Download Cover Page IJMIE_June_2012......
PARTICULAR
|
Page No.
|
A Case Study: Increasing The Aeration Efficiency By Redesigning The Aerator For A Tertiary Treatment Plant In A Nitrogenous Fertilizer Plant. M.Sathiyamoorthy, Biraju.J.Sanghavi, Zelalem Tumsa, Ali Shemsedin and Hagos Birhane
Abstract:
The main objective of this work is to redesign the aerator which is used for a tertiary treatment plant in a nitrogenous fertilizer plant. The existing aerator used in the fertilizer tertiary treatment plant is surface aerator. Totally there are 8 aerators used, each consuming 35HP power per day which was found non economical and least efficient because of higher power consumption. So a fine bubble aerator was proposed. In this fine bubble aerator the factors such as retention time, sludge age, BOD removal, and oxygen required were analyzed. The result shows that oxygen transfer efficiency is 50% and also it exhibits high aeration efficiency. Compared to coarse bubble aeration, fine bubble aeration can reduce power required to transfer oxygen by up to 50%.
Download full Lenght Paper......
|
1-17
|
Technology Transfer: A Study of Export Marketing of Sanganer Printing Apparels.
Suresh Kumar Sharma And Hemlata Manglani
Abstract:
The National Strategy for Manufacturing prepared by the National Manufacturing Competitiveness Council (NMCC) has indicated that the decade 2006-2015 will be the decade of Manufacturing for India, with the aim of an average growth rate of 12 - 14 percent in manufacturing. It has also been suggested that the policies of Government should focus on the growth of labour intensive sectors (like Handicrafts), which also enjoy a competitive advantage. To provide an impetus to the growth of this industry, there is need for substantial augmentation in the overall Plan allocations for the Handicrafts sector, based on the felt needs of different segments of the sector.
Download full Lenght Paper......
|
18-48
|
An Algorithm for Land Surface Temperature Analysis of Remote Sensing Image Coverage over Dehradun District, Uttarakhand, India. Kamlesh Khanduri, Prabhir Singh, Neetu Verma and Avtar Singh
Abstract:
Estimation of LST from remotely sensed data is nowadays usual. LST is a key parameter in the physics of land surface processes because it is involved in the energy balance as well as in the evapotranspiration and desertification processes (Peres and DaCamara, 2004). This study investigates the thermal variations of the different land use/cover types in Dehradun district retrieved from Landsat ETM+ imagery of October, 2005. Band 2, 3, 4 and 6 of the imagery were used in the landuse classification, estimation of NDVI, land surface emissivity values, and satellite sensor temperature.
Download full Lenght Paper......
|
49-57
|
A Study Of Newspaper Readership Patterns Among Urban Population Of Punjab. Kanwal Gurleen Singh and Rajneesh Arya
Abstract:
Newspapers have been a source of information to one and all from various years. However, with the proliferation of TV News Channels, Readers' choice of getting news and information has changed. The evolution of new media has expanded the horizons for news and information gatherers, the focus of this study is on identification of habits and preferences of Newspaper readers. This study has been conducted to identify the Newspaper readership patterns among urban population of Punjab. The study also identifies the Language preferences and time spent on reading newspaper by urban population of Punjab.
Download full Lenght Paper......
|
58-74
|
Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication. Brajesh Patel and Neha Jha
Abstract:
In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and suitability for constraint environment such as mobile sensor applications. Here both computing resources and power availability are limiting factors. Thus, it is expecting to have cryptographic algorithms for low power consuming, less computing, and highly secure for mobile sensor networks. Elliptic curve cryptography (ECC) is an emerging favorite because requires less computational power, communication bandwidth, and memory when compared to other cryptosystems.
Download full Lenght Paper......
|
75-90
|
Security Optimization Of E-Governance WebPages. Subhash Chander, Ashwani Kush and Sharmila
Abstract:
ICT is being applied in various fields nowadays. Affected fields in this category include education, commerce, health and governance. Due to this effect day by day a number of websites and portals are taking birth. No doubt it is for the benefit of the society and its and its people. But as the number of websites and web application are growing exponentially, security of these is becoming main issue. As soon as more and more services are going to be online the risk of losing that information is increasing due to various security concerns. Not only loosing the information, unauthorized changes made in that information may be more dangerous than loss of the data.
