9081. Textile wastewater treatment using reverse osmosis and SDI | ||
M. Ramesh Kumar, C.V. Koushik and K. Saravanan | ||
Abstract | Pdf | Category : Engineering | Sub Category : Chemical Engineering |
Textile wastewater treatment using reverse osmosis and SDI
Textile industry is the major source of water consumption and wastewater pollution. There are various treatment techniques to remove textile wastewater pollution. Textile wet processing unit involves a variety of chemicals comprising a various class of dyes along with huge amount of water resulting from wet processing operation. The conservations of chemical become a most important aspect for environment specially in consideration of the pollution phenomenon and increasing cost of chemicals in order to make the industry much more competitive in the globalize context. For that reason, liquid waste management and waste volume reduction by the product recovery are essential. In the case of India many wet processing industries and about 80% of these are woven fabric dyeing industries are needed to feed the fabric in the garments industries. For these reasons, effluent treatment planning is a burning question for a wet processing unit. In order to solve these problems as textile technologist we should define many corrective measures. This paper deals with the effluent standards and different wastages of woven fabric wet processing industries along with reverse osmosis treatment and SDI (Silt Density Index) explained in detail. It also deals with the various advantages, comparison of RO feed and permeates, RO feed and reject parameters of Silica, Sulphate, Free Chlorine, Chlorides, Silicate and S.D.Index. RO feed and permeate parameters Si reduced by – 95.46%, SO4 reduced by – 99.19%, Cl¯ reduced by – 94.51%, SiO2 reduced by – 95.22% and SDI reduced by – 100.00%.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9082. Vegetable Crops: An overview of the Processing and Storage Methods | ||
Adamu Jibrin Nayaya and Magaji G. Usman | ||
Abstract | Pdf | Category : Agricultural Sciences | Sub Category : Agriculture |
Vegetable Crops: An overview of the Processing and Storage Methods
Year-long supplies of fresh food have been made possible by improvements in controlled storage conditions, shipping and importing. A fresh weekly food supply at the local supermarket has eliminated the need for the home preservation and food processing of earlier days. Today, we may choose to preserve and process food for reasons besides availability such as the price of food, quality and nutrition. For these reasons, gardeners who find themselves with a surplus of fresh produce at the end of the season may decide to store and preserve. When conditions are not suitable for storage or immediate marketing of fresh produce, many horticultural crops can be processed using simple technologies. There are some processing methods that can be used by small-scale handlers, including drying, fermenting, canning, freezing, preserving and juicing which are highlighted in this review. Fruits, vegetables and flowers can all be dried and stored for use or sale in the future.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9083. Which One is Successful in the Nano Technology Revelation, Oil Industry Managers or Leaders? | ||
Fatemeh Rezaei, Naser Akhlaghi and Nima Akhlaghi | ||
Abstract | Pdf | Category : Educational Research | Sub Category : Leadership Management |
Which One is Successful in the Nano Technology Revelation, Oil Industry Managers or Leaders?
Management nowadays is something more than a job or a profession and it became the combination of science, art, skill. Managers in such a complex and dynamic industrial societies of these days, regarding the increasing knowledge in all fields and unreliable conditions of global competitive, cannot succeed just by using managing skills and there is no option but using leadership skills. Management is the art of making others do the job for you, but leadership is the process of influence others in the way that they conduct the work of their own accord and prefer the organization's interest to their own in all areas. A manager needs four skills: understanding, humanity, technical, and specialist. So he can do his duties such as planning, coordinating, organizing, controlling and supervising leadership and guidance, budgeting and industrial innovating. the manager's characteristics are (managing knowledge, art, experience and intrinsic management competency; however a leader must have characteristics such as great intelligence ,self-control ,self-confidence, charm ,speech influence ,high understanding ,emotional stability in addition to above items) and therefore ,when science and technology leaders come to an agreement and experience the deepest human relationship with their employees ,they achieve the most successful outcomes. The fast changes are permanent in the nowadays industrial world and leaders most perform different roles in this changing world so they can be successful in all aspects. Effort for success in the new science, specially nano technology and it`s application in the petroleum industry, definitely needs to such leaders who can lead the employees through the recognition of their potentials and used each of them in its place and to help leaders to achieve results.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9084. A comprehensive study of latest phishing techniques and prevention | ||
Prateek Lohiya | ||
Abstract | Pdf | Category : Computing and Informatics | Sub Category : Network |
A comprehensive study of latest phishing techniques and prevention
Phishing is a criminal mechanism employing both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails purporting to be from legitimate businesses and agencies to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as usernames and passwords. Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using systems to intercept consumers online account user names and passwords and to corrupt local navigational infrastructures to misdirect consumers to counterfeit websites (or authentic websites through phisher controlled proxies used to monitor and intercept consumers’ keystrokes). Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy etc. Some of the criminals behind phishing scams have even gone so far as to create websites that appear to be operated by government agencies. According to latest phishing reports submitted to APWG of 26,402 in March 2011 was down 35 percent from the all-time high of 40,621 in August, 2009.[1]Though many agencies, personnel’s working for combatting this problem new techniques have been developed to outsmart them. This paper aims to discuss latest phishing techniques, motivation, causes of vulnerability of systems in detail. This analysis aims to help users & organization to avoid being victims and to take primary preventive measures.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9085. A novel approach for identification and localization of rotated objects | ||
Meenal D Divate and Seema R Baji | ||
