Documente Academic
Documente Profesional
Documente Cultură
Editorial
I am happy to convey that second issue of third volume of "International Journal of Scientific and
Innovative Research (IJSIR)", a bi-annual journal has been published by Sky Institute, Lucknow in an
effort to promote multidisciplinary scientific and innovative research of societal benefit. This journal
covers all branches of science, technology, engineering, health, agriculture and management.
Research articles in the field of education are also encouraged in order to promote educational
technology aiming at improvement in present educational system. As research and development (R &
D) has been playing a significant role in overall development of society, continuous multidisciplinary
innovative research in science and technology is needed to address the challenges in context to
changing environmental conditions in the present era of gradual increase in industrial and
technological advancement at global level. Efforts should be made to develop eco-friendly
technologies in order to provide solutions for developing socially, economically and culturally
sustainable society.
The present issue of International Journal of Scientific and Innovative Research (IJSIR) contains 40
research papers I articles covering different areas of science and technology. All these papers are well
written and informative in content. I express my sincere thanks and gratefulness to Mr.Mohit Bajpai,
Chairman, Sky Institute, Lucknow (U.P.), India for his support in publishing it. I express my thanks to
members of Committee for Editorial Assistance Dr. B.C.Tripathi, Dr. Pankaj Verma, Shri Sanjay
Pandey, Shri Sanjay Dixit and Mr. Shamshul Hasan Khan for their hard work and devotion in giving
the final shape to the journal. I am thankful to all faculty members, scientists and research scholars of
different universities, research organizations and technical institutions for contributing their research
articles for publication in the present issue of the journal. The help provided by faculty members and
supporting staff of Sky Institute in publishing the present volume of the journal is also acknowledged. I
hope scientists, academicians and young researchers will be greatly benefited by this publication for
their research work.
I request humbly to the readers and contributors of our journal to continue encouraging us for regular
publication of the journal. Any suggestion and comment for the improvement in the quality of the
journal are always welcome.
Dr. B. R. Pandey
Editor-in-Chief
EDITOR-IN-CHIEF
FORMER
DIRECTOR (RESEARCH)
SKY INSTITUTE, KURSI ROAD, LUCKNOW, U.P, I NDIA
FORMER JOINT D IRECTOR, COUNCIL OF SCIENCE & TECHNOLOGY , UP, LUCKNOW
(D EPARTMENT OF SCIENCE AND TECHNOLOGY , UP GOVERNMENT ), INDIA
PROFESSOR, INTERNATIONAL INSTITUTE OF HERBAL M EDICINE (IIHM), LUCKNOW, U.P., INDIA
E- MAIL ID: editorijsir02@gmail.com, MOBILE-: 9794849800
Assistant Prof.
Deptt. of Education,
Rama P.G. College,
Chinhat, Lucknow,
Uttar Pradesh
Assistant Prof.
National Institute of
Fashion Technology,
Raebareli,
Uttar Pradesh
Research Scholar,
Sai Nath University,
Ranchi,
Jharkhand
ADVISORY BOARD
Prof.(Dr.)S. P. Ojha
Prof.(Dr.)V.K. Srivastava
Former Prof & Head, Deptt. of Community Medicine
Head, Deptt. of Home Sci., Mahila P.G. College, Kanpur, Uttar Pradesh
Prof.(Dr.)N.S. Verma
Prof.(Dr.)A.K. Tripathi
Prof & Ex- Head, Deptt of Biochemistry, Former Pro- Vice Chancellor,
Former Dean, Faculty of Science, University of Lucknow, Lucknow, U.P.
Prof.(Dr.)C.M. Pandey
Prof.(Dr.) V.K.Tondon
Former Prof & Head, Deptt. of Chemistry, Ex- Dean Faculty of Science,
University of Lucknow, Lucknow, Uttar Pradesh
Dr. S.Sinha
Dr. K.Raman
Dr. P.K.Agarwal
Dr. R.K.Singh,
Former Director,
R. M. L. Institute of Medical Sciences, Lucknow and Prof. & Head,
Deptt. of Radiotherapy, K. G. Medical University, Lucknow, Uttar Pradesh
www.ijsir.co.in
295
EDITORIAL BOARD
Prof.(Dr.) Y.B. Tripathi
Dr. K.K.Verma
Prof. & Head , Deptt. of Biochemistry, Shri Guru Ram RaiInstitute of Medical
& Health Sciences, Dehradun, Uttarakhand & Former Prof. & Head,
Department of Biochemistry, K. G. Medical University , Lucknow, U.P.
Dr. S.K.Tiwari
Senior Principal Scientist ,CSIR- National Botanical Research Institute,
Lucknow, Uttar Pradesh
Lucknow Associate Prof. & Coordinator, Deptt. of Applied Physics, School for
Physical Sciences, Babasaheb Bhimrao Ambedkar University, Lucknow, U.P.
Prof. & Head, Deptt. of Oral & Maxillofacial Surgery, Faculty of Dental
Sciences, K. G. Medical University, Lucknow, Uttar Pradesh
Dr.A.K.Pandey
Dr.S.K.Pandey
Dr. C.M.K.Tripathi
Former Deputy Director & Head, Division of Fermentation Technology, CSIRCentral Drug Research Institute , Lucknow, Uttar Pradesh
Dr.G. N. Pandey
Prof.(Dr.) L. Pandey
Prof.(Dr.) J.P.N.Rai
Prof.& Head, Deptt. of Environmental Sciences, G.B. Pant University of Agr. &
Technology, Pant Nagar, Uttarakhand
Prof. & Head, Deptt. of Biochemistry, Banaras Hindu University, Varanasi, U.P.
Prof. V.P.Sharma
Former Deputy Director & Head , Aquatic Toxicology Division, CSIR- Indian
Institute of Toxicology Research, Lucknow, Uttar Pradesh
Prof.(Dr.) S. M. Natu
Prof., Deptt. of Pathalogy,K.G. Medical University, Lucknow, Uttar Pradesh
Prof. , Deptt. of Civil Engg., Institute of Engg. & Technology, Sitapur Road ,
Lucknow, Uttar Pradesh
Prof.(Dr.)V.K. Sharma,
Prof.(Dr.)Anil Gaur
Prof., Deptt. of Biotechnology & Genetic Engg., G.B. Pant University of Agr.
& Technology, Pant Nagar, Uttarakhand
296
www.ijsir.co.in
297
organized several national and international conferences. He has actively participated in national and
international conferences, symposia and workshops and presented research papers and chaired scientific /
technical sessions. He is life member and fellow of many scientific societies such as National Academy of
Sciences India , Society of Toxicology of India, Indian Academy of Neurosciences, Bioved Research
Society India, International Society for Herbal Medicine (ISHM), Society of Biological Sciences and Rural
Development, India. He has been member of several scientific expert committees/ advisory committees to
evaluate scientific research proposals. Dr. Pandey has been actively associated with various universities
and institutions in India as examiner for conducting graduate, post graduate and doctoral level examinations
in disciplines like chemical sciences, pharmaceutical sciences, biochemical sciences, biotechnology and
allied areas and member of Board of Studies for the academic development in the department. He has been
approved research supervisor for guiding research in chemistry, biotechnology and related areas from various
universities of India leading to PhD Degree. In view of his vast research and administrative experience and
broad R & D vision, Dr. Pandey has been associated with International Journal of Scientific & Innovative
Research (IJSIR) as Editor-in-Chief.
298
www.ijsir.co.in
Sky Institute
www.ijsir.co.in
299
CONTENTS
SIGNIFICANCE OF ASCORBATE IN TRANS-PLASMA MEMBRANE ELECTRON
TRANSPORT IN HEALTH AND DISEASE OF HUMANS: REVIEW
PAGE
1
12
Nimisha Singh, Vibha Singh, Satish Dhasmana, Ridhi Jaiswal, Gagan Mehta
17
26
41
58
67
71
78
Ankit Kumar Srivastava, Neeraj Kumar Tiwari and Bineet Kumar Gupta
BIOCONTROL : AN OVERVIEW
83
Kalpana Singh
90
Monika Raghuvanshi
97
105
107
Ankita, K P Yadav
115
Sucheta, K P Yadav
SURVEY AND ANALYSIS OF CURRENT WEB USAGE MINING SYSTEM AND TECHNOLOGIES 123
Vignesh V., K. Krishnamoorthy
300
www.ijsir.co.in
129
E. Gajendran, K P Yadav
136
142
G Sarvanan, K Krishnamoorthy
STUDY AND ANALYSIS OF SINGLE POINT CUTTING TOOL UNDER VARIABLE RAKE ANGLE
150
158
MANUFACTURING QUALITY
169
173
N L Maharaja, B. Kumar
179
186
196
206
Shalini Bariar
210
216
226
232
241
Prakash Yadava
244
301
248
Renuka Singh,
255
261
267
270
277
281
286
INSTRUCTION TO AUTHORS
287
SUBSCRIPTION FORM
291
UNDERTAKING
292
COVER LETTER
293
302
www.ijsir.co.in
ABSTRACT
Trans-Plasma membrane electron transport (t-PMET) has been established in the year
1960s.This system (t-PMET system) transfer electron across the plasma membrane, which
results in the net reduction of extracellular oxidants (e.g., ferricyanide) at the cost of intracellular
reductants such as NADH and ascorbate. Ascorbate (vitamin C), helps in the protection of
organism against a variety of oxidative agents. Oxidation of ascorbate takes place in two oneelectron steps, the first step results in the Ascorbate Free Radical (AFR) formation. AFR can be
oxidized further to produce dehydroascorbic acid (DHA) and also two molecules of AFR
disproportionate to form one DHA and one ascorbet molecule. In humans, NAD(P)H- and NADH
dependent system have been distinguished. Recent finding suggest that transplasma membrane
ascorbate/dehydroascorbate cycling enhance NTBI reduction and uptake by human
erythroleukemia (K562) cells. By this phenomenon cell can respond to change in the redox
microenvironment which is responsible for regulating several biological functions such as cell
metabolism, proton pumping, and activity of ion channels, growth and death. This review will
give an update on functional significance of ascorbate in t-PMET and emphasis on its correlation
to some harmful diseases, such as cancer, abnormal cell death, cardiovascular diseases, aging,
obesity, metabolic syndrome etc. and genetically linked pathologies.
Keywords: Dehydroascorbate, ascorbate free redical, K562 cells, vitamin.
INTRODUCTION
Transplasma membrane electron transfer
(tPMET) systems are responsible for reducing
extracellular electron acceptor utilizing cytosolic
electron doners. In humans, NAD(P)H and
NADH-dependent systems have been
distinguished. tPMET activities are related to the
regulation of vital cellular processes including the
bioenergetics, regulation of growth and
differentiation, apoptosis, pH control and
mitogenesis cell signal transduction,
antioxidation, and iron/copper metabolism. In
accordance, deregulation of tPMET is related to
various human conditions which includes aging
and neurodegeneration, macrophage-mediated
LDL oxidation in atherogenesis , diabetic
nephropathy and glycolytic cancer progression
[1]
. A distinction was made between NAD(P)H and
www.ijsir.co.in
BIOCHEMISTRY OF ASCORBATE
L-ascorbic acid (C 6 H 8 O 6 ) is the trivial/
common name of Vitamin C. The chemical name
of ascorbate is 2-oxo-L-threo hexono-1,4lactone-2,3-enediol.
L-ascorbic
and
dehydroascorbic acid are the major dietary forms
of vitamin C. The monovalent ascorbate anion
undergoes sequential one-electron oxidations
under physical condition of pH, temperature and
oxygen tension [5]. The first oxidation product is
relatively long-lived and electrochemically stable
ascorbet free radical (AFR; also known as semior mono-dehydroascorbate;E0= +330mV .The
first oxidation step of ascorbate requires relatively
low levels of circulating redox-active transition
metals, such as iron and copper [2]. AFR is
unreactive with dioxygen dissimilar to other free
radicals and it tends to decay mainly by
ASCORBATE-STIMULATED
PLASMA
MEMBRANE FERRICYANIDE REDUCTASE
tPMET activity is present in human
erythrocytes that utilizes intracellular ascorbate
which acts as major electron donor for reduction
of extracellular ferricyanide .After increasing
intracellular ascorbate by dehydroascorbate,
stimulation of the plasma membrane ferricyanide
reductase activity takes place [8].By the addition
of ascorbate oxidation the stimulation of
ferricynade reductase activity is not affected (all
extracellular ascorbate is oxidized to form DHA
and inhibits direct reduction of ferricyanide by
ascorbate),therefore intracellular ascorbate acts
as an electron donor for reduction of extracellular
ferricyanide (Lane et al., data not shown).Direct
addition of ascorbate could not reproduce the
stimulation of reductase activity; hence these
cells do not express significant levels of sodiumascorbate co-transporters (SVCTs) [9].
CELLULAR DHA UPTAKE
Maximum human cells are able to maintain
intracellular ascorbate concentration that is
remarkably higher e.g. up to 30-fold in some
www.ijsir.co.in
(D) Enzymes
1. NADPH oxidases
Fig.4.Structure of 2, 2, 6, 6,-tetramethyl-4hydroxypiperidine-N-oxyl
www.ijsir.co.in
Biological Function
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
REFERENCES
1.
2.
3.
www.ijsir.co.in
16.
17.
18.
10
279: 5171551718.
36. Nauseef WM. Biological roles for the NOX family NADPH
oxidases. J Biol Chem. 2008; 283: 1696116965.
37. Parkos CA, Allen RA, Cochrane CG, and Jesaitis AJ.
Purified cytochrome b from human granulocyte plasma
membrane is comprised of two polypeptides with relative
molecular weights of 91,000 and 22,000. J Clin
Invest.1987; 80: 732742.
38. Suh YA, Arnold RS, Lassegue B, Shi J, Xu X, Sorescu
D, Chung AB, Griendling KK, and Lambeth JD. Cell
transformation by the superoxide-generating oxidase
Mox1. Nature. 1999; 401: 7982.
39. Kikuchi H, Hikage M, Miyashita H, and Fukumoto M.
NADPH oxidase subunit, gp91(phox) homologue,
preferentially expressed in human colon epithelial cells.
Gene. 2000; 254:237243.
40. De Deken X, Wang D, Many MC, Costagliola S, Libert
F, Vassart G, Dumont JE, and Miot F. Cloning of two
human thyroid cDNAs encoding new members of the
NADPH oxidase family. J Biol Chem.2000; 275: 23227
23233.
41. Banfi B, Molnar G, Maturana A, Steger K, Hegedus B,
Demaurex N, and Krause KH. A Ca(2)-activated
NADPH oxidase in testis, spleen, and lymph nodes. J
Biol Chem. 2001; 276:3759437601.
42. Griendling KK, Sorescu D, and Ushio-Fukai M. NAD(P)H
oxidase: role in cardiovascular biology and disease. Circ
Res. 2000; 86: 494501.
43. De Deken X, Wang D, Many MC, Costagliola S, Libert
F, Vassart G, Dumont JE, and Miot F. Cloning of two
human thyroid cDNAs encoding new members of the
NADPH oxidase family. J Biol Chem. 2000; 275: 23227
23233.
44. Pachucki J, Wang D, Christophe D, and Miot F. Structural
and functional characterization of the two human
ThOX=Duox genes and their 5-flanking regions. Mol
Cell Endocrinol. 2004; 214: 5362.
45. Ameziane-El-Hassani R, Morand S, Boucher JL, Frapart
YM, Apostolou D, Agnandji D, Gnidehou S, Ohayon R,
Noel-Hudson MS, Francon J, Lalaoui K, Virion A, and
Dupuy C. Dual oxidase-2 has an intrinsic Ca2dependent H2O2-generating activity. J Biol Chem. 2005;
280: 3004630054.
