Archive

OTHER SOURCE

IJERD is now being indexed with Index Copernicus, Google Scholar, Informatics, ProQuest, Research Gate,
Docstoc, Scribd, UlrichWeb, Internet Archive
Academia.edu, Computer Science Directory, Wepapers, Geond, Auburn University, Aalborg University,
Queen’s University, Goethe University

IJERD Menu

IJERD Contents

IJERD Libraries

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Open Access

QR Code

ISO Certified

IJERD : Volume 12 - Issue 8

Version - 1 (August 2016)


Analiza Borongan- Calles

Influence of Math Comprehension Skills to the Problem Solving Performance in Solid Mensuration among Freshmen Students of Naval State University

  • Abstract
  • Keywords
  • Reference
  • Full Article
The study was conducted to determine the influence of math comprehension skills to the problemsolving performance in Solid Mensuration among freshmen students of Naval State University. The study used a researcher-made questionnaire. The questionnaire was administered to 50 student-respondents in their Solid Mensuration class. From the gathered data, frequency count and percentage distribution were used to analyze the students' profile, their level of performance in Math, their comprehension ability and Solid Mensuration performance. Female students dominated the student population of the Bachelor of Science in Information Management (BSIM) of Naval State University. All of the respondents graduated from the public high schools. The grades in Math 115 and Math 122 of the respondents fell under the grade level of 1.6 to 2.0. The grades of the respondents in English fell under the grade level of 1.6 to 2.0...............
Comprehension Skills; Performance in Mathematics; Problem Solving.
[1]. Gayrama, Vilma (2006). "Relationship between selected abilities and solving problems in college algebra among students in Biliran National Agricultural College: Basis for improved instruction" Unpublished Master's Thesis, Naval Institute of Technology, Naval, Biliran
[2]. Lambdin, D.V., Smith, N.L. Suydam, M.N.(2001).Helping children learn mathematics (6th ed.) NewYork: John Wiley.Retrieved on September 2009, from http.www.analyze math_problem/paper_7 html.
[3]. Mangco, Jesus Isaac. (2004). "Effectiveness of small-group instruction in teaching Mathematics to the Second Year Students of Almeria National High School" Unpublished Master Thesis , Naval institute of Technology, Naval ,Biliran.
[4]. Mendoza, Ronnie (2006). "Students scholastic performance in algebra across National High School in Western, Biliran" Naval Institute of Technology. Naval, Biliran.
Citation
Analiza Borongan- Calles "Influence of Math Comprehension Skills to the Problem Solving Performance in Solid Mensuration among Freshmen Students of Naval State University" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0002. Philippines
Page 15-21
Download
  

Abiyu Kerebo, Adane Desta, Ramesh Duraisamy

Removal of Methyl Violet from Synthetic Wastewater Using Nano Aluminium Oxyhydroxide

  • Abstract
  • Keywords
  • Reference
  • Full Article
Dyes are one of the pollutants and due to their toxicity, carcinogenesis and irreversible the environment and humans. Clean, safe and adequate fresh water is crucial to all living organism and normal functioning of ecosystems, communities and economics. Absorption is an economical and commonly method to uptake of dye. In this study, the nano scale aluminum oxyhydroxide (nano.AlOOH) is used to remove methyl violet from wastewater. Batch experiments were done to investigate the contact time, effect of pH, initial dye concentration and Langmuir isotherm models were used to describe the interaction between the adsorbate and adsorbent.
Dye, Pollutant, Wastewater, AlOOH nanoparticles, and Adsorption capacity.

[1]. Din,A.T.M., Hameed,B.H (2010) "Adsorption of methyl violet dye on acid modified activated carbon: isotherms and thermodynamics", Journal of Applied science in Environmental sanitation, Vol.5 (2) pp. 161-170.
[2]. Rafatullah,M. (2010) "Adsorption of methylene blue on low-cost adsorbents: A review", Journal of hazardous materials, Vol.177 (1-3) pp.70-80.

