Abiyu Kerebo, Adane Desta, Ramesh Duraisamy |
Removal of Methyl Violet from Synthetic Wastewater Using Nano Aluminium Oxyhydroxide |
Dyes are one of the pollutants and due to their toxicity, carcinogenesis and irreversible the environment and humans. Clean, safe and adequate fresh water is crucial to all living organism and normal functioning of ecosystems, communities and economics. Absorption is an economical and commonly method to
uptake of dye. In this study, the nano scale aluminum oxyhydroxide (nano.AlOOH) is used to remove methyl violet from wastewater. Batch experiments were done to investigate the contact time, effect of pH, initial dye concentration and Langmuir isotherm models were used to describe the interaction between the adsorbate and adsorbent.
Dye, Pollutant, Wastewater, AlOOH nanoparticles, and Adsorption capacity.
[1]. Din,A.T.M., Hameed,B.H (2010) "Adsorption of methyl violet dye on acid modified activated carbon: isotherms and thermodynamics", Journal of Applied science in Environmental sanitation, Vol.5 (2) pp. 161-170. [3]. Hunger,K. (2003) "Industrial Dyes Chemistry, Properties, Applications", WILEY-VCH Verlag GmbH
and Co., Weinheim. |
Varathan Selvaraja, Venugopal Rajendran |
||||||||
Synthesis of Diallyl Thioether under the Influence of Ultrasound Assisted Multi-Site Phase-Transfer Catalysis Condition – A Kinetic Study |
||||||||
Allyl bromides afford the corresponding sulfide derivatives upon treatment with aqueous sodium sulfide under multi-site phase-transfer catalysts (MPTC) and ultrasound irradiation conditions. The use of phase-transfer catalysis and sonochemistry has been compared and demonstrated in these nucleophilic substitution reactions. The kinetics of reaction depends on the effect of amount of catalyst, agitation speed, quaternary ammonium salts, amount of sodium sulfide, amount of sodium hydroxide, organic solvents, temperature and frequency of the ultrasound waves on the conversion of allyl bromide was investigated in detail. A kinetic model was built from which a pseudo-first order rate law is sufficient to describe the behavior of the reaction. The observed peculiar phenomena were also explained satisfactorily.
Phase-transfer catalysis; Alloy bromide; ultrasound acceleration; Thioether.
[1]. Merk Index, 12th ed., Capman & Hall, New York, USA, 1996. [2]. T.D. Shaffer, M.C. Kramer, Markromol. Chem. 191 (1990) 3157. [3]. B. Boyer, A. Hambardzoumian, J.P. Roque, N. Beylerian, Tetrahedron. 56 (2000)303 [4]. G.D. Yadav, P.M. Bisht, Catal. Commun. 5 (2004) 259. [5]. H.E.-S. Ali, Catal. Commun. 8 (2007) 46
|
||||||||
Edgardo S. Geniston, Noel P. Tancinco |
||||||||
Association of Mathematical Ability And Reading Comprehension to the Chemistry Performance of Bachelor of Science Criminology Students of Naval State University, Naval, Biliran Province |
||||||||
The study was conducted to determine the association of mathematical ability and reading comprehension skills to the chemistry performance of BS Criminology students of Naval Institute of Technology. Utilizing the descriptive-correlation method, 120 respondents in Chemistry class were involved as subjects of this study. Male students dominated the student population of the BS Criminology of Naval Institute of Technology. Most of them graduated from public high school. More than one-fourth of their fathers were farmers and about three-fourth of their mothers were housekeepers. Their family's mean income posted at Php 6,355.83. The time spent by students in studying chemistry per day was less than an hour. Their average grades in Mathematics and English fell under the grade level of 2.1 to 2.5..............
Chemistry Performance; Mathematical Ability; Reading Comprehension
[1]. Alegria, Blessilda M. (2007). The Modern Teacher, p.94. [2]. Julian, Erlinda S. (2000). Improving Reading Comprehension, p.229. [3]. Pascual, Catalina E. (2000). Developing Comprehension Skills Among Elementary Pupils, p.226. [4]. Salazar, E.S. (1986). Skill Builders for Efficient Reading, Quezon City: Phoenix Publishing House, Inc., 1986 [5]. Talamayan, Aida B. (2000). Graphic Organizers Enhance Reading Comprehension. The Modern Teacher, p.233.
|
||||||||
Israt Jahan, Kangkhita Keam Psyche, Mithun Dutta |
An Off-line E-Cash Scheme based on Group Blind Signature Scheme |
In this paper we have described the signature scheme inwhich an individual can sign a document ormessage onbehalf of entire group. Here, a group blind signaturescheme has been proposed. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension of Camenisch and Stadler'sGroup Signature Scheme [12] that adds the blindness property.One important requirement of
electronic cash systems is the anonymity of customers.Unconditional anonymity is also very well suited to support criminals inblackmailing...........
