Volume 4, Issue 4, April 2013 Edition


IJSER Research Group https://www.ijser.org/forum/index.php Register for IJSER Research Forum      IJSER Xplore IJSER Xplore Research Paper Database

Pages   [1] [2] [3] [4] [5] [6]
 



Open Loop Control of a Novel Power Converter for FuelCell assisted Photovoltaic Power Systems[ ]


A novel DC-DC converter is proposed in the work carried out powered from multiple sources such as PV and Fuel Cell while the Battery is used as the Back-Up source.The power conversion circuit consists of less number of active power switches with associated passive components. By adjusting the duty-ratio of the active power switch, the power sharing between sources as well as the output voltage regulation can be made.According to various situations, the operational states of the proposed converter can be divided into three states based on battery utilization .In order to ensure that the system operates with high efficiency, this paper proposes a power management control scheme, which controls the bidirectional converter operating under boost mode according to the operation condition of the PV/Fuel Cell, so that the battery can be charged or discharged. The system performance under different solar Irradiance has been verified by carrying out simulation studies using a load demand of 2.5 KW.The integration of the hybrid renewable power system is implemented and simulated using MATLAB/SIMULINK.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of Salt-Contaminated Mixing Water and Aggregates on Time-to-Initiate Rebar Corrosion in Concrete[ ]


Durability problems occurring in reinforced concrete structures have become a major concern to end-users. Particularly, structures that are built near shoreline normally suffer premature deterioration due to corrosion of their reinforcing steel bars which is caused by continuous ingress of chlorides from seawater into the concrete cover. Making this problem more serious is the use of salt-contaminated mixing water and sea-based aggregates in making concrete - a very common practice in coastal rural areas where concrete ingredients are taken from near-shoreline sources. This study was conducted in order to quantify the effect of salt-contaminated aggregates and water on the time-to-initiate corrosion of steel bars in concrete. Six types of concretes was used: a control sample, concrete containing salty aggregates, concrete mixed on seawater, and concretes mixed with 10%, 20% and 30% salt solution, respectively. Corrosion monitoring was done via impressed current where the corrosion activity on steel bars was monitored by a Silver-Silver Chloride Electrode (SCE) under laboratory controlled conditions. Results have showed that concrete mixed with salt-contaminated aggregates and mixing water, produced a faster corrosion of steel bars than the normal concrete.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Homogeneous Charge Compression Engine[ ]


The Homogeneous Charge Compression Ignition Engine, HCCI, has the potential to combine the best of the Spark. Ignition and Compression Ignition Engines. With high octane number fuel the engine operates with high compression ratio and lean mixtures giving CI engine equivalent fuel consumption or better. Due to premixed charge without rich or stoichiometric zones, the production of soot and NOx can be avoided. This paper presents some results from advanced laser diagnostics showing the fundamental behaviour of the process from a close to homogeneous combustion onset towards a very stratified process at around 20-50% heat released. The need for active combustion control is shown and possible means of control are discussed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multi Account Embedded ATM Card[ ]


T he idea behind this work is that to add more than one bank account in an ATM card, so that the user need not carry more cards with them and complication of handling passwords. Here in this one, we embed more than one bank account so that the user can transact as he wish with a single swipe. For security we use pin password with a cipher key generated during the card authentication time.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Monitoring PCs using Android[ ]


In today's era, electronic devices and PC's are the vital part of ones' life. Our project represents how a single PC or multiple PCs connected in a network can be controlled from remote place with your smart phone device with the help of Internet. An important aspect of the technology is to remotely monitor these devices. The project presents an application using which user can connect to any computer having Client Application running on it provided this application is currently installed on the android phone. It is basically an Android based Mobile Application for keeping an eye on a Target PC or multiple PCs. User can monitor the Target PC, provided its MAC address is known. By getting MAC address from the PC, the smart phone can constantly keep in touch with all the computers registered. All the applications running on the computers will be monitored by the hand held device. One can use the application to copy files from PC to the android device, start and stop any applications installed on the Target PC, shutdown the Target PC, configure allowable applications on the target PC, get the online/off line status of the machine and much more. In our project we will be using JAVA and Android as both are open source platform thus they allows the development of new ideas and tests them with a set of open standards.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
File and database integrated databse transformations: An middleware[ ]