Download full Lenght Paper......
|
91-98
|
E-Governance in Punjab - A SWOT Analysis. Dr. Vikram Singh and Subhash Chander
Abstract:
The present study deals with impact, challenges, chances to grow and implementing precaution measures. Descriptive & inferential studies carried out with association of literature review. SWOT Analysis carried out based on the survey of 256 expert's opinion of various NIC/IT/department Heads as a pilot study. This study also reveals that what are the precaution measures which must be taken by the implementing agency while implementing new e-governance initiative. It may be observed review of literature that some pioneer work has been done by various researchers on ICT and good governance in developing countries including India.
Download full Lenght Paper......
|
99-110
|
Software Reliability Measurment Based On API and Information Theoretic Metrics. Pratiksha D. Patil, Dr.S. D. Joshi and Gauri Rao
Abstract:
Measuring the quality of software now days is one of the most important tasks. In this research paper we are enhancing the software quality measurement using API and theoretic information metrics. Along with the new set of metrics that measure the quality of modularization of a non-object-oriented software system, we are presenting metrics that also measures the quality of modularization of object oriented software system. We have proposed a set of design principles to capture the notion of modularity and defined metrics centred on these principles.
Download full Lenght Paper......
|
111-121
|
Recycling And Reusing The E-Waste. Ms. Ashwini Dakare and Prof. Ajay P. Thakare
Abstract:
Every year industry develops a new technology & in the entire world the use of electronic products has grown substantially over the past two decades, changing the way & speed of communication. Rapid changes in technology, low initial cost & planned obsolescence have resulted in fast growing surplus of electronic waste around the globe. The world produces about 40 millions tones of waste from electronic devices known as E-Waste. Large quantity of unused electronic waste causes serious pollution problem, environmental & health hazards because it contains some very serious contaminants such as CRTs, PCB, Silicon, Carbon, Arsenic, Cadmium, Mercury etc.
Download full Lenght Paper......
|
122-135
|
Cloud Computing-New Vision to the World. Pravin Gurjar, Viki T. Patil, Prashant Gosavi and Dr. B. B. Meshram
Abstract:
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. A cloud is a large pool of resources, unified through virtualization or job scheduling techniques, these resources can be managed to dynamically scale up to match the load, using a pay-per-resources business model. The resources include hardware and systems software on remote data centres, as well as services based upon these that are accessed through the Internet. Key features advertised are elasticity, multi-tenancy, maximal resource utilization and pay-per-use.
Download full Lenght Paper......
|
136-144
|
Fingerprint Matching Incorporating Ridge Features Using Wavelet Transform. D.Chelladurachi and S.Muthukumar
Abstract:
Next to DNA, fingerprint is the unique feature which identifies the individual. Due to distortions such as skin elasticity, non uniform pressure applied by the subject, different finger placement with the sensor and deformations in the skin, the fingerprint is difficult to match in the conventional minutiae only approach. But when ridge features are incorporated with minutiae features (minutiae type, orientation and position) more topological information is obtained. And also ridges are invariant to transformations such as rotation and translation.
Download full Lenght Paper......
|
145-158
|
Multi Objective Multi Agent Based AccessPoint Selection Mechanism using Fuzzy Logic. Vikas K.Soman and Vinodh P.Vijayan
Abstract:
The last few years have seen a tremendous increase in the deployment of 802.11 Wireless Local Area Networks (WLANs). The proliferation of wireless users and the promise of converged voice, data and video technology is expected to open new numerous opportunities for 802.11 based WLANs in the networking market.When the WLAN design was first developed in 1990, the model assumes that a WLAN deployment comprises one stand alone Access Point (AP).In fact, such a system provides satisfactory user experience as long as there is few users with relatively light traffic load and one AP. Due to rapid increase of wireless users and the requirement for continuous coverage, multi-AP WLANs now a days span buildings or floors.
Download full Lenght Paper......
|
159-167
|
Mapping the Agricultural Geography: A District Wise Pattern in the South-Eastern Part of the Punjab Province in Colonial India. Dr. Mahender Singh
Abstract:
The South-Eastern part of the Punjab was somewhat backward during 1858-1947. This sub-region was also located away from the perennial rivers Punjab and the river Jamuna's course was along the eastern boundary of the state. The non-perennial river Ghaggar, which passed through the northern parts of this area, caused considerable yearly damage to agriculture. Rainfall was low and erratic, and in the peak period, July to September, there were often early local and wide spread floods. The soil was sandy and light in texture. Irrigation through wells was extremely limited.