[3]. Hunger,K. (2003) "Industrial Dyes Chemistry, Properties, Applications", WILEY-VCH Verlag GmbH and Co., Weinheim.
[4]. Fu,Y., Viraraghavan, T. (2001) "Removal of C.I.acid blue 29 from an aqueous solution by Aspergillus niger", American Asso.of Textile Chemistry and Color Revised, Vol.1, pp.36-40.

Citation
Abiyu Kerebo, Adane Desta, Ramesh Duraisamy "Removal of Methyl Violet from Synthetic Wastewater Using Nano Aluminium Oxyhydroxide" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0003. Ethiopia
Page 22-28
Download
  

Varathan Selvaraja, Venugopal Rajendran

Synthesis of Diallyl Thioether under the Influence of Ultrasound Assisted Multi-Site Phase-Transfer Catalysis Condition – A Kinetic Study

  • Abstract
  • Keywords
  • Reference
  • Full Article
Allyl bromides afford the corresponding sulfide derivatives upon treatment with aqueous sodium sulfide under multi-site phase-transfer catalysts (MPTC) and ultrasound irradiation conditions. The use of phase-transfer catalysis and sonochemistry has been compared and demonstrated in these nucleophilic substitution reactions. The kinetics of reaction depends on the effect of amount of catalyst, agitation speed, quaternary ammonium salts, amount of sodium sulfide, amount of sodium hydroxide, organic solvents, temperature and frequency of the ultrasound waves on the conversion of allyl bromide was investigated in detail. A kinetic model was built from which a pseudo-first order rate law is sufficient to describe the behavior of the reaction. The observed peculiar phenomena were also explained satisfactorily.
Phase-transfer catalysis; Alloy bromide; ultrasound acceleration; Thioether.
[1]. Merk Index, 12th ed., Capman & Hall, New York, USA, 1996.
[2]. T.D. Shaffer, M.C. Kramer, Markromol. Chem. 191 (1990) 3157.
[3]. B. Boyer, A. Hambardzoumian, J.P. Roque, N. Beylerian, Tetrahedron. 56 (2000)303
[4]. G.D. Yadav, P.M. Bisht, Catal. Commun. 5 (2004) 259.
[5]. H.E.-S. Ali, Catal. Commun. 8 (2007) 46
Citation
Varathan Selvaraja, Venugopal Rajendran "Synthesis of Diallyl Thioether under the Influence of Ultrasound Assisted Multi-Site Phase-Transfer Catalysis Condition – A Kinetic Study" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0004. India
Page 29-37
Download
  

Edgardo S. Geniston, Noel P. Tancinco

Association of Mathematical Ability And Reading Comprehension to the Chemistry Performance of Bachelor of Science Criminology Students of Naval State University, Naval, Biliran Province

  • Abstract
  • Keywords
  • Reference
  • Full Article
The study was conducted to determine the association of mathematical ability and reading comprehension skills to the chemistry performance of BS Criminology students of Naval Institute of Technology. Utilizing the descriptive-correlation method, 120 respondents in Chemistry class were involved as subjects of this study. Male students dominated the student population of the BS Criminology of Naval Institute of Technology. Most of them graduated from public high school. More than one-fourth of their fathers were farmers and about three-fourth of their mothers were housekeepers. Their family's mean income posted at Php 6,355.83. The time spent by students in studying chemistry per day was less than an hour. Their average grades in Mathematics and English fell under the grade level of 2.1 to 2.5..............
Chemistry Performance; Mathematical Ability; Reading Comprehension
[1]. Alegria, Blessilda M. (2007). The Modern Teacher, p.94.
[2]. Julian, Erlinda S. (2000). Improving Reading Comprehension, p.229.
[3]. Pascual, Catalina E. (2000). Developing Comprehension Skills Among Elementary Pupils, p.226.
[4]. Salazar, E.S. (1986). Skill Builders for Efficient Reading, Quezon City: Phoenix Publishing House, Inc., 1986
[5]. Talamayan, Aida B. (2000). Graphic Organizers Enhance Reading Comprehension. The Modern Teacher, p.233.
Citation
Edgardo S. Geniston, Noel P. Tancinco "Association of Mathematical Ability And Reading Comprehension to the Chemistry Performance of Bachelor of Science Criminology Students of Naval State University, Naval, Biliran Province" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0005. Philippines
Page 38-45
Download
  

