Computational Intelligence and Communication Network, DOI 10.1109/CICN.2010.119. [5]. B.Muquet and M.De.Couville, “Blind and Semi-Blind Channel identification methods using second order statistics for OFDM transmission’’ IEEE Transaction on signal processing, pp.2745-8, Mar.1993. [6]. H.liu and G.Xu, “A deterministic approach to blindestimation,’’ IEEE signal processing letters, vol.1, no.12, pp.205-7, Dec.1994. [7]. M.Shukla, V.K.Srivastava, S.Tiwari “Interleave Division Multiple Access for Wireless Communication”:ICONGENCOM-06 [8]. Kuldeep choudhary, P.S Sharma “Interleavers for IDMA Technology: A Comparison Survey”: IJARCCE Vol.1, Issue 2, Apr 2012. [9]. Aashish Shukla, Dhiraj Purwar, Dileep Kumar “Multiple Access Schemes for (4G) Communication: A Comparison Survey”: ISDMISC (IJCA) 2011. [10]. Li Ping and Peng Wang, Xiaodong Wang “RecentProgress in Interleave-Division Multiple-Access (IDMA)”. [11]. Farheen Begum “Implementation of Interleave Division Multiple Access (IDMA) with Multiple Users in Wireless Communication System’’, International Journal of Computer Applications (0975 – 8887)Volume 134 – No.15, January 2016 [12]. Matalb Tool (help) [13]. Performance comparision of MIMO systems over awgn and Rayleigh channels with zero forcing receiver. Global journal of research in engineering electrical and electronics engineering [14]. Study and analysis capacity of MIMO systems for AWGN channel model scenarios hussain bohra int journal of engineering research and appilications. [15]. OFDM Wikipedia [16]. Comparative Analysis of ber performance of IDMA and OFDM-IDMA International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January-2017 ISSN 2229-5518 [17]. Performance of OFDM-IDMA and OFDM-CDMA architectures over frequency selective MISO channels [18]. Review Paper on OFDM-Concepts and Applications© 2015 IJEDR | Volume 3, Issue 3 | ISSN: 2321-9939 [19]. A Review Paper On Orthogonal Frequency Division Multiplexing(Ofdm) International Journal of Scientific & Engineering Research, Volume 6, Issue 2, February-2015 ISSN 2229-5518.
Abhishek Kumar Srivastava, Pratyush Tripathi "An Analysis of OFDM System on the Basis of FFT Size and Number of OFDM Symbols at Extremely High Values" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.41-45 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/41-45.pdf
The aim of this research is to understand the factors behind laptop purchase decisions of consumers. Nowadays companies make use of various strategies in order to attract new customers, retain existing customers and differentiate their products from those of their competitors. Perhaps, the most important and effective strategy to influence consumer behavior in the product selection is emphasizing the “brand name” of the products. Aim in this paper is to investigate how Laptop brands can influence consumer’s loyalty and Commitment. Brand equity is a set of brand assets and liabilities linked to a brand name and symbol, which add to or subtract from the value provided by a product or service. It enhances the customer’s ability to interpret and process information, improves confidence in the purchase decision and affects the quality of the user experience. Using this construct widely discussed in the literature, we use and build our hypothesis including independent variables as Perceived quality, Brand awareness, Brand association and Brand trust and Purchase intention with taking dependent variables as Customer Loyalty and Customer Commitment. In this study five laptop brand have been considered namely Apple, HP, Dell, Lenovo and Samsung and given sixth option as other brand to make a choice. The study involved a questionnaire administered to 98 respondents. Findings indicates that a majority of the Laptop buyers’ decisions are mainly influenced by Brand Association, Brand awareness and Perceived quality. Purchase intention and Brand trust do not seem to influence Customer Loyalty and Commitment for the sample of this study.
- Page(s): 46-63
- Date of Publication: 19 August 2018
- Anupama Sundar D Assistant Professor, JSS Centre for Management Studies, JSS Science and Technology University Sri Jayachamarajendra College of Engineering, JSS Technical Institutions Campus, Mysore-570006, Karnataka, India
References
[1]. The Impact of Brands on Consumer Buying Behavior: Javad Esmaeili and UlasAkkucuk. [2]. Impact of brand personality on three major relational consequences (trust, attachment, and commitment to the brand) Didier Louis and Cindy Lombart. [3]. Exploring the impact of brand image on customer loyalty and commitment in China. Ike-ElechiOgba and Zhenzhen Tan. [4]. The impact of satisfaction and image on loyalty: Rita Faullant, Kurt Matzler and Johann Fu¨ller. [5]. 2001: A Space Laptop SpaceRef – Your Space Reference. [6]. A study on consumers’ attitude towards brand image, athletes’ endorsement, and purchase intention: Chao-Sen Wu. [7]. Types of Laptops: How Do You Compute"? PC Magazine. Ziff Davis Publishing Holdings Inc. 18 September 2006. Retrieved 7 November 2008.
Anupama Sundar D "The Impact of Brand Image on Customer Loyalty and Commitment" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.46-63 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/46-63.pdf
IoT (Internet of Things) is a fast growing technology, helping lots of devices to connect to the Internet. With this outbreak, attackers have been observed to take advantages of the numerous security holes in the system. This weakness can be used to exploit the core Internet infrastructure- DNS (Domain Name Service). The DNS system is choked under control of single organization and also the existing Public Key Infrastructure (PKI) needs to be overhauled. There is a need for more open distributed, decentralized model. The proposed model, utilizes the blockchain technology to implement the record storage as well as an secure open book system. Further, various cloud entities can also implement their DNS service making it distributed. An algorithm has also been devised to reduce the resolution times for the user, making it fast as well as secure. The system proposed here is an attempt to make the existing DNS infrastructure more secure, thereby reducing the risk of the Internet connected devices.
- Page(s): 64-69
- Date of Publication: 28 August 2018
- Shanthala P TDepartment of CSE, PES University, Electronic City Campus, Bangalore, Karnataka, India
- Annapurna DDepartment of ISE, PES University, Electronic City Campus, Bangalore, Karnataka, India
References
[1]. Ali, Muneeb, Jude C. Nelson, Ryan Shea, and Michael J. Freedman. ”Blockstack: A Global Naming and Storage System Secured by Blockchains.” In USENIX Annual Technical Conference, pp. 181-194. 2016. [2]. Kalodner, Harry A., Miles Carlsten, Paul Ellenbogen, Joseph Bon-neau, and Arvind Narayanan. ”An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.” In WEIS. 2015. [3]. Wright, Aaron, and Primavera De Filippi. ”Decentralized blockchain technology and the rise of lex cryptographia.” (2015). [4]. DNS Server Security Survey by IDC, https://www.efficientip.com/resources/white-paper-idc-dns-security-survey-2014/ , 2014. [5]. Gao, Hongyu, Vinod Yegneswaran, Yan Chen, Phillip Porras, Shalini Ghosh, Jian Jiang, and Haixin Duan. ”An empirical reexamination of global DNS behavior.” ACM SIGCOMM Computer Communication Review 43, no. 4 (2013): 267-278.. [6]. Musiani, Francesca. ”A Decentralized Domain Name System? User-Controlled Infrastructure as Alternative Internet Governance.” 8th Media In Transition (MiT8) conference, May. 2013. [7]. Calheiros, Rodrigo N., Rajiv Ranjan, Anton Beloglazov, Csar AF De Rose, and Rajkumar Buyya. ”CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms.” Software: Practice and experience 41, no. 1 (2011): 23-50. [8]. Nakamoto, Satoshi. ”Bitcoin: A peer-to-peer electronic cash system.” (2008): 28. Harvard [9]. Morselli, Ruggero, Bobby Bhattacharjee, Jonathan Katz, and Michael Marsh. Keychains: A decentralized public-key infrastructure. Univer-sity of Maryland, College Park College Park United States, 2006. [10]. Ramasubramanian, Venugopalan, and Emin Gn Sirer. ”The design and implementation of a next generation name service for the internet.” In ACM SIGCOMM Computer Communication Review, vol. 34, no. 4, pp. 331-342. ACM, 2004. [11]. Walfish, Michael, Hari Balakrishnan, and Scott Shenker. ”Untangling the Web from DNS.” In NSDI, vol. 4, pp. 17-17. 2004. [12]. Cohen, Edith, and Haim Kaplan. ”Proactive caching of DNS records: Addressing a performance bottleneck.” Computer Networks 41, no. 6 (2003): 707-726. [13]. Shaikh, Anees, Renu Tewari, and Mukesh Agrawal. ”On the effective-ness of DNS-based server selection.” In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1801-1810. IEEE, 2001. [14]. Scot Hilton, Dyn Analysis Summary Of Friday October 21 Attack, https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ [15]. Wired, How Hackers Hijacked a Bank’s Entire Online Oper-ation, https://www.wired.com/2017/04/hackers-hijacked-banks-entire-online-operation/ [16]. ArsTechnica , Google Chrome will banish Chinese certificate author-ity for breach of trust,https://arstechnica.com/security/2015/04/google-chrome-will-banish-chinese-certificate-authority-for-breach-of-trust/
Shanthala P T, Annapurna D "An Efficient Secured Internet Model for All Upcoming IoT Applications" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.64-69 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/64-69.pdf
The present study is undertaken to create awareness among the methods of corrosion prevention and control the use of organic inhibitors is one of the most practiced one. The majority of organic inhibitors act by the adsorption on the metal surface. The adsorption is influenced by the chemical structure of the inhibitors. Most of the well-known acid inhibitors are organic compounds containing nitrogen, sulphur and oxygen atoms. The influence of nitrogen containing organic compounds as amines and hetrocyclic compounds on the corrosion of steel in acidic solution have investigate. In this paper deals with the experimental results from weight loss method on corrosion behavior of carbon steel in 0.5N, 1N HCl and 0.5N, 1N H2SO4 acids and its inhibition by the antibiotic inhibitor namely cefotaxime Sodium. As a result, the inhibitor produced high efficiency even with very low concentration of the order 1mM.