Anonymity, blackmail, group blind signaturescheme
[1]. IsratJahan, MohammadZahidurRahman, and Md. GolamMoazzem. Review of anonymous electronic payment system. Journal of Electronics and computer science, 2:35-39, 2003.
[2]. Olivier Blazy, Georg Fuchsbauer, David Pointcheval and Damien Vergnaud, Short Blind Signatures, Journal of Computer Security, Volume 21, Number 5, pages 627-661. 2013. [3]. Girraj Kumar Verma, Probable Security Proof of a Blind Signature Scheme over Braid Groups, International Journal of Network Security, Vol.12, No.2, PP.118{120, Mar. 2011. [4]. Y.-M. Tseng, T.-Y.Wu and J.-D. Wu, An efficient and provably secure id-based signature scheme with batch verifications, International Journal of Innovative Computing, Information and Control, vol.5, no.11(A), pp.3911-3922, 2009. [5]. J. S. Chou, Y. Chen, M. H. Cho and H. M. Sun, A novel id-based electronic cash system from pairings, Cryptology–PrintArchive, Report 2009/339, 2009. |
M. Anupama Reddy, D. Anjaneyulu, D. Prasanth Varma, G. Rama Rao |
||||||||
WSN in IOT Environment Interfacing with Smart Sensors Using Arm7 with Zigbee for Industries |
||||||||
A sensor interface device is essential for sensor data collection of industrial wireless sensor
networks (WSN) in IoT environments. The Internet of Things (IoT) environment, each sensor connected to the device is required to write complicated and cumbersome data collection program code. In the proposed method we overcome the drawback present in existing system by using wireless sensor network. We are designed a system by using ARM 32-bit micro controller which supports different features and algorithms for the development of industrial automation systems. Using ARM controller we can connect all types of sensors and we can connect 8 bit microcontroller based sensor network to ARM controller using different wireless technology called Zigbee. Many open source libraries and tools are available for ARM-Linux wireless sensor network development and controlling. We can monitor and control the wireless sensor network remotely using internet and web server.
ZigBee, Internet of Things (IOT), ARM7, Temperature, Gas, Light Sensors, sensor data acquisition.
[1]. S. Li, L. Xu, X. Wang, and J. Wang, "Integration of hybrid wireless networks in cloud services oriented enterprise information systems,"Enterp. Inf. Syst., vol. 6, no. 2, pp. 165–187, 2012. [2]. Q. Li, Z. Wang, W. Li, J. Li, C. Wang, and R. Du, "Applications integration in a hybrid cloud computing environment: Modelling and platform," Enterp. Inf. Syst., vol. 7, no. 3, pp. 237–271, 2 [3]. Gang Zhao" Wireless Sensor Networks for Industrial Process Monitoring and control : A Survey Network Protocol and Algorithms, ISSN 1943-3581 2011,Vol.3,No.1" [4]. M. T. Lazarescu, "Design of a WSN platform for long-term environmental monitoring for IoT applications," IEEE J. Emerg. Sel. Topics Circuits Syst., vol. 3, no. 1, pp. 45–54, Mar. 2013.
|
||||||||
P. Maninder, S. Ravibabu |
||||||||
Experimental Investigation of Natural Convection Heat Transfer Along A Vertical Cylinder Using (Water + Ethylene Glycol) Fluids |
||||||||
In the present study, the enhancement of natural convection heat transfer of Water, and mixture of (Water + Ethylene Glycol) fluids in a vertical Aluminium square enclosure has been experimentally investigated by placing the vertical cylindrical heating element in a stationary test fluid. The uniform heat flux has been has been applied to the large L/D ratio that has been performed in this experiment. The temperature distribution along the surface of the heating element has been recorded with respect to time within the uniform heat flux at different heat generation rates. The preparation of the fluid is done by mixing 3 litres of water with 1 litre of Ethylene Glycol, i.e, in the proportion of (75:25)............