46. Hyun DH, Emerson SS, Jo DG, Mattson MP, and de
Cabo R. Calorie restriction up-regulates the plasma
membrane redox system in brain cells and suppresses
oxidative stress during aging. Proc Natl Acad Sci U S A.
2006; 103: 1990819912.
47. Navarro F, Navas P, Burgess JR, Bello RI, De Cabo R,
Arroyo A, and Villalba JM. Vitamin E and selenium
deficiency induces expression of the ubiquinonedependent antioxidant system at the plasma membrane.
FASEB J. 1998;12:16651673.
48. Villalba JM, Navarro F, Cordoba F, Serrano A, Arroyo
A, Crane FL, and Navas P. Coenzyme Q reductase from
liver plasma membrane: purification and role in trans
plasmamembrane electron transport. Proc Natl Acad Sci
U S A. 1995; 92:48874891.
49. Li R, Bianchet MA, Talalay P, and Amzel LM. The
threedimensional structure of NAD(P)H:quinone
www.ijsir.co.in
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
www.ijsir.co.in
11
NIMISHA SINGH1,* VIBHA SINGH1, SATISH DHASMANA2, RIDHI JAISWAL3, GAGAN MEHTA1
Department of Oral and Maxillofacial Surgery, K.G. Medical University, Lucknow, Uttar Pradesh, India, 2Department of
Anaesthesia, R.M.L.Institute of Medical Sciences, Lucknow , Uttar Pradesh, India, 3Department of Pathology and
Microbiology, K.G. Medical University, Lucknow, Uttar Pradesh, India
*Address for Correspondence: Dr. Vibha Singh, Professor, Dept.s of Oral and Maxillofacial Surgery
,K.G.Medical University, Lucknow, Uttar Pradesh, India,
email: vibhasinghraghuvanshi@gmail.com
ABSTRACT
Aggressive fibromatosis or desmoid tumor is a benign but locally-aggressive tumor, which most
often affects the muscles of the shoulder, the pelvic girdle, and the thigh. This tumor has high
potential for loco regional extension. It is very rarely located in the mandible. The differential
diagnosis with malignant tumors is difficult. Surgery is the first-line treatment. However, alternative
therapies should be considered, especially in children, to avoid mutilating operations. This article
reports a case of aggressive fibromatosis involving mandible in a 13 year old female and literature
review.
Keywords: Desmoid, Fibromatosis, Mandible.
INTRODUCTION
Desmoid tumors (DT), also called
aggressive fibromatosis (AF), are rare
neoplasms, occurring both sporadically and in
the context of familial adenomatous polyposis,
also recognized as Gardner s syndrome.
Fibromatoses are a group of fibrous connective
tissue lesions that are morphologically classified
as benign neoplasms. They do not usually
develop distant metastasis, however, locally they
show an aggressive and infiltrative behavior. The
low incidence of this rare tumor presents
problems in both diagnosis and management.
Juvenile aggressive fibromatosis affects infants
and children and requires radical surgery.
Stout[1] first described juvenile fibromatosis
as a non-congenital disease affecting children
younger than 16 years. There are two types of
juvenile aggressive fibromatosis, superficial and
deep. The superficial variant is not aggressive,
does not grow faster, and does not invade deep
tissues. By contrast, deep fibromatosis is more
aggressive and invades other tissues. Some
authors tend to classify it as a fibroblastic
proliferative disorder different from neoplasia [2].
12
CASE REPORT
A 13 year old female
presented to Outpatient
Department of Oral &
Maxillofacial
Surgery,
K.G.Medical University,
Lucknow with a firm swelling
Fig 1: Frontal view showing
large swelling of right lateral
mandible.
DISCUSSION
www.ijsir.co.in
CONCLUSION
Aggressive fibromatosis presents a
diagnostic dilemma and may mimic malignancy.
The differential diagnosis with malignant tumors
is difficult. Fibromatosis in the maxillofacial
region is a very rare among diverse pathologic
conditions, and because of the rarity of this tumor,
definite treatment regimen is not established,
which may be responsible for a high recurrence
rate of these tumors. Surgery is the first-line of
treatment, however, alternative therapies should
be considered, especially in children, to avoid
mutilating operations.
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
15
14. Das Gupta TIC, Brasfield RD, OHara J. Extraabdominal desmoids: a clinicopathological study. Ann
Surg 1969; 170:109-21.
16
www.ijsir.co.in
*a
*Address for Correspondence : Dr. Mahesh Pal, Principal Scientist, Phytochemistry Division CSIR-National
Botanical Research Institute, Lucknow 226 001, India
E.mail: drmpal.nbri@rediffmail.com
ABSTRACT
Polyalthia longifolia var. angustifolia is a member of the Annonaceae family and is a small
medium-sized tree distributed in many tropical countries around the world, commonly used as
ornamental street tree due to its effectiveness in combating noise pollution. In traditional and
indigenous systems of medicine Polyalthia longifolia has been commonly used in the treatment
of fever, helminthiasis, diabetes and in cardiac problems. Various pharmacological investigations
have shown that Polyalthia longifolia posseses significant biological and pharmacological
activities such as antibacterial, antifungal, antitumor, anti-ulcer, antidiabetic and antioxidant
properties. In context of various medicinal importance of P. longifolia, this review is an attempt
to compile detailed exploration of all currently available botanical, phytochemical,
pharmacological and other ethnomedicinal properties of P. longifolia in an attempt to provide a
direction for further research work.
Keywords: Polyalthia longifolia, Phytochemistry, Pharmacological Actions.
INTRODUCTION
Herbs and the humans have a great
relationship with each other. Plants have been
known to be used for alleviation and
management of diseases since the very
beginning of human civilization. Even at present
day medicinal plants play important roles despite
the tremendous scientific development and hold
much more hidden treasure to be explored as
almost 80 percent of the human population in
developing countries is dependent on plant
resources for their primary healthcare [1]. Plantbased therapy has been used as a vital
component in traditional medicine systems and
also serves as the main source of inspiration for
several major pharmaceutical drugs used in the
defence against various diseases. One such
plant Polyalthia longifolia (Order: Magnoliales ;
Family : Annonaceae) is an evergreen plant
commonly used as an ornamental street tree due
to its effectiveness in combating noise pollution.
Polyalthia longifolia is also known as false
www.ijsir.co.in
17
DISTRIBUTION
The genus Polyalthia includes about 120
species occurring mainly in Africa, South and
South Eastern Asia, Australia, and New Zealand.
India has 14 species of Polyalthia [5]. The
distribution of major Polyalthia species in India
are Polyalthia cerasoides Bedd.; a shrub or small
tree, found throughout India, Polyalthia fragrans
Benth ; a large tree found in Western Ghats and
P. longifolia (Sonn.) Thw ; found under cultivation
in India. There are two distinct varieties of this
species, both found in Maharashtra and
elsewhere [6].
PHYTOCHEMISTRY
LONGIFOLIA
OF
POLYALTHIA
HO
OH
18
OH
H
OH
OCH3
(-)-8-oxopolyalthiaine
OH
O
O
H
OH
OH
NH
HO
OH
H
OH
CH3
H3CO
noroliveroline
H3CO
COOH
O
HO
OCH3
Fig. 4: Longimide B
NH
O
H3CO
N
OH
(-)-anonaine
OH
OCH3
PHARMACOLOGICAL ACTIVITIES
POLYALTHIA LONGIFOLIA
OF
Different P. longifolia leaf extracts like 1, 4dioxan, methanol and acetone extracts were
investigated at two different concentrations for
their antimicrobial potentiality against 91 clinically
important microbial strains. All the three extracts
at 500 g/disc concentration were active against
95% of the total gram positive bacterial strains.
1, 4-Dioxan extract was active against 18.18%
of the total gram negative bacterial strains while
methanolic and acetone extracts were active
against 12.72% of the total gram negative
bacterial strains [38].
(F) Antifungal Activity
Different solvent extracts viz., petroleum
ether, benzene, chloroform, methanol and
ethanol extracts of Polyalthia longifolia were
tested for their antifungal activity where
petroleum ether extract showed highly significant
antifungal activity than other solvent extracts [39].
www.ijsir.co.in
21
2.
3.
4.
5.
6.
7.
Chen C.Y., Chang F.R., Shih Y.C., Hsieh T.J., Chia Y.C.,
Tseng H.Y. Cytotoxic constituents of Polyalthia longifolia
var. pendula: Journal of Natural Products. 2000;
63:1475-8.
8.
23
22. Wu Y.C., Duh C.Y., Wang S.K., Chen K.S., Yang T.H.
Two new natural azafluorene alkaloids and a cytotoxic
aporphine alkaloid from Polyalthia longifolia. Journal
of Natural Products. 1990; 53: 1327-1331.
24
23. Chen C.Y., Chang F.R., Shih Y.C., Hsieh T.J., Chia Y.C.,
Tseng H.Y., Chen H.C., Chen S.J., Hsu M.C., Wu Y.C.
Cytotoxic constituents of Polyalthia longifolia var.
pendula. Journal of Natural Products. 2000; 63: 14751478.
24. Faizi S., Khan R.A., Azher S., Khan S.A., Tauseef S.,
Ahmad A. New antimicrobial alkaloids from the roots
of Polyalthia longifolia var. Pendula. Planta Medica.
2003; 69: 350 355.
25. Singh M., Singh S., Prasad S., Gambhir I.S.
Nanotechnology in medicine and antibacterial effect of
silver nanoparticles. Digest Journal of Nanomaterials
and Biostructures. 2007; 3, 115122.
26. Kaviya S., Santhanalakshmi J., Viswanathan B. Green
synthesis of silver nanoparticles using Polyalthia
longifolia leaf extract along with D-sorbitol: study of
antibacterial activity. Journal of Nanotechnology. 2011;
2011, 1-5.
27. Parvin A., Akter J., Hasan M.M., Biswas N. Study on
the comparative antibacterial activity of Polyalthia
longifolia (Debdaru) leaf extracts to some selective
pathogenic bacterial strains. International Journal of
Biosciences. 2013; vol. 3(5), 17-24.
28. Ghosh G., Subudhi B.B., Badajena L.D., Ray J., Mishra
M.K., Mishra S.K. Antibacterial activity of Polyalthia
longifolia var. angustifolia stem bark extract.
International Journal of PharmTech Research. 2011;
3(1), 256-260.
29. Ugochi O., Joshua P.E., and Omeh, O.V. Antioxidant
Properties of Polyalthia longifolia. New York Science
Journal. 2011; 4(6), 83-87
30.
31.
32. Chang H., Chang F.R., Chen J.S., Wang H., Wu Y.,
Wang C.C, Wu Y.C, Hwang T. Inhibitory effects of 16hydroxycleroda-3,13(14)E-dien-15-oic acid on
superoxide anion and elastase release in human
neutrophils through multiple mechanisms. European
Journal of Pharmacology. 2008; 586, 332339.
33. Sharma R.K., Mandal S, Rajani G.P., Gupta N.,
Srivastava D.P. Antiulcer and anti-inflammatory activity
of fresh leave extracts of Polyalthia longifolia in rats.
International Journal of Drug Delivery and Research.
2011; 3: 351 359.
34. Tanna A., Nair R., Chanda S. In vitro antioxidant and
anti-inflammatory potential of Polyalthia longifolia in
rats. Journal of Natural Medicine. 2009; 63: 80-85.
www.ijsir.co.in
37.
46.
52.
53.
54.
www.ijsir.co.in
55. Jain A.K., Jain A., Jain A., Jain S., Sikarwar M.S., Dubey
S.K. Xanthine Oxidase
56. Inhibitory Activity And Enzyme Kinetics of Polyalthia
Longifolia ( Sonner.) Thw. Leaves Using In-vitro Method.
Plant Archives. 2006; 6: 841-842.
25
Address for Correspondence: Dr. Sudhir Mehrotra, Associate Professor, Deparment of Biochemistry,
University of Lucknow, Lucknow, Uttar Pradesh, India ,
Email : sudhirankush@yahoo.com
ABSTRACT
According to WHO survey in 2010 there are 34 million people who are infected with HIV and
attained AIDS. Per year about 1.8 million people dies with AIDS and 2.7 million new people
become infected with HIV. AIDS is a secondary immunodeficiency caused by HIV virus that
belongs to retroviral family. During AIDS T-cell count in blood falls tremendously below 200
cells l that results to be fatal in about 2-3 years. HIV can be transmitted from one person to
another by unprotected homosexual or heterosexual sex, by transfusion of blood infected with
HIV, by needle sharing between drug or steroid abusers, from mother to child during childbirth
or during breast feeding and presence of sexually transmitted diseases (STDs) increase the
threat of HIV infection. During AIDS many opportunistic infections and other immune deficiencies
occur frequently that usually have negligible chances to affect a normal healthy person. It was
found in Berlin patient of HIV, who was living on HAART, was transplanted with bone marrow
from a person who was homozygous for CCR532bp deletion i.e. deletion of one base pair on
32 position in CCR5 gene after which patient became resistant to HIV infection. He discontinued
the HAART therapy and lived like a normal person. Viral particles and viral reservoirs were
vanished from his blood. This observation laid the basis for use of gene therapy against AIDS.
By modifying stem cells taken from bone marrow in which using gene therapy genes for disrupted
CCR5 were inserted in place of normal CCR5 gene and then the cells were re-implanted in
bone marrow after which they started producing HIV resistant blood cells. Another observation
was that modifying stem cells to produce interfering RNAs like sense RNA, antisense RNA,
ribozymes that interfere in viral replication cycle or host cell function that is required for viral
replication also provided good results to produce anti-HIV immune system. Like HAART in
which combination of many drugs are used in similar way if many anti-HIV genes are used
simultaneously to modify stem cells targeting different point in viral life cycle provide better
results than results acquired by use of single anti-HIV gene to eradicate HIV infection. Although
gene therapy provided good results against HIV infection but it is still in trial stage and have not
been used on humans yet.
Keywords: HIV, AIDS, CD4+TCells, HAART, Stem cells etc.
INTRODUCTION
1. HIV (Human Immunodeficiency Virus)
One of the most common secondary
immunodeficiency is Acquired Immunodeficiency
Syndrome, or AIDS, which results from infection
with the human immunodeficiency virus (HIV).
According to the World Health Organization
(WHO), there were 34 million people living with
AIDS, with 2.7 million new cases and 1.8 million
deaths worldwide in the year 2010(Organization,
W.H. World health organization: global). HIV
26
HIV STRUCTURE
- VIRAL ENVELOP
HIV virus is roughly spherical and approx
120 nm in diameter i.e. 1/10,000 of mm.
Outermost coat of virus is known as Viral Envelop
that generally consists of phospholipid bilayer
that is derived from host cell membrane during
the process of budding out from the host as
shown in (figure 1). Envelop consists throughout
the proteins of host in addition to 72 copies at
average of Env protein embedded. Env protein
GENE
gag
pol
env
tat
rev
vif
vpr
GENETIC ORGANISATION
Core consists of two identical single
stranded RNA both RNA terminals possesses
RNA sequence called Long Terminal Repeats
(LTR) that act as switches to control production
of new viruses and can be triggered by proteins
either from HIV or the host cell. HIV genome
consists of 9 genes out of which 3 genes are
common to whole retroviral family these are env,
gag and pol. Besides these 6 regulatory genes
that are unique to HIV that guides the whole life
cycle of HIV in various ways are tat, rev, nef, vpr,
vif [8, 9].
TABLE 1: The genomic organization of HIV
[10]
vpu
Viral protein U
nef
Negative regulation
factor
*Env gene produces protein called gp160 that is broken down by a viral enzyme to form gp120 and gp 41
the component of env protein.
www.ijsir.co.in
27
j.