Israt Jahan, Kangkhita Keam Psyche, Mithun Dutta

An Off-line E-Cash Scheme based on Group Blind Signature Scheme

  • Abstract
  • Keywords
  • Reference
  • Full Article
In this paper we have described the signature scheme inwhich an individual can sign a document ormessage onbehalf of entire group. Here, a group blind signaturescheme has been proposed. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension of Camenisch and Stadler'sGroup Signature Scheme [12] that adds the blindness property.One important requirement of electronic cash systems is the anonymity of customers.Unconditional anonymity is also very well suited to support criminals inblackmailing...........
Anonymity, blackmail, group blind signaturescheme
[1]. IsratJahan, MohammadZahidurRahman, and Md. GolamMoazzem. Review of anonymous electronic payment system. Journal of Electronics and computer science, 2:35-39, 2003.
[2]. Olivier Blazy, Georg Fuchsbauer, David Pointcheval and Damien Vergnaud, Short Blind Signatures, Journal of Computer Security, Volume 21, Number 5, pages 627-661. 2013.
[3]. Girraj Kumar Verma, Probable Security Proof of a Blind Signature Scheme over Braid Groups, International Journal of Network Security, Vol.12, No.2, PP.118{120, Mar. 2011.
[4]. Y.-M. Tseng, T.-Y.Wu and J.-D. Wu, An efficient and provably secure id-based signature scheme with batch verifications, International Journal of Innovative Computing, Information and Control, vol.5, no.11(A), pp.3911-3922, 2009.
[5]. J. S. Chou, Y. Chen, M. H. Cho and H. M. Sun, A novel id-based electronic cash system from pairings, Cryptology–PrintArchive, Report 2009/339, 2009.
Citation
Israt Jahan, Kangkhita Keam Psyche, Mithun Dutta "An Off-line E-Cash Scheme based on Group Blind Signature Scheme" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0006. Bangladesh
Page 46-53
Download
  

M. Anupama Reddy, D. Anjaneyulu, D. Prasanth Varma, G. Rama Rao

WSN in IOT Environment Interfacing with Smart Sensors Using Arm7 with Zigbee for Industries

  • Abstract
  • Keywords
  • Reference
  • Full Article
A sensor interface device is essential for sensor data collection of industrial wireless sensor networks (WSN) in IoT environments. The Internet of Things (IoT) environment, each sensor connected to the device is required to write complicated and cumbersome data collection program code. In the proposed method we overcome the drawback present in existing system by using wireless sensor network. We are designed a system by using ARM 32-bit micro controller which supports different features and algorithms for the development of industrial automation systems. Using ARM controller we can connect all types of sensors and we can connect 8 bit microcontroller based sensor network to ARM controller using different wireless technology called Zigbee. Many open source libraries and tools are available for ARM-Linux wireless sensor network development and controlling. We can monitor and control the wireless sensor network remotely using internet and web server.
ZigBee, Internet of Things (IOT), ARM7, Temperature, Gas, Light Sensors, sensor data acquisition.
[1]. S. Li, L. Xu, X. Wang, and J. Wang, "Integration of hybrid wireless networks in cloud services oriented enterprise information systems,"Enterp. Inf. Syst., vol. 6, no. 2, pp. 165–187, 2012.
[2]. Q. Li, Z. Wang, W. Li, J. Li, C. Wang, and R. Du, "Applications integration in a hybrid cloud computing environment: Modelling and platform," Enterp. Inf. Syst., vol. 7, no. 3, pp. 237–271, 2
[3]. Gang Zhao" Wireless Sensor Networks for Industrial Process Monitoring and control : A Survey Network Protocol and Algorithms, ISSN 1943-3581 2011,Vol.3,No.1"
[4]. M. T. Lazarescu, "Design of a WSN platform for long-term environmental monitoring for IoT applications," IEEE J. Emerg. Sel. Topics Circuits Syst., vol. 3, no. 1, pp. 45–54, Mar. 2013.
Citation
M. Anupama Reddy, D. Anjaneyulu, D. Prasanth Varma, G. Rama Rao "WSN in IOT Environment Interfacing with Smart Sensors Using Arm7 with Zigbee for Industries" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0007. India
Page 54-60
Download
  