- Page(s):70-74
- Date of Publication: 28 August 2018
- K.PrabhakaranCentre for Environment Research, Department of Chemistry, Kongu Engineering College [Autonomous], Perunduri-638 060, Tamil Nadu, India.
- J.RavichandranDepartment of Chemistry, Sri Ramakrishana Mission Vidyalaya college Arts and Science College [Autonomous], Coimbatore-641 020, Tamil Nadu, India.
References
[1]. Corrosion research committee of CSIR, Basic research on corrosion and its prevention [2]. M.N. Desai and M.B. Desai, Corros. Sci., 47 (1991) 410. [3]. Little B. Rayr, J.Corros. Sci., 41(1999) 1273 [4]. T.A Banfield, Corros. Prev. and Control, 53(1997) 915. [5]. S. Glasstone, “An Introduction to Electrochemistry, Van Nostrand, Princeton”, 15(1942) 210. [6]. 6. E. Kalnan, I. Felhosi, F.H Karman, I Lukovits, J. Telegi and G.Plinkas, “Environmentally Friendly Inhibtors in Corrosion and Environmental Degradation”, Chem., 9 (2000) 231-537. [7]. O.E Olorunniwo, L.E Umoru and O.R Bamiboye, J.App. Sci., 94 (1950) 40. [8]. L. Larbi, M. Traisnel, Corros. Sci., 45 (2003) 371. [9]. M.Ozcan, M.Dehri, S.Erbilm, Org. Cottings, 54 (2005) 195.
K.Prabhakaran, J.Ravichandran "Corrosion Inhibition of Carbon Steel by Cefotaxime Sodium in Acidic Medium" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.70-74 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/70-74.pdf
Fingerprint identification is one of the most well-known and common biometric identification systems. This research presents another sincere contribution made in Design and Implementation of a Fingerprint Based Identity Management System. This project is developed to keep daily attendance of students in class via their fingerprints. This is a unique identification which will prevent impersonation and errors in calculating attendance. Its purpose is to computerize the tradition way of taking attendance and generating of report automatically at the end or between of the session. A use case is the methodology is used in system analysis to identify, clarify, and organize system requirements. This project was carried out using the technique of Extreme Programming (XP) which is an offshoot of Agile software development methodology and developed as a standalone desktop application. Microsoft visual basic and Microsoft SQL was used in building the database and software for developing the graphic interface of student module. System testing of the software was done by deploying it to laptop device for testing purposes. The essence of the system testing is to show proper functionality with hardware components such as the fingerprint Scanner. Tests were also carried out to ensure proper and regular synchronization with the database server. In conclusion, the study shows that the integration of fingerprint biometric system in sensitive institution database can improve security of the organization and alleviate problem associated with traditional identity verification techniques.
- Page(s): 75-80
- Date of Publication: 28 August 2018
- Abioye, M.Department of Mechanical Engineering, Kogi State Polytechnic, Lokoja, Nigeria
- Abioye A. E.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwana. Ebonyi State, Nigeria
- Omotehinwa O. TDepartment of Computer Science, Kogi State University, Anyigba, Nigeria
- Egonwa B. O.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwana. Ebonyi State, Nigeria
- Oluwe M. O.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwana. Ebonyi State, Nigeria
References
[1]. Shila S., (2011). A DoG based approach for fingerprint Image enhancement, Ph.D Thesis, Department of Computer Science and Engineering, NIT Rourkela. [2]. Caldwell O. (2015). Market report: “border biometrics”, Biometric Technol. Today, vol.2015, No.5, pp.5-11. [3]. Jyoti R. & Gupta, P.C. and Sharmarvind C. (2016). Fingerprint-based Identification System-Asurvey. International journal of Computer Technology and Electronic Engineering, Vol. 1 Issue 3. [4]. Chaudhari, A.S. Patnaik, G.K. and Patil, S.S. (2014). Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept, Inform. Econ., vol. 18, no. 1/2014, pp. 17–26. [5]. Ikuomola A. J. (2015). Fingerprint base authentication for time and attendance management. British Journal of mathematics & computer science available via www.sciencedomain.org [6]. https://www.crossmatch.com/UareU4500Reader [7]. https://logo-kid.com/microsoft-visual-studio-2013-logo-png.htm
Abioye, M., Abioye A. E., Omotehinwa O. T, Egonwa B. O., Oluwe M. O. "Design and Implementation of a Fingerprint Based Identity Management System" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.75-80 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/75-80.pdf
Concrete is the most widely used man-made construction material in the world. Various required performance attributes of concrete includes strength, workability and durability.To attain these characteristics, it is imperative to emphasize the mix design, which generates the above characteristics with the conservation of energy and materials. Self-Compacting Concrete (SCC) growth has become a revolutionary milestone in the history of the construction industry. SCC is a flowing concrete mixture that is able to consolidate under its own weight. The highly fluid nature of SSC makes it suitable for placing in difficult conditions and in section with congested reinforcement. Fine aggregate content is increased higher than coarse aggregates to make concrete highly flowable. It is desirable to replace river sand by M-Sand due to high fine aggregate content. In this paper, High Volume Fly ash Self-Compacting Concrete (HVFASCC) of M30 grade was designed based on Nan-Su trial and error mix design procedure. HVFASCC differs from normal SCC since the fly ash content varies from 50 to 80%. The fresh properties of SCC were characterised by EFNARC guidelines. Here Ordinary Portland Cement is replaced with 50% of fly ash. Basalt fibers were added in the mix by 0%, 0.25%, 0.5%, 0.75%, 1% of its total volume of concrete and optimum fiber content was found out. Compressive and flexural strengths were determined for all percentages of basalt fibers. The experimental test results showed marginal increase in compression and considerable increase in flexural strength. To understand basalt fiber influence on durability characteristics Rapid Chloride Permeability Test (RCPT) was carried out for 28 days cured specimens. The present work also deals with the effect of elevated temperature on Rebound Number (RN) and Ultrasonic Pulse Velocity (UPV).The exposure temperatures were 2000C and 4000C for two hours duration. The results revealed the reduction in rebound number and ultrasonic pulse velocity.
