Adsorption of acenaphthene unto activated carbon produced from agricultural wastes
The suitability and the performance of activated carbon produced from flamboyant pod back, milk bush kernel shell and rice husk for the effective removal of acenaphthene from simulated wastewater under the influence of carbonization temperature and initial concentration were investigated. The adsorption capacities of all the activated carbons obtained from the selected raw materials are influenced by increasing carbonization temperature. Activated carbons obtained from rice husk at carbonisation temperature of 600 0C had the maximum adsorption capacity (5.554 mg/g) while carbons produced from milk bush at carbonisation temperature of 300 0C had the minimum adsorption capacity (1.386 mg/g), for the adsorption of acenaphthene from the simulated wastewater. The removal efficiencies of the investigated adsorbents generally rank high and the highest value (80.56 %) was obtained for the adsorption of acenaphthene by rice husk carbonized at 600 0C. Furthermore, the removal efficiencies obtained in the study decreased as the initial concentrations of the adsorbate increased. The four selected isotherm models; Freundlich, Langmuir, Temkin and Dubinin-Radushkevich described well the equilibrium adsorption of acenaphthene unto activated carbon derived from Flamboyant pod bark, milk bush kernel shell and rice husk. Sequence of suitability of the selected isotherms in the study was Temkin ? Freundlich > Dubinin-Radushkevich > Langmuir for adsorption of acenaphthene. It therefore shows that Temkin isotherm is the most suitable model for fitting experimental data obtained from adsorption of acenaphthene from simulated wastewater unto activated carbon produced from Flamboyant pod bark, milk bush kernel shell and rice husk.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An n-dimensional pseudo-differential type operator involving Hankel type transformation
In this paper Bessel type differential operator and an n-dimensional pseudo-differential type operator involving the n-dimensional Hankel type transformation is defined. The symbol class is introduced. It is shown that pseudo-differential type operators associated with symbols belonging to this class are continuous linear mappings of the n-dimensional Zemanian space into itself. An integral representation for the pseudo-differential operator is obtained. By using the Hankel type convolution, it is shown that the pseudo-differential type operator satisfies a certain norm inequality.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Security Aware Routing Protocol for Mobile Ad Hoc Networks
Mobile Ad-Hoc Networks (MANETs) uses security routing scheme for establishing secure route and securely data transmission. The security issues in MANET are mostly concentrated in two parts. The main security threat in MANET is integrity, non-repudiation and privacy. To combat with these security threats, many secure routing protocols has been designed to reduce the security threats in MANET. In this paper we have proposed Privacy Aware Routing Protocol (ESARP) to enhance the security levels in the routing protocol to prevent the network attacks. The proposed work consists of three parts. In the first part each node perform a key exchange operation with its one and two hop distance neighbours, in the second step, secure route establishment and in the third step, secure data communication is performed. Key exchange operation is done in two steps; in the first step, source node (S) exchanges public key (e) with its one hop distance nodes and establish a secret key (SK), and in the second step, source node exchanges public key with its two hop distance nodes and establish a secret key. On establishing the key exchange process node can participate in routing process. In route establishment process, secure route will be established between the sender and receiver. In the third step, sender and receiver will exchange their public key securely and establish a secret key for communication and then data communication is performed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analytical solution of Unsteady MHD free Convection and mass transfer past a Vertical Porous Plate with Slip Flow Region
The unsteady free convection flow of a laminar viscous, incompressible, electrically conducting with chemical reactive species and heat generation fluid past a semi-infinite vertical plate embedded in uniform porous medium with slip flow region has been studied. The governing equations are solved analytically using perturbation techniques. The influences of the various parameters on the flow field, Temperature field, Mass concentration field, Skin friction, Rate of heat transfer and Rate of mass transfer are extensively discussed through Graphs and Tables.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analyzing blood cell images to differentiate WBC and counting of linear & non-linear overlapping RBC based on morphological features