The database transformations have either been performed using 'Command line interface' or import tools. This traditional process is complex and becomes tedious when same set of transformation has to be performed periodically. Moreover, Data transformations are not supported for varying schemas and outdated database applications. The goal of our project is to develop a 'middleware application' which eases the task of database transformations over a vast range of databases and flat file structures, and varying schemas.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Delay Optimization in Networks Using PEAR Algorithm[ ]


According to our simulation, potential-based entropy adaptive routing (PEAR) has achieved high delivery rate on a wide range of mobility entropy, while link-state routing has worked well only at small entropy scenarios and controlled replication-based routing only at large entropy environments. Many message routing schemes have been proposed in the context of delay tolerant networks (DTN) and intermittently connected mobile networks (ICMN).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient and Low Resource Uniform Random Number Generator Using LUT-SR[ ]


The uniform random number generator plays a vital role in cryptography. The aim of the current work is to achieve the maximum period of P=22048 - 1. The proposed uniform random number generator designed for efficient implementation in lookup tables (LUT) based architecture. It describes a type of uniform RNG called a LUT_SR RNG which takes advantage of bitwise XOR operations and the ability to turn the lookup tables into shift registers of varying lengths. The LUT-SR generator uses the absolute minimum resources of one LUT to generate the sequence of binary bits compared to previous high resource LUT_FIFO RNG and low quality LUT_OPT RNG, and also provides duty cycle of 50%.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Effect of the Right-Wing Media on Public Knowledge of the Affordable Care Act (ACA)[ ]


Bill Hicks, a famous comedian known for his abrasive, acerbic style of humor, argued in the 1990s that the Media was working against the public's interest by spinning and misrepresenting data. This is evident in the modern day as public knowledge of the Affordable Care Act (ACA) is distorted and misrepresented by the misinformation presented by the right-wing media through psychological framing. The conclusion is not only corroborated by specific cases of conservative vitriol but also by the statistics showing the knowledge base of each news network's audience demographic. The "information process" as outlined by Hicks can be delineated into three separate parts, and it is through this course that we find Hicks' argument truly manifest in the modern day. Because of the misinformation phenomenon found in the ACA, it is possible that the very purpose of democracy is being countered as voter bases are acting against their own best interests.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improvement of Efficiency and Thermal Withstanding Capacity of Single Phase Induction Motor using organic Nano Filler Mixed Enamel[ ]


It has been found that the addition of nanofillers to the enamel can greatly improve the thermal, mechanical and electrical properties of enamel. Al2O3 has been used as nano filler. The micro particles of Al2O3 were converted into nano particles with the help of ball mill. Scanning electron microscope (SEM) has been used to augment the particle size of the nano powder. The nano filler was mixed with enamel by using ultrasonic vibrator. The enamel filled with nano filler was coated on the windings of the single phase induction motor. The performance analysis of the single phase induction motor was carried out by no load test, blocked rotor test and load test. Based on the calculations and result obtained by the above tests, the efficiency of the induction motor coated with enamel filled with nano filler of Al2O3 was increased by 6% when compared to that of induction motor coated with pure enamel. Heat run test was also performed on this motor to determine the total loss of energy dissipated as heat.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Byzantine Fault Tolerance Based Security Challenges For The Privacy Preserving Public Cloud[ ]


Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and has significant storage space and computation resources and third party is an optional TPA who has expertise and capabilities that users may not have is trusted to assess and expose risk of cloud storage services on behalf of the users upon request. Our proposed work cloud computing architecture for analysis is cloud data storage a user stores his data through a CSP into set of cloud servers which are running in a simultaneous cooperated and distributed. Data redundancy can be employed with technique of erasure correcting code to further tolerate faults. Comparative study represents the security issues in cloud computing architecture that have the best efficiency or the best learning.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
JANUS: The Protector of Virtual Machine Networks[ ]


Developing a virtual machine security tool manually is generally believed to be a tedious, time consuming, and error-prone process because of the large semantic gap. Recent advances in the field of virtualization show that we can largely narrow this semantic gap. But still there is no completely automated tool for VM security. In this paper, we present JANUS, an entirely new technique for VM security that can automatically bridge the semantic gap. The key idea is that, through oursystem, we will automatically redirect all the requests coming into the virtual machine network to our monitoring machine which will identify the valid or authentic requests and redirect them to the respective machines after they have been logged in the database. This system acts as a gateway for the VM network and offers a number of new features and capabilities. Particularly, it automatically enables inspection of every single request coming into the network and hence ensures high security. We have tested our system on several commonly used utilities on top of different kernels. The experimental results show that our technique is general (largely OS-agnostic), and it introduces 9.3X overhead on average for the redirected requests as compared to the native non-redirected ones.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improving Security & QoS in IP-Based MANETs[ ]