Natural convection heat transfer, Temperature distribution, Heat transfer coefficient, Nusselt number, Raleigh number, Grashof number, Fluids, Water, (Water + Ethylene Glycol).
[1]. M. ARSHAD, M. H. INAYAT and I.R. CHUGHTAI, "HEAT TRANSFER THROUGH VERTICAL CYLINDER IN A STATIONARY FLUID", Journal Name: Pakistan Atomic Energy Commission, The Nucleus, Volume No: 49(3), 2009, PP: 1-5. [2]. Zi-Tao Yu, Wei Wang , Xu Xub, Li-Wu Fan c, Ya-Cai Hu, Ke-Fa Cen, "A numerical investigation of transient natural convection heat transfer of aqueous nanofluids in a differentially heated square cavity", Journal Name : International Communications in Heat and Mass Transfer, Volume No: 38, 2011, PP: 585–589, ELSEVIER. [3]. Mahmoud Reza Khadangi Mahrood, Seyed Gholamreza Etemad, Rouhollah Bagheri, "Free convection heat transfer of non Newtonian nanofluids under constant heat flux condition", Journal Name: International Communications in Heat and Mass Transfer, Volume No: 38, 2011, PP: 1449–1454, ELSEVIER. [4]. Feng-Hsiang Lai, Yue-Tzu Yang, "Lattice Boltzmann simulation of natural convection heat transfer of Al2O3/water nanofluids in a square enclosure", Journal Name: Thermal Sciences, Volume No: 50, 2011, PP: 1930-1941, ELSEVIER.
|
||||||||
Homer Ricacho Ampong, Andrew M. Curso, Noel P. Tancinco |
Managing Network Resources Over Wireless Device |
This study was focused on discovering an innovative way of developing a network management solution that will utilize wireless remote control through Internet. These wireless devices offer great connectivity that other types of devices cannot offer. In this study, a wireless technique is devised to implement a monitoring system by using Java – based client/server applications. In order for this device to support the ava application programs, a Mobile Information Device Profile (MIDP) is implemented. The MIDP is a profile defined specifically for the wireless devices that is implemented on top of a Connection Limited Device Configuration (CLDC) defined for handheld devices...........
Network Management; Network Operating System; Wireless Device.
[1]. Gueco, W. C. C., Villorente, D. F., Larin, L.R., Mendoza, R.C., Olesco, R.O, "Next Generation Internet in the Philippines (2001): The Philippine Research Education & Government Information Network (PREGINET)," Philippine Journal of ICT and Microelectronics, 2001.
[2]. Byers, S., Kormann, D., "Access Point Mapping," Communications of the ACM, May, 2003. [3]. Goff, M, "A Historical Look at Java's Emerging Role in the Changing System and Network Management: Java in the Management, Part 1," http://www.javaworld.com.,1999. [4]. "Common Information Model (CIM) Specification v2.2 (2002)", http://www.dmtf.org/standards/cim_spec_v22/, 2002, August 22. [5]. Feng, Y., "Network Programming with J2ME Wireless Devices (2000)," http://www.wirelessdevnet.com/channel/java/features/j2me_http.phtml, 2002, August 15. |
Version - 2 (August 2016) |
Anup Parag Bhave, Deepa A. Joshi |
A Review Paper on Earned Value Analysis |
Earned value is the measurement of work. It is used to evaluate the progress of a project based on the cost of work performed up to the project status date. The earned value calculation enables to conduct comparative study of original cost estimate and the actual cost. This helps in evaluating economic status of the project. Despite of having various benefits, the earned value analysis (EVA) is not being used in India extensively as compared to developed countries. A detailed review on application of EVA has been presented in this paper.
Earned value analysis; cost; project management; performance measurement; cost control.
[1]. Agata Czarnigowska (2008). "Earned value method as a tool for project control." Budownictwo i
Architektura 3 (2008) 15-32.