P. Maninder, S. Ravibabu

Experimental Investigation of Natural Convection Heat Transfer Along A Vertical Cylinder Using (Water + Ethylene Glycol) Fluids

  • Abstract
  • Keywords
  • Reference
  • Full Article
In the present study, the enhancement of natural convection heat transfer of Water, and mixture of (Water + Ethylene Glycol) fluids in a vertical Aluminium square enclosure has been experimentally investigated by placing the vertical cylindrical heating element in a stationary test fluid. The uniform heat flux has been has been applied to the large L/D ratio that has been performed in this experiment. The temperature distribution along the surface of the heating element has been recorded with respect to time within the uniform heat flux at different heat generation rates. The preparation of the fluid is done by mixing 3 litres of water with 1 litre of Ethylene Glycol, i.e, in the proportion of (75:25)............
Natural convection heat transfer, Temperature distribution, Heat transfer coefficient, Nusselt number, Raleigh number, Grashof number, Fluids, Water, (Water + Ethylene Glycol).
[1]. M. ARSHAD, M. H. INAYAT and I.R. CHUGHTAI, "HEAT TRANSFER THROUGH VERTICAL CYLINDER IN A STATIONARY FLUID", Journal Name: Pakistan Atomic Energy Commission, The Nucleus, Volume No: 49(3), 2009, PP: 1-5.
[2]. Zi-Tao Yu, Wei Wang , Xu Xub, Li-Wu Fan c, Ya-Cai Hu, Ke-Fa Cen, "A numerical investigation of transient natural convection heat transfer of aqueous nanofluids in a differentially heated square cavity", Journal Name : International Communications in Heat and Mass Transfer, Volume No: 38, 2011, PP: 585–589, ELSEVIER.
[3]. Mahmoud Reza Khadangi Mahrood, Seyed Gholamreza Etemad, Rouhollah Bagheri, "Free convection heat transfer of non Newtonian nanofluids under constant heat flux condition", Journal Name: International Communications in Heat and Mass Transfer, Volume No: 38, 2011, PP: 1449–1454, ELSEVIER.
[4]. Feng-Hsiang Lai, Yue-Tzu Yang, "Lattice Boltzmann simulation of natural convection heat transfer of Al2O3/water nanofluids in a square enclosure", Journal Name: Thermal Sciences, Volume No: 50, 2011, PP: 1930-1941, ELSEVIER.
Citation
P. Maninder, S. Ravibabu "Experimental Investigation of Natural Convection Heat Transfer Along A Vertical Cylinder Using (Water + Ethylene Glycol) Fluids" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0008. India
Page 61-69
Download
  