28
ACQUIRED IMMUNODEFICIENCY
SYNDROME (AIDS):
It is the terminal phase of HIV infection cycle.
During AIDS the opportunistic infections become
more frequent with decrease in CCD4+ cell count
to below 200l -1 that results in profound
immunodeficiency indicates the final stage of HIV
i.e. AIDS viral load (viaremia) is highest in this
stage and level of CTLs and antibodies are
lowest and patient survives not longer than 2
years even with highest quality of sophisticated
treatment and at last patient dies [12]. AIDS is
usually not caused just after the infection and till
today it is not known how virus damages the
immune system and if a person infected with HIV1 will develop the AIDS. Great researches have
been done but still a safe cure for HIV is not
found.
The main priority for immunologists is to
develop vaccine against AIDS .There are several
effective strategies present to develop anti-viral
drugs. Researchers target several points in HIV
lifecycle that might be blocked by pharmaceutical
agents. Two major challenges to produce vaccine
for HIV are: (i) To find immunogens that can
stimulate many cross-reacting neutralizing
antibodies (ii) to find immunogens that can
stimulate high levels of persisting CD8+ and
CD4+ T cells. Both humoral and cellular immunity
may be needed, but they require different types
of immunogens; eventually vaccines could be
mixed to achieve both.
It was thought that neutralizing antibodies
would be stimulated by gp120 preparations, and
they do against tissue culture adapted HIV strains
but, all such vaccines failed to neutralize primary
virus isolates. Now the aim is to design HIV
envelope protein immunogens that will stimulate
protective antibodies. Unfortunately it has many
hurdles in between against this: (i) because of
heavy glycosylation of the envelope it is nonimmunogenic in nature. (ii) because it is
conformation -ally variable, the chemokine
receptor binding site, is not exposed unless CD4+
has bound; (iii) the CD4+ binding site is found
interiorly and difficult to access by antibodies; (iv)
In addition to carbohydrate gp120 surface is
protected by hyper variable loops that vary by
mutation at very high rate with no cost to virus
www.ijsir.co.in
[13]
a) Adenoviruses
b) Retroviruses
c) Adeno-associated viruses
Adenoviruses: These are used so as to
avoid insertion of gene in wrong site .This vector
does not get incorporated in host genome and
transcribe the gene product freely in the host cell
but re- administration of vector is required in
growing cell line because the gene is not
replicating with the host genome. Host range of
adenovirus is very broad .It can evoke human
immune response and induce inflammatory
reaction but then also it is used to treat cancer of
liver and ovaries [20].
Retroviral vector: Retroviruses were first
to be used in gene therapy because of their great
efficiency to infect any kind of cell. These contain
RNA as their genetic material which is converted
30
CHIMERAPLASTY
It is a non viral procedure of gene therapy
used to fix defective gene directly by inserting
new normal gene sequence in cell nucleus
which binds at the defective gene at terminals
in cell nucleus . The defective part in middle does
not bind forming hump like structure in DNA
which activates the DNA repair action of cell,
DNA repair enzymes interchange the defective
sequence with chimeraplast sequence and
remove defective gene that is later degraded.
Effectiveness of the chimeraplasty has been
found to be 0.0002% effective in transforming
yeast cells [20].
HUMAN APOBEC
HYPERMUTATIONS
3G
MEDIATED
APOBEC3G or hA3G
(human
apolipoprotein B is a mRNA-editing enzyme
catalytic polypeptide-like 3G). It belongs to a
protein family including hA3D, hA3F, hA3H which
possesses cytidine deaminase activity therefore
acts as a potent host restriction factor of retroviral
replication through, vif a HIV-1 accessory protein
interacts with hA3G and protects the virus from
its anti-viral activity [21,22]. In the presence of
defective vif, hA3G/F/D/H induces mutation in
the minus strand of the ssDNA by replacing dCto-dU ,in response to this , dG-to-dA mutations
in the plus strand of the cDNA occurs.
Viral replication is ceased by hyper
mutations produced by hA3G which introduces
stop codon in ORFs of retroviral gene mainly in
the tryptopham residues (TGG-to-TGA/TAA/
TAG). Many sub-lethal hyper mutations have also
been suggested to contribute to the HIV-1 genetic
diversity [23] and greater genetic variations due
to the low level of G-to-A mutation which allows
HIV-1 evolution [24]. In proviral sequence cytidine
deamination can generate drug-resistant
progenies in vitro [25], pol sequences have been
identified as a potential target sites for hA3G/F
by computer prediction , but still the effect of
hA3G in HIV-1 drug resistance in vivo is unknown
and considered to be low [24].
HEMATOPOIETIC STEM CELL-BASED GENE
THERAPY FOR HIV DISEASE
HIV gene therapy provides an alternative to
HIV infected people living on HAART treatment
www.ijsir.co.in
33
HIV-infected cells
[72]
Interfering
RNAs used
in HIV
gene
therapy
Target RNA/protein
Localization required
forActivity
Interference site(s)
Fate of HIVinfected
Genemodifiedcell
Antisense RNA
Nuclear/Cytoplasmic
Protected
HIV mRNAs
Nuclear/Cytoplasmic
Protected
Cytoplasmic/Virion
Sense RNA
U3-R-U5 RNA
TAR/RRE
RNA
Cytoplasmic
Subsequent rounds of
Infection
Protected
Nuclear
Cytoplasmic/Virion
Ribozymes
Nuclear/Cytoplasmic
Cytoplasmic
Nuclear/Cytoplasmic
Protected
Psi-e RNA
Protected
Protected
Virion
Subsequent rounds of
Infection
Sense RNAs
These are designed to contain specific
sequences of HIV-1 RNA which are involved in
specific viral RNA/RNA or RNA/protein
interactions. These RNAs compete with the HIV
RNA for binding to viral RNAs or proteins. These
may be used to prevent trans-activation, nuclear
export Packaging, or reverse transcription of the
progeny virion RNA. Sense RNAs with specific
sequences present in HIV TAR and RRE act as
34
Subsequent rounds of
Infection
Protected
35
2.
3.
4.
5.
6.
7.
37
38
www.ijsir.co.in
46. Van Rij, R.P., Andino, R., The silent treatment: RNAi
as a defense against virus 676 infection in mammals.
Trends Biotechnol. 2006; 24, 186193.
48. Boden, D., Pusch, O., Lee, F., Tucker, L., Ramratnam,
B., Human immunodeficiency virus type 1 escape
from RNA interference. J. Virol., 2003; 77, 11531
11535.
49. Das, A.T., Brummelkamp, T.R., Westerhout, E.M.,
Vink, M., Madiredjo, M., Bernards,R., Berkhout, B.,
Human immunodeficiency virus type 1 escapes from
RNA interference-mediated inhibition. J. Virol.,2004;
78, 26012605.
50. Westerhout, E.M., Ooms,M., Vink, M., Das, A.T.,
Berkhout, B. . HIV-1 can escape from RNA interference
by evolving an alternative structure in its RNA
genome.Nucleic Acids Res. 2005 33,796804.
www.ijsir.co.in
39
86.
87. Sharp PM, Hahn BH. Origins of HIV and the AIDS
Pandemic. Cold Spring Harb Prospect Med.
2011;1:a006841. [PMCID: PMC3234451]
88. Kidd JM, Newman TL, Tuzun E, Kaul R, Eichler EE.
Population stratification of a common
89. APOBEC gene deletion polymorphism. PLoS Genet.
2007;3:e63. [PMCID: PMC1853121] [PubMed:
17447845] Itaya S, Nakajima T, Kaur G, Terunuma H,
Ohtani H, Mehra N, et al. No evidence of an
association between the APOBEC3B deletion
polymorphism and susceptibility to HIV infection and
AIDS in Japanese and Indian populations. J Infect Dis.
2010;202:8156. [PubMed: 20684727]
40
www.ijsir.co.in
*Address for Correspondence : Dr. B.C. Yadav, Associate Professor and Coordinator, Department of Applied
Physics, School for Physical Sciences, Babasaheb Bhimrao Ambedkar University, Lucknow-226025, U.P.,
India, email: balchandra_yadav@rediffmail.com
ABSTRACT
The present review reports the synthesis, physical properties, status and prospects for the
development of transparent conducting oxides. Progress in the field of material science is heavily
depend on the development of metal oxides because they constitute a diverse and fascinating
class of materials whose properties cover the entire range from metals to semiconductors and
insulators. A special attention is focused on the properties of bulk and nanostructured materials
especially tin oxide. Brief literature survey on pure and doped SnO2 has been incorporated.
Synthesis and fabrication methods of nanostructured materials are mentioned. Phase diagram
and crystal structure of tin oxide have also been described. In this article, we describe some of
the important methods employed for synthesis and fabrication of nanostructures, describing a
few case studies for illustrative purposes.
Keywords: Pure and doped SnO2, Phase diagram, Synthesis techniques, TCOs film fabrication.
INTRODUCTION
Metal oxides offer strong and versatile base
materials for the development of novel
technologies such as superconducting
electronics, microwave communications,
ferroelectric memories, infrared detectors,
magnetic sensors, transparent conducting
coatings and gas sensors [1]. The subtle interplay
between structure and properties makes these
materials strong candidates for the fundamental
materials research world-wide. Among these
metal oxides, semiconducting metal oxides
having wide band gaps have attracted great
interest, because of their future possible
applications in areas, such as UV sensors, lightemitting diodes (LEDs), laser diodes (LDs), and
other high-speed high-power electronic devices
[2].
applications
[3].
PHASE
DIAGRAM
STRUCTURE
AND
CRYSTAL
X P02-1/ n
with n varying between 5.7 and 8.3 for
temperatures between 990 K and 720 K
respectively. In these studies a maximum oxygen
deficiency of x = 0.034 in SnO2-x at 990 K was
observed before metallic Sn is formed. At lower
42
www.ijsir.co.in
SnO[16].
Molecular formula
Crystal Structure
Space group
Geometry
Heat Formation[eV]
Symmetry
Sn-O bond lengths
Tin sphere radius
Density
Molecular Mass
Lattice constants at
room temperature
Melting point
Relative permittivity
Band gap energy at
room temperature (Eg)
Specific heat capacity (Cp)
Thermal conductivity (k)
Thermal diffusivity ()
SnO2
Rutile(tetragonal),
P42/mnm, No. 136
Planar (O2- )
6.0
Oh
2.054
1.384
6.95 g/cm3
150.71 g/mol
a = b = 4.738 ,
c = 3.188
1630 C
7.5
3.6 eV
70 J/(K mol)
4.5 W/(K m)
0.015 cm2/s
www.ijsir.co.in
www.ijsir.co.in
Method
Reference
Chemical vapor
deposition
[69]
Thermal evaporation
Polyhedron-shaped
(200 to 1300 nm)
[70]
Wet chemistry
technique
Nanospheres
(diameters of30 nm)
[71]
Thermal evaporation
technique
[72]
Hydrothermal
technique
REFERENCES
1.
20.
2.
21. Robertson, J.; Xiong, K.; Clark, S.J. Band gaps and
defect levels in functional oxides. Thin Solid Films,
2006, 496, 1-7.
3.
Wang, J.X.; Xie, S.S.; Gao, Y.; Yan, X.Q.; Liu, D.F.;
Yuan, H.J.; Zhou, Z.P.; Song, L.; Liu, L.F.; Zhou, W.Y.;
Wang, G. Growth and characterization of axially periodic
Zn2SnO4 (ZTO) nanostructures. J. Cryst. Growth, 2004,
267, 177-183.
4.
5.
6.
7.
26.
8.
Hasselbach, K.; Murken, G.; Tromel, M. MossbauerMessungen an Sn2O3, Z. Anorg. Allg. Chem. 1973, 897,
127-132.
9.
17. Barbarat, P.; Matar, S.F.; LeBlevennec, G. Firstprinciples investigations of the electronic, optical and
chemical bonding properties of SnO2. J. Mater. Chem.,
1997, 7, 2547-2550.
18. Calatayud, M.; Andres, J.; Beltran, A. A theoretical
analysis of adsorption and dissociation of CH3OH on
the stoichiometric SnO2 (110) surface. Surf. Sci. 1999,
430, 213-222.
19. Errico, L.A. Ab initio FP-LAPW study of the
54
28.
35.
Zhang, D.F.; Sun, L.D.; Yin, J.L.; Yan, C.H. LowTemperature Fabrication of Highly Crystalline SnO2
Nanorods. Adv. Mater., 2003, 15, 1022-1025.
39. He, R.R.; Law, M.; Fan, R.; Kim, F.; Yang, P.D.
Functional Bimorph Composite Nanotapes. Nano Lett.,
2002, 2, 1109-1112.
www.ijsir.co.in
44.
45.
46.
49. Fan, J.; Wang, T.; Yu, C.; Tu, B.; Jiang, Z.; Zhao, D.
Ordered, Nanostructured Tin-Based Oxides/Carbon
Composite as the Negative-Electrode Material for
Lithium-Ion Batteries, Adv. Mater., 2004, 16, 14321436.
50. Han, S.; Jang, B.; Kim, T.; Oh, S.M.; Hyeon, T. Simple
Synthesis of Hollow Tin Dioxide Microspheres and Their
Application to Lithium-Ion Battery Anodes. Adv. Funct.
Mater., 2005, 15, 1845-1850.
51. Rockenberger, J.; Felde, U.Z.; Tischer, M.; Trger, L.;
Haase, M.; Weller, H. J. Chem. Phys. B., 2000, 112,
4296.
52. Sun, K.; Liu, J.; Browning, N.D. Correlated Atomic
Resolution Microscopy and Spectroscopy Studies of
Sn(Sb)O2 Nanophase Catalysts. J. Catal., 2002, 205,
266-267.
53. Mishra, K.C.; Johnson, K.H.; Schmidt, P.C. Electronic
structure of antimony-doped tin oxide, Phys. Rev. B.
Condens. Matter, 1995, 51, 13972-13976.
54. McGinley, C.; Moussalami, S.A.; Riedler, M.;
Pflughoefft, M.; Borchert, H.; Haase, M.; De Castro,
A.R.B.; Weller, H.; Moller, T. Eur. Phys. J. D., 2001,
16, 225.
55. Slater, B.; Richard, C.; Catlow, A.; Gay, D.H.; Williams
D.E.; Dusastre, V. Study of Surface Segregation of
Antimony on SnO2 Surfaces by Computer Simulation
Techniques. J. Phys. Chem. B., 1999, 103, 1064410650.
56.
www.ijsir.co.in
57. Wang, G.X.; Park, M.S.; Wexler, D.; Chen, J.; Liu, H.K.
Synthesis and characterization of one-dimensional
CdSe nanostructures. Appl. Phys. Lett., 2006, 88,
193115-193117.
58. Park, M.S.; Wang, G.X.; Kang, Y.M.; Wexler, D.; Dou,
S.X.; Liu, H.K. Preparation and Electrochemical
Properties of SnO2 Nanowires for Application in LithiumIon Batteries. Angew. Chem. Int. Ed., 2007, 46, 750753.
59. Wang, G.X.; Park, J.S.; Wexler, D.; Park, M.S.; Ahn,
J.H. Inorg. Chem., 2007, 46, 4778.
60. Brinker, C.J.; Sherer, G.W. Sol-Gel Science., Academic
Press, San Diego, 1990.
61. Park, M.S.; Kang, Y.M.; Kim, J.H.; Wang, G.X.; Dou,
S.X.; Liu, H.K. Effects of low-temperature carbon
encapsulation on the electrochemical performance of
SnO2 nanopowders. Carbon., 2008, 46, 35-40.
62. Park, M.S.; Kang, Y.M.; Wang, G.X.; Dou, S.X.; Liu,
H.K. The Effect of Morphological Modification on the
Electrochemical Properties of SnO2 Nanomaterials.