A Mobile ad hoc network (MANET) is a temporary network formed by the collection of mobile nodes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
High purity Alpha Alumina nanoparticle: Synthesis and characterization [ ]


High purity crystalline alpha alumina (?-Al2O3), platelet powder, synthesized by the combustion synthesis, aluminum nitrate was used as the source of aluminum and urea as oxidizer in an aqueous medium. X-Ray diffractometer applied to study crystalline phase. Scanning Electron Microscopy (SEM) and Energy dispersive X-ray spectroscopy analysis (EDAX) was used for morphological and chemical characterization of nanoparticel. Further study on crystalline structure of ?-Al2O3was done by applying Transmission Electron Microscopy (TEM) and Selected Area Electron Diffraction (SAED). Size distribution of powder investigated using Particle Size Analyzer (PSA). Thermal gravimetric and differential thermal analysis(TG/DTA)evaluated thermal behavior of ?-Al2O3.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Analysis and Evaluation of Critical Success Factors and Barriers of Power Quality Programme Implementation Failure in Developing Countries[ ]


The aim of this paper is to study the implementation of a Power Quality Programme (PQP) framework, and the obstacles and barriers faced by Libyan Distribution Networks (LDNs) in implementing a PQP. Firstly, to identify the most critical success factors that would have a major impact on PQP implementation in LDNs. Five Critical Success Factors (CSFs) for PQP were identified to examine the level of power quality in LDNs. They are PQ awareness, PQ disturbances, PQ management commitment, PQ employee's participation and training and PQ customers' satisfaction. It revealed that all five CSFs were significantly affected by the level of PQ awareness, and the suspension of PQP implementation. An appropriate PQP framework was developed for the purpose of this study to guide LDNs as a case study on developing countries. The proposed PQP framework model was validated based on the identified CSFs, and the barriers and benefits of PQP, which were analysed using different techniques based on both SPSS and NVivo software. The PQP framework was developed from the findings based on the responses of 397 PQ survey participants, and supported by 44 face-to-face semi-structured interviews conducted with professionals and expert LDNs staff. Out of 16 PQP barriers, 13 were statistically significant, which indicated that Libya distribution systems have already surmounted various barriers to implementing a PQP effectively. This framework encourages and guides the implementation teams to have an obvious and clear awareness and vision of how to prevent existing obstacles from reappearing in different forms, leading to long-term PQP improvements. There were 11 overall benefits of PQP implementation, which would have a positive impact on LDNs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Analysis of XBee ZB Module Based Wireless Sensor Networks [ ]


In this paper, performance analysis of ZigBee networks based on XBee ZB modules have been evaluated in terms of following performance metrics: received signal strength (RSSI), network throughput, packet delay, mesh routing recovery time and energy consumption in an indoor environment. Two main groups of network scenarios have been evaluated: (i) direct transmissions between the coordinator and the remote nodes, and (ii) transmissions with routers which relay the packet between the coordinator and the remote nodes. The wireless sensor node hardware designed for this experimentation consists of ZigBee (XBee S2 with 2mW wire antenna) wireless communication module from Digi International. X-CTU software is utilized for configuring and testing the ZigBee module of each sensor node. After configuration, the entire network is simulated in real time using Docklight V2.0 software. The results of this study are useful for building Wireless Home Area Network (WHAN) using the ZigBee where there are reflections due to indoor objects and also for scenarios where communication between nodes require multi-hop transmissions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Testing the Validity of the Theoretical Model for TQM CSFs in hospitality Industry and their impact on Customer Loyalty[ ]