- Page(s): 81-87
- Date of Publication: 28 August 2018
- Akhil KabadePostgraduate Student, Department of Civil Engineering, KLE Dr. M. S. Sheshgiri College of Engineering and Technology, Belagavi, Karnataka, India
- Dr. V. D.GundakalleProfessor, Department of Civil Engineering, KLE Dr. M. S. Sheshgiri College of Engineering and Technology, Belagavi, Karnataka, India
References
[1]. Nan-Su, Kung-Chung Hsu, His-Wen Chai, “A simple mix design method for self-compacting concrete”, Cement and Concrete Technology, Cement and Concrete research, 2001, Volume 31, pp 1799-1807. [2]. Stefanus A Kristiawanaand M Taib M Aditya, “Effect of high volume fly ash on shrinkage of self-compacting concrete”, Procedia Engineering, Vol.125, 2015, pp. 705 – 712. [3]. N. Bouzoubaa, M. Lachemi, “Self-compacting concrete incorporating high volumes of class F fly ash preliminary results”, Cement and Concrete Research, 2001, Volume 31, pp 413-420. [4]. B.K. Tuljaramsa and V.D. Gundakalle, “A Study on Strength Properties of SCC With M-Sand”, NCRIET and Indian Journal Of Scientific Research, 2015, Volume 12, pp 370-374. [5]. Chandramouli K, Srinivasa Rao P, SeshadriSekhar T, et al. (2010), “Rapid Chloride Permeability Test for Durability Studies on Glass Fiber reinforced Concrete”, ARPN Journal of Engineering and Applies Sciences, Vol. 5, No. 3, pp. 67-71. [6]. Bing Chen, Juanyu Liu, “Residual strength of hybrid-fibre-reinforced high-strength concrete after exposure to high temperatures:, Cement and Concrete Research, Volume 34, 2004, pp 1065-1069. [7]. Arabi N S Al Qadi and Sleiman M Al-Zaidyeen (2014), “Effect of Fiber Content and Specimen Shape on residual strength of polypropylene fiber self-compacting concrete exposed to elevated temperatures”, Journal of King Saud University, 2014, Volume 26, pp 33-39. [8]. BiswadeepBharali, “Experimental Study on Self-Compacting Concrete Using GGBS and Fly Ash”, International Journal of Core Engineering and Management (IJCEM), Volume 2, Issue 6, September 2015. [9]. Dr. A. Muthadhi and Dr. S. Kothandaraman, “Effect of Elevated Temperature on Strength Properties of RHA Blended Concrete”, Indian Concrete Institute, June 2015, pp 21-29. [10]. Stanish K D, Hooton R D and Thomas M D A (1997), Testing the Chloride Penetration Resistance of Concrete: A Literature Review, Department of Civil Engineering University of Toronto, Toronto, Ontario, Canada, FHWA Contract DTFH61-97-R-00022, Prediction of Chloride Penetration in Concrete. [11]. EFNARC May 2005: European guidelines for Self-Compacting Concrete, Specification, Production and Use. [12]. IS: 516 - 1959: “Methods of Tests for Strength of Concrete”, Bureau of Indian Standards, New Delhi, India. [13]. IS: 2386 (Part III) - 1963: “Methods of Test for Aggregates for Concrete – Part III Specific Gravity, Density, Voids, Absorption and Bulking. [14]. IS: 383 - 1970: “Specification for Coarse and Fine Aggregates from Natural Sources for Concrete”, Bureau of Indian Standards, New Delhi, India.
Akhil Kabade, Dr. V. D.Gundakalle "Effect of Addition of Basalt Fibers and Temperature on the Strength of High Volume Fly Ash Self-Compacting Concrete" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.81-87 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/81-87.pdf
The paper design to overcome the losses of life from fire and smoke, proposed models for fire and smoke detection using image processing is provided without using additional sensors. The proposed solution is based on dynamic image processing using different mosaics pattern for both fire and smoke. The retrieve and analysis of mosaics are valuated using a statistical analysis of samples getting from different video frames and images. The proposed models can be used to detect the complete fire and smoke. It is focus to solve the issues in large areas. Past research works focused on developing the detection algorithms for processing video captured at real-times and also with sensor devices, it is required a huge amount of data storage and large scale processing therefore the complexity of algorithms is increases. The proposed method based on map-reduce function that clean and pre-process the large area video captured from the local site video devices. It basically works on frames of the video data of central cloud.
- Page(s): 88-91
- Date of Publication: 28 August 2018
- Vivek Singh RathoreComputer Science & Engineering Chouksey Engineering College Bilaspur, India
- Akhilesh SharmaComputer Science & Engineering Chouksey Engineering College Bilaspur, India
- Vinod Singh KharsanComputer Science & Engineering Chouksey Engineering College Bilaspur, India
References
[1]. Le Dong, Lin, Liang, Ling He, Zhang, Chen, Cao and Izquierd (2016)”A Hierarchical Distributed Processing Framework for Big Image Data”, ieeexplore; Pages 1-13. [2]. Szul and Bednarz (2014) “Productivity frameworks in big data image processing computations - creating photographic mosaics with Hadoop and Scalding”, Vol. 29, ICCS; Pages 2306–2314. [3]. R. Balaji and S. Appavu (2015)” An Intelligent Video Surveillance Framework with Big Data Management for Indian Road Traffic System”, Vol. 123 – No.10, IJCA; Pages 12-19. [4]. Zabłocki, Gosciewska, Frejlichowski and Radosław Hofman (2014) “Intelligent video surveillance systems for public spaces – a survey”, Vol. 8, No. 4, jtacs; Pages. 13-27. [5]. Trambitckii , Anding , Musalimov and G Linß (2015) “Colour based fire detection method with temporal intensity variation filtration”, iop; Pages. 1-6. [6]. Seebamrungsat, Praising, and Riyamongkol (2014) “Fire Detection in the Buildings Using Image Processing” , ICT-ISPC; Pages. 95-98. [7]. Yuan, Zhang and Liu (2015) ” A survey on technologies for automatic forest fire monitoring, detection, and fighting using unmanned aerial vehicles and remote sensing techniques”, Vol. 45, NRC; Pages. 783-792. [8]. Byoungmoo Lee and Dongil Han (2007) ” Real-Time Fire Detection Using Camera Sequence Image in Tunnel Environment”, ICIC 2007, Pages. 1209–1220, © Springer-Verlag Berlin Heidelberg. [9]. Md. Mahamudul Hasan, M. Abdur Razzak (2016) “An Automatic Fire Detection and Warning System Under Home Video Surveillance”, CSPA, Pages. 258-262, Melaka, Malaysia. [10]. Vemula and Crick (2015) “Hadoop Image Processing Framework”, ieee xplore, New York, NY, USA. [11]. Ssonawane , Pandure and Kawthekar (2016) ” A Review on Hadoop MapReduce using image processing and cloud computing”, IOSR-JCE e-ISSN: 2278-0661,p-ISSN: 2278-8727, Pages. 65-68 [12]. Yuzhong Yan, Lei Huang (2014)” Large-Scale Image Processing Research Cloud”, IARIA, 2014. ISBN: 978-1-61208-338-4, Pages. 88-93. [13]. Çelik, ozkaramanlı, and Demirel (2007 ) ” Fire and Smoke Detection Without Sensors: Image Processing Based Approach”, EUSIPCO, Pages. 1794-1798, Poznan, Poland. [14]. Ms. Krishnapriya C and Ms. Swathi Chandra T. R (2016) “A Survey: Image processing in Real-Time Big Data Analytical Architecture”, Vol. 8, Pages. 45-48. [15]. Sneyers and Wuille (2016)” Free Lossless Image Format Based on Maniac Compression”, ICIP, Pages. 66-70. [16]. Pooja Choudhary and Rajandeep Kaur (2016)” A Review of Image Compression Techniques”, IJCA, Volume 142 – No.1, Pages. 8-11. [17]. S. Anantha , P. Eswaran and C. Senthil (2016) “Lossless Compression Algorithm Using Improved RLC for Grayscale Image”, Springer. [18]. Tomar and Jain (2015)” Lossless Image Compression using Differential Pulse Code Modulation and Its purpose”, IJSP, Vol.8, No.9 Pages.249-256. [19]. Hana H. Saleh (2016) ” Image Compression Based Discrete Cosine Transform Technique (DCT)”, ACECS, Hammamet, Tunisia. [20]. Olshannikova, Ometov , Koucheryavy and Olsson (2015) “Visualizing Big Data with augmented and virtual reality: challenges and research agenda”, Springer, pages. 