Download full Lenght Paper......
|
168-183
|
Implementation of virtual private drive using cloud O. S. Akanksha Bilse, Pranita Mate, Pravin Balbudhe and Vikram Borkar
Abstract:
As an emerging technology and business paradigm cloud computing has taken commercial computing by storm cloud computing platform provides easy access to a company high performance computing and storage infrastructure through web services. This article gives a quick introduction to cloud storage in the form of virtual private drive in cloud o. s. in which you store your photos, docs, videos. and virtual drive with online music player ,video player and online PDF, doc viewer thus no need to download extra software and you will access your data from anywhere through your desktop ,mobile, laptops, tablets and servers or other computing resource with web browser.
Download full Lenght Paper......
|
184-197
|
Object Oriented Metrics Measurement Paradigm. Dr. K.P. Yadav, Ashwini Kumar and Sanjeev Kumar
Abstract:
The increasing importance of software measurement has led to development of new software measures. Many metrics have been proposed related to various constructs like class, coupling, cohesion, inheritance, information hiding and polymorphism.
The central role that software development plays in the delivery and application of information technology, managers are increasingly focusing on process improvement in the software development area. it is very difficult for project managers and practitioners to select measures for object-oriented systems.
Download full Lenght Paper......
|
198-208
|
Establishment Of The Relationship Between Occupational/ Job Stress And Occupational Anxiety-A Study Of Marketing Managers Of Selected Indian Private Banks At Nagpur. Mrs. Rumi Dasgupta
Abstract:
Management Facilitator Peter Drucker wrote "Marketing is the distinguishing unique function of the business." In 1991, Marketing expert Regis Mckenna expressed a viewpoint in Harvard Business Review Article as - "Marketing is everything because the marketing encompasses all factors, that influence a company's ability to deliver value to customers, it must be all pervasive part of everyone's job description, from the receptionist to the Board Of Directors. Marketing Management encompasses wide varieties of functions and activities; such as Marketing Research and analysis, Marketing Strategies and Action Plan, Marketing Project Management, Process and Vendor Management, Organizational Management, Reporting, Measurement, Feedback and Control Systems etc.
Download full Lenght Paper......
|
209-219
|
Various Factors Influenceing Retention Of Employees In Technical Institute. Rathnakar G and Prahallada M. C
Abstract:
It is widely believed that technical institutes are plagued by shortages of teachers, primarily due to recent increases in enhanced student enrollments, new courses, new institutes and teacher retirements etc. This investigation summarizes a series of analyses that have investigated the possibility that there are other factors tied to the organizational characteristics and conditions of technical institutes that are behind technical institute staffing problems. The data utilized in this investigation are from the technical institute. These data indicate that technical institute staffing problems are not primarily due to teacher shortages, in the sense insufficient availability of qualified teachers.
Download full Lenght Paper......
|
220-232
|
A Survey on Data Security & Computer Networks. Mr. Shashiraj Teotia, Mr. Ravi Punia and Mrs. Monisha Awasthi
Abstract:
This research deals with data security in distributed and client/server computer systems, placing special emphasis on access security.
The paper presents the subject of data security & computer Networks in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryption and access control, the main components in data security management of distributed systems.
Download full Lenght Paper......
|
233-244
|
A Study on Liquidity, Profitability and Working Capital Management of Co-Operative Dudh Sangh. Prof. R.G.Sathe
Abstract:
Working capital management involves the management and control of the gross current assets. Its effective management provision can do much more to the success of the business. Its inefficient management can lead not only to loss of profits but also to the downfall of a business. A study of working capital is of major importance to internal and external analysis because of its close relationship with the current day-to-day operations of a business.In the present competition, the business dose not have any other option than cutting the cost of its operations in other to survive and continue to be financially healthy.
Download full Lenght Paper......
|
245-256
|
Diversity Reception Technique for QoS Improvement. Sunil J Wagh, Dr. U.V. Kulkarni and Dr. S. Qamar
Abstract:
The diversity is used to provide the receiver with several replicas of the same signal. The diversity techniques like selection diversity, equal gain diversity and maximum ratio combining diversity have been discussed to improve the quality of service parameters in CDMA communication network.
Download full Lenght Paper......
|
257-263
|
SAP - A simple way for optimal utilization of resources. S. Kishor Kumar and M. Suresh Kumar
Abstract:
ERP Enterprise Resource Planning, used to plan our resources in order to get good profits with less effort. A sound foundation is necessary to compete and win the global marketplace. The SAP ERP application supports the essential functions of the business processes and operations efficiently and is tailored to specific needs of the industry.