Abstract | Pdf | Category : Computing and Informatics | Sub Category : Computer Engineering |
A novel approach for identification and localization of rotated objects
The goal of this project is to automatically detect and recognize some objects in an image by using a multi-agents architecture. A knowledge database is thus necessary and should contain an invariant description of known objects for the desired application. An agent processes an area of the image, its goal is to detect an object and check if this object belongs to the knowledge database. Point matching is an important aim in the research work. A digital image may undergo any arbitrary translational, rotational changes because of which the object shape may change. In this paper we present a novel approach for shape and feature matching using putative point matching.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9086. A study on the career development in industries | ||
Muhammed Naren | ||
Abstract | Pdf | Category : Management | Sub Category : Organizational Behaviour |
A study on the career development in industries
The structural adjustments programmers adopted in a number of countries have brought home the vulnerability of human development variables. The linkages between investments in human development programmes and economic development have become sharper. There have been major international developments-such as the opening of global markets, the increased market orientation of economies and the restructuring in socialist countries-which have given rise to an increased competition, forcing developing countries to produce and market quality products at competitive prices.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9087. Achievement in college mathematics: past effect analysis | ||
Harpaljit Kaur, Shalini Nagaratnam and Tey Ban Cheng | ||
Abstract | Pdf | Category : Arts and Humanities | Sub Category : Social Studies |
Achievement in college mathematics: past effect analysis
Investing in education is imperative in this knowledge based economy to sustain a competitive edge. As we are aware, the higher education level is a significant factor for a long term economic growth. To ensure students’ are well equipped with the foundation for a higher level, a proper transition from primary right up to tertiary is crucial. In retrospect, poor achievement in higher learning institution has been an invariable issue and has drawn the attention of the higher learning institution, especially in numerical subjects like the College Mathematics. Although research of the higher learning institution places emphasis on classroom intervention to enhance students’ achievement, a study in the phenomenon from the perspective of course setting of the high school level mathematics education as reason behind poor performance in college is also vital. The aim of this study was to investigate the influence of students’ performance in high school Mathematics on students’ academic performance in College Mathematics. The respondents of this study were the students from a private college. This study revealed that performance in high school Mathematics has an association with student’s performance in College Mathematics, while gender and medium of study act as moderators.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9088. Agri charcoal as a fuel for power generation: An Initiative | ||
B.Lonia, S.B.Singh and J.S.Dhaliwal | ||
Abstract | Pdf | Category : Agricultural Sciences | Sub Category : Agriculture |
Agri charcoal as a fuel for power generation: An Initiative
The prevention climatic changes induced by anthropological greenhouse gas emissions, is one of the of severe major challenges for the current and future generation of mankind hence this study investigates in providing a cheaper and cleaner fuel in burning from post harvesting agricultural wastes. Coal and wood have been the primary fuel used subsequently and produce lot of polluting gases like carbon monoxide, sulphur dioxide, carbon dioxide which has consequences on health. The agriculture waste is bio degradable and decomposes/burns. Since waste can be a source of energy after mixing the waste material of different calorific value, the agriculture waste can be converted into fuel cakes or by modifying charcoal by destructive distillation process by using of effective carbonizer. The results obtained with multifuel (Agri charcoal) further stronger the idea of setting small power plants, dedicated to rural sector of India.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9089. An Efficient Methodology for Cloud Computing to Retrieve Data | ||
Kapil Dev Raghuwanshi and Sitendra Tamrakar | ||
Abstract | Pdf | Category : Computing and Informatics | Sub Category : Computer Engineering |
An Efficient Methodology for Cloud Computing to Retrieve Data
Cloud computing is an efficient data sharing technique where users can directly store and access information through internet. Hence the chances of unauthorized access and security of data is an important issue in cloud computing, hence various techniques are implemented for the security of cloud data. Encryption is a technique of providing a secure access of data over internet, but chances of attack is still possible. Hence an efficient technique is implemented using the concept of multi-keyword based data retrieval in cloud computing with encryption [1]. Although the technique is efficient in terms of communication overhead and security from various attacks but further enhancements can be done in the technique to make it for secure and easy, hence a new and efficient technique is implemented in cloud computing using attribute based encryption and verification, the proposed technique implemented provides security from various attacks and provide less storage and communication overhead.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
9090. Analysis and overview of Flooding Attack in Optimized link State Routing protocol | ||
Akshat Khaskalam and Sandeep Sahu | ||
Abstract | Pdf | Category : Computing and Informatics | Sub Category : Network |
Analysis and overview of Flooding Attack in Optimized link State Routing protocol
During this last decade, mesh networks have experienced strong growth due to their ability to provide an additional and complementary support for existing infrastructure communication systems. In such a network, routers are supposed to be fixed for short (e.g. public safety deployment) or long (e.g. network operator extension) period. This relative stability of infrastructure makes proactive routing protocols appropriate. One of the well known proactive routing protocols is OLSR (Optimized Link State Routing), which routing decisions are based on exchanges of topology information using all-to-all flooding of local information in order for each router to build a global knowledge of the topology. This study first goal is to improve the performance of topology information flooding in OLSR by introducing network coding techniques, which leads to a decrease of signaling overhead.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]