1-27. [21]. Mingmin Chi, Antonio Plaza, Benediktsson, Zhongyi Sun, Jinsheng Shen, and Yangyong Zhu (2015)” Big Data for Remote Sensing: Challenges and Opportunities”, ieee, Pages. 1-23 [22]. Dr. Chandak and Khurana (2016)” Survey of Multimedia Data Analysis by Feature Extraction using MapReduce Technique”, Vol. 6, IJARCSSE, Pages. 504-511 [23]. Zabłocki,Gościewsk, Frejlichowski and Hofman (2014) ” Intelligent video surveillance systems for public spaces – a survey”Vol. 8, No. 4, Pages. 13-27 [24]. Lad and Patel (2016) ” An approach for Object Detection and Object Tracking using Background Subtraction ”, Vol-2 , No.3, Pages. 556-561 [25]. Dhinakaran , Silviya . and Duraimurugan (2015)” Video Analytics using HDVFS in Cloud Environment”, Vol. 10, NO. 13, Pages. 5569-5576 [26]. Banaei and Moghaddam (2014) ” Hadoop and Its Role in Modern Image Processing “,Journal of Marine Science, 4, 239-245. [27]. Hati, Sa, and Majhi (2013) ”Intensity Range Based Background Subtraction for Effective Object Detection”, IEEE SIGNAL PROCESSING LETTERS, VOL. 20, No. 8, Pages. 759-762
Vivek Singh Rathore, Akhilesh Sharma, Vinod Singh Kharsan "A Hierarchical Dynamic Image Processing to Detect The Smoke & Fire With Big Data Using MOSIACS " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.88-91 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/88-91.pdf
High strength self-compacting concrete (HSSCC) has gained popularity in the recent years as it can flow and fill up gaps under its own self-weight without the need of any vibration. Workability, strength and durability are the major attributes of concrete used in the construction industry. For concrete to be accepted as SCC it must satisfy certain guidelines in its fresh state which are provided by EFNARC. The flowability required for HSSCC can be achieved by increasing the powder content and thus reducing the volume of aggregates in the concrete, which means the cement content required is more and hence the heat of hydration is more which may cause shrinkage cracks. To avoid this cement is partly replaced with mineral admixtures. For the concrete to be termed as high volume fly ash self-compacting concrete the replacement of cement must be greater than 50%. In this study M60 grade self-compacting concrete was designed, where in 50% of cement replaced with fly ash. This type of concrete is termed high volume fly ash high strength self-compacting concrete (HVFAHSSCC). River sand is the most commonly used fine aggregate in concrete, in due to the boom construction activity there is a scarcity of natural sand. For strength and workability, 30% replacement of river sand by M-Sand was found to be optimum. Steel fibers were incorporated in the mix and varied in terms of volume fraction from 0.5% to 2% at an interval of 0.5%. Non-destructive tests were conducted on the specimens. Further, rapid chloride penetration test (RCPT) was also performed, and it observed that the penetration of chloride ions is reduced with increase in volume fraction of steel fibers as compared to reference mix. All specimens showed very less penetration (<1000 Coulombs) values. The concrete specimens were tested for compressive strength at various temperatures (200°C and 400°C), for a duration of 2 hours. It was observed that all specimens suffered reduction in strength at elevated temperatures.
- Page(s): 92-97
- Date of Publication: 28 August 2018
- Ved AmonkarPostgraduate Student, Department of Civil Engineering, KLE Dr. M. S. Sheshgiri College of Engineering and Technology, Belagavi, Karnataka, India
- V. D. GundakalleProfessor, Department of Civil Engineering, KLE Dr. M. S. Sheshgiri College of Engineering and Technology, Belagavi, Karnataka, India
References
[1] R. Vasusmitha, “Effect of Elevated Temperature on Mechanical Properties of High Strength Self Compacting Concrete” International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 8, October – 2012. [2] Chandramouli K., Srinivasa Rao P., SeshadriSekhar T and Pannirselvam N. “Rapid chloride permeability test for durability studies on glass fibre reinforced concrete” ARPN Journal of Engineering and Applied Sciences, Vol. 5, No. 3, March 2010. [3] Arabi N.S. Al Qadi, Sleiman M. Al-Zaidyeen, “Effect of fiber content and specimen shape on residual strength of polypropylene fiber self-compacting concrete exposed to elevated temperatures” Journal of King Saud University, Vol.26, pp.33-39, December 2012. [4] Jin Tao, Yong Yuan and Luc Taerwe “Compressive Strength of Self-Compacting Concrete during High-Temperature Exposure” JOURNAL OF MATERIALS IN CIVIL ENGINEERING, October 2010. [5] Nan Su, “A simple mix design method for self-compacting concrete” Cement and Concrete Technology, Cement and Concrete research, Vol.31, No.12, pp.1799-1807, 2001. [6] BurakFelekoglu, SelcukTurkel, Bulent Baradan, “Effect of water/cement ratio on the fresh and hardened properties of self-compacting concrete” Building and Environment, Vol.42, No.4, pp.1795-1802, January 2006. [7] N. Bouzoubaa, “Self-compacting concrete incorporating high volumes of class F fly ash Preliminary results” Cement and Concrete Technology, Cement and Concrete Research, Vol 31, pp 413-420, 2001. [8] C.S. Poon, “Compressive behavior of fiber reinforced high-performance concrete subjected to elevated temperatures” Cement and Concrete Technology, Cement and Concrete Research, Vol 34, pp 2215-2222, 2004 [9] EFNARC May 2005: European guidelines for Self-Compacting Concrete. [10] IS: 2386-3: 1963: “Methods of Test for Aggregates for Concrete - Part 3: Specific Gravity, Density, Voids, Absorption and Bulking”, Bureau of Indian Standards, New Delhi, India. [11] IS: 516-1959: “Method of tests for strength of concrete”, Bureau of Indian Standards, New Delhi, India. [12] IS: 13311 part1:1992 “Method of Non-destructive testing of concrete”, Bureau of Indian Standards, New Delhi, India. [13] Abbas Al Ameeri, “The effect of steel fiber on some mechanical properties of self- compacting concrete” American Journal of civil engineering, Vol.1, No.3, pp.102-110, 2013. [14] Clotilda petrus, Goh Lyn Dee, Ruqayyah Ismail, “Compressive strength of concrete with fibers at elevated temperature” Journal Technology, Vol.78, No.5-4, December 2015.
Ved Amonkar, V. D. Gundakalle "Influence of Elevated Temperature and Steel Fiber on High Volume Fly Ash High Strength Self Compacting Concrete" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.92-97 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/92-97.pdf
Electrical power sector is the vital part of National Energy Sector. Various non-conventional and conventional energy sources are converted to electrical energy for quick, automatic controlled, easy, power transmission and supply of rich-quality and clean energy to satisfy the consumers at all times at lowest possible cost for ultimate utilization in domestic, industrial, commercial, transport and agricultural sectors. Today in rapidly changing Energy Scenario, Biomass is the important renewable energy source for the 21st century, particularly for rural and urban applications and has following principal routes of energy conversion: > Incineration of dry biomass to obtain heat. > Anaerobic digestion of wet biomass to obtain methane. > Biochemical reactions giving biogases, chemicals etc. > Photo chemical processes of biomass energy conversion > Fermentation to obtain ethyl alcohol.