Total quality management (TQM) is a management philosophy which focuses on the work process and people, with the major concern for satisfying customers and improving the organizational performance. It involves the proper coordination of work process which allows for continuous improvement in all business units with the aim of meeting or surpassing customer's expectations. It emphasizes on totality of quality in all facets of an organization with the aim of reducing waste and rework to reduce cost and increase efficiency in production and service. Total quality management (TQM) has become popular in the hospitality industry. It proposes to elicit the cooperation and loyalty of employees for the sake of corporate goals via an educational, motivating and positively rewarding relationship entered into by managers with their subordinates. The aim of the study is to test and validate the introduced theoretical model in the first part of the research, the validity of such a model can provide guidance for managers, decision makers and quality practitioners aiming to implement TQM in 5-stars hotels business to achieve their quality objectives, a comprehensive review of literature on Leadership, human resource management, customer focus, supplier relationship management, process management, training and education, teamwork, organizational culture, benchmarking and communication were carried out to accomplish the objectives of this part of the research, a group of five 5- stars Egyptian hotels was used as a case study for primary data collection, the statistical package for social science (SPSS) approach was used for hypotheses testing, Furthermore, a future scope of this study is also presented at the end of the research.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fluoride hydrochemistry of Dikrong river basin, Arunachal Pradesh, India[ ]


In order to understand the fluoridation condition of drinking water of Dikrong River Basin in Papumpare District, arunachal Pradesh. The total of 30 groundwater samples collected from tube well, ring well, stem water, dug well and rivers from Dikrong River basin, papumpare.district, Arunachal Pradesh, India were analysed for fluoride contamination, besides water quality Parameters such as pH, calcium, magnesium, manganese,iron and major anions such as chloride, nitrate etc.out of these thirty samples eighteen samples were taken from tube wells, ten samples from ring wells and two from rivers. The concentration of fluoride in the water samples ranged between 0.00 and0.48 mg/L and revealed that all water samples contain fluoride permissible limit.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Advanced Clinical Workflow for Connecting Clinic[ ]


This system is designed to improve clinical workflow, and perform advanced appointment scheduling. This application shows how clinics and patient are connected online through web based application. In today's life no one has time to visit clinic and wait for appointment. This application will help for getting online appointment. Patient can get appointment through SMS or Internet. Receptionist will manage all the appointment. Doctor can make his schedule according to patient's appointment. Patient can see online how many people are waiting for appointment. Doctor will upload all the patient medical history on website. This information is visible to only that patient and to the visiting Doctors. Thus privacy is maintained. As patient and clinic are connected online if patient goes from one clinic to another clinic, visited clinics doctor can see medical history of that patient and personal information of patient. It is waiting room solution. All this services provided to users at free of cost.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Prediction of emission and scattering coefficient from cloud layer contain gases ,ice and water vapor from optical and infrared band[ ]


Now a day the effect of cloud layer in ice and water vapor on the propagation of electromagnetic waves has become a subject of interest. Hence considerable attention has been devoted to evaluate the influence of natural occurring obscurant on the performance of electromagnetic wave (optical, infrared and millimeter wave) propagation. It may be mentioned that like other precipitation sand and dust particles present in the atmosphere ice, sheet, water vapor, different gases, also effect the propagation of electromagnetic waves. These particles affect the phase and amplitude of the wave during propagation. In this paper an attempt has been made to evaluate the scattering Aledo, coefficient, reflection coefficients from cloud layer using Radiative Transfer Model at optical, infrared radiation. After estimation of reflection coefficient and scattering coefficients, calculate temperature brightness with wavelength for different effective radius of particles of gases such as ozone, carbondiodixe, ammonia, water vapor

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Windows optimization for office buildings in Islamabad Pakistan[ ]


The office buildings are main consumers of energy for space cooling in Pakistan. In this study a three storied office building was selected for studying the energy consumption. The data was collected from the selected building and was entered to eQuest software proram for simulation. This model was termed as baseline model. The building was further optimized with the windows area and glazing type separately. The results were compared with the baseline model. Simulation results showed that 10.5% of electrical energy used for cooling purposes can be saved by reducing the windows area. And up to 5% of the energy can be saved by using the double glazed brown tinted windows instead of single glazed windows.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Awareness on Confidentiality in Social Networking Sites[ ]


Privacy concerns with social networking sites have become a controversial topic since the evolution of Bebo, Friendster, My Space, Orkut and Facebook. With the increasing popularity certain issues related to stalking, identity theft, sexual predators, phishing and employment are consistently on the higher side. Also in social networking sites the ethics regarding data storage, management and sharing of data is still a big concern. A security issue occurs when a hacker gains unauthorized access to a site's protected coding. The potential harm to an individual depends on how much a user engages in social networking site and the amount of private information he shares. It is possible to identify the risks and design preventive measures to protect our confidential data in social networking sites. We therefore need to improve the safety measures regularly in line with the latest technological development like maintaining physical, electronic and procedural safeguards or computer safeguards such as firewall and data encryption.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Parallelizing Digital Library Search[ ]