Homer Ricacho Ampong, Andrew M. Curso, Noel P. Tancinco

Managing Network Resources Over Wireless Device

  • Abstract
  • Keywords
  • Reference
  • Full Article
This study was focused on discovering an innovative way of developing a network management solution that will utilize wireless remote control through Internet. These wireless devices offer great connectivity that other types of devices cannot offer. In this study, a wireless technique is devised to implement a monitoring system by using Java – based client/server applications. In order for this device to support the ava application programs, a Mobile Information Device Profile (MIDP) is implemented. The MIDP is a profile defined specifically for the wireless devices that is implemented on top of a Connection Limited Device Configuration (CLDC) defined for handheld devices...........
Network Management; Network Operating System; Wireless Device.
[1]. Gueco, W. C. C., Villorente, D. F., Larin, L.R., Mendoza, R.C., Olesco, R.O, "Next Generation Internet in the Philippines (2001): The Philippine Research Education & Government Information Network (PREGINET)," Philippine Journal of ICT and Microelectronics, 2001.
[2]. Byers, S., Kormann, D., "Access Point Mapping," Communications of the ACM, May, 2003.
[3]. Goff, M, "A Historical Look at Java's Emerging Role in the Changing System and Network Management: Java in the Management, Part 1," http://www.javaworld.com.,1999.
[4]. "Common Information Model (CIM) Specification v2.2 (2002)", http://www.dmtf.org/standards/cim_spec_v22/, 2002, August 22.
[5]. Feng, Y., "Network Programming with J2ME Wireless Devices (2000)," http://www.wirelessdevnet.com/channel/java/features/j2me_http.phtml, 2002, August 15.
Citation
Homer Ricacho Ampong, Andrew M. Curso, Noel P. Tancinco "Managing Network Resources Over Wireless Device" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0009. Philippines
Page 70-85
Download
  

Version - 2 (August 2016)

  

Anup Parag Bhave, Deepa A. Joshi

A Review Paper on Earned Value Analysis

  • Abstract
  • Keywords
  • Reference
  • Full Article
Earned value is the measurement of work. It is used to evaluate the progress of a project based on the cost of work performed up to the project status date. The earned value calculation enables to conduct comparative study of original cost estimate and the actual cost. This helps in evaluating economic status of the project. Despite of having various benefits, the earned value analysis (EVA) is not being used in India extensively as compared to developed countries. A detailed review on application of EVA has been presented in this paper.
Earned value analysis; cost; project management; performance measurement; cost control.
[1]. Agata Czarnigowska (2008). "Earned value method as a tool for project control." Budownictwo i Architektura 3 (2008) 15-32.
[2]. Anbari F. T. (2003). "Earned value project management methods and extension." Project Manage. J., 34(4),
12–23. ANSI. (1999). ANSI/EIA-748 guidelines on earned value management, Washington, DC.
[3]. Anning Liu, Xingzhen Ren, Yihao Xu, Xuefeng Chen (2015). "Study on Construction Project Cost Control Based on Lean Construction Thought." 2nd International Conference on Education, Management and Information Technology (ICEMIT 2015).
[4]. Bhosekar S. K. & Vyas G. (2012). "Cost Controlling Using Earned Value Analysis in Construction Industries." International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 4, April 2012.
Citation
Anup Parag Bhave, Deepa A. Joshi "A Review Paper on Earned Value Analysis" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0001. India
Page 01-03
Download
  

Seena R Subhagan, Dr. D. Dhalin, Dipak S. Khtatawka

Comparative Evaluation of Electrostatic Sprayer with Powered Mist Blower

  • Abstract
  • Keywords
  • Reference
  • Full Article
Theknapsack mist blower is one of the most popular and versatile pesticide application equipment in India due to its simplicity, ease of operation and inexpensiveness. However these sprayers have to overcome certain constraints like low deposition efficiency, poor distribution and low penetration into dense plant canopy. The introduction of electrostatic sprayer could overcome these lacunas with its application efficiency by about 80% with 50% less spray chemical ingredients. Both the sprayers were evaluated for comparative assessment of performance both under laboratory and filed conditions. The evaluation was done for deposition efficiency and biological efficacy............
Deposition efficiency, Electrostatic spraying, Mist blower, Air assisted sprayer.
[1]. Allen, J.G., A.P. Smith, D.J. Bult and T.M. Warman. 1991. Improving performance of mist blower sprayers by electrostatic spraying. Proceedings of a symposium organized by a British crop production council and the association of applied biologists, Swansea, UK. 46: 143-150.
[2]. Bindra, O.S. and Harcharan Singh. 1971. Pesticide application equipment. Published by Mohan Primlani, Oxford and IBH Publishing Co., Delhi, pp 61-157.
[3]. Derksen, R.C., Saji and J. Sanderson. 1991. Green house liquid applicator performance evaluations. Paper- ASAE, No. 91-1026, pp 16.
[4]. Durairaj, C.D. 1994. Development of an electrostatic spinning disk sprayer.Indian Journal of Plant Protection., 24(1-2): 139-141.
Citation
Seena R Subhagan, Dr. D. Dhalin, Dipak S. Khtatawkar "Comparative Evaluation of Electrostatic Sprayer with Powered Mist Blower" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0002. India
Page 04-11
Download
  