- Page(s): 98-101
- Date of Publication: 30 August 2018
- Pandit Amitkumar RamprakashLecturer in Electrical Dept., S. B. Polytechnic, Savli-391770, Vadodara, Gujarat, India
References
[1]. Central Pollution Control Board, (CPCB), 2004: “Management of Municipal Solid Waste. Ministry of Environment and Forests”, New Delhi, India. [2]. Kansal, A., 2002: “Solid waste management strategies for India”, Indian Journal of Environmental Protection, 22, 4, 444–448. [3]. Kansal, A., Prasad, R.K., Gupta, S., 1998: “Delhi municipal solid waste and environment – an appraisal”, Indian Journal of Environmental Protection, 18, 2, pp 123–128. [4]. Barral, M.T., Paradelo, R., Moldes, A.B., Dominguez, M., DiazFierros, F., 2009:“Utilization of MSW compost for organic matter conservation in agricultural soils of NW Spain”, Res Conserve Recy, 53, pp 529–534. [5]. Bastida, F., Moreno, J.L., Garcı´a, C., Herna´ndez, T., 2007, “Addition of urban waste to semiarid degraded soil: long term effect”, Pedosphere, 17, pp 557–567. [6]. Gillett, J.W., 1992,: “Issues in risks assessment of compost from municipal solid waste: occupational health and safety, public health and environmental concerns”, Biomass Bio energy 3, pp 145–162. [7]. Giusquiani, P.L., Pagliai, M., Gigliotti, G., Businelli, D., Benetti, A., 1995:“Urban waste compost: effects on physical, chemical and biochemical soil properties”, J Environ Qual, 24, pp 175–182. [8]. Tyler, G., 1981:”Heavy metals in soil biology and biochemistry. In: Paul EA, Ladd JN (Eds) Soil Biochemistry”, Ch. 5. Marcel Dekker, New York, pp 371–413. [9]. Richard, T.L., 1992: “Municipal solid waste composting: physical and biological processing”, Biomass Bio energy, 3, pp 163–180. [10]. Epstein, E., 1997, The science of composting. Technomic Publishing, Lancaster,USA. [11]. Shekdar, A.V., Krshnawamy, K.N., Tikekar, V.G., Bhide, A.D., 1992: “Indian urban solid waste management systems – jaded systems in need of resource augmentation”, Journal of Waste Management, 12,4, pp 379–387. [12]. S. Rao, 1995. “Energy Technology”. Non-conventional, Renewable and Conventional, pp 412-427. [13]. Report “Waste to Energy in India” by Shradha Aswani, Energetica India. [14]. Sharma, S., Shah, K.W., 2005,: “Generation and disposal of solid waste in Hoshangabad. In: Book of Proceedings of the Second International Congress of Chemistry and Environment, Indore”, India, pp 749–751. [15]. Asnani, P.U. (2004). United States Asia Environmental Partnership Report, United States Agency for International Development, Centre for Environmental Planning and Technology, Ahmedabad. [16]. Report “Sustainable Solid Waste Management in India” by Ranjith Kharvel Annepu (Columbia University) [17]. Report “MSW to energy in India: The scenario and Expectations”, by – N B Mazumdar. [18]. Akolkar, A.B. (2005). Status of Solid Waste Management in India, Implementation Status of Municipal Solid Wastes, New Delhi.
Pandit Amitkumar Ramprakash "Urban Waste-To-Energy by Incineration Process " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.98-101 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/98-101.pdf
Software development life cycle depends on the software requirements where researchers and practitioners alike have long recognised and established that requirements elicitation is the most essential phase of the requirement engineering process in any software development project. There is a need to collect necessary information about the requirements and the environment of a system-to-be using the appropriate methods and tools during the requirements elicitation stage of any software development life cycle which needs to be accomplished within a certain time and budget. This involves the use of system analysts who are responsible for collecting the information and the stakeholders who provide the necessary information. There are various requirement elicitation techniques and tools available for correct and complete requirement gathering. This paper reviewed various requirements elicitation techniques from the stakeholders’ point of view based on their strengths and weaknesses. The paper also summarises the comparison of requirement elicitation techniques and software requirement tools using various parameters and functionalities.
- Page(s): 102-111
- Date of Publication: 02 September 2018
- Sa’adatu Abdulkadir Department of Computer Science, Nigerian Defence Academy, Kaduna, Nigeria
- Francesca Nonyelum OgwuelekaDepartment of Computer Science, Nigerian Defence Academy, Kaduna, Nigeria
References
[1] S. G. Gunda, “Requirements Engineering: Elicitation Techniques,” Department of Technology, Mathematics and Computer Science, University West, Sweden, 2008. Retrieved from https://www.diva-portal.org/smash/get/diva2:215169/fulltext01. [2] S. Tiwari and S. S. Rathore, “A Methodology for the Selection of Requirement Elicitation Techniques,” arXiv:1709.08481 [cs], Sep. 2017. Retrieved on 10th June 2018, from https://arxiv.org/pdf/1709.08481.pdf. [3] O. I. Al Mrayat, N. M. Nowawi and N. Basir, “Requirements Elicitation Techniques: Comparative Study,” International Journal of Recent Development in Engineering and Technology, vol. 1, no. 3, pp. 1-10, 2013. [4] B. Davey and K. R. Parker, “Requirements Elicitation Problems: A Literature Analysis,” Issues in Informing Science and Information Technology, vol. 12, no. 1, pp. 71-82, 2015. Retrieved from https://iisit.org/Vol12/IISITv12p071- 082Davey1929.pdf. [5] R. Raisinghani, R. Riggen, and K. Ryan, “Adopting an Agile Methodology Requirements-Gathering and Delivery”. PricewaterhouseCoopers, 2014. Retrieved on 7th June 2018 from https://www.pwc.com/en_US/us/insurance/publications/assets/pwc-adopting-agile-methodology.pdf. [6] A. Srivastava, “Top 6 characteristics of Good Requirements and SRS”. [Online]. Available: https://www.linkedin.com/pulse/top-6-characteristics-good-requirements-srs-abhishek-srivastava. [Accessed: 17-Jun-2018]. [7] D. Zowghi and C. Coulin, “Requirements Elicitation: A Survey of Techniques, Approaches, and Tools”, in Engineering and Managing Software Requirements, A. Aurum and C. Wohlin, Eds. Berlin/Heidelberg: Springer-Verlag, 2005, pp. 19–46. Retrieved on 31st May 2018, from https://web.eecs.umich.edu/~weimerw/481/readings/requirements.pdf [8] R. R. Nelson, “IT Project Management: Infamous Failures, Classic Mistakes, and Best Practices”, MIS Quarterly Executive, vol. 6, no. 2, pp. 67–78, 2007. [9] B. Solemon, S. Sahibuddin and A. Abd Ghani, “Requirements Engineering Problem s in 63 Software Companies in Malaysia,” International Symposium on Information Technology, vol. 4, pp. 1-6, 2008. [10] I. Sommerville, Software Engineering, 9th ed., Boston, Massachusetts: Addison Wesley, p. 790. [11] G. Kotonya and I. Somerville, Requirements Engineering: Processes and Techniques. England: John Wiley & Sons Ltd, 1998. [12] B. Nuseibeh and S. Easterbrook, “Requirements Engineering: A Roadmap”, 2000, pp. 35–46. [13] M. Tariq, S. Farhan, H. Tauseef and M. A. Fahiem, “A Comparative Analysis of Elicitation Techniques for Design of Smart Requirements using Situational Characteristics,” International Journal of Multidisciplinary Sciences and Engineering,” vol. 6, no. 8, pp30-38, 2015. Retrieved on 17th June 2018 from https://www.ijmse.org/Volume6/Issue8/paper6.pdf [14] S. Tiwari, S. S. Rathore, and A. Gupta, “Selecting Requirement Elicitation Techniques for Software Projects”, 2012, pp. 1–10. DOI (Boukhari and Siddiqui 2010): 10.1109/CONSEG.2012.6349486. [15] M. A. Abbasi, J. Jabeen, Y. Hafeez, D.-B. Batool, and N. Fareen, “Assessment of Requirement Elicitation Tools and Techniques by Various Parameters”, Software Engineering, pp. 7-11. DOI: 10.11648/j.se.20150302.11. [16] M. Yousuf and M. Asger, “Comparison of Various Requirements Elicitation Techniques,” International Journal of Computer Applications, vol.116, no. 4, pp. 8-15, 2015. Retrieved on 17th June 2018 from https://www.academia.edu/12160700/Comparison_of_Various_Requirements_Elicitation_Techniques [17] M. Shahid, S. Ibrahim and M. N. Mahrin, “An Evaluation of Requirements Management and Traceability Tools,” International Journal of Computer and Information Engineering, vol. 5, no. 6, pp. 627-632, 2011. Retrieved on 10th July 2018 from https://waset.org/publications/15009/an-evaluation-of-requirements-management-and-traceability-tools [18] M. U. Bokhari and S. T. Siddiqui, “A Comparative Study of Software Requirements Tools for Secure Software Development,” BVICAM’s International Journal of Information Technology, vol. 2, no. 2, pp. 207-216, 2010
Sa’adatu Abdulkadir and Francesca Nonyelum Ogwueleka "Comparative Study of Information Gathering Methods and Tools" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.102-111 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/102-111.pdf
I. INTRODUCTION Outsourcing is defined as any job, task, activity or function contracted to a third-party vendor for a significant period of time instead of carrying it out in-house within the company. In this highly competitive world, outsourcing of activities has become the talk of the town. For example, Nike, a well-established company in sports shoes category outsources its complete manufacturing process and advertisement component to multiple countries including China, Indonesia, Taiwan, Vietnam and South Korea in order to bring about quality production and to focus on its core processes like branding and designing of shoes. Nike has grown into a multimillion dollar company by taking advantage of outsourcing activity.