Digital libraries today are expected to store millions of articles or items of interest. Inexpensive and efficient access to this information becomes critical for success of digital libraries. In order to keep the costs of maintaining digital libraries low, computer programs are taking on the tasks that were traditionally carried out by skilled professional such as librarians. Such tasks often include selection, cataloging and indexing of items in the digital library. Once articles in a digital library are indexed with a set of keywords, computer programs are efficient at retrieving articles that are of interest to a digital library user by resorting to keyword searches of the index database based on user specified keywords. Our research work is investigating ways to speed up implementation and improve experience of using digital libraries. As part of this effort we are investigating ways to use new language extensions such as the Intel Cilk Plus extensions to C and C++ from Intel Corporation that offer a quick, easy and reliable way to improve the performance of programs on multi core processors. Multi core systems are now becoming prevalent on desktops, servers and even laptops. In this paper, we present the results from our work using the Cilk Plus extensions to parallelize digital library searches for articles of interest.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Framework for Mitigating the DDoS attacks[ ]


Distributed Denial of Service (DDoS) attacks are a destructive, relatively new type of attack on the availability of Internet services and resources, andamong the hardest security problems. Over the past few years, DDOS attacks have increased up to a large extent. As a result of which we need to fight against the severe effects of these attacks. In this paper, we will discuss different types of DDOS attacks, the way they affect the networks and the appropriate defence mechanisms for them. Also, a solution is proposed to mitigate these attacks which work in four steps including detection of DDOS attacks, diverting the attack traffic for treatment, monitoring and filtering the attack traffic and finally forwarding the good traffic to the final destination.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Different Approaches for the Service Oriented Software Development[ ]


Service oriented development is the process of developing an application that is able to provide the required service to the customer keeping in mind the requirements of the customer but an application is said to be good service providing software if it provides the quality that is required by the consumer. In this paper we have reviewed various proposed methods that are capable of developing software from the consumer's perspective and able to manage the quality requirement in the application.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Site Selection Using Optimization Techniques[ ]


The process of selection of sites for commercial activities involves myriad of qualitative, quantitative and financial factors. In general, there are multiple diversified factors. Due to the human tendency to depend more on emotions than reasons, there is every chance of reaching an irrational conclusion. This paper presents a formal system to evaluate comparative ranks of available sites for commercial activities and thereby to determine the long termed profitable decision using Lexicographic Approach. A versatile solution is provided to given problem using Weighted Penalty Method.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Theoretical Investigation Of The Electronic Properties Of Zigzag Graphene Nanoribbons With Pyridine And Porphyrin-like Defects[ ]


Defects can alter the properties of zigzag graphene nanoribbons (ZGNRs). A ZGNR segment containing 120 C atoms with pyridine (3NV-ZGNR) and porphyrin (4ND-ZGNR) defects was investigated with the aid of spin-unrestricted density functional theory (DFT). It is found out that the incorporation of pyridine and porphyrin defects resulted in half metallic behavior. The formation energies and electronic properties were also reported. The results provide comprehensive strategies in obtaining well-defined N-doped ZGNRs and realizing their novel intrinsic electronic and magnetic properties in the nonodevices.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Adsorption Energies Of Mercury Containing Species On The Surface Of Calcium Oxide (0 0 1) Predicted By Density Functional Theory[ ]


In this work, the use of computational chemistry methods for predicting Hg and HgCl2 adsorption on CaO was introduced, which has never been studied before with theoretical calculations. The GGA functionals was used to obtain the optimized geometries and adsorption energies of proposed periodic and adsorption site structures. Also, the goal of the research is to investigate if GGA functionals gives reliable answers compared to available experimental datas.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Evaluation of Software Architecture for an Internet Banking System[ ]