Rinky Ahuja, Kiran Khatter

An Efficient Biometric Multimodal Fingerprint and Iris using an SVM Classifier and Adaptive Neuro Fuzzy Inference System (ANFIS)

  • Abstract
  • Keywords
  • Reference
  • Full Article
ecent times witnessed much advancement in the field of biometric and multimodal biometric fields. This is typically observed in the area, of security, privacy, and forensics. Even for the best of unimodal biometric systems, it is often not possible to achieve a higher recognition rate. Fusion of matching scores of multiple biometric traits is becoming more and more prevalent and is a very likely approach to boost the system's accuracy. The finger print and iris are among the most promising biometric authentication that can accurately identify and analysis a person as their unique qualities can be rapidly extracted during the recognition process. This biometric recognition and verification often deals with non-ideal scenarios such as faint images, off-angles, reflections, expression changes
Biometric recognition, ANFIS, SIFT, Support Vector Machine (SVM), Hamming Distance.
[1]. S. Soviany and M. Jurian, ―Multimodal biometric securing methods for informatic systems,‖ inProceedings of the 34th International Spring Seminar on Electronic Technology, pp. 12–14, Phoenix, Ariz, USA, May 2011. View at Publisher · View at Google Scholar · View at Scopus
[2]. S. Soviany, C. Soviany, and M. Jurian, ―A multimodal approach for biometric authentication with multiple classifiers,‖ in International Conference on Communication, Information and Network Security, pp. 28–30, 2011.
[3]. T. C. Mota and A. C. G. Thomé, ―One-against-all-based multiclass svm strategies applied to vehicle plate character recognition,‖ in IEEE International Joint Conference on Neural Networks (IJCNN '09), pp. 2153–2159, New York, NY, USA, June 2009. View at Publisher · View at Google Scholar · View at Scopus
[4]. R. Brunelli and D. Falavigna, ―Person identification using multiple cues,‖ IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 10, pp. 955–966, 1995. View at Publisher · View at Google Scholar · View at Scopus
Citation
Rinky Ahuja, Kiran Khatter "An Efficient Biometric Multimodal Fingerprint and Iris using an SVM Classifier and Adaptive Neuro Fuzzy Inference System (ANFIS)" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0003. India
Page 12-26
Download
  

Hyun Kwon, Yongchul Kim

Intrusion Tolerance System Using VM Balancing In Virtual Environments

  • Abstract
  • Keywords
  • Reference
  • Full Article
Computing systems that provide useful services to clients are connected to the Internet. Unfortunately, there are malicious clients who make them susceptible to attacks. Even though security solutions such as an intrusion prevention or firewall can be used to protect such attacks, it is not always possible to defend systems against attacks completely. The studies on intrusion tolerant system (ITS) have been proposed to maintain the proper services in threatening environments. In this paper, we propose an ITS using VM balancing scheme which can balance online virtual machines within each of hosts. The proposed method reduces the damage of VM escape that allows an attack to move from one virtual machine to another virtual machine in a host. By this method, the proposed scheme can guarantee the minimum of services to clients, even under malicious intrusion such as VM escape.
Intrusion Tolerance System, VM balancing, SCIT (Self Cleansing Intrusion Tolerance), VM

[1]. Kwon, Ohmin, et al, "A Survey on Intrusion-Tolerant System," Korea Computer Congress 2012, 2012.
[2]. Q. Nquyen, and A. Sood, "Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerance System,"Portugal : 3rd Workshop on Recent Advances in Intrusion Tolerance System, 2009.
[3]. Kanika, "Analysis of Virtualization : Vulnerabilities and Attack over the Virtualized Cloud Computing," International Association of Scientific Innovation and Research (IJETCAS), 2014.
[4]. Wilcox Jr, "Dynamic load balancing of virtual machines hosted on Xen," Master's Thesis. USA : Brigham Young
University, 2009.