Adv. Funct. Mater., 2008, 18, 455-461.
63. Wang, G.X.; Park, J.S.; Park, M.S.; Gou, X.L.; Synthesis
and high gas sensitivity of tin oxide nanotubes, Sensor
and Actuators B: Chemical, 2008, 131, 313-331.
64. Park, M.S.; Wang, G.X.; Kim, S.Y.; Kang, Y.M.; Liu,
H.K.; Dou, S.X. Mesoporous organo-silica nanoarray
for energy storage media, Electrochem.
Commun., 2007, 9, 71-75.
65. Pan, Z.W.; Dai, Z.R.; Wang, Z.L.; Nanobelts of
Semiconducting Oxides. Science, 2001, 291, 19471949.
66. Spezia, G. Pressure is chemically inactive regarding
the solubility and regrowth of quartz. Atti. Accad. Sci.
Torino. 1909, 44, 95-107.
67. Walton, R.I. Subcritical solvothermal synthesis of
condensed inorganic materials. Chem. Soc. Rev., 2002,
31, 230-238.
68. Zhang, K.F.; Bao, S.J.; Liu, X.; Shi, J. Hydrothermal
synthesis of single-crystal VO2(B) nanobelts. Materials
Research Bulletin, 2006, 41, 1985-1989.
69. F e n g , H . T.; Zhuo, R.F.; Chen, J.T.; Ya n , D . ;
Feng, J.J.; Li, H.J.; Cheng, S.; Yan, P.X. Axial
periodical nanostructures of Sb-doped SnO2 grown by
chemical vapor deposition. Physica E, 2009, 41, 16401644.
70. Kim, H.W.; Shim, S.H.; Lee, C. SnO2 microparticles by
thermal evaporation and their properties. Ceramics
Internation., 2006, 32, 943-946.
71. Deng, Z.; Peng, B.; Chen, D.; Tang, F.; Muscat, A.J. A
new route to self-assembled tin dioxide nanospheres:
Fabrication and characterization. Langmuir, 2008, 24,
11089-11095.
72. Wang, J.; Zhou, D.; Fraundorf, P.; Liu, J. Microsc
Microanal., 2007, 13, 2.
73. Lupan, O.; Chow, L.; Chai, G.; Heinrich, H.; Park, S.;
Schulte, A. Synthesis of one-dimensional SnO 2
nanorods via a hydrothermal technique. Physica E,
2009, 41, 533.
55
56
www.ijsir.co.in
113. Yang, B.; Kumar, A.; Upia, N.; Feng, P.; Katiyar, R.S.
Low-temperature synthesis and Raman scattering of
Mn-doped ZnO nanopowders. J. Raman Spectr., 2010,
41, 88-92.
www.ijsir.co.in
57
*Address for correspondence :Dr. S. P. Shukla, Professor, Department of Civil Engineering, Institute of
Engineering and Technology, Sitapur Road, Lucknow, Uttar Pradesh, India,
e-mail: sps.iet@gmail.com
ABSTRACT
The adsorption of Methylene Blue (MB) dye on used tea leaves has been studied in a batch
adsorber. The equilibrium data fit well in the Langmuir isotherm. Three simplified kinetic models
based on pseudo first-order equation, pseudo second-order equation and intra particle diffusion
equations were selected to study the adsorption process. Kinetic parameters, rate constants,
equilibrium adsorption capacities and related correlation coefficients for each kinetic model are
presented in this paper. Adsorption of MB dye on used tea leaves is found to be described best
by the pseudo second-order equation and the same has been used for the design of a twostage batch adsorber. The model has been optimized to minimize total contact time for MB dye
removal. The optimum contact time for the 99% removal of MB dye has been found as 28.1
minute.
Keywords: Two-stage batch adsorber, Contact time, Adsorption kinetics, Methylene Blue, Used
tea leaves
INTRODUCTION
Dyes used in various industries (such as
textile, tannery, food, pulp and paper) to color
their products are an important source of
environmental contamination. Color is a visible
pollutant and the presence of even very little
amount of coloring substance makes it
undesirable due to its appearance (Hamdaoui
et al., 2008). The presence of dyes in waste water
offers considerable resistance to their
biodegradation and thus upsetting aquatic life
(Wong and Yu, 1999). Some of the dyes are
carcinogenic and mutagenic (Sivaraj et al.,
2001).Many investigations have been conducted
on physico - chemical methods for removing color
58
(CH3)2N
S
+
Cl
N(CH3)2
Adsorbent
Used tea leaves, collected from tea shops,
used in this study were repeatedly boiled with
water until the filtered water has been cleared
and dried at 60C for 48 hours. Dried sample was
grounded in mixer grinder for 5 minutes and
sieved. The material passing through 500 micron
sieve and retained on 300 micron sieve was used
as adsorbent in the present study. The adsorbent
was stored in the plastic bottles (Hameed, 2009).
Equilibrium and kinetic study
Adsorption experiments were carried out by
adding a fixed amount of adsorbent (1.75g used
tea leaves) in 1 L glass flasks containing 500 ml
of dye solution of different initial concentrations
(50, 100, 150, 200, 250, 300 mg/L) without
changing the solution pH at room temperature
(~ 30C). The flasks were placed in a Jar Test
Apparatus and agitated at 150 rpm for 200
minutes to ensure that equilibrium was reached.
The amount of adsorption (qt) at time t in
mg/g was calculated using equation 1.
qt =
( C0 Ct ) *V
W
(1)
Where,
C0: liquid-phase initial concentration of dye in mg/L.
Ct: liquid-phase remaining concentration of dye in mg/L
at time t.
V: volume of the solution in L.
W: mass of dry adsorbent used in g.
qe
( C Ce ) *V
= 0
temperature.
(2)
Where
Ce: Remaining liquid-phase concentration of dye in mg/
L at equilibrium.
( C0 Ce )
*100
C0
Removal percentage =
(3)
Kinetic Models
qe =
Ce
(1 + Ce )
(4)
1 1 1
= +
qe
1
*
Ce
(5)
60
dqt
= k1 ( qe qt )
dt
(6)
1
t
1
=
+
*t
qt ( k2 * qe 2 ) qe
(10)
k
log ( qe qt ) = log qe 1 * t
2.303
(7)
Where qe and qt are the amounts of MB
adsorbed at equilibrium and time t (mg/g),
respectively, and k1 is the rate constant of pseudo
first-order adsorption, (min-1). Figure 4 shows a
plot of Eq. (7) for the adsorption of dye MB on
used tea leaves.
dqt
2
= k2 ( qe qt )
dt
(8)
1
1
= + k2 * t
( qe qt ) qe
(9)
www.ijsir.co.in
qt = k p * t 2
(11)
61
qe exp
k2*10-3
qe
3.92
0.795
70.014
14.08
0.099
11.14
0.876
27.841
28.57
41.09
0.094
19.59
0.903
12.902
43.48
200
54.20
0.092
33.57
0.952
6.149
58.82
250
67.19
0.101
46.88
0.994
3.920
71.43
0.999
300
80.41
0.085
63.28
0.992
2.161
84.91
0.999
conc.
(mg/g)
k1
50
13.80
0.101
100
27.59
150
qe
cal
R2
cal
(mg/L)
C0
q0
W2
L ( C n-1 Cn ) = W ( qt ,n q0 )
C1
Stage
1
q1
W1
C2
Stage
2
q2
W2
(12)
Cn = Cn 1
2
e ,n
(W k q t )
(13)
L (1 + k qe ,n t )
C
n =1
n 1
Cn =
n =1
2
e ,n
(W k q t )
L (1 + k qe ,n t )
(14)
www.ijsir.co.in
100 W m
Rn =
n =1
L C0 n =1
m
k qe2,n t
(16)
(1 + k qe ,n t )
k = X k C0YkYq
qe = X q C0
(17)
(18)
Yk
Yq (19)
n =1
L C0 n =1 1 + ( X k C0 )( Xq C0 t
m
Yk
R2
Xq
Yq
R2
162.2
-1.88
0.983
0.282
1.002
0.999
(20)
t1 = 10 + (N-1) * 2min
(21)
(22)
63
Adsorbent
Two stage
adsorber
Initial MB
concentration
(mg/L)
CT (min)
System
no.
Stage 1
t1
Stage 2 t2
Total
t1+t2
Spent tea
99%
300
18
10.1
28.1
leaves
removal
400
22
13.9
35.9
500
26
17.5
43.5
64
CONCLUSION
The results show that the used tea leaves,
an abundantly available waste, can be used for
the removal of MB from aqueous solution. The
equilibrium data were best fitted to linear models
of Langmuir, with maximum monolayer
adsorption capacity of 166.67 mg/g of used tea
leaves at room temperature. The design model
presented is based on a pseudo second-order
equation and this has been used for minimizing
the CT in a two stage crosscurrent system. The
minimum CT, to achieve 99% of MB removal from
wastewater by adsorption using a fixed mass of
used tea leaves has been predicted as 28.1 min
(stage 1 = 18 min and stage 2 = 10.1 min). To
www.ijsir.co.in
2.
3.
4.
5.
6.
7.
8.
9.
Fan L., Zhou Y., Yang W., Chen G., Yang F.,
Electrochemical degradation of aqueous solution of
Amaranth azo dye on ACF under potentiostatic model,
Dyes Pigments 76 (2008) 440446.
www.ijsir.co.in
65
66
www.ijsir.co.in
*Address for correspondence: Dr. Amod Tiwari, Director- Professor , Bhabha Institute of Technology,
Kanpur Dehat, Kanpur, Uttar Pradesh ,India,
e mail : amodtiwari@gmail.com
ABSTRACT
Language transformation is challenged part of programming into runtime verification tools. To
increase the idea during the writing concept that these runtime verification tools can be used for
testing realworld programs, the paper uses compiler technique, a subset of the C and C++
programming language, which can be used to execute and test real programs. Compiler
technique is extended with threads and synchronization construction, and two concurrent
semantics are derived from its sequential semantics. First one is defining a sequentially consistent
memory model can be easily transformed into a runtime verification tool for checking datarace
and deadlock freeness. Second one is relatively minimal fashion a relaxed memory model. The
paper increased the efficiency of the programming language like C and C++ for using above
Programming Analysis Design (PAD) technique.
Keywords: Pseudo-code, Structured programming chart, Top down analysis, Compiler tool.
INTRODUCTION
Problem analysis design (PAD) process of
using formal definitions of programming
languages as testing and analysis tools. We
argue here that variable K [7, 8] definitions can be
used to test and analyze executions of programs
written concept in real-life languages either
directly or by extending them to become runtime
analysis tools.The rewriting logic representation
of K definitions gives them access to the arsenal
of generic tools for rewriting logic available
through the Maude rewrite engine [9] state space
exploration. This collection of analysis tools is
by itself enough to provide more information
about the behaviors of a program than one would
get by simply testing the program using an
interpreter or a compiler for that language.
Nevertheless, the effort of defining the
semantics pays back in more than just one way:
by relatively few alterations to the definitions, one
can use the same generic tools to obtain type
checkers and type inferencers [9], static policy
www.ijsir.co.in
67
//Program 1
#include <stdio.h>
int main(){
int x[10],x1,x2;
<* input x *>
<* (x1, x2) from (x[0], x[1]) *>
for(i=2; i<10; i++)
<* (x1, x2) from (x1, x2, x[i]) *>
<* output x1, x2 *> return 0;
}
<* (x1, x2) from (x[0], x[1]) *>:={
if(x[0]<x[1]){x1=x[1]; x2=x[0];}
else {x1=x[0]; x2=x[1];}
}
<* (x1, x2) from (x1, x2, x[i]) *>:={
if(x2<x[i]){x2=x1; x1=x[i];}
else if(x1<x[i]){x1=x[0];}
}
//Program 2
#include <stdio.h>
int sum(int u, int v){return u+v;}
void add(int* p, int* q){*p += *q;}
int main(){
int x,y; <* input x,y *>
add(x, y);
<* output x,sum(&x,&y) *> return 0;
}
There are some design policies of the
compiler program using with application of C and
C++, All of the necessary information is included,
Declaration blocks are not similar to execution
68
EFFECT OF MODIFICATION
The advantage to use a chart compared with
a colored text is reduction of reserved words as
shown in fig. 5, which implies large characters
can be used in a lecture using MS Power Point
slides.
Figure 8:
code
Figure 9:
Program
CONCLUSION
We have shown how K definitions of
programming languages can be turned (with
negligible effort) into runtime analysis tools for
testing and analyzing executions of concurrent
programs. We do not claim here that the tools
one obtains almost for free within the K
framework completely eliminate the need of
writing dedicated analysis tools in real
programming languages. The proposed chart is
an object oriented programming chart rather than
a structured programming chart i.e. (C ,C++).
Since reserved words are reduced in such a
chart, it is easier than a colored text to see how
the algorithm is implemented.
REFERENCES
www.ijsir.co.in
1.
Weiss, E. H., Visualizing a Procedure with NassiSchneiderman Charts. Journal of Technical Writing
and Communication 1990 ; 20(3) : 237-254.
2.
http://www.cbu.edu/~lschmitt/I351/
Nassi%20Schneiderman.htm (Mark Kelly, Structured
Design with Nassi-Schneiderman Charts)
3.
4.
http://www.informingscience.org/proceedings/
IS2003Proceedings/docs/091Ourus.pdf (N. Ourusoff,
Using Jackson Structured Programming (JSP) and
Jackson Workbench to Teach Program Design)
5.
69
http://fi.ftmr.info/PapersToRead/PAD-JARECT.PDF (Y.
Futamura and T. Kawai, Problem Analysis diagram)
7.
12.
8.
13.
9.
70
www.ijsir.co.in
*Address for correspondence : Dr. Anurag Tripathi , Assistant Professor, Deptt. of Electrical Engineering,
Institute of Engineering & Technology, Sitapur Road, Lucknow, Uttar Pradesh, India ,
email: anurag.tripathi.aparna@gmail.com
ABSTRACT
For a long time, purely electric locomotives fed from an overhead electric supply utilized DC
series motors to propel them. As the running cost involved is high and also the frequent
maintenance (both scheduled as well as the breakdown) is required, the need for an integrated
self contained system had become obvious and this led to the concept of a diesel electric
locomotive. It was also thought that since there is a rapid augmentation in the field of power
electronic converters both in terms of the current carrying capabilities as well as the overall
power handling capacities, it would be prudent to utilize the three phase induction motor drive
in the locomotives. A great amount of work is being done on the improvement of control through
simulation of the electric drives used for various high-power traction purposes. The legitimacy
of the simulated results is based on the accurate modelling of the various parts of the electric
drive system. Threephase Induction motors form an extremely important part of the modern
day electric drive system and their usage is continuously on a rise owing to their inherent
properties of ruggedness, minimum maintenance requirements and continually increasing
efficiencies. Usually the three-phase induction motor model used in various research works
does not integrate stator and rotor core losses, stator and rotor stray load losses and magnetizing
saturation and rotor conductor skin effects. The present paper aims at developing a threephase induction motor model taking the above losses and effects into account. The dynamic
linking of the model to a thermal model considering the temperature dependent resistive elements
is an added feature. The motor model described in this paper is the extension of the conventional
2-phase lumped-parameter induction motor model. The biggest advantage is that the model is
user-programmable in MATLAB environment and can be used for system level transient studies.
The simulation results of the developed model, with various parameter variations taken into
account and subjected to sudden changes in load, show better torque and speed performances
of the motor both in steady state and dynamic conditions.
Keywords: Mathematical modelling, AC propulsion system, Three phase induction motor drive.