[2]. Anbari F. T. (2003). "Earned value project management methods and extension." Project Manage. J., 34(4), 12–23. ANSI. (1999). ANSI/EIA-748 guidelines on earned value management, Washington, DC. [3]. Anning Liu, Xingzhen Ren, Yihao Xu, Xuefeng Chen (2015). "Study on Construction Project Cost Control Based on Lean Construction Thought." 2nd International Conference on Education, Management and Information Technology (ICEMIT 2015). [4]. Bhosekar S. K. & Vyas G. (2012). "Cost Controlling Using Earned Value Analysis in Construction Industries." International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 4, April 2012. |
Seena R Subhagan, Dr. D. Dhalin, Dipak S. Khtatawka |
Comparative Evaluation of Electrostatic Sprayer with Powered Mist Blower |
Theknapsack mist blower is one of the most popular and versatile pesticide application equipment in India due to its simplicity, ease of operation and inexpensiveness. However these sprayers have to overcome certain constraints like low deposition efficiency, poor distribution and low penetration into dense plant canopy. The introduction of electrostatic sprayer could overcome these lacunas with its application efficiency by about 80% with 50% less spray chemical ingredients. Both the sprayers were evaluated for comparative assessment of performance both under laboratory and filed conditions. The evaluation was done for deposition efficiency and
biological efficacy............
Deposition efficiency, Electrostatic spraying, Mist blower, Air assisted sprayer.
[1]. Allen, J.G., A.P. Smith, D.J. Bult and T.M. Warman. 1991. Improving performance of mist blower
sprayers by electrostatic spraying. Proceedings of a symposium organized by a British crop production
council and the association of applied biologists, Swansea, UK. 46: 143-150.
[2]. Bindra, O.S. and Harcharan Singh. 1971. Pesticide application equipment. Published by Mohan Primlani, Oxford and IBH Publishing Co., Delhi, pp 61-157. [3]. Derksen, R.C., Saji and J. Sanderson. 1991. Green house liquid applicator performance evaluations. Paper- ASAE, No. 91-1026, pp 16. [4]. Durairaj, C.D. 1994. Development of an electrostatic spinning disk sprayer.Indian Journal of Plant Protection., 24(1-2): 139-141. |
Rinky Ahuja, Kiran Khatter |
||||||||
An Efficient Biometric Multimodal Fingerprint and Iris using an SVM Classifier and Adaptive Neuro Fuzzy Inference System (ANFIS) |
||||||||
ecent times witnessed much advancement in the field of biometric and multimodal biometric fields. This is typically observed in the area, of security, privacy, and forensics. Even for the best of unimodal biometric systems, it is often not possible to achieve a higher recognition rate. Fusion of matching scores of multiple biometric traits is becoming more and more prevalent and is a very likely approach to boost the system's accuracy. The finger print and iris are among the most promising biometric authentication that can accurately identify and analysis a person as their unique qualities can be rapidly extracted during the recognition process. This biometric recognition and verification often deals with non-ideal scenarios such as faint images, off-angles, reflections, expression changes
Biometric recognition, ANFIS, SIFT, Support Vector Machine (SVM), Hamming Distance.
[1]. S. Soviany and M. Jurian, ―Multimodal biometric securing methods for informatic systems,‖
inProceedings of the 34th International Spring Seminar on Electronic Technology, pp. 12–14, Phoenix,
Ariz, USA, May 2011. View at Publisher · View at Google Scholar · View at Scopus [2]. S. Soviany, C. Soviany, and M. Jurian, ―A multimodal approach for biometric authentication with multiple classifiers,‖ in International Conference on Communication, Information and Network Security, pp. 28–30, 2011. [3]. T. C. Mota and A. C. G. Thomé, ―One-against-all-based multiclass svm strategies applied to vehicle plate character recognition,‖ in IEEE International Joint Conference on Neural Networks (IJCNN '09), pp. 2153–2159, New York, NY, USA, June 2009. View at Publisher · View at Google Scholar · View at Scopus [4]. R. Brunelli and D. Falavigna, ―Person identification using multiple cues,‖ IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 10, pp. 955–966, 1995. View at Publisher · View at Google Scholar · View at Scopus
|
||||||||
Hyun Kwon, Yongchul Kim |
Intrusion Tolerance System Using VM Balancing In Virtual Environments |
Computing systems that provide useful services to clients are connected to the Internet. Unfortunately, there are malicious clients who make them susceptible to attacks. Even though security solutions such as an intrusion prevention or firewall can be used to protect such attacks, it is not always possible to defend systems against attacks completely. The studies on intrusion tolerant system (ITS) have been proposed to maintain the proper services in threatening environments. In this paper, we propose an ITS using VM balancing scheme which can balance online virtual machines within each of hosts. The proposed method reduces the damage of VM escape that allows an attack to move from one virtual machine to another virtual machine in a host. By this method, the proposed scheme can guarantee the minimum of services to clients, even under malicious intrusion such as VM escape.