Download full Lenght Paper......
|
264-270
|
Self-Aware Dynamic Routing in Wireless Sensor Networks. K.Pranesh Raja
Abstract:
Delay in Wireless Sensor Networks has negative impact on the performance, namely, decreased throughput and increased per-packet energy consumption. In wireless sensor network, when congestion occurs in the intermediate level, the forwarding node takes the load status about its neighbors into account in order to scatter the excessive packets, an appropriate detour path consisting of idle or under loaded nodes can be found purposely. But the detour path takes large end-to-end delay.
Download full Lenght Paper......
|
271-279
|
Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network. Mr. Amol V. Zade and Prof. Vijaya K. Shandilya
Abstract:
A major aspect of ad-hoc networks is that the nodes can move randomly, which requires the routing protocols. The routing protocol should try to minimize control traffic, such as periodic update messages. Instead the routing protocol should be reactive, thus only calculates routes upon receiving a specific request. The On-demand protocol performs better than the table-driven protocol. The simulator that we are using is Network Simulator (NS-2) which is a most widely used network simulator. It has the capabilities to simulate a range of networks including wired and wireless networks. The size of the network and the offered traffic load affects protocols based on routing, like AODV, to some extent.
Download full Lenght Paper......
|
280-290
|
Fuzzy Controller for an Image based Traffic System. Anna Merine George and Palika Shetty S
Abstract:
Traffic problems nowadays are increasing because of the growing number of vehicles and the limited resources provided by current infrastructures. The simplest way for controlling a traffic light uses timer for each phase.
We propose a fuzzy based system for traffic control since the most desired factor in a traffic controller is that it should be adaptive to any changes in the traffic flow. Thus a fuzzy logic enables control engineers to systematically implement control strategies used by human operators with experience and expertise.
Download full Lenght Paper......
|
291-305
|
Global Positioning System Data Logger. Amar V. Sable and Prof. V. S. Gulhane
Abstract:
A GPS tracking unit is a device that uses the Global Positioning System to determine the precise location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular intervals. The recorded location data can be stored within the tracking unit, or it may be transmitted to a central location data base, or internet-connected computer, using a cellular (GPRS or SMS), radio, or satellite modem embedded in the unit. This allows the asset's location to be displayed against a map backdrop either in real time or when analysing the track later, using GPS tracking software.
Download full Lenght Paper......
|
306-318
|
Design of Distributed System application on SOA, WPF, WF and WCF like new technologies: a Survey. Mr. Shrimant B. Bandgar, Mr. Manojkumar Bhosle, Prof. Mr. T. M. Bansod and Dr. B. B. Meshram
Abstract:
In this paper, a Survey of Latest Technologies used in the Software companies based on the latest Service Oriented Architecture (SOA) ,Windows Presentation Foundation (WPF), Windows communication foundation (WCF), Windows Workflow Foundation(WF) technologies, which can satisfy the demand on any request , WPF provide Graphical Window view ,SOA provide Architecture , WF provide Object orient Workflow and WCF provide the communication layer which work like Middleware like RPC,RMI CORBA. The server side services are designed as based on template architecture which could change database in configuration file. To satisfy the demand on performance, the requests are transmitted by message service.
Download full Lenght Paper......
|
319-329
|
Rain Technology. Kamaldeep Kaur
Abstract:
The massive jumps in technology led to the expansion of internet as the most accepted medium for communication. But one of the most prominent problems with this client server based technology is that of maintaining a regular connection. Even if a sole intermediate node breaks down, the entire system crumples. The solution to this problem can be the use of clustering. Clustering means linking together two or more systems to manage erratic workloads or to offer unremitting operation in the event one fails .Clustering technology suggests an approach to augment general reliability and performance.
Download full Lenght Paper......
|
330-341
|
Flow and Heat Transfer in Straight Duct. Sabah Tamimi
Abstract:
In the present work, a wall element technique based on finite element method (FEM) has been developed and adopted in the zone which is closed to the solid walls of a long straight channel which replaces the traditional use of the empirical laws for the determination of confined turbulent flow associated heat transfer. The validity of this technique was investigated and well compared with other standard techniques.
Download full Lenght Paper......
|
342-353
|
Comparative Approach for Work Study and RTA (Robot Time Analysis) Method on Powder Coating Line Based on Minimization of Cost. Gunvanta T. Dhanuskar, Jayant P. Giri, Dr.V.S.Tatwawadi and S.G.Mahakalkar
Abstract:
The aim of this research paper is to minimize the processes and production cost in a spray powder line. The coating operation is the bottleneck point in modular furniture industries. For minimize the wastage of the powder by avoiding overspray painting on the article and improved the quality of the coating by using work study methodology and RTA method. Both are widely used to produce articles as per customer's demands. The sequencing is an important factor in powder coating industries. For resolved the sequencing problem in favour of minimizing the total cost and keeping uniform usage of each part and cost model is presented. To get best alternative between work study and RTA method, a comparison is done, concerning sequencing problem.