- Page(s): 112-118
- Date of Publication: 02 September 2018
- Archana Vijay Assistant Professor, Acharya Institute of Technology, Bangalore, Karnataka, India
References
[1]. https://www.genengnews.com/gen-articles/outsourcing-hazardous-waste-management-four-questions-to-ask/4841 [2]. https://cdn.fortishealthcare.com/pdf/Environmental_Social_Review_Summary.pdf [3]. Collins, H. 2002, "Outsourcing waste management", Foundry Management & Technology, vol. 130, no. 6, pp. 27. [4]. Giacchetta, G. &Marchetti, B. 2013, "Medical waste management: a case study in a small size hospital of central Italy", Strategic Outsourcing: an International Journal, vol. 6, no. 1, pp. 65-84. [5]. Dunson, C. 1999, "The middle man", Waste Age, vol. 30, no. 11, pp. 42-48. [6]. Chin-Chia, H. & Wu, C. 2006, "The Evaluation of the Outsourcing of Information Systems: A Survey of Large Enterprises", International Journal of Management, vol. 23, no. 4, pp. 817-830,942. [7]. Stoy, C. &Kytzia, S. 2005, "Cost of outsourcing versus cost of rental services for office buildings in Switzerland", Journal of Corporate Real Estate, vol. 7, no. 3, pp. 246-257. [8]. "Outsourcing Made Easy", 2004, Chain Store Age, vol. 80, no. 1, pp. 82. [9]. Seroka-Stolka, O. &Bubel, D. 2015, "OUTSOURCING IN MANAGING A MODERN ENTERPRISE", International Journal of Arts & Sciences, vol. 8, no. 2, pp. 215-225. [10]. Zhuang, B. 2012, Antecedents and Consequences of Logistics Outsourcing: An Empirical Investigation in China, The Chinese University of Hong Kong (Hong Kong). [11]. Agrawal, P. & Haleem, A. 2013, "The Impact of the Outsourcing of IT on Firm Performance: An Empirical Study", International Journal of Management, vol. 30, no. 3, pp. 121-139. [12]. Terence Y.M. Lam 2011, "Outsourcing of housing services in Hong Kong: optimization of transaction value", Journal of Facilities Management, vol. 9, no. 2, pp. 114-126. [13]. Chandra, H., Jamaluddin, K., Masih, L., &Agnihotri, K. (2006). COST-BENEFIT ANALYSIS/CONTAINMENT IN BIOMEDICAL WASTE MANAGEMENT : MODEL FOR IMPLEMENTATION*. Journal of Financial Management & Analysis, 19(2), 110-113. Retrieved from https://search.proquest.com/docview/215226338?accountid=177636 [14]. Harland, C., Knight, L., Lamming, R., & Walker, H. (2005). Outsourcing: Assessing the risks and benefits for organisations, sectors and nations. International Journal of Operations & Production Management, 25(9), 831-850. [15]. Terence Y.M. Lam 2012, "Economic perspective on outsourcing of property management services", Property Management, vol. 30, no. 4, pp. 318-332. [16]. Bhatt, G.D., Gupta, J.N.D. & Sharma, S.K. 2007, "Integrating IT-Enabled Social Networks with Transaction Cost Economics and the Resource Based View of the Firm", Journal of International Technology and Information Management, vol. 16, no. 2, pp. 27-III.
Archana Vijay "Outsourcing vs. Carrying In-House of Biomedical Waste Management" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.112-118 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/112-118.pdf
The packaging materials for smoked fish product were produced from three different materials namely; Laminating films, Glossy card and polyamide polyethylene. The normal traditional basket was used as control. These materials were chosen after a preliminary study was carried out, the size and shape of the packages were also put into consideration for convenience handling. The polyamide polyethylene package is rectangular in shape, 38cm x 23.50cm by size and 0.06mm thickness. While the glossy card is square shape, 25cm x 23.20cm by size and 0.24mm thickness. Fish samples were smoked and allowed to cooled. Sample of the smoked fish were taken for proximate and sensory analysis before and after storage. The smoked fish samples were stored in the two different packages for eight weeks and same for the control (local basket). There was no significant difference before and after storage for sensory analysis from the result obtained. The proximate analysis also revealed little difference before and after eight weeks storage. In general, the result shows that properly packaged smoked fish can prevent post harvest losses also prolong the shelf life of smoked fish for duration and more hygienic for end users. These packages protect the product against spoilage and breakage, easy distribution or transportation.
- Page(s): 119-121
- Date of Publication: 04 September 2018
- Amina I.MNational Institute for Freshwater Fisheries Research, P.M.B 6006, New Bussa Niger State, Nigeria
- Ayuba A. B National Institute for Freshwater Fisheries Research, P.M.B 6006, New Bussa Niger State, Nigeria
- Okounzi S.ANational Institute for Freshwater Fisheries Research, P.M.B 6006, New Bussa Niger State, Nigeria
References
[1]. Domenick, C. (2017). Tip for Designing Great Food Packaging,retrieved from www.thebalancesmb.com/brand-identify-and-marketing2295442 [2]. Iwuoha, J. (2013). Dried and smoked fish export; How to serve the demand of Africans lining abroad. In Agribusiness and Food Business ideas. Retrieve from www.smallstarter.com/browse-ideas/dried-and-smoked-fish-export [3]. Soroka (2002).fundamentals of Packaging Technology , Institute of Packaging Professionals ISBN 1-930268-25-4 [4]. Olayemi , F. , Omodara , M . and Olufemi , P .(2015). Development of appropriate packing for shelf life extension of smoked fish in a developing economy.International Journal of Fisheries and Aquatic Studies, 2(4s), 46-50. [5]. Coles, R. (2003).Introduction to food packaging technology.In R. Coles, D. McDowell and M.J. Kirwan (Eds.), Food packaging technology (pp.1-31). USA: CRC Press LCC.
Amina I.M, Ayuba A. B , Okounzi S.A "Design and Fabrication of Different Packaging Materials for Smoked Fish Products" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.119-121 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/119-121.pdf
Fish oil are mostly used in the food, soap, medical and pharmaceuticals industry for the production of pomade, oil for cooking, toilet soap, drugs and medical ointment respectively. The objective of this work is to develop a technology for the extraction and processing of fish oil, from Cat Fish (clarias gariapinus); to design and fabricate, assemble the component and testing of the extractor, based on the design specification. While in designing and in material selection, consideration was given to the social – economic status of the intended user of the machine. The functional part of the machine include worm shaft, cylindrical barrel gear box, oil outlet, cake outlet, pulley and hopper The modification of the machine involves consideration on the process of extraction, time taken to extract, quality and quantity of oil recovered from the fish. The worm shaft is at increasing diameter while the screw system is at a decreasing pitch, these in turn give rise to a maximum pressure for oil extraction and fish cake extrusion process. In operation, the gradually built-up pressure along the worm travel conveys, crushes, grinds, presses and squeezes oil out of the pre-heated fish into the oil outlet. The fish residue is also extruded out through the fish cake outlet inform of flakes. The extruder was tested and result showed a reasonable oil yield and extraction efficiency. It is Powered by a 5 hp single phase electric motor. The extruder have a production cost of ₦98,000.00 It is design to extract and recover about 80% chemical free oil from the whole body of the fish.