INTRODUCTION
System Description
A simplified schematic of the AC propulsion
system is shown below in fig 1.1. The Diesel
engine drives the alternator that has multiple
stator (secondary) windings that generates power
for traction, field excitation and also for the
auxiliaries. The locomotive propulsion system
considered for modeling and simulation for the
www.ijsir.co.in
locomotive.
72
AND
REFERENCE
www.ijsir.co.in
flux frame)
m
f qds
= f qsm jf dsm Magnetizing (air gap flux)
e j m = cos m j sin m
frame
e j m = cos m + j sin m
Current:
Equivalent Circuit
The equivalent circuit of the motor electrical model is shown in fig. 1.3 in complex vector notation, and
in Figure 1.4 in real variable notation.
Figure 1.3: Equivalent circuit in complex vector notation with internal core and stator stray load loss
www.ijsir.co.in
73
Figure 1.4:
Equivalent circuit in real variable notation with internal core and stator stray load loss
State Variables
The following complex state variables are chosen
for formulation of the motor model equations:
Rotor Voltages:
Flux Equations
Voltage Equations
Stator Flux:
Rotor Flux:
Air Gap Voltage:
74
www.ijsir.co.in
www.ijsir.co.in
75
STEADY
STATE
PERFORMANCE
COMPARED AGAINST PUBLISHED RESULTS
As a first step, the transient machine model
built in MATLAB/SIMULINK was checked to work
for steady state. For this purpose, the model was
tested on cases shown in the text Analysis of
Electrical Machinery, Paul Kraus and the results
were found to match.
The model was fed with the steady state
76
Figure 1.6: Torque and Current-Steady State validation for 2250 hp machine.
r1
Xl1
0.435 0.754
0.087 0.302
0.262 1.206
0.029 0.226
Parameters
Torque (Nm)
Stator Current (A )
Xm
Xl2'
r2'
calculation model
calculation model
26.13 0.754 0.816
14.02
14.00
8.84
8.79
13.08 0.302 0.228
234.60 234.55
62.80
62.80
54.02 1.206 0.187
1999.40 2000.00
105.21
105.10
13.04 0.226 0.022
9173.50 9170.50
469.56
469.45
2.
3.
4.
P.L. Cochran, Polyphase Induction Motors Analysis, Design, and Application, Marcel Dekker,
Inc., 1989.
5.
6.
7.
8.
9.
77
ABSTRACT
The modern computing has been a blessing to all human beings and exponential advancement
of these technologies has been created a big issue regarding with the environment. The aim of
the green wall methodology in sustainable development is to overcome the environmental
damage causing by the development of technologies and process of informatization from the
beginning phase. Our study has trends of green wall that can be considered as a methodology
for sustainable development. In this paper, sustainable development qualities such as entourage
effect, curtailment, social impact and performance are described well and whether these qualities
can be adopted in software engineering. Further, we tried approaching to develop the green
and sustainable software that may contain low cost and low energy consumption during
development process and how environmental risk can be minimized.
Keywords: Sustainable software development, Green computing, ICT.
INTRODUCTION
The modern computing technology has
been a blessing to all human beings and
exponential advancement of these technologies
has been created a big issue regarding the
environment. With the development of
technology and the process of informatization,
various types of computer systems have been
widely used. Whenever computers are discussed
it is generally with reference to operational power
management, rather than how IT can help a
business as well as achieve its environmental
goals [1]. The environmental damage can be
overcome by adopting green computing because
by the help of green computing, technology can
be developed in a sustainable way. Development
in sustainable way means usage of optimized
material flows or to substitute material products
with their virtual counterparts, which reduce
energy and resource consumption [2]. From the
past decade to the present generation, ICT which
is also called as information and communication
technology adopting the approaches of green
78
REFERENCES
1.
2.
5.
6.
7.
3.
8.
4.
9.
Gong, L., Xie, J., Li, X., Deng, B.: Study on Energy
Saving Strategy and Evaluation Method of Green
Cloud Computing System. IEEE (2013).
10.
82
www.ijsir.co.in
BIOCONTROL : AN OVERVIEW
KALPANA SINGH*
Department of Zoology, University of Lucknow,
Lucknow, Uttar Pradesh, India
*Address for Correspondence : Dr. Kalpana Singh, Assistant Professor, Department of Zoology,
University of Lucknow, Lucknow, Uttar Pradesh, India
email- drkalpanasingh@gmail.com
ABSTRACT
Agriculture constitutes one of the most important sectors of any economy. Sustenance of 45%
of worlds population depends on agriculture only. The proportion of population involved in
agriculture ranges from about 2% in United States to 80% in some parts of Asia and Africa. In
Asia, Indian economy is concentrated around agriculture mostly where about 72% of population
is engaged in agriculture. Every year huge losses occur in agricultural production due to various
climatic and biotic factors. Of biotic factors, pests alone are responsible to cause major damage
to agriculture thus affecting total harvest. They continue destroying agricultural produce even
after harvesting when it is stored in storages. Generally chemical pesticides have been in use
to suppress pest populations. These provide immediate relief but have proved to be hazardous
in long run. Their indiscriminate and continuous use has resulted in immeasurable deterioration
of our environment and health problems to secondary and tertiary members of food chain due
to bioaccumulation. Thus there is a need for effective eco-friendly alternative that should also
be cost-effective. Biological control or bio-control is one such option that involves manipulation
within the ecosystem by the agency of man to suppress harmful species by a superior and
beneficial one. This process goes on in nature as natural control where one animal feeds on
another thereby keeping its population under check. Biological control may be of two types;
natural biological control and applied biological control. Applied biological control is further
classified into five subcategories, classical biological control, new-association biological control,
conservation biological control, augmentation biological control, and bio-pesticides. Out of these
classical and new-association biological control is for permanent control over large areas whereas
conservation and augmentation biological control and bio-pesticides is for temporary pest
suppression.Biological control is likely to be more successful in long-term rather than shortterm crops, vegetables rather than ornamentals, crops having few pests other than the one
targeted for biological control, crops in which the target pest does not attack the part of the plant
that is sold, crops in which the targeted pest does not transmit plant diseases, and well-screened
green houses in regions with cold winters.The biological control is used on 5% (excluding China)
of 40,000 ha of greenhouses worldwide, in vegetable crops-30,000 ha mostly in north temperate
areas, on 1000 ha of ornamental crops and a small amount of warm-region vegetable crops.
The number of natural enemies reared commercially has increased from one in 1968 to more
than 100 by 2006.There are many advantages of biological control as it is eco-friendly, cost
effective, self-perpetuating and bereft with harmful effect of pesticides. Disadvantages are : it is
species specific, takes long time and alone cannot be effective if applied in large agricultural
fields.
Key words: Bio-control, Agriculture, Eco-friendly, Bio-pesticides
INTRODUCTION
In many countries agriculture constitutes one
of the most important sectors of its economy. Our
basic need of food and clothing are almost
www.ijsir.co.in
in regions with cold winters. Bio-control is ecofriendly since it uses natures own device i.e.
natural enemies against the pests. It is cost
effective also in the long run since once natural
enemies are introduced and established in the
desired area they require no maintenance cost.
It is self-perpetuating since natural enemies
reproduce again and again and maintain their
population over time. It is bereft with the harmful
effect of pesticides such as it does not cause
pollution and does not release chemicals that are
hazardous to the environment etc. Its
disadvantages are that it is species specific since
natural enemies applied in biocontrol are very
specific for a particular kind of pest thats how
they effectively manage the population of desired
pest. Sometimes, it takes long time as in classical
bio-control where natural enemies are introduced
then they take some time to acclimatize to the
new environmental conditions and reproduce
over time thus may take long time initially. In case
of large agricultural fields where a complex of
pests may be there bio-control alone cannot be
fully effective and it may need some other types
of pest management methods to be applied there
such as physical control, cultural control, genetic
control or even chemical control (Coppel &
Mertins, 1976; Bellows & Fischer, 2005).
ACKNOWLEDGEMENTS
Author is thankful to Head, Department of
Zoology, University of Lucknow, Uttar Pradesh,
India for providing necessary laboratory space.
Author is also grateful to Prof. Omkar ,
Department of Zoology, University of Lucknow,
Uttar Pradesh, India for motivation and valuable
suggestions.
REFERENCES
1.
2.
3.
4.
www.ijsir.co.in
6.
7.
Internet1:http://web.worldbank.org/WBSITE/
EXTERNAL/COUNTRIES/SOUTHASIAEXT/
E X T S A R E G T O P A G R I /
0,contentMDK:20273764~menuPK:548214~
p a g e P K : 3 4 0 0 4 1 7 3 ~ p i P K
:34003707~theSitePK:452766,00.html
8.
Internet2 :http://ipmworld.umn.edu/chapters/
landis.htm
9.
10.
11.
www.ijsir.co.in
13.
14.
15.
89
*Address for Correspondence : Monika Raghuvanshi, Pacific Academy of Higher Education and Research
University, Udaipur, Rajasthan, India
E-mail: monikaraghuvanshi07@gmail.com
ABSTRACT
Society in a layman language comprises of a group of people coming together for a purpose
and are bounded by common beliefs as well as culture or in other words its a group of people
separated by geographical boundaries which are similar in various characteristics and as we
all know environmental issues are burning and drew attention of common masses and various
class of people come together to tackle such problems in their own ways. This gave rise to ecodeveloped societies which although exist but are yet to be discovered to have scope of future.
Such societies make use of renewable resources of energy and energy efficient process with
life cycle assessment to utilize environmental services along with eco-friendly applications.
They have their own innovative ways like recycling points and power rating system and hence
set global trend. Eco-developed societies understand the need of current generation and work
towards building a healthy environment for future generations. Benefit of sustainable thinking
and practices is that if they become habits now they will continue to have existence in the future
generation thus fosters sustainable life style in future generations. Green marketing can also
be inclined towards scientific approaches which maintain proper balance between eco-system
and man and can have technology to check diversion from ideal practices so that corrective
measures can be taken on time so this leads to development of eco-scientific societies. There
can be section of society which is sensitive to environmental issues like they are sensitive to
biodiversity as they believe that earth is mother of so many living creatures and all of us have
equal rights on it so we humans should not be cause of loss of other species and hence can be
called as eco-sensitive society. The uses of green products give rise to futuristic societies.
Transformational societies are already established and settled but believe in changes as per
need of time to progress fast. Motivational society believes in creating awareness as they
believe in united efforts and bringing huge changes. Eco-focused societies comprise of advanced
educated classes of people who develop goals and work on them as per guidelines and remain
updated with percentage of target achieved. Pure base societies believe nature is the lifeline of
everything. So they are more inclined towards use of Ayurvedic therapies and nature- based
products. This can be a society which utilizes green practices and makes use of green products
from every ecological angle and hence will be called as green society.
Keywords: Green products, Eco-developed societies, Future generations, Environment
INTRODUCTION
Society in a layman language comprises of
a group of people coming together for a purpose
and its modified version in simple terms is a group
90
Global
sem
ecosystem
Waste
Wast
Utilization
EcoEcofriendly
Product
frien
Better
environmental
Bette
credentials
r
Recycling
Recy
point
EnergyEner
efficient
gy
cling
Environmental
policies
Renewable
Green
marketing
leads
Gree
n
towards
New power
New
Generation
pow
Environmental
Envi
Services
ronm
Innovative
Society
develo
New product
pment
Development
Life cycle
t
assessment
Energy/
Ener
power
rating
gy
system
Ecological
Applications
Smar
Smart
packaging
t
Eco profile
Ecoof
products
profi
Gree
Green
channel
n
Ecol
Ecological
Games
ogic
Global ecofriendly
environment
Sustainable
life style in
future
generations
Sustainable
thinking and
practices
Sustainable
eco-system
Green
marketing
leads towards
Sustainable
Society
Optimum
utilization of
natural
resources
Commitment
for
sustainability
Understanding
of future
generations
www.ijsir.co.in
Environment performance
systems
indicators
Audit system
Environment management
Energetic business
system
Future-oriented
Eco- growth
(Sustainable progress)
94
www.ijsir.co.in
Have guidelines
Achieve targets
Conservation of energy
Technological absorption
Purity factor
Natural technology
Green behavior
Green buildings
Green practices
Zero waste
Sustainable solutions
Socio-environment norms
Green technology
Green process
Green values
CONCLUSION
REFERENCES
www.nokia.com/in-en/
www.wipro.com/india/
www.ril.com/
www.tata.in/
www.infosys.com/pages/index.aspx
www.lg.com/in
www.microsoft.com/en-in/default.aspx
www.parleproducts.com/
www.hul.co.in/
www.amul.com/
www.dabur.com/en/general/contactus.aspx
www.britannia.co.in/
www.suzlon.com/
96
www.ijsir.co.in
*Address for Correspondence : Monika Raghuvanshi, Pacific Academy of Higher Education and Research
University, Udaipur, Rajasthan, India
E-mail: monikaraghuvanshi07@gmail.com
ABSTRACT
Humans are from nature so whatever we do to nature it comes back to us. It is an admitted fact
that due to current harmful anthropological activities environment is under stress and the same
is reflected in daily lives in form of depleting resources, economic fluctuations, natural
devastations and unhealthy localities and lifestyle. So this drew attention of business houses to
inculcate ecological thinking into every business angle and hence gave rise to the need of
green marketing which although exists in our daily lives and is practiced from time to time but
yet have to be made part of our daily lives to bring back the balance in eco-system and its
components and hence to bring back life to our future generations with health and comfort.
Today humans are surviving in money driven society. The use of renewable sources of energy
will result in healthy lives and can be recycled bringing no damage to environment and have
long run economic benefits too. Green marketing is the use of eco-friendly products, using
green process and inculcating ecological thoughts for mutual benefit of environment and humans.
Green marketing is optimum utilization of natural resources and thus enjoys unlimited tangible
as well as intangible benefits and hence economically as well as ecologically justified. Green
marketing involves green process so making use of neat and clean technologies can bring
healthy life. Green marketing causes mutual benefits to humans as well as environment so
ethically valuable and can be carried generations to generations. So if green marketing is valued
there are possibilities of green societies with ecological sound practices and healthy lives with
perfect environment. Green marketing if practiced brings intangible benefits of positive image
in the society and acts as source of inspiration for others. Only little bit changes are needed in
every class like if one is manufacturer they need to focus green products with green process,
distributors need to have green communication to retailers and they need to create green
awareness into consumers with green message, consumers need to have green purchase with
green product choices and stakeholders need to have green behavior which drives us towards
ecological or in other words green societies. Similarly green marketing mix is necessary to
follow as it is urgent need of time. There is need to redesign products with value added renewable
features as per ecological standards with little molding in physical evidences like biodegradable
green packing with green labels and sustainable energy-efficient process is followed along with
promotion associated with personal, economic, social and environmental benefits will make
green marketing as solution to most of our problems.
Key words: Green Marketing, Environment, Health, Ecological Thinking.
INTRODUCTION
Just imagine a picture of future societies all are fighting for their own survival and killing
each other for scare natural resources as when
men today are not leaving anything for them what
www.ijsir.co.in
Economic
aspect
Ecological
aspect
Societal
aspect
Green
Marketing
Technological
aspect
Ethical aspect
www.ijsir.co.in
Process
Green-labels
Green-packaging
(Biodegradable)
Product
Eco-friendly
Redesigned
Acc. to standards
Value-added
Renewable
Sustainable
Energy-efficient
Healthy for
workers
Green
marketing
mix
People
(Green consumers)
True blue greens
Geen-back greens,
Srouts, Gousers,
Basic browns
Price
Long-term
economic benefit
Little extra for
healthy society
Promotion
Associated with
benefits
Personal benefits
Economic benefit
Social benefit
Environmental
benefit
Place
Leads to clean
environment
post dissonance.