Download full Lenght Paper......
|
354-371
|
Visual Cryptographic Steganogrphy In Images. Neha Chhabra
Abstract:
In the multimedia steganocryptic system, the message will first be encrypted using public key encryption algorithm, and then this encrypted data will be hidden into an image file thus accomplishing both data encoding and hiding. The multimedia data will be used to provide the cover for the information. Visual steganography is one of the most secure forms of steganography available today. It is most commonly implemented in image files. However embedding data into image changes its color frequencies in a predictable way. To overcome this predictability, we propose the concept of multiple cryptography where the data will be encrypted into a cipher and the cipher will be hidden into a multimedia image file in encrypted format.
Download full Lenght Paper......
|
372-386
|
Features Selection for Image Clustering using Limited Device. Monika Bhatnagar and Dr. Prashant Kumar Singh
Abstract:
Image classification is becoming a prominent field with the passage of time. Image classification on limited devices such as cellular phone is also coming in demand as the technology is advancing. So for constructing classifier the use of clustering is coming into picture for its ability to use less space which is a prime factor for limited devices. Thus for constructing the classifiers several features have to be considered. This paper shows what features can be considered in order to create an efficient classifier on limited device such as cellular phone.
Download full Lenght Paper......
|
387-401
|
Steps For Implementation of 5S. Kaushik Kumar and Sanjeev Kumar
Abstract:
5S is an effective approach for enterprise management. This paper describes the steps undertaken for the implementation of the 5S emphasizing on the benefits to the organisation. Here the steps involved in the implementation from inception to execution have been discussed. A special emphasis has been given on the ways of implementation of each of the 5 S's of 5S.
Download full Lenght Paper......
|
402-416
|
Integration Of EC & IC Engine's Working. Abhimanyu Joon and B.S.Patel
Abstract:
It is known that when any kind of fossil fuel is burnt two phenomenons take place (i) Explosion and (ii) Heat generation. In the concept that is stated it is desired to merge the functioning of External Combustion (EC) and Internal Combustion (IC) engines on the basis of their working principle. In an EC engine the motive power is obtained by utilizing the factor of heat alone, which results in vaporization of a fluid that is used to move the piston inside the cylinder piston arrangement. Whereas in an IC engine the motive power is derived form the explosion factor, which takes place inside a control volume, thereby providing the necessary power to push the piston for obtaining the desired working motion.
Download full Lenght Paper......
|
417-433
|
4G Wireless Networks: Benefits and Challenges. Pushpendra Kr. Verma and Dr. Jayant Shekhar
Abstract:
The era of new wireless communications is upon us. Eventually it will penetrate into our daily life and change the way we live just like many technological innovations whose original research came from the military needs. In this paper, we investigate future wireless network especially in the hostile military environment. By combining two hottest wireless network topics, 4G (the fourth generation of cellular communication systems) and MANET (the Mobile Ad-hoc Network), we explore potentials as well as foreseeable challenges to the wireless communications in the future battlefield.
Download full Lenght Paper......
|
434-441
|
Design & Development Of A New And Efficient Approach For Line Text Editing In Turbo Pascal 7 For Windows*. K. J. Satao
Abstract:
Text editors come in the forms viz. Line editors, Stream editors, Screen editors, Word processors, Structure editors, etc. There are many text editors provided with Windows viz. Notepad, WordPad, Microsoft Office Word, etc. The MS-DOS editors viz. EDLIN, EDIT also work in Windows. But none of the above editors is interactive. The process of entering the programs/text shall be greatly enhanced, for the newcomers, if the editor is an interactive one. This paper gives the design & development of a new and efficient approach for line text editing, the most basic and fundamental editing, in Turbo Pascal 7 for Windows OS. It is proposed to give a new, interactive, and more user friendly approach to line text editing for document / non document(program) files using singly linked lists.
Download full Lenght Paper......
|
442-480
|
DESIGN & DEVELOPMENT OF A NEW AND EFFICIENT APPROACH FOR LINE TEXT EDITING
IN TURBO C FOR WINDOWS K. J. Satao
|
481-514
|
WAVE PROPAGATION IN POROUS LAYERED MEDIUM
IN TURBO C FOR WINDOWS Rajkala
|
515-525
|
An Experimental Study of DSR algorithm for Ad-Hoc Networks
IN TURBO C FOR WINDOWS Ashwani Gupta
|
515-525
|