[5]. Rodrigo N. Calheiros, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. Exper. p 23–50, 2011

Citation
Hyun Kwon, Yongchul Kim "Intrusion Tolerance System Using VM Balancing In Virtual Environments" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0004. South Korea
Page 27-33
Download
  

Fatima Qureshi, Dr. Irfana Memon, Fayyaz Ahmed Memon, Safia Amir Dahri, Farida Memon

A study on image detection techniques

  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper presents the detailed study of image detection techniques such as SIFT, SURF, FAST, BRISK, HARRIS, & Min.Eigen. Image detection techniques are widely used in today's world for various applications such as monitoring and security purpose. These techniques allow image detection in the simple, cluttered, rotated, and scaled by retaining some useful or most important features. Feature extraction is used to find the correspondence between two images of same scene. In this way, the technique can detect the image properly even in case of rotation, scaling, translation & illumination changes. This paper will help new researchers to understand image detection techniques and propose new image detection technique.
Image detection, SIFT, SURF, FAST, BRISK, HARRIS, Min.Eigen.

[1]. Corner_detection. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Corner_detection
[2]. Blob_detection. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Blob_detection
[3]. Edge Detection. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Edge_detection
[4]. Lowe, D. G., "Object Recognition from Local Scale-Invariant Features", International Conference on
[5]. Computer Vision, pp. 1150-1157, 1999.

Citation
Fatima Qureshi, Dr. Irfana Memon, Fayyaz Ahmed Memon, Safia Amir Dahri, Farida Memon "A study on image detection techniques" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0005. South Korea
Page 34-39
Download
  

Dr.(Prof.) V.C.A. Nair

An Arm-Chair Philosophy from a Physicist

  • Abstract
  • Keywords
  • Reference
  • Full Article
The introduction in the paper gives a good insight on the summary of the paper. Topics mainly from Physics and few from general are taken at random and their relevance to Physics and philosophy are discussed. A physicist should necessarily read between the lines of the paper and even a non-physicist can have a general reading as matter is given in a popular style at many places. The last topic in the paper is "Rudiments of Veda and Vedic Science.
This Research Paper not being focused on a particular subject or topic, the key wordsare many and hence not included

.....................................................

Citation
Dr.(Prof.) V.C.A. Nair "An Arm-Chair Philosophy from a Physicist" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0006. India
Page 40-55
Download
  

Merlin Thomas, Sagar P. Patel, Ankit V. Patel, Jigar V. Patel

A Comparative Study on the Efficiency of Koh Impregnated and H3PO4 Impregnated Jackfruit Leaf Based Carbon as Adsorbent for Removal of Ni from Its Aqueous Solution

  • Abstract
  • Keywords
  • Reference
  • Full Article
This research work investigates the efficiency of H3PO4and KOH impregnated jackfruit leaf powder based carbon as adsorbent to remove Ni from wastewater. The removal characteristics of Nickel using both the adsorbents were investigated under various operating variables like contact time, adsorbent dosage, initial metal concentration, solution pH, temperature and stirring speed. The results showed that the H3PO4impregnated jackfruit leaf powder based carbon is a better adsorbent than the KOH impregnated adsorbent. The experimental results were found to fit well with langmuirand freundlich isotherms.The maximum adsorption capacity of theH3PO4impregnated adsorbentwas found to be 62.98 mg/g and that of the KOH impregnated adsorbent to be 54.66 mg/g.
Ni, adsorption, Jackfruit leaf powder, adsorption isotherm.