Green communication
Green communication needs extra efforts to
make place in mind of customers. Proper green
communication is required through green
channels for recognizing green products when
placed along with other products.
CONCLUSION
Awareness is a need in field of green
marketing as if customers are aware none of the
other factors can prevent the green marketing to
take its place in the society. Only need is to realize
the need of time and save the future. What human
beings were doing in the past were mistakes due
to unawareness about the negative
consequences of marketing but what humans are
doing now, instead of awareness about the
negative consequences, is that humans are
closing their eyes towards future generations
which may even disappear due to irresponsible
attitude towards nature and the thing is future
generations are a far off thing by not using green
marketing, humans are harming society at
present. Time is precious but not at the cost of
blank future so all need to do is pay little attention
towards green marketing, do little efforts to create
awareness in others and contribute little for a
better future.
REFERENCES
1.
2.
3.
4.
5.
http://en.wikipedia.org/wiki/Society
6.
http://www.cim.co.uk/files/7ps.pdf
7.
https://www.google.co.in/search=aspects+
of+green+marketing&espv
8.
Mohansundaram,V.(April
2012),
GREEN
MARKETING
CHALLENGES
AND
OPPORTUNITIES, ZENITH International Journal of
Multidisciplinary Research, Vol.2 Issue 4, April 2012,
ISSN 2231 5780
103
10.
11.
104
www.ijsir.co.in
ABSTRACT
An ecological cycle is the movement and exchange of organic and inorganic matter back into
the production of living matter. A dead and decaying corpse is a rich source of nutrients for
many organism chiefly insects and acts as an important ecosystem. Various groups of insects
visit corpse during various stages of its decomposition and bring about breakdown of
macromolecules with help of enzymes produced by them. This in turn returns the nutrients
back to soil thus ecosystem and is utilized by many other organisms for their growth and
reproduction. The insects involved in decomposition of a cadaver are known as forensic insects.
Within minutes of the death, forensic insects are able to locate the dead body through the
sense of smell. Flies are usually the insects that arrive first at the decomposing corpse, mainly
blow flies and flesh flies. The female fly deposits eggs (calliphorid flies) or larvae (sarcophagid
flies) on open wounds or natural orifices, such as the nose, mouth, and anus of the corpse.
These larvae then feed on the decaying corpse. Other arthropods such as beetles, ants, moth,
and butterflies arrive later and decompose the corpse. These include the beetles (family
dermestidae and silphidae), wasps (family vespidae), ants (order hymenoptera) and mites
(gamasid and oribatid mites).There are five stages in the process of decomposition of a corpse:
fresh, bloat, active decay, advanced decay and skeletonization. Fresh stage starts from the
moment of death to the first sign of bloating. In the fresh stage of decomposition, process of
microbial proliferation occurs which is termed as putrefaction and leads to the second stage of
decomposition, known as bloat. Blowflies and Flesh flies are the first forensic insects which
arrive and oviposit on the corpse. In the bloated stage, the body becomes stretched like a
balloon due to accumulation of gases within the body cavity and gives cadaver a bloated
appearance. At this stage more and more blow flies attract on the corpse. Active decay is
recognized by greatest mass loss, it includes ammonical fermentation of the body. In active
decay a different cohort of insects are attracted. As a result of the feeding of maggots and the
purging of decomposition fluids, cadaveric materials are rapidly introduced to below ground
floral and faunal communities, which result in the formation of a highly concentrated island of
fertility, or cadaver decomposition island (CDI). At advanced decay stage skin, cartilage and
bones with some flesh are remaining. The biggest indicator of this stage is the increase in
presence of beetles. Each CDI releases energy and nutrients to the wider ecosystem. Thus
carbon and nutrients, such as nitrogen, phosphorus, potassium, calcium, and magnesium etc
increased in the surrounding soil. During the skeletonization/dry stage only hair and bones are
left. Generally insects are not found at this stage, beetles of the family Nitidulidae may be
present.
Keywords : Forensic insects, Cadaver, Nutrients, Ecosystem
INTRODUCTION
The decomposition of vertebrate carrion,
directly and indirectly, affects soil and enthic
chemistry, as well as the local flora and fauna. A
www.ijsir.co.in
FORENSIC
INSECTS
IN
106
2.
3.
4.
5.
6.
7.
www.ijsir.co.in
ABSTRACT
Software engineering courses are core elements of the computer science curricula. While
the main aim of such courses is to give students practical industry-relevant software
engineering in the large experience, often such courses fall short of this important target
due to lack of industrial experience and support infrastructure. Therefore, it is necessary to
design and develop better infrastructure support for teaching or learning such courses and
this would benefit instructors and students world over. This aims to create a knowledge
and tool infrastructure for the benefit of instructors and students in software engineering
courses. Thus, the system embodies a teaching and learning environment that blends
collaboration, simulation, knowledge sharing, and industrial software projects. This paper
discusses the need for the learning style in software engineering education and proposes
an algorithm for dynamically assessing the learning style of the learner and channels the
learners to choose appropriate learning materials based on their learning style.
Keywords:
Software Engineering, Software Engineering Education, Learning Style,
Learning Theory, Collaborative Learning, Teaching/Leaning Methods
INTRODUCTION
While the software production has had
amazing triumph in emergent software that is
of mounting degree and intricacy, it has also
practiced a stable and noteworthy flow of
collapses. The majority of these failures are
well-known with open tragedy such as failed
mars landings, rockets carrying satellites
needing to be destroyed shortly after takeoff,
or unavailable telephone networks, and many
more private tribulations crop up that can be
similarly disastrous or at least, problematic and
infuriating to those occupied. Exploratory, one
of the major forums documenting these failures,
the risk forum, supplies an enlightening insight
such as a considerable section of documented
failures can be credited to software engineering
process breakdowns [16]. This collapses range
from individuals not following an approved
www.ijsir.co.in
109
B. Case Tools
An extensive assortment of positive hope
has been credited to the professional use of
CASE tools in software engineering education.
This incorporates the thinking of the students
in use of a CASE tool which will smooth the
progress of the disciplined and standardized
development process, enhance stability and
fullness of the models that are developed,
amplify the capability for quality
assurance,
transform the concentration of assessing
away from mere correction of minor errors,
make better project planning and management
by providing general idea of the development
process, cheer on reverse engineering, expand
the capability to fabricate high-quality
documentation, and bridge the gap between
design and implementation [2, 11, 22, 23, 25].
C. Educational Game
An educational game which is used in
software engineering education to simulate the
soft ware engineering p rocess fro m
requirements specification to product delivery.
This game provides students with an overall,
high-level, practical experience of the software
engineering process in a speedy enough
method to be used continually in a limited
amount of time. Educational game has a
number of other traits that contribute to its
learning efficiencies. Competition motivates
students to play the game, b ut it also
encourages collaborative learning, makes sure
that all of the fundamental technicalities of the
software engineering process being simulated
are able to be seen and it has a fun and
engaging nature, and quality that is known to
be highly conducive to learning [3, 10].
D. Web-Based Learning
Looking for mainly a complement and not
a replacement to traditional education, a set of
learning resources is particularly designed for
the world-wide-web. As a complement to the
lectures and printed material, the students had
right of entry to the web-based courseware
which contained an improved adaptation of the
lessons material in electronic form and useful
links to pertinent material on the internet.
Furthermore, asynchronous communication
110
111
CONCLUSION
Software engineering education has been
practiced through several teaching and learning
methods but these methods do not produce
enough talented software engineers to the
industrys expectations since these methods
satisfy a specific learning style. Previous
research provides evidence that software
engineering class contains all types of learner
categories such as visual, auditory and kin
aesthetic, in nearly equal in strength. Therefore,
it is important to check the learning style of the
learner and provides the learning materials
according to his/her learning style that would
motivate the knowledge gathering process. The
proposed algorithm discovers the leaner style
and leads the student to easily pick the learning
materials in line with their learning style.
Therefore, students are motivated to learn
software engineering concepts enjoyably than
the other teaching and learning methods and this
model also stimulates collaborative learning
environment. This environment encourages the
students to study software engineering in depth
and become a knowledgeable software engineer.
REFERENCES
1.
2.
www.ijsir.co.in
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Gane. C, Computer-Aided Software EngineeringThe Methodologies, the Product, and the Future,
Prentice-Hall, 1990.
13.
14.
15.
16.
17.
www.ijsir.co.in
113
39.
40.
34.
41.
35.
42.
36.
43.
37.
38.
114
www.ijsir.co.in
*SUCHETA1, K P YADAV2
Research Scholar, Department of Computer Science, Sai Nath University, Ranchi, India
2
Director, MIET, Greater Noida, Uttar Pradesh, India
ABSTRACT
Computer worms have a behavior of self-propagation over the host machines and have been
terrorizing the Internet for the last several years. This is due to the ability of worms to propagate
in automated fashion as they continuously compromise computer on the internet. At the same
time, being fully automated, it makes their behavior repetitious and predictable. This article
presents a survey on the behavior and detection schemes of Internet worms. We first identify
worm characteristics through their behavior, and then classify worm detection algorithms based
on the parameters used in the algorithms. Furthermore, we analyze and compare different
detection algorithms with reference to the worm characteristics by identifying the type of worms
that can and cannot be detected by these schemes.
Keywords: Self-Propagation, Behavior, Detection, Vulnerability, Algorithms
INTRODUCTION
Self-propagating malicious codes known as
computer worms spread themselves without any
human interaction and launch the most
destructive attacks against computer networks
like launching massive Distributed D e n i a l - o f Service (DDoS) attacks that disrupt the Internet
utilities, access confidential information that can
be misused through large-scale traffic sniffing,
key logging etc. They destroy data that has a
high monetary value, and distribute large-scale
unsolicited advertisement emails (as spam) or
software (as malware). These worms include
Camouflaging worm (C-Worm in short)[2], CodeRed worm [3], Slammer worm [4], Witty/Sasser
worms [8] and Morris Worm [6] . Being fully
automated, a w orms behavior is usually
repetitious and predictable, making it possible
to be detected. A worms life consists of the
following phases: target finding, transferring,
activation, and infection. Since worms involve
network activities in the first two phases, their
behaviors in these two phases are critical for
developing detection algorithms. Therefore, this
www.ijsir.co.in
I.
Virus
TECHNOLOGY
A. Activation
Activation is when a worm starts performing
its malicious activities. Activation might be
triggered on a specific date or under certain
conditions.
B. False alarm
A false alarm is an incorrect alert generated
by a worm detection system.
C. False Positive
A false positive is a false alarm where an
alert is generated when there is no actual attack
or threat.
D. False negative
False negative means the detection system
missed an attack. It is false negative if no alert is
generated while the system is under an attack.
E. Infection
Infection is the result of the worm performing
its malicious activities on the host.
F. Target Finding
Target finding is the first step in the worms
life to discover the victims (vulnerable hosts).
G. Threshold
Threshold is a predefined condition that, if
met, indicates the existence of specious traffic or
a worm attack.
H. Transfer
Transfer refers to sending a copy of the worm
to the target after the victim (target) is defined.
116
Worm
A worm is a malicious piece of code that selfpropagates, often via network connections,
exploiting security flaws in computers on the
network. In general, worms do not need any
human intervention to propagate; however, a
category of worms called passive worms require
certain host behavior or human intervention to
propagate. For example, a passive worm only
propagates itself until it is contacted by another
host.
EXISTING INTERNETWORMS
In this section we look at one of the first
Internet worms, the Morris worm, which gained
extensive media coverage, then discuss five
more recent Internet worms: Morris, Code Red,
Slammer, and Witty based on their
characteristics.
1. Morris Worm
The Morris worm was one of the first
Internet worms whose devastating effect gained
the wide attention of the media. Morris worm was
launched in November 1988 by Robert Tappan
Morris, who was a student at Cornell University
at the time. It is the first known worm to exploit
the buffer overflow vulnerability. It targeted sent
mails and finger services on DEC VAX and Sun
3 hosts. Based on the creators claim, the Morris
worm was not intended to cause any harm, but
was designed to discover the number of the
hosts on the Internet. The worm was supposed
to run a process on each infected host to respond
to a query if the host was infected by the Morris
worm or not. If the answer was yes, the infected
host should have been skipped; otherwise, the
worm would copy itself to the host. However, a
flaw in the program caused the code to copy
itself multiple times to already infected machines,
each time running a new process, slowing down
the infected hosts to the point that they became
unusable.
www.ijsir.co.in
Behaviour
The Morris worm was a mixture of
sophistication and naivety. It had a simple overall
design: look at a computers system configuration
to find potential neighbors, invade them, and try
to minimize the number of invasions on any
machine. The worm used heuristic knowledge
about Internet topology and trust relationships
to aid its spread, and it targeted two different
machine architectures. Its cleverness in finding
potential attack targets made it especially
effective, but it also took on the time consuming
task of guessing passwords on individual user
accounts, which gave it an attack in depth
aspect. Nonetheless, it became a victim of its
own success as it was unable to control its
exponential growth. With no global information
and no point of control, the Morris worm ran
rampant.
Detection Scheme
The Morris worm also contained some note
-worthy design flaws:
It was overly aggressive. Although it did have
a way to notice multiple infections, its ratewww.ijsir.co.in
Behavior
www.ijsir.co.in
3. Slammer Worm
Slammer, also known as Sapphire, was one
of the smallest worms ever seen. It was found in
January 2003 targeting Microsoft SQL Server
2000 or MSDE 2000. Slammer uses UDP port
1434 to exploit a buffer overflow in an MS SQL
server. The code size is 376 bytes. Adding the
UDP header makes the worm 404 bytes long in
total. It uses a blind scan scheme where
randomly generated numbers are used as IP
addresses in searching for vulnerable hosts. To
initialize the random number generator, Slammer
uses the GetTickCount() function from Win32
API. Sometimes the random generator returns
values that are broadcast addresses, such as
a.b.c.255, and causes all the hosts in that
network to receive the worm packets, making the
spread of the Slammer worm more rapid. Like
most UDP worms, Slammer is self-carried and
has a monomorphic payload. Slammer does not
write to the disks of infected machines, it only
overloads the victim systems and slows down
traffic.
Behaviour
The worms spreading strategy uses
random scanning .It randomly selects IP
addresses, eventually finding and infecting all
susceptible hosts. Random-scanning worms
initially spread exponentially, but their rapid newhost infection slows as the worms continually
retry infected or immune addresses. Thus, as
with the Code Red worm, Slammers infectedhost proportion follows a classic logistic form of
initial exponential growth in a finite system.
119
Detection Scheme
While Slammer spread nearly two orders of
magnitude faster than Code Red, it probably
infected fewer machines. Both worms use the
same basic scanning strategy to find vulnerable
machines and transfer their exploitive payloads.
However, they differ in their scanning
constraints. While Code Red is latency-limited,
Slammer is bandwidth-limited, enabling Slammer
to scan as fast as a compromised computer can
transmit packets or a network can deliver them.
For a random-scanning worm to be effective, it
needs a good source of random numbers to
select new attack targets. Slammers randomnu mber gen erator has so me interesting
deficiencies that make our analysis difficult and,
perhaps, have implications for future worms.
Slammer uses a linear congruent or power
residue, pseudo random number generation
(PRNG) algorithm.
These
www.ijsir.co.in
Detection Scheme
In this section, we in detail explain the
technical aspects of monitoring Witty worm.
Network telescope
Because Internet worm victims span diverse
geographic and topological locations, the overall
impact of a worm is difficult to measure from a
single viewpoint. The University of California, San
Diego (UCSD) Network Telescope consists of a
large piece of globally announced IPv4 address
space that we have instrumented to monitor
network security events. The telescope contains
almost no legitimate hosts, so inbound traffic to
nonexistent machines is always anomalous in
some way.