In this paper we propose a new set of features based on morphology for total RBC count in given blood sample is explained along with classification of WBC. For the diagnosis of any disease first requirement is complete blood count i.e total number of RBC, WBC and platelets in given blood sample. And if there are excess of any of these types or any of these is few in number then this gives the doctor a basic idea that the person is not healthy for sure. To do this manually is very tedious. Here RBC and WBC are first differentiated and then counted through some algorithm. Implementation here is done through MATLAB.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Antimicrobial, DNA cleavage and antitumoral properties of some transition metal complexes of 1, 10 –phenanthroline and 2, 2? – bipyridine: a review
Transition metal ions coordinated to nitrogen containing ligands, such as 1, 10 – phenanthroline and/or 2, 2? – bipyridine have found wide applications in chemotherapy. The ligands form very stable chelates with many first row transition metals and the ligands, as well as some of their derived complexes, do exhibit antimicrobial properties. The mechanism of action of these novel set of drugs was reviewed and compared to that of the conventional antifungal drugs (polyene and azoles). Transition metal complexes of 1, 10 – phenanthroline and/or 2, 2? – bipyridine demonstrated a significantly different mode of action and thus could be used either in combination with existing antimicrobial drugs or in a situation where resistance to conventional antimicrobial drugs have emerged. However, the antimicrobial properties of the various transition metal complexes of phen and bpy are not uniform indicating a degree of metal – ion dependency on their mode of action. The DNA binding, DNA cleavage and antitumoral properties of the transition metal complexes of the chelating ligands were also reviewed. DNA cleavage by these metallonucleases is reported to be dependent on the presence of a biological reductant (e.g. L-ascorbic acid, gluthathione) and an oxidant ( H2O2). The metal complexes were reported to control cancer cell division by significantly reducing DNA synthesis. However there is a significant difference in the mode of action of these novel sets of antitumoral drugs compared to the conventional antifungal drug cisplatin.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Bio-efficacy and dissipation of Beta-cyfluthrin against white fly in okra
Beta-cyfluthrin at 18 g a.i. ha-1 applied twice as foliar spray was found to be most effective in controlling the whitefly and dissipation pattern was studied by collecting okra fruits at 0, 1, 3, 5, 7, 10 and 15 days after last spray and analyzed at AINP on Pesticide Residues, Hyderabad. The initial deposits of beta-cyfluthrin (18.75 g a.i. ha-1) in okra fruits was 0.11 mg kg-1 dissipated to below detectable level (BDL) on 5th day.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Celebrate Esfandgan (Sepandarmazgan)
This research paper is about "celebrating Esfandgan", which aims at understanding the customs of ancient Persia, and transmit it to future generations is performed. In this study, which is an effort in order to preserve the legacies of the past, the definition of "Sepandar Mazgan", are very different in culture and resources, and how the ritual celebrations in different parts of the country, and also because the difference in time to hold it in different periods, have been studied. According to the March party providers, as the celebration of "Women of the earth", is held in this study, the relationship between these two cases have been investigated. Well as parts of the Avesta, the two poems in praise , and the common denominator is that enhance are referenced. Given that, Valentine, among the Romans, called the day of love is named, as well as Sepandar Mazgan celebrate the Day of the Woman, the epitome of love, has been named in the investigation of how the appearance of Valentine's Day , Rome and Persia, is also noted.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Comparative Study of Page Replacement Algorithms
A page fault is a kind of delay, put forward by the system hardware on accessing of a page by a process in execution, which is plotted in the virtual memory, but not really stacked to the main memory. The set up which observes the interrupt is known as the CPU's memory management unit (MMU), whereas the exception handling program which tackles these interrupts is mainly a section of systems program kernel. During managing an interrupt, the systems program normally take attempts in making the needed page obtainable at the locale in physical memory, or aborts the process in a scenario of unauthorized memory retrieval. In this paper we have done a survey on different techniques to handling a page fault or an interrupt.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]