The study of Nima’s Personal Symbols
Nima was known as a poet while King Reza came to the crown, It was while Reza’s dictatorship limited everybody especially the literary figures and the deserved poets like Nima socially and politically. It is clear that the poets like Nima takes the refugee in the world of their poems by creating the symbols which are definitely belong to themselves, the symbols are aligned with the political, social, cultural problems and the clashes of his personal life, the limitation of literary thoughts, and the familiarity with European, the novice literature especially the French symbolism. Nima’s personal symbols include the different elements such as birds, humans, place, time, animal, nature and plants, therefore this study tries somehow to show and concentrate on them in details.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Trials and Analysis on Belt Conveyor System used for Cooling of Casting Mould
Belt conveyor system is the transportation of material from one location to another location. Belt conveyor has high load carrying capacity (upto 30000 t/h), large length of conveying path (upto 3-4 km), simple design, easy maintenance and high reliability of operation. Belt conveyor system is also used various industries such as the material transport in foundry shop like supply and distribution of moulding sand, moulds and removal of waste, coal and mining industry, sugar industry, agricultural industry, bagasse industry, fuel industry etc. . In this paper the study is carried out on DISA pattern moulding machine to meet the requirement of higher weight castings. From the DISA specification the belt conveyor system is designed by using different standards like CEMA (Conveyor Equipment Manufacture’s Association) standards, some handbooks of belt conveyor system etc. then this parameter are verified by using Belt Comp software. The result got from the Belt Comp software is in close agreement of theoretical results. After the design the manufacturing is done and the installation is done on the manufacturer’s site. The trials are carried out on the belt conveyor system successfully and the problems occurs during the trials are overcome in the analysis by taking proper steps. The present discussion aims to Trial and Analysis on belt conveyor system.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
XML Document Management Tools Survey
Now a day’s large volume og information is available online. An efficient and effective management of the information on the web is not only valuable to individual users but also to business organizations, especially for decision making purposes. Here challenging task is amongst available information on the web finding business values. The signi?cance of organizations information depends on the applications that deal with it. An organization allows the customer to query online published products information and collects their reviews about the products. XML guarantee about those features of business functions including integration, intelligence and reuse of the content. To complete XML assurance it is very important to maintain XML documents properly. In this paper provides discussion and comparison of various commercial tools and database management systems to create, store, maintain, and query XML documents.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A new topology for doubly fed induction generator to improve the overall performance of wind energy conversion system
Doubly Fed Induction Generators (DFIGs) are currently extensively used in variable speed wind power plants due to their superior advantages that include reduced converter rating, low cost, reduced losses, easy implementation of power factor correction schemes, variable speed operation and four quadrants active and reactive power control capabilities. On the other hand, DFIG sensitivity to grid disturbances, especially for voltage sags represents the main disadvantage of the equipment. In this paper, a coil is proposed to be integrated within the DFIG converters to improve the overall performance of a DFIG-based wind energy conversion system (WECS). The charging and discharging of the coil are controlled by controlling the duty cycle of the switches of the dc-dc chopper. Simulation results reveal the effectiveness of the proposed topology in improving the overall performance of the WECS system under study.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A survey of low power elliptic curve cryptography for smart network
The proposed project is to implement a novel idea in Sensor networks. Normally Sensor networks are used to sense environment and collect data. Security in such networks is a big challenge. The first challenges of security in sensor networks lie in the conflicting interest between minimizing resource constraints and maximizing security. An implementation of operating system may reduce the risk level of handling secure data but sensor networks also introduce severe resource constraints due to their lack of data storage and power. Thus we employ a hardware cryptographic unit with low power consumption. The working memory of a sensor node is insufficient to even hold the variables (of sufficient length to ensure security) that are required in asymmetric cryptographic algorithms. A symmetrical key crypto security system will be less adequate to handle the modern secure threats, due to that a much complex asymmetric crypto system called elliptic curve cryptography is designed with various optimizing units(ex: pipeline, scheduling) to achieve greater security and to consume much power with reduced resources constraint.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A survey of the demand for money in an emerging market economy