Because the network telescope c o n t a i n s
approximately 1/256th of all IPv4 addresses, we
receive roughly one out of every 256 packets
sent by an Internet worm with an unbiased
random number generator. Because we are
uniquely situated to receive traffic from every
worm-infected host, we provide a global view of
the spread of many Internet worms.
ISS vulnerability
Several ISS firewall products contain a
protocol analysis module (PAM) to monitor
application traffic. The PAM routine in version
3.6.16 of isspam1.dll analyzed ICQ server traffic
and assumes that incoming packets on port 4000
are ICQv5 server responses and that this code
contains a series of buffer overflow
vulnerabilities. eEye discovered this vulnerability
on 8 March 2004 and announced it with ISS 10
days later. ISS released an alert, warning users
of a possibly exploitable security hole and
providing updated software versions that were
not vulnerable to the buffer overflow attack.
121
Pele Li, Mehdi Salour, And Xiao Su, San Jose State
Uuniversity, A Survey of Internet Worm Detection
and Containment 1ST QUARTER 2008, VOLUME
10, NO. 1
2.
3.
4.
5.
6.
7.
Worm
Target
Findin
g
Schem
e
Blind
Propagatio
n Scheme
Transmissio
n Scheme
Morris
Self-carried
TCP
CodeBlind*
Self-carried
TCP
Red
Slamme
Blind
Self-carried
UDP
r
Witty
Blind
Botnet
UDP
*Code-Red II focused on local subnet scan
CONCLUSION
We studied a new class of worms, which
has the capability of self-propagation and further
avoid them by detection. Our investigation
showed that worms successfully propagate in the
time domain as well as frequency domain. Based
on observation, we identified various detection
schemes to detect them. Our evaluation data
showed that our schemes achieved superior
detection performance against the worms in
122
www.ijsir.co.in
*Address for correspondence: Vignesh V., Research Scholar, Department of Computer Science &
Engineering, Sai Nath University, Ranchi, India
ABSTRACT
The paper discusses about web usage mining which involves the automatic discovery of user
access patterns from one or more Web servers. This article provides a survey and analysis of
current Web usage mining systems and technologies. The paper also confers about the
procedure in which the web usage mining of the data sets is carried out. Finally the paper
concludes with the areas in which web usage mining is implemented.
Keywords: User/Session identification, Web Recommender, Web log, Server log
INTRODUCTION
Web mining is the application of data mining
techniques to discover patterns from the Web.
According to analysis targets, web mining can
be divided into three different types, which are
Web usage mining, Web content mining and
Web structure mining. Web Mining is the
extraction of interesting and potentially useful
patterns and implicit information from artifacts or
activity related to the World Wide Web.
According to the differences of the mining
objects, there are roughly three knowledge
discovery domains that pertain to web mining :
web content mining, web structure mining, and
web usage mining. Web content mining is the
process of extracting knowledge from the content
of documents or their descriptions. Web content
mining is the process to discover useful
information from text, image, audio or video data
in the web. Web content mining sometimes is
called web text mining, because the text content
is the most widely researched area. Web
document text mining, resource discovery based
on concepts indexing or agent based technology
may also fall in this category. Web structure
mining is the process of inferring knowledge from
the World Wide Web Organization and links
www.ijsir.co.in
Date
Request
Status
Bytes
www.ijsir.co.in
125
REFERENCES
1.
4.
5.
6.
7.
CONCLUSION
Web Usage Mining (WUM) systems are
specifically designed to carry out the task by
analyzing the data representing usage data
about a particular Web Site. WUM can model
users behavior and, therefore, to forecast their
future movements. Online prediction is one web
usage mining application. Web usage mining
model is a kind of mining to server logs and its
aim is to get useful users access information in
logs to make sites that can perfect themselves
with pertinence, serve users better and get more
economical benefit.
128
www.ijsir.co.in
ABSTRACT
Todays Cloud Computing Technology has been emerged to manage large data sets efficiently
and due to rapid growth of data, large scale data processing is becoming a major point of
information technique. The Hadoop Distributed File System (HDFS) is designed for reliable
storage of very large data sets and to stream those data sets at high bandwidth to user
applications. In a large cluster, hundreds of servers both host directly attached storage and
execute user application tasks. By distributing storage and computation across many servers,
the resource can grow on demand while remaining economical at every size. Map Reduce has
been widely used for large-scale data analysis in the Cloud. Hadoop is an open source
implementation of Map Reduce which can achieve better performance with the allocation of
more compute nodes from the cloud to speed up computation; however, this approach of renting
more nodes isnt cost effective in a pay-as-you-go environment.
Keywords: Cloud Computing, Distributed Data Mining, Hadoop, Hadoop Distributed File System,
Map Reduce
INTRODUCTION
These days large amount of data is created
every day so with this rapid explosion of data we
are moving towards the terabytes to petabytes.
This trend creates the demand for the
advancement in data collection and storing
technology. Hence there is a growing need to
run data mining algorithm on very large data sets.
Cloud computing is a new business model
containing pool of resources constituting large
number of computers. It distributes the
computation task to its pool of resources so that
applications can obtain variety of software
services on demand. Another feature of cloud
computing is that it provides unlimited storage
and computing power which leads us to mine
mass amount of data.
Hadoop is the software framework for writing
applications that rapidly process large amount
of data in parallel on large clusters of compute
nodes. It provides a distributed file system and a
framework for the analysis and transformation
www.ijsir.co.in
..
+(qn-pn)
B. Apriori
Apriori [7] is one of the key algorithms to
generate frequent item sets. Analyzing frequent
item set is a crucial step in analyzing structured
data and in finding association relationship
between items. This stands as an elementary
foundation to supervised learning Association
It aims to extract interesting correlations,
frequent patterns associations or casual
structures among sets of items in the transaction
databases or other data repositories and
describes association relationship among
different attributes.
Finding Frequent Item set by using Apriori
data mining algorithm:
Require: Items I = {i1, i2, . . . , in}, dataset
D, user-defined support threshold
Ensure: F(D_) := Frequent sets from D
w.r.t. that particular threshold
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
//Pruning Part
for all transactions (tid, I) 2 D do
for all candidate sets X 2 Ck do
if X _ I then
support(X) + +
end if
end for
end for //Computes the supports of all
candidate
sets
12: Fk := {X|support(X) _ _} //Extracts all frequent
sets
13: //Generating Part
14: for all X, Y 2 Fk,X[j] = Y [j] for 1 _ j _ k 1,
and X[k] < Y [k] do
15: I = X [ {Y [k]} //Join step
16: if 8J _ I, |J| = k : J 2 Fk then
17: Ck+1 := Ck+1 [ I //Prune step
18: end if
19: end for
20: k + +
21: end while
In short we are trying to perform following
steps:
1. Generate Ck+1, candidates of frequent item
sets of size k +1, from the frequent item sets
of size k.
2. Scan the database and calculate the support
of each candidate of frequent item sets.
3. Add those item sets that satisfy the minimum
support requirement to Fk+1.
A. Apriori: The Apriori algorithm is shown above
in line 13 generates Ck+1 from Fk in the following
two step process:
a. Join step: Generate RK+1, the initial
candidates of frequent item sets of size k + 1 by
taking the union of the two frequent item sets of
size k, Pk and Qk that have the first k1 elements
in common.
Qk = {item l, . . . , itemk1, item k , RK+1 = Pk
temk_ }
132
www.ijsir.co.in
Properties
Amazon
EC2
Service Type
IaaS
Compute/
Storage
Value added
service provider
Yes
User Access
Interface
Virtualization
Platform
(OS & runtime)
Google
App
Engine
IaaS
PaaS
Compute
(web applications)
Microsoft Manjras
oft
Azure
Aneka
IaaS - PaaS
PaaS
Compute
Compute
Yes
Yes
Yes
Web API
Command
Line
Tool
OS on Xen
Hypervisor
Web API
Command
Line Tool
Azure Web
Portal
Application
Container
Service
Container
Linux,
Windows
Linux
.NET on
Windows
Web apps
Deployment model Customizabl (Python,
VM
Java, Ruby)
If PaaS, ability to
deploy on 3rd party
N.A.
No
IaaS
Azure
Services
Web
APIs,
Custom
GUI
Service
Container
.NET on
Window
s, Mono
Linux
Applicatio
ns (C#,
C++, VB)
No
Yes
B. Map Reduce
Map Reduce [5] is a programming model for
processing large data sets, and the name of an
implementation of the model by Google. Map
Reduce is typically used to perform distributed
computing on clusters of computers. The model
is inspired by map and reduces functions
commonly used in functional programming,
although their purpose in the Map Reduce
framework is not the same as their original forms.
Map Reduce libraries have been written in many
programming languages. A popular free
implementation is Apache Hadoop.
Map Reduce is a framework for processing
the parallelizable problems across huge datasets
using a large number of computers (nodes),
collectively referred to as a cluster (if all nodes
are on the same local network and use similar
hardware) or a grid (if the nodes are shared
across geographically and administratively
distributed systems, and use more
heterogeneous hardware). Computational
processing can occur on data stored either in a
file system (unstructured) or in a database
(structured). Map Reduce can take advantage
of locality of data, processing data on or near
the storage assets to decrease transmission of
data.
www.ijsir.co.in
CONCLUSION
There are many new technologies emerging
at a rapid rate, each with technological
advancements and with the potential of making
ease in use of technology. However, one must
be very careful to understand the limitations and
security risks posed in utilizing these
technologies. Neither Map Reduce-like software,
nor parallel databases are ideal solutions for data
analysis in the cloud. Hybrid solution that
combines the fault tolerance, heterogeneous
cluster, and ease of use out-of-the-box
capabilities of Map Reduce with the efficiency,
performance, and tool plug ability of sharednothing parallel systems could have a significant
impact on the cloud market. We will work on
bringing together ideas from Map Reduce and
data mining algorithms, also to combine the
advantages of Map Reduce-like software with the
efficiency and shared work advantages that come
with loading data and creating performance
enhancing data structures.
REFERENCES
1.
2.
3.
4.
134
www.ijsir.co.in
6.
7.
8.
www.ijsir.co.in
135
*Address for correspondence : Vivek Saini, Research Scholar, Department of Computer Science &
Engineering, Sai Nath University, Ranchi, India
ABSTRACT
Now a days P2P networks are widely used for voice and video communications and also in
many transactions like file sharing. In P2P networks DHT (Distributed Hash Table) oriented
routing protocols gives an efficient way to search the contents (like files) between various peers.
A DHT protocol works on a hash function for the P2P application that provides a key and
searches the responsible nodes for the particular key. In this paper the core focus is targeted to
identify a new hash function that can enhance the working of DHT by generating a new identifier
for p2p nodes. The Chord protocol is also chosen as the routing protocol for the numerous
reasons those are conferred in this paper.
Keywords: P2P Networks, Distributed Hash Tables, Hash Functions ,Cryptography, Key
Distribution Center
INTRODUCTION
To find the resources rapidly in decentralized
distributed systems, DHT protocols are very
suitable for searching the contents efficiently. In
a distributed system, resources like any type of
file, several messages and directories, or various
contents can be backed up or fetch from the any
nodes at anytime. DHT has a collection of joining
nodes, wherever every node have small
information of other nodes to make the difference
to each other in the system and also has a route
searching requests to identify a best path to move
towards an appropriate target[1].
Message integrity is among the major
requirements in many network protocols that we
use today. As, today transmission on any network
is achieved at very high speed, the processing
for encryption, authentication and integration
must also be done at very high speed. Currently,
many hash functions are being used for this
purpose, say- MD4[2], MD5 [3] and SHA-1[4], Tiger,
Whirlpool etc.. These hash functions are oneway hash functions, in the sense that original
136
www.ijsir.co.in
137
140
www.ijsir.co.in
3.
4.
5.
6.
7.
8.
www.ijsir.co.in
9.
10.
R. Antony, D.
Peter,
Pastry:
Scalable,
Decentralized Object Location, and Routing for LargeScale Peer-to-Peer Systems, In Proc. of IFIP/ACM
International Conference on Distributed Systems
Platforms, ISBN:3-540-42800-3, Heidelberg,
Germany, pp. 329350, Nov. 2001
11.
12.
13.
14.
141
G SARVANAN1, K KRISHNAMOORTHY2
Research Scholar, Department of Computer Science & Engineering, Sai Nath University, Ranchi, India
2
Professor, Sudarshan Engineering College, Tamilnadu, India
Address for correspondence: G. Sarvanan, Research Scholar, Department of Computer Science &
Engineering, Sai Nath University, Ranchi, India
ABSTRACT
Software reliability is one of a number of aspects of computer software which can be taken into
consideration when determining the quality of the software. Building good reliability models is
one of the key problems in the field of software reliability. A good software reliability model
should give good predictions of future failure behavior, compute useful quantities and be widely
applicable. Software Reliability Growth Models (SRGMs) are very important for estimating and
predicting software reliability. An ideal SRGM should provide consistently accurate reliability
estimation and prediction across different projects. However, that there is no single such model
which can obtain accurate results for different cases. The reason is that the performance of
SRGMs highly depends on the assumptions on the failure behavior and the application datasets. In other words, many models may be shown to perform well with one failure data-set, but
bad with the other data-set.
Thus, combining some individual SRGMs than single model is helpful to obtain a more accurate estimation and prediction. SRGM parameters are estimated using the least square estimation (LSE) or Maximum Likelihood Estimation (MLE). Several combinational methods of SRGMs
have been proposed to improve the reliability estimation and prediction accuracy. The
AdaBoosting algorithm is one of the most popular machine learning algorithms. An AdaBoosting
based Combinational Model (ACM) is used to combine the several models. The key idea of this
approach is that we select several SRGMs as the weak predictors and use an AdaBoosting
algorithm to determine the weights of these models for obtaining the final linear combinational
model. In this paper, the Fitness and Prediction of various Software Reliability Growth Models
(SRGMs) can be compared with AdaBoosting based Combinational Model (ACM) with the help
of Maximum likelihood estimation to estimate the model parameters.
Keywords: Software Reliability, Software Reliability Growth Models (SRGMs), AdaBoosting
Algorithm, Least Square stimation, Maximum Likelihood Estimation.
INTRODUCTION
Software Reliability Engineering is defined
as quantitative study of the operational behavior
of software-based systems with respect to user
requirements concerning reliability. The demand
for software systems has recently increased very
rapidly. The reliability of software systems has
become a critical issue in the software systems
industry. With the 90s of the previous century,
computer software systems have become the
major source of reported failures in many
142
Bootstrap Algorithm
Input:
Training set Z={z1,z2,,zN}, with zi=(xi,yi).
B, number of sampled versions of the training
set.
Output:
S(Z), statistical estimate and its accuracy.
Step 1:
for n=1 to B
a) Draw, with replacement, L < N samples from
the training set Z, obtaining the nth sample
Z*n.
b) For each sample Z*n, estimate a statistic
S(Z*n).
Step 2:
Produce the bootstrap estimate S(Z), using
S(Z*n) with n = {1, . . . ,B}.
Step 3:
Compute the accuracy of the estimate, using
the variance or some other criterion.
We start with the training set Z, obtaining
several versions Z*n (bootstrap samples). For
each sampled version, we compute the desired
statistical measure S(Z*n).
2. Bagging
The Bagging technique [10] consists of
Bootstrap aggregation. Let us consider a training
set Z ={z1, z2, . . . , zN}, with zi = (xi, yi) for which
we intend to fit a regression model, obtaining a
prediction f(x) at input x. Bagging averages this
prediction over a collection of bootstrap samples,
thereby reducing its variance.
For classification purposes, the Bagging
algorithm is as follows.
Bagging Algorithm for Classification
Input:
Z = {z1, z2, . . . , zN}, with zi = (xi, yi) as training
set. B, number of sampled versions of the training
set.