Software architecture has a measurable part which exemplifies the early design decisions covering several perspectives and also it impacts the quality attributes of a system. Therefore the evaluation of software architecture plays a prominent role in determining the degree to which architecture satisfies its quality requirement and also to expose architecture risk that potentially inhibit the achievement of an organization's business goals.In this paper , we present some identification of pattern in an internet banking system for efficient access. The pattern for an internet banking system will be allowing the system to be load free , the transactions will be speed and faster processing .We have also implemented some patterns for an internet banking system for server load free functions. Then the rest of the paper deals with software architecture evaluation for an internet banking system using some evaluation method. Finally, the evaluation results are represented in a weight metric form. And our next work is to propose an refined internet banking architecture.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Reed Solomon Decoder Based on pRiBM Algorithm for Effective Digital Signal Reception[ ]


In this paper, Reed Solomon (RS) decoder adopting the pipelined reduced inversion free Berlekamp Massey (pRiBM) algorithm is proposed. This Reed Solomon decoder is designed by equipping the Syndrome Computation unit, Key Equation Solver (KES), Chien search and Forney algorithm unit. The RS decoder requires long latency for decoding large number of test vectors. Therefore, the Reed Solomon decoder using pipelined reduced inversion free Berlekamp-Massey algorithm is used to reduce latency. The Reed Solomon decoder is simulated with the Verilog HDL language using Xilinx 9.1 tool. The total delay obtained is 99.464 ns.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Accessing the Potential of Lingocellulosic Agricultural Waste Biomass for Removal of Ni (II) Metal Ions from Aqueous Streams[ ]


Acacia saligna pods (ASP), a lignocellulosic agricultural waste material, was used as low cost biosorbent for the removal of Ni (II) from aqueous solutions in batch mode. In this study the influences of phase contact time, solution pH, adsorbent dose and initial concentrations were investigated to optimize the conditions for maximum adsorption. The experimental data was analyzed by Langmuir, Freundlich and Temkin isotherm models. The Langmuir and temkin isotherms best represented the measured sorption data. The removal efficiency of the ASP was found to be 93 % under optimized conditions. The kinetics of adsorption of Ni (II) was evaluated by pseudo-first order and pseudo second order kinetic models. The experimental data fitted well with pseudo second order kinetics Results indicated that the ASP were very effective in removing the selected metal ion from simulated as well as real industrial effluents. Equilibrium was approached within 60 min of the experiment at Ph of 6.0. The selected biosorbent has been analyzed by CHN, for its natural composition, FT-IR for identification of contributing functional groups, XRD for its structural properties and SEM for the structural morphology analysis

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cluster and Grid Integration Issues: A Review[ ]


To resolve the problems today's Grid computing offers many solutions that are already addressed. Grid computing includes number of derivatives like data grids, cluster grids, compute grids, science grids, access grids, knowledge grids, terra grids and commodity grids. To support various services Grid need infrastructure like security, uniform access, resource management, scheduling, application composition, computational economy, and accountability. In this paper, I will discuss the several new issues and challenges related to DRMAA, GridBank, Grid programming, Chirp, Scheduling, Distributed Monitoring System, Grid data management, Sensor Grid and ASKALON. The toolsets and techniques are used to overcome the issues that are discussed in this paper.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Architectural Aspects of Tablet Learning in Green Engineering Tech-Convergence Era[ ]


This is the Green Engineering Tech-Convergence era, which is a very exciting time for e-learning. Technical advances such as the Internet along with Cloud applications aid and enrich our modern daily life through latest e-gadgets like Tablets etc. Thus, large businesses and the private sector can see the benefits of embracing these hardware tools & software applications & services to gain the advantage over their competitors. Moreover, this not only applies to businesses but also to Educational Field. This paper focuses on the particular technologies that have been applied to support Education, through buzz words like Learning Management System (LMS) and T-Learning. This paper covers the LMS and its various issues i.e. Pedagogical use of Tablet for Collaborative learning and Architectural Aspects of Tablet Learning (T-learning) etc.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hierarchical Privacy Preserving Distributed Frequent Itemset Mining Over Verically Distributed Dataset[ ]