[1]. Abollino O, Aceto M, Malandrino M, Sarzanini C, Mentasti E "Adsorption of heavy metals on Na-ontmorillonite. Effect of pH and organic substances'. Water Res 37(7),2003,1619-27. doi:10.1016/S0043-1354(02)00524-9
[2]. Ahmadpour A, Do DD " The preparation of activated carbon from macadamia nutshell by chemical activation". Carbon 35(12),1997,1723-32.
[3]. Aksu Z, Kutsal T" Abioseparation process for removing lead(II) ions from waste water by using Chlorella vulgaris". J. Chem. Technol. Biotechnol 52,1991,109–118. doi:10.1002/jctb.v52.
[4]. Aworn A, Thiravetyan P, Nakbanpote W " Preparation of CO2 activated carbon from corncob for monoethylene glycol adsorption". Colloids and Surfaces A: Physicochemical and Engineering Aspects 333(1),2009,19-25. oi:10.1016/j.colsurfa.2008.09.021
[5]. Azevedo DC, Araujo JC, Bastos-Neto M, Torres AE, Jaguaribe EF, Cavalcante CL " Microporous activated carbon prepared from coconut shells using chemical activation with zinc chloride". Microporous and Mesoporous Mater 00(1),2007,361-4. doi:10.1016/j.micromeso.2006.11.024.

Citation
Merlin Thomas, Sagar P. Patel, Ankit V. Patel, Jigar V. Patel "A Comparative Study on the Efficiency of Koh Impregnated and H3PO4 Impregnated Jackfruit Leaf Based Carbon as Adsorbent for Removal of Ni from Its Aqueous Solution" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0006. India
Page 56-65
Download
  

Richa Chauhan, M. Zahid Alam

High Speed Area Efficient 2×2 And 3×3 Fast Parallel FIR Filter Using Kogge-Stone Adder

  • Abstract
  • Keywords
  • Reference
  • Full Article
In the advanced digital technology the need is of high speed in real time system along with the improvement in implementation issue. Vedic Multipliers has been used to solve the typical and tedious engineering calculation by simple Vedic methods. Here in this paper we have proposed 2x2 and 3x3 parallel FIR filter with kogge stone adders replacing the traditional carry select adder The Vedic multiplier has also been designed using this Kogge-stone adder to improve the propagation delay time and area on silicon chip. With this slight improve in the multiplier, great results have been achieved in signal processing tasks. The VM has been designed for the target device XC3S400 -5 PQ208.
.................................

[1]. Shahnam Mirzaei, Anup Hosangadi, Ryan Kastner, "FPGA Implementation of High Speed FIR Filters
Using Add and Shift Method", 1-4244-9707-X/06/$20.00@2006 IEEE.
[2]. Amina Naaz.S, Mr.Pradeep M.N, Satish Bhairannawar and Srinivas halvi, "FPGA Implementation Of High Speed Vedic Multiplier using CSLA For Parallel Fir Architecture", 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS).
[3]. Laxman P.Thakre, Suresh Balpande, Umesh Akare, Sudhir Lande, "Performance Evaluation and Synthesis of Multiplier used in FFT operation using Conventional and Vedic algorithms," Third international conference on emerging trends in Engineering and Technology , IEEE, 2010.
[4]. S. S. Kerur, Prakash Narchi, Jayashree C N, Harish M Kittur and Girish V. A., "Implementation of Vedic Multiplier for Digital Signal Processing," International Conference on VLSI ,Communication& Instrumentation (ICVCI), 2011

Citation
Richa Chauhan, M. Zahid Alam "High Speed Area Efficient 2×2 And 3×3 Fast Parallel FIR Filter Using Kogge-Stone Adder" published at International Journal of Engineering Research and Development, Volume 12, Issue 8 (August 2016)
MID 1208.067X.0007. India
Page 66-71
Download