143
4. AdaBoosting
Output:
H(x), a classifier suited for the training set.
Step 1:
for n=1 to B
a) Draw, with replacement, L < N samples from
the training set Z, obtaining the nth sample
Z*n.
b) For each sample Z*n, learn classifier Hn.
Step 2:
Produce the final classifier as a vote of Hn
with n = {1, . . . ,B}
3. Boosting
AdaBoosting Algorithm
H(x)= sign (
n=1
Hn(x))
Input:
set.
144
t =1
3
n=1
Hn(x))
X, yi
{-1,+1}
Initialize
weights Dt(i) = 1/n
Iterate t=1,,T:
www.ijsir.co.in
t R
Output
Final Classifier
T
t =1
EXISTING SYSTEM
1. Software Reliability Growth Models
A software reliability growth model (SRGM)
describes the mathematical relationship of finding
and removing faults to improve software
reliability. A SRGM performs curve fitting of
observed failure data by a pre-specified model
formula, where the parameters of the model are
found by statistical techniques like maximum
likelihood method. The model then estimates
reliability or predicts future reliability by different
forms of extrapolation.
After the first software reliability growth
model was proposed by Jelinski and Moranda in
1972, there have been numerous reliability
growth models following it. These models come
under different classes, e.g. exponential failure
time class of models, Weibull and Gamma failure
time class of models, infinite failure category
models and Bayesian models. These models are
based on prior assumptions about the nature of
failures and the probability of individual failures
occurring. There is no reliability growth model
that can be generalized for all possible software
projects, although there is evidence of models
that are better suited to certain types of software
projects.
www.ijsir.co.in
a(1 - exp(-rt))
(1 + c * exp(-rt))
(5) Generalized GO Model : M5
In GO model, the failure occurrence rate per
fault is time independent, however since the
expected number of remaining faults decreases
with time, the overall software failure intensity
decreases with time. In most real-life testing
scenarios, the software failure intensity increases
initially and then decreases. The generalized GO
model was proposed to capture this increasing/
decreasing nature of the failure intensity.
a(1-exp(-rtc))
In these NHPP models, usually parameter
a usually represents the mean number of
www.ijsir.co.in
P
i=1
Wis Mis(t)
is
is
Notation 1:
Fitness function (FF) can be defined
according to the estimation method of the
parameters of these candidate SRGMs. The
general methods to estimate the parameters of
SRGMs are least-squares estimation (LSE) and
maximum likelihood estimation (MLE).
If Maximum likelihood Estimation is used,
FF equation
is FF =1/- log (ML)
Where ML is the maximum likelihood
function derived in the next section.
147
Notation 2:
Lis =
n
j=1
j
is
kij * L
Ki+1 = { Ki+1, j },
Ki+1, j = kij * Ljis / (
n
j=1
kij * Ljis )
Notation 4:
is
Notation 5:
Wis = f(
Analysis of Data
is
) = log (1/
is
)/
p
i=1
log 1/
is
3. Parameter Estimation
Once the analytic expression for the mean
value function is derived, it is required to estimate
the parameters in the mean value function, which
is usually carried out by using Maximum
likelihood Estimation technique [11].
Maximum Likelihood Estimation:
Once a model is specified with its
parameters, and data have been collected, one
is in a position to evaluate its goodness of fit,
that is, how well it fits the observed data.
Goodness of fit is assessed by finding parameter
values of a model that best fits the data, a
procedure called parameter estimation.
The general methods to estimate the
parameters are least-squares estimation (LSE)
and maximum likelihood estimation (MLE).
Fitting a proposed model to actual fault data
involves estimating the model parameters from
the real test data sets. Here we employ the
method of MLE to estimate the parameters a
and r. All parameters of different Reliability
models can be estimated by the method of MLE.
For example, suppose that a and r are
determined for the observed data pairs:
(t0, m0), (t1, m1), (t2, m2),.,(tn, mn).
Then the likelihood()( !function)exp[(m(tfor the)
parametersm(t))] a and r in the models with m(t)
is giv n by
ML = ---------Where, mj is the cumulative number of faults
148
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
149
ABSTRACT
The finite element method is used to study the effect of different rake angles on the force
exerted on the tool during cutting. This method is attracting the researchers for better understanding the chip formation mechanisms, heat generation in cutting zones, tool-chip interfacial
frictional characteristics and integrity on the machined surfaces. In present study, the three
different rake angles are studied to find out the variation in values of Vonmisses stress for the
specified applied forces. As we increase the rake angle then the value of Vonmisses stress
goes on decreasing. The value of Vonmisses stress decreases for increase of rake angles of
7, 9 and 1 1 respectively . From results it seems that reduction of resultant forces might cause
increase in tool life but it causes decrease in tool life. In present study, mesh is created in
ANSYS and the boundary conditions are applied and the analysis is carried out for the applied
constraints. The results calculated on software can be verified with experiments carried out
with tool dynamometers for lathe tool. For future study the applied model can be used for
multipoint cutting tools such as milling cutters, broaching tools etc.
Keywords: Single Point Cutting Tool, Back Rack Angle, Vonmisses Stress, Finite Element
Method.
INTRODUCTION
Finite Element Method (FEM) based modeling and simulation of machining processes is
continuously attracting researchers for better understanding the chip formation mechanisms, heat
generation in cutting zones, tool-chip interfacial
frictional characteristics and integrity on the machined surfaces. Predicting the physical process
parameters such as temperature and stress distributions accurately plays a pivotal role for predictive process engineering of machining processes. The cutting forces vary with the tool
angles, feed and cutting speed. Knowledge about
the forces acting on the cutting tool may help the
manufacturer of machining tool to estimate the
power requirement.
Tool edge geometry is very important, because its influence on obtaining most desirable
tool life and surface integrity is extremely high.
150
Discretization of the field region into a number of node points and finite elements.
2]
Derivation of the element equation: The unknown field quantity is represented within
each element as a linear combination of the
shape functions of the element and in the
entire domain as a linear combination of the
basis functions. A relationship involving the
unknown field quantity at the nodal points
is then obtained from the problem formulation for a typical element. The accuracy of
the approximation can be improved either
by subdividing the region in a finer way or
by using higher order elements
3]
4]
Post-processing of the Results: - To compute other desired quantities and to represent the results in tabular form or graphical
form, etc. Use of TSP is routing in network.
Minimum path will help to reduce the overall receiving time
151
Forces
(F x ) in
N
F o rc es
(F y ) in
N
Forces
(F z ) in
N
20
300
80
35
450
105
50
500
130
i.
ii.
www.ijsir.co.in
iii.
iv.
v.
vi.
Fig. 3: Variations in Vonmisses Stress against resultant force at different rake angles
S.No.
Force
G eo m etric
Vonmisses
1.
Conditions
1
Conditions
A
Stress
0.566 + E 6
2.
0.534 + E 6
3.
0.451 + E 6
4.
0.855 + E 6
5.
0.802 + E 6
5.
0.502 + E 6
6.
0.115 + E 8
8.
0.106 + E 8
9.
0.801 + E 6
The results are generated from various classifications of force and geometric conditions im-
www.ijsir.co.in
155
FUTURE SCOPE
1.
2.
Marusich, T.D. and Ortiz, M., Modeling and simulation of high-speed machining, International Journal
The future scope of this analysis can be extended for calculating the force acting on a tool
in general metal cutting environment. This analysis can be explored for multi point cutting tools
like milling cutters, broach tool etc. It can help in
estimation of tool life and wear of cutting tools.
We can calculate heat generation and temperature by calculating the material flow. The generalization of constrained can further help to handle
actual problem of industry like the case when tool
material is non-homogeneous, non-linear, as well
as when the problem states are dynamic and
transient.
(2) For single point cutting tool and chip
contact
VALIDATIONS OF RESULTS
For solid model all those results that had
been worked by me in this study with the help of
ANSYS platform can be practically verified by
using dynamometer for measurement of cutting
forces. Moreover, the same can be measured
through power measurement and calorimetry.
The measurement assists in estimating the efficiency of the machine tool in determining the size
of the cutting tool required to resist those encountering forces and for verifying the result.
REFERENCES
www.ijsir.co.in
3.
4.
5.
6.
7.
8.
17.
18.
Y.M.lee, W.S. Choi, T.S.Song, Analysis of 3-D Cutting with Single point Cutting Tool, International Journal of the Korean Society of precision Engineering,
Vol 1,No.1 2000.
19.
20.
Ozel, T., The influence of friction model on finite element simulations of machining, International Journal of Machine Tools and Manufacture, 2005.
21.
22.
23.
24.
25.
Natarajan U., Arun P., Periasamy V. M., (2007), Online Tool Wear Monitoring in Turning by Hidden Markov
Model (HMM) Institution of Engineers (India) Journal
(PR), Volume 87, pp. 31-35.
26.
27.
Ozel, T. and Zeren, E., Finite element method simulation of machining of AISI 1045 steel with a round
edge cutting tool, Proceedings of the 8th CIRP International Workshop on Modeling of Machining Operations, Chemnitz, Germany, 2005.
9.
10.
11.
12.
13.
14.
15.
16.
www.ijsir.co.in
157
*Address for correspondence: Satish Chander Garg, Research Scholar, Department of Mechanical
Engineering, Sai Nath University, Ranchi, India
ABSTRACT
Quality Function Deployment (QFD) was conceived in Japan in the late 1960's, and introduced
to America and Europe in 1983. This paper will provide a general overview of the QFD
methodology and approach to product development. Once familiarity with the tool is established,
a real-life application of the technique will be provided in a case study. The case study will
illustrate how QFD was used to develop a new tape product and provide counsel to those that
may want to implement the QFD process. Quality function deployment (QFD) is a method to
transform user demands into design quality, to deploy the functions forming quality, and to
deploy methods for achieving the design quality into subsystems and component parts, and
ultimately to specific elements of the manufacturing process.
Keywords: Quality Function Deployment, Tape Product, Product Development, Design Quality,
Manufacturing
INTRODUCTION
Quality Function Deployment (QFD) is a
quality tool that helps to translate the Voice of
the Customer (Vo C) into new products that truly
satisfy their needs. In this paper, QFD has been
reviewed in order to understand how it works, to
highlight its strengths and weaknesses and to
discuss its practical applications. The first part
of the paper presents an overview of QFD and
explains the methodology. QFD has been
defined and explained by means of an example
and a number of benefits and implementation
problems have been revealed [1] . First
conceptualized in 1966 as a method or concept
for new product development under the umbrella
of Total Quality Control, Hinshitsu Tenkai (quality
deployment) was developed by Dr. Shigeru
Mizuno and Yoji Akao. Yoji Akao, et al detailed
methods of quality deployment in 1972. The
Japan Society of Quality Control formed a
research group to specifically study Quality
Function Deployment (QFD) in 1978. QFD is
used to translate customer requirements to
158
www.ijsir.co.in
161
Resource
Vonderembse and
Raghunathan (1997)
Kathawala and
(1) Identify the customer
Motwani (1994); Zairi (2) Determine what the customer
(1995)
wants
(3) Provide a way to meet the
customers desires
Franceschini and
Rossetto (1995)
162
QFD
To drive long-term improvements
in the way new products are
developed in order to create value for
customers
Improved
Communication
QFD
clarifies the
customer priority
Enables
one
to
focus
proactively on CR early in the
design stage. Critical items
identified for parameter design
and product planning is much
easier to carry out. Also,
ensure consistency between the
planning and the production
process.
Source
Source
Kathawala and Motwani
(1994); Dahlgaard and
Kanji
(1994);
Prasad
(2000); Zairi (1995); Dale
et al. (1998); Bouchereau
and
Rowlands
(1999,
2000a);
Designing
for
customer satisfaction (1994)
Dahlgaard
and
Kanji
(1994); Bouchereau and
Rowlands (1999, 2000a);
Designing for customer
satisfaction (1994)
Dahlgaard and Kanji
(1994); Dale et al. (1998);
Bouchereau and Rowlands
(1999, 2000a)
www.ijsir.co.in
2.
3.
4.
5.
20.
6.
21.
7.
22.
8.
23.
9.
10.
24.
11.
25.
26.
27.
28.
12.
13.
14.
15.
16.
17.
18.
www.ijsir.co.in
165
41.
30.
42.
43.
44.
45.
46.
47.
48.
49.
50.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
166
www.ijsir.co.in
52.
53.
54.
55.
56.
57.
58.
59.
www.ijsir.co.in
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
167
73.
74.
75.
168
77.
78.
www.ijsir.co.in
MANUFACTURING QUALITY
1
ABSTRACT
This paper deals with the quality during manufacturing. It discusses various manufacturing
steps and methods of manufacturing keeping in view the quality of product at all stages. It
includes Just-In-Time (JIT) and Just-In Sequences (JIS) in details. It emphasizes upon that
quality of a product has to be maintained during manufacturing employing different kinds of
gauges for example Go and No Go gauges, depth micrometer, level protractor, Vernier caliper,
micrometer etc. Also at the end importance of Statistical Quality Control in discussed.
INTRODUCTION
MANUFACTURING STEPS
www.ijsir.co.in
2.
3.
4.
5.
6.
7.
Pilot Production.
8.
Production.
9.
ii)
www.ijsir.co.in
172
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
www.ijsir.co.in
*N L MAHARAJA1 B. KUMAR2
Research Scholar, Sunrise University, Alwar, Rajasthan, India
2
Professor, MIET, Greater Noida, Uttar Pradesh, India
ABSTRACT
Experiments were conducted to control the exhaust emissions from two-stroke, single cylinder,
spark ignition (SI) engine, with alcohol blended gasoline (80% gasoline, 20% methanol by vol;
80% gasoline and 20% ethanol by volume) having copper coated engine [CCE, copper-(thickness, 300 ) coated on piston crown, inner side of cylinder head] provided with catalytic converter with different catalysts such as sponge iron and manganese ore and compared with
conventional engine (CE) with pure gasoline operation. A microprocessor-based analyzer was
used for the measurement of carbon monoxide (CO) and un-burnt hydro carbon (UBHC) in the
exhaust of the engine at various magnitudes of brake mean effective pressure. Aldehydes were
measured by DNPH (dinitrophenyl hydrazine) method. CCE with alcohol blended gasoline considerably reduced emissions in comparison with CE with pure gasoline operation. Catalytic
converter with air injection significantly reduced pollutants with test fuels on both configurations
of the engine. The catalyst, sponge iron in comparison with manganese ore reduced the pollutants effectively with both test fuels in both versions of the engine. Methanol blended gasoline
effectively reduced pollutants in comparison with ethanol blended gasoline.
Keywords: S.I. Engine, CE, CCE, Emissions, Catalytic converter, Sponge iron, Manganese
ore, Air injection
NOMENCLATURE
BMEP
C
Fuel-equivalence ratio,
Brake mean effective pressure in bar
Number of carbon atoms in fuel composition
CCE
Copper coated engine
CE
Conventional engine
CO
Carbon monoxide
CO2
Carbon dioxide
DNPH Dinitrophenyl hydrazine
Gasohol 20% of ethanol blended with 80% of gasoline by volume
H
Number of hydrogen atoms in fuel composition
HPLC
High performance liquid chromatography
M
Manganese ore
www.ijsir.co.in
METCO
S
Set-A
Set-B
Set-C
SI
UBHC
A Trade name
Sponge iron
Without catalyst and without air injection
With catalyst and without air injection
With air injection and with catalyst
Spark ignition
Un-burnt hydro-carbons
INTRODUCTION
CO and UBHC, major exhaust emissions
formed due to incomplete combustion of fuel,
cause many human health disorders [1,2]. Such
emissions also cause detrimental effects3 on
animal and plant life, besides environmental disorders. Age and maintenance of the