The process of defining association rules is dependent of frequent itemsets. Distributed data mining is a significant scenario due to the fact of large quantity of data and adaptive resource sharing between networks that provides computational strength. In this context data that is high in volume need to be distributed to various computational clients to perform data mining in distributed manner, which is scalable in regard to computation and process time. Henceforth it become a serious issue to protect the privacy of the data that distributed for mining. Here in this paper we explored a novel perturbation technique called connected guassian approach (CGA) to protect the data privacy that distributed and a distributed frequent itemset mining modal. The model here we proposed is referred as hierarchical privacy preserving distributed frequent itemset mining (HPPDFIM) that applied on vertically partitioned data tuples. The other underlying goal of the proposed model is that achieving privacy by using one way digestive standard during communication between distributed computational resources involved in DDM. The experiments revealed that the model is scalable and accurate unlike other perturbation standards. In a glance the goals of the proposed HPPDFIM is (i) protecting privacy during the distribution of the vertically partitioned data tuples even distributed computational resources compromised, (ii) achieving privacy during the conversations between participant distributed computational resources, (iii) and the frequent itemset mining should be done such that each node of the network that participating in mining process should not aware of the transaction elements of the other nodes that are involving in data mining process.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhancement of dc ionic conductivity with particle size of dispersoid in XKNO3 - 1-X Ba(NO3)2 [ ]


The ionic conductivity of XKNO3 -1-XBa(NO3)2 mixed crystals, sx, has been measured from nearly 360K to close to their melting points. The conductivity in the extrinsic region of Ba(NO3)2 increased as the m/o of KNO3 is increased up to 91m/o and then for 95 m/o the conductivity falls. The further enhancement in conductivity of about three orders is found with the dispersion of Al2O3 to the 91 m/o of KNO3 in Ba(NO3)2. DSC and XRD studies reveal that no new phase is formed. The enhanced conductivity is attributed to the excess cation vacancies generated in the space charge region of the matrix phase surrounding the alumina particles as a consequence of stabilization of cations at the dispersoid surface due to internal absorption.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation Of Kgs Based Control For Gear Shift Lever Line Manufacturing System[ ]


Information technologies have been rapidly developed in recent years, and they have provided sufficient technical support for building modern industrial automation systems with more open architecture with respect to the previous ones. It turns out that the computerized real-time monitoring analysis and automated technologies realize the full automation of an industrial measurement system. The combination of emerging information technologies with traditional condition monitoring systems allows for the continuous running status monitoring for essential equipment as well as comprehensive data processing and centralized resource management. Automation plays an increasingly important role in the world economy. It has notable impact in a wide range of industries beyond manufacturing. Control systems are of growing importance as they are involved in many safety critical industrial applications; civil aircraft, ground transportation, nuclear power plant, etc. For automation of production planned either centralized or distribution control systems are used. In this field, a lot of activity has been devoted to ensuring and improving hardware and software reliability.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Issues related to Resource Management and Scheduling in Grid Computing and a Review of some Resource Management Models and[ ]


Continuously needed updating in better and challenging application programs via computational power have given birth to another need of connecting sky-high performance computational channels sources spreader along many organizations. So that's why the core of grid computing is known as resources management. Many different work and projects have been centralizing on the praiseworthy implementation of resources management system with some collective choice of architecture and taxonomy. Nevertheless, the management of resources and scheduling computations in the grid environment is a multi-mix constructed project as they are equally divided, miscellaneous in mature, in hand of different single or multi organizations while having their different company policies, rules and regulations. Different access and cost models, and have dynamically varying loads and availability needs a powerful resource management system. This delivers quite count of challenging matter like site autonomy, heterogeneous substrate, policy extensibility, resource allocation or co-allocation, online control, scalability, transparency, and "economy of computations". This paper will locate and talk about issues in resources management and scheduling in the emerging grid computing context and review of some resource management systems and scheduling techniques.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performing Computer Operations with Voice Controlled Mouse[ ]


The goal of Human Computer interaction (HCI) is to design a system that improves the interaction between computers and users, mainly for people with disabilities. For this reason, this research describes how to make computers more usable by using speech based interaction. Proposed system will use speech and non speech characteristics of human voice for hands free computing. System will use human vocal characteristics to command mouse pointer. Words and sounds will be used to perform mouse 2-D movement and performing operating system's operations. By doing this people with disabilities can use the computer systems normally as the normal users use it. Current speech recognition systems provide discrete interaction because they process user's vocal utterances at word level, proposed system will be able to perform mouse-like operations fluidly.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Test for divisibility by 7[ ]


Normally, it becomes hard to check whether a large number is divisible by 7 ex. 757,344.It takes a lot of time to perform actual division and checking the result. A divisibility rule called 6-9 method is designed to verify whether a given number is divisible by 7. This method examines the digits in a number and checks whether it is divisible by 7 without performing actual division operation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Pages   [1] [2] [3] [4] [5] [6]