Intrusion Tolerance System, VM balancing, SCIT (Self Cleansing Intrusion Tolerance), VM
[1]. Kwon, Ohmin, et al, "A Survey on Intrusion-Tolerant System," Korea Computer Congress 2012, 2012. [5]. Rodrigo N. Calheiros, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. Exper. p 23–50, 2011 |
Fatima Qureshi, Dr. Irfana Memon, Fayyaz Ahmed Memon, Safia Amir Dahri, Farida Memon |
A study on image detection techniques |
This paper presents the detailed study of image detection techniques such as SIFT, SURF, FAST,
BRISK, HARRIS, & Min.Eigen. Image detection techniques are widely used in today's world for various
applications such as monitoring and security purpose. These techniques allow image detection in the simple,
cluttered, rotated, and scaled by retaining some useful or most important features. Feature extraction is used to
find the correspondence between two images of same scene. In this way, the technique can detect the image
properly even in case of rotation, scaling, translation & illumination changes. This paper will help new
researchers to understand image detection techniques and propose new image detection technique.
Image detection, SIFT, SURF, FAST, BRISK, HARRIS, Min.Eigen.
[1]. Corner_detection. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Corner_detection |
Dr.(Prof.) V.C.A. Nair |
An Arm-Chair Philosophy from a Physicist |
The introduction in the paper gives a good insight on the summary of the paper. Topics mainly
from Physics and few from general are taken at random and their relevance to Physics and philosophy are
discussed. A physicist should necessarily read between the lines of the paper and even a non-physicist can have
a general reading as matter is given in a popular style at many places. The last topic in the paper is "Rudiments
of Veda and Vedic Science.
This Research Paper not being focused on a particular subject or topic, the key
wordsare many and hence not included
..................................................... |
Merlin Thomas, Sagar P. Patel, Ankit V. Patel, Jigar V. Patel |
||||||||
A Comparative Study on the Efficiency of Koh Impregnated and H3PO4 Impregnated Jackfruit Leaf Based Carbon as Adsorbent for Removal of Ni from Its Aqueous Solution |
||||||||
This research work investigates the efficiency of H3PO4and KOH impregnated jackfruit leaf powder
based carbon as adsorbent to remove Ni from wastewater. The removal characteristics of Nickel using both the
adsorbents were investigated under various operating variables like contact time, adsorbent dosage, initial metal
concentration, solution pH, temperature and stirring speed. The results showed that the H3PO4impregnated
jackfruit leaf powder based carbon is a better adsorbent than the KOH impregnated adsorbent. The experimental
results were found to fit well with langmuirand freundlich isotherms.The maximum adsorption capacity of
theH3PO4impregnated adsorbentwas found to be 62.98 mg/g and that of the KOH impregnated adsorbent to be
54.66 mg/g.
Ni, adsorption, Jackfruit leaf powder, adsorption isotherm.
[1]. Abollino O, Aceto M, Malandrino M, Sarzanini C, Mentasti E "Adsorption of heavy metals on Na-ontmorillonite. Effect of pH
and organic substances'. Water Res 37(7),2003,1619-27. doi:10.1016/S0043-1354(02)00524-9
|
||||||||
Richa Chauhan, M. Zahid Alam |
High Speed Area Efficient 2×2 And 3×3 Fast Parallel FIR Filter Using Kogge-Stone Adder |
In the advanced digital technology the need is of high speed in real time system along with the
improvement in implementation issue. Vedic Multipliers has been used to solve the typical and tedious
engineering calculation by simple Vedic methods. Here in this paper we have proposed 2x2 and 3x3 parallel
FIR filter with kogge stone adders replacing the traditional carry select adder The Vedic multiplier has also been
designed using this Kogge-stone adder to improve the propagation delay time and area on silicon chip. With this
slight improve in the multiplier, great results have been achieved in signal processing tasks. The VM has been
designed for the target device XC3S400 -5 PQ208.
.................................
[1]. Shahnam Mirzaei, Anup Hosangadi, Ryan Kastner, "FPGA Implementation of High Speed FIR Filters |