The demand for money function creates a background to review the effectiveness of monetary policies, as an important issue in terms of the overall macroeconomic stability. Money demand is an important indicator of growth for a particular economy. The increasing money demand mostly indicates a country's improved economic situation, as opposed to the falling demand which is normally a sign of deteriorating economic climate (Marvin and Palin, 2010).Thus it has been the focal point of considerable economic research. This paper surveys some of the more recent research on the demand for money and the policy implications for Asian developing countries. By and large the error correction model approach is the dominant methodology in most researches but the ARDL approach appears to be on the rise. Expectedly, the significant explanatory variables were found to be the income variable as the scale variable and domestic interest rate as the opportunity cost variable. In some cases additional variables had to be included in the money demand function such as the exchange rate, the inflation rate and some external interest rate. Generally, the demand for money was found to be stable and the money supply can be used as a tool of monetary policy aimed at influencing the macroeconomic variables of the economy
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Application of Fuzzy Logic in Interior Daylight Evaluation
In the present day electricity consumption in indoor and outdoor lighting systems has continuously increased. Daylight as a primary source of illumination may be used as a sustainable development concept as the day lit area has very promising energy-saving opportunities. A Day lighting system is comprised of daylight apertures such as windows and skylights and different shading devices to control direct sunlight and glare.For getting the maximum benefit of daylight and to avoid obstructions, proper planning and layout of buildings is necessary. Artificial lighting may have to be provided when the level of illumination falls below the recommended value. Specifically, methods developed by the Indian standards have been used by Architects for years. The result is distributed in qualitative form for different distance from the location of windows. However in day lighting calculation it is very unsure to calculate that, whether a percentage of certain daylight factors are considered to be properly lighted, dark or dull? Traditionally there is a method to define a threshold over which an average daylight factor is considered a member of the bright set and under which it is not. Fuzzy Logic allows one to speak of a certain percentage of daylight factors is both a member of the bright set and the medium set, and possibly even the dark set. This paper addresses the Application of Fuzzy Logic in Interior Daylight Evaluation to control direct sunlight and glare. Besides, the design principles and strategies to obtain a window dimension for a given daylight factor has been discussed. For functional influence of the Building in warm humid climate of Coastal Odessa (Average latitude 210 North), a literature review about day lighting availability has been done. Then, the experimental set up has been described. For sufficient day lighting the calculation of solar radiation and position of windows have been worked out and graphically represented with classic and fuzzy models. Other possible design applications are suggested.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Assessment of soil Contamination due to release of heavy metals from industries
This research work involves ten representative soil samples from the industrial area of Mysore city, Karnataka, to determine the total heavy metal content and general properties related to fertility of the soil. For digestion of heavy metals tri-acid mixture method was used. The results showed that, the iron content is higher at the range of 2.5gm/kg to 6.03gm/kg in rainy season and 3.3gm/kg to 6.0gm/kg in pre-monsoon season, for copper it ranges from 13.55mg/kg to 20.15mg/kg and 14.5mg/kg to 18.9mg/kg for rainy season and pre-monsoon season respectively. Chromium is also present in the concentration of 6.3mg/kg to 18.3mg/kg in rainy season and 6.9mg/kg to 22.5mg/kg in pre-monsoon season, zinc concentration varies from 61.9mg/kg to 109.4mg/kg and 64.3mg/kg to 112.3mg/kg for rainy season and pre-monsoon season respectively and presence of nickel varied from 9.1mg/kg to 16.05mg/kg in rainy season and 11.4mg/kg to 17.2mg/kg for and pre-monsoon season. From this study, finally we concluded that, the heavy metal concentration is little more in pre-monsoon season than that of rainy season and the heavy metal concentration is in the sequence of Fe>Zn>Cu>Cr>Ni. It reveals that presence of heavy metal has been observed from the different industries with different processes in which the industries have involved so many operations during production of materials and improper disposal of waste materials.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Bi-Edge – graceful and global edge – graceful labeling of some graphs
Lo[14 ] introduced the notion of edge-graceful graphs. In this paper, we extend this to bi-edge and global edge-graceful graphs. Here, we completely characterized the global edge-graceful graphs.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Content Analysis and the Challenges of Measuring Insurgencies in Nigeria: the Case of Boko Haram
This paper discusses the relevance of content analysis as a methodological tool in the study of conflict situation in Nigeria. It attempts to test the widely held assumption that poverty is the major reason for the growing number of insurgencies in the country in recent time. The central argument put forth here is that despite the weakness associated with content analysis in terms of validity and reliability, it can be used to effectively examine the content of communication, especially in conflict situations. Thus, this paper seeks to identify the link between quality research and effective policy process in Nigeria. The paper relies essentially on secondary sources of data. It recommend that government should adopt dialogue in resolving the problem of insurgency at its formative stage rather than the use of counter violence as is the case with the current Boko Haram insurgency.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]