- Page(s): 122-126
- Date of Publication: 04 September 2018
- Ayuba A. BFish Product Development and Engineering Department, National Institute for Freshwater Fisheries Research, P.M.B 6006 New Bussa, Niger State Nigeria
- Amina I.M Fish Product Development and Engineering Department, National Institute for Freshwater Fisheries Research, P.M.B 6006 New Bussa, Niger State Nigeria
- Okouzi S.A Fish Product Development and Engineering Department, National Institute for Freshwater Fisheries Research, P.M.B 6006 New Bussa, Niger State Nigeria
- Olugenga B.OFish Product Development and Engineering Department, National Institute for Freshwater Fisheries Research, P.M.B 6006 New Bussa, Niger State Nigeria
References
[1]. Adesoji M. O., Kamaldeen A. Y., Adebayo L. W., and Kunle K. A. (2007). Design, development and testing of a screw press expeller for palm kernel oil extraction. Journal of Agricultural Engineering and Technology,56-59 [2]. Aidos I, van-der-Padt A, Boom RM, and Luten JB, 2003. Quality of crude fish oil extracted from herring by-products of varying states of freshness. Journal of Food Science. 68, 458-465. [3]. Brennan, J.G., Butters, J.R., Cowell, N.D and Lilly A.E.V (2003), Food Engineering Operations Second Edition, Published by Applied Science Publishing Limited, Lodon. [4]. Budynas, R.G. and Nisbeth, J.K. (2011). Shigley’s Mechanical Engineering Design Ninth Edition, McGraw-Hill Companies, Inc., New York. 1082p. [5]. European Food Safety Authority (EFSA), 2007. Scientific Opinion on Fish Oil for Human Consumption. The EFSA Journal 2010;8(10):1874 [6]. Khurmi R.S and J.K. Gupta (2011). A Textbook on Machine Design, Fourteenth Edition, Eurasia Publishing House (Pvt.) Ltd. Ram Nagar, New Delhi. 1230p. [7]. Ngwu E.O, Ayuba, A.B.., Adelowo, E.O., (2013). Design and fabrication of a Screw Press for fish oil extraction. National Institute for Freshwater Fisheries Research Annual Report pg 53-54 [8]. Olaniyan, A.M., and Oje, K.,(2007). Development of mechanical expression rig for dry extraction of shear butter from shear kernel. Journal of food Science and Technology, 44(5), 465-470 [9]. Pigot, G.M. (1967). Production of Fish Oil, In: "Fish Oils," M.E Stanby Edited. Avi Publishing Company, Westport, Connecticut, pp 183-192. [10]. Saravacos, G.D. and Kostaropoulos, A.E. (2002). Handbook of Food Processing Equipment. Springer Science+Business Media LLC, New York, 698p. [11]. Ullman (2010) The Mechanical Design Process, Fourth Edition McGraw-Hill Companies, Inc New York, 450p [12]. United Nation Development Organization (UNIDO) (1987), Small Scale Oil Extraction from Groundnut and Copra UNIDO Edition
Ayuba A. B, Amina I.M , Okouzi S.A and Olugenga B.O "Design and Fabrication of an Extruder for the Extraction of Fish Oil from Catfish" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.122-126 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/122-126.pdf
This study makes a systematic approach to gather information on teacher’s collaboration and its challenges in various educational institutions. This primary research tries to investigate the significance of teacher’s collaboration towards sustainable development of curriculum for the betterment of student learning process. The research was conducted to analyse various concept of teacher’s team and its vital importance to build a better future learning organization. The study concentrates on various key concepts like teaching pedagogies, institutional involvement in teacher’s team strategy, and teacher’s involvement in collaborative teaching methods. The study was conducted based on questionnaire.
- Page(s): 127-130
- Date of Publication: 06 September 2018
- Srikanth. KAssistant Professor, Department of Commerce and Management, Ramaiah Institute of Business Studies Bangalore, Karnataka, India
References
[1]. Book on Team Teaching: What, Why, and How? By Francis J. Buckley [2]. Murawski, W. W, & Hughes, C. E. (2009). Response to intervention, collaboration, and co-teaching: A logical combination for successful systemic change. Preventing School Failure [3]. Jones, F. and Harris, S. (2012). Benefits and drawbacks of using multiple instructors to teach a single course [4]. Austin, V.L. (2001). Teachers’ beliefs about co-teaching. Remedial and Special Education, 22, 245-255 [5]. Gerber, P.J., & Popp, P.a. (1999). Consumer perspectives on the collaborative teaching model. Remedial and Special Education, 20, 288-296. [6]. https://www.cultofpedagogy.com/co-teaching-push-in/
Srikanth. K "The Study on Role of Teacher’s Team in Sustainable Development of Curriculum in Educational Institution" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.127-130 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/127-130.pdf
In restructured Power System, building parts of arranging and activity must be reformulated in spite of the fact that basics thoughts stay same. With crisis of unmistakable characters of GENCO's, TRANSCO's, DISCO's, and the ISO's a considerable lot of the subordinate administrations of the vertically incorporated utility will have an alternate part to play and henceforth must be changed in an unexpected way. Among these, auxiliary administrations are, "The Automatic Generation Control (AGC)".An endeavor is made in this paper to exhibit basic writing audit and a cutting-edge and comprehensive list of sources on the AGC of a hydro Thermal system in deregulated condition. Different control viewpoints concerning the AGC issue have been featured.
- Page(s): 131-135
- Date of Publication: 07 September 2018
- R.GanesanAssistant Professor, Department of Electrical & Electronics Engineering, AAA College of Engineering and Technology, Sivakasi, Tamil Nadu, India
- S.Ramesh Professor & Head, Department of Electrical & Electronics Engineering, PSR Engineering College, Sivakasi, Tamil Nadu, India
References
[1]. "J. Nanda, M. L. Kothari, P. S. Satsangi, "Automatic Generation Control of an Interconnected Hydro-thermal system in Continuous and Discrete modes considering Generation Rate Constraints", IEE Proc., vol. 130, pt. D, No.1, Jan. 1983, pp 17-27. [2]. A.Demiroren, E.Yesil “Automatic Generation Control with fuzzy logic controllers in the power system including SMES units”, electric power and energy system, 26(2004) page 291-305 [3]. A.Demiroren, H.L.Zeynelgil, N.S.Sengor, “Application of ANN technique to load frequency control for three area power system” IEEE PTC,sept-2001 [4]. A.P Sakis Meliopoulos, G.J.Cokkinidesand A.G.Bakirtzis,” Load-Frequency Control Service in a Deregulated Environment”, Decision Support Systems 24(1999) 243-250. [5]. C. Concordia, L. K. Kirchmayer, "Tie-Line Power & Frequency Control of Electric Power Systems", AIEE Trans., vol. 72, part III, 1953, pp. 562-572. [6]. C. Concordia, L. K. Kirchmayer, "Tie-Line Power & Frequency Control of Electric Power Systems-Part II, AIEE Trans., vol. 73, part III-A, 1954, pp. 133-141. [7]. C. E. Fosha, O. I. Elgerd, "The Megawatt Frequency Control problem: A New Approach via Optimal Control Theory", IEEE Trans. on Power Apparatus and Systems, vol. PAS-89, No.4, Apr. 1970, pp. 563-574. [8]. D.G. Ramey, J. W. Skooglund, "Detailed Hydro governor representation for System stability Studies", IEEE Trans. on Power Apparatus and Systems, vol. PAS-89, No. Jan. 1970, pp. 106-112. [9]. Dr.N.Bekhouche,”Automatic Generation Control Before and after Deregulation” IEEE 2002 Page 321-323. [10]. F. R. Schleif, A. B. Wilbor, "The Co-ordination of Hydraulic Turbine Governors for Power System Operation," IEEE Trans. Power Apparatus and Systems, vol. PAS-85, No.7, Jul. 1966, pp. 750-758. [11]. V. Donde, M. A. Pai and I. A. Hiskens, "Simulation and Optimization in an AGC System after Deregulation", IEEE Transactions on Power Systems, Vol. 16, No.3, August 2001, pp 481-488. [12]. H. Shayeghi, H.A. Shayanfar and O.P. Malik,” Robust decentralized neural networks based LFC in regulated power system’’Electric Power Systems Research 19 Apr 2006. [13]. H.L.Zeynelgil, A.Demiroren, N.S.Sengor “Application of ANN technique to AGC for multi area system”, electric power and energy system, page 345-354 July-2001. [14]. IEEE Committee Report, "Dynamic Models for steam and Hydro Turbines in Power System Studies", IEEE Trans. Power Apparatus & systems, Nov.IDec. 1973, pp. 1904-1915. [15]. IEEE Committee Report, "IEEE Standard Definition of Terms for Automatic Generation Control of Electric Power Systems", IEEE Trans. Power Apparatus and Systems, vol. PAS-89, Jul. 1970, pp. 1358-1364. [16]. J. Kumar, Kah-Hoe Ng and G. Sheble, "AGC Simulator for Price-Based Operation: Part I", IEEE Transactions on Power Systems, Vo1.l2, No.2, May 1997,pp527-532 [17]. J. Kumar, Kah-Hoe Ng and G. Sheble, "AGC Simulator for Price-Based Operation: Part II", IEEE Transactions on Power Systems, Vol.12, No.2, May 1997, pp 533-538. [18]. J. Nanda, B. L. Kaul, "Automatic generation Control of an Interconnected Power System", IEE Proc., vol. 125, No.5, May 1978, pp. 385-391. [19]. L. Hari, M. L. Kothari, J. Nanda, "Optimum Selection of Speed Regulation Parameter for Automatic Generation Control in Discrete Mode considering Generation Rates Constraint", IEEE Proc., vol. 138, No.5, Sept 1991, pp. 401-406. [20]. L. K. Kirchmayer, "Economic Control of Interconnected Systems", John Wiley, New York, 1959. [21]. M. L. Kothari, B. L. Kaul, J. Nanda, "Automatic Generation Control of Hydro-Thermal system", Journals of Institute of Engineers (India), pt. EL-2, vol. 61, Oct. 1980, pp. 85-91. [22]. M. L. Kothari, J. Nanda, P. S. Satsangi, "Automatic Generation Control of Hydro-Thermal system considering Generation Rate Constraint", Journals of Institute of Engineers (India), pt. EL, vol. 63, June 1983, pp. 289-297. [23]. M. Leum, "The Development and Field Experience of a Transistor Electric Governor for Hydro Turbines," IEEE Trans. Power Apparatus & Systems, vol. PAS-85, Apr. 1966, pp. 393-402. [24]. Manoranjan Parida and J. Nandal’’ Automatic Generation Control of a Hydro-Thermal system in Deregulated Environment’’, Proceedings of the Eighth International Conference on Electrical Machines and Systems, vol 2,Septmeber 2005 , page 942-947. [25]. Nathan Cohn, "Control of Generation & Power Flow on an Interconnected Power Systems", John Wiley, New York, 2ndEdition, July 1971. [26]. Nathan Cohn, "Some Aspects of Tie-Line Bias Control on Interconnected Power Systems", AIEE Trans., vol. 75, Feb. 1957, pp. 1415-1436. [27]. O. I. Elgerd, C. E. Fosha, "Optimum Megawatt Frequency Control of Multi-area Electric Energy Systems", IEEE Trans. on Power Apparatus and Systems, vol. PAS-89, No.4, Apr. 1970, pp. 556-563. [28]. P. Kundur, "Power System Stability & Control," McGraw-Hill, New York, 1994, pp. 418-448. [29]. Power plant responses," IEEE Committee report, IEEE Trans. Power Apparatus & Systems, vol. PAS-86, Mar. 1967, pp. 384-395. [30]. Richard D. Christie, Anjan Bose, "Load Frequency Control Issues in Power System Operations after Deregulation", IEEE Transactions on Power Systems, V01.11, No.3, August 1996, pp 1191-1196. [31]. S.P.Ghoshal,” Application of GA/GA-SA based fuzzy automatic generation control of a multi-area thermal generating system”, Electric Power System Research 70 (2004) 115–127. [32]. S.P.Ghoshal,” Optimizations of PID gains by particle swarm optimizations in fuzzy based automatic generation control” , electric power and energy system, April 2004 page 203-212
R.Ganesan, S.Ramesh "Extended Literature Review of Automatic Generation Controller" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.131-135 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/131-135.pdf
Power outage is one thing that is not needed in the power system network both by the power supply company and the consumer. Efforts have been made by researchers to reduce occurrence of outage in any given power system to the barest minimum. This report presents another sincere contribution made in the form of minimization of power system outage using the fuzzy logic controller. The different kinds of faults which take place in the research area (Afikpo distribution network) were determined, the nature of outages in the research area was also determined. The research area was modeled using the “simpowersystem” of the Matlab/Simulink software. Then an effective monitoring system was modeled using fuzzy logic controller designed in Simulink. The effect of the fault monitoring was demonstrated using same software and results compared. Simulation results show that the fuzzy inference system effectively captured the fault condition and went into the appropriate output logic state within the normal simulated time for alarm.
- Page(s): 136-148
- Date of Publication: 07 September 2018
- Ogbuatu M. O.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwan, Ebonyi State, Nigeria
- Ekiokekeme K.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwan, Ebonyi State, Nigeria
- Egonwa B. O.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwan, Ebonyi State, Nigeria
- Ibiam N. I.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwan, Ebonyi State, Nigeria
- Abioye A. E.Department of Electrical/Electronic Engineering, Akanu Ibiam Federal Polytechnic, P.M.B. 1007, Unwan, Ebonyi State, Nigeria
References
[1]. Ohrstrom M. (2013), “Fast fault detection for power distribution systems”. [2]. Gupta J.B., (2013), “A course in power systems”, S.K. Kataria & sons. [3]. Kapadia S, (2010), “Faults classification in power system using microprocessor”,California state university, Sacramento. [4]. Greg C. (2012), Thesis in “Design and fault analysis of a 345kv 220 mile overhead transmission line” California State University, Sacramento. [5]. Ferreira K..J. (2007) “Fault Location for Power Transmission Systems Using Magnetic Field Sensing Coils”, unpublished Msc Thesis in Worcester Polytechnic Institute. [6]. Nguyen H. T, Nadipuram R. P, Carol L. W, Elbert A,Walker (1993), First Course in Fuzzy and Neural Control. Boca Raton, FL: Chapman & Hall/CRC. [7]. Jang J.S.R. and Sun C.T, (1995), “Neuro-fuzzy modeling and control, Proceedings of the IEEE. [8]. The MathWorks (2005), Fuzzy Logic Toolbox Available via: Online https://www.mathworks.com/products/fuzzylogic/ [9]. Aydin I.( 2008) “Artificial immune inspired fault detection algorithm based on fuzzy clustering and genetic algorithm methods” In CIMSA - IEEE Conference on Computational Intelligence for Measurement Systems and Applications Proceedings. [10]. Chen D. S, Ramasamy and Flinn D. G, (1995) “A Windows Based Graphical Package for Symmetrical Components Analysis”, IEEE Transactions on Power Systems. https://helios.acomp.usf.edu/~fehr/carson.pdf.
Ogbuatu M. O., Ekiokekeme K., Egonwa B. O., Ibiam N. I., Abioye A. E. "Minimization of Power System Outage Using Fuzzy Logic Control Mechanism" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.136-148 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/136-148.pdf
Image processing is a methodology to perform some operations on an image, so as to get enhanced image or to extract some helpful information from it. it's a sort of signal process during which input is an image and output could also be image or characteristics/features related to that image. Nowadays, image process is among apace growing technologies. It forms core research area among engineering and technology disciplines too.We have innovatively developed and implemented image process based mostly application using labview ni vision module. using vision module image acquisition, color transformation, edge detection and morphological operation are performed.
- Page(s): 149-154
- Date of Publication: 09 September 2018
- Anusha NellutlaAssistant Professor, ECE Dept., IARE Hyderabad, Telangana, India
References
[1]. IMAQ Vision Concepts Manual, 2002, National Instruments [2]. LabVIEW Advanced Programming Techniques, [3]. Bitter, Mohiuddin, and Nawrocki, 2001, CRC Press LLC [4]. LabVIEW Graphical Programming (2nd ed.), [5]. Gary W. Johnson, 1997, McGraw Hill [6]. LabVIEW Power Programming, Gary W. Johnson, 1998, McGraw Hill [7]. National Instruments Developer Zone, https://zone.ni.com [8]. National Instruments LabVIEW Zone, https://www.ni.com/devzone/lvzone [9]. Shape Analysis and ClassiÞcation, Luciano da Fontoura Costa and Roberto [10]. Marcondes Cesar Jr., 2001, CRC Press LLC [11]. The Engineering Handbook, Richard C. Dorf, 2003, CRC Press LLC [12]. The Image Processing Handbook (4th ed.), John C. Russ, 2002, CRC Press
Anusha Nellutla "Image Processing Techniques Using LabVIEW" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.7 issue 8, August 2018, pp.149-154 URL: www.ijltemas.in/DigitalLibrary/Vol.7Issue8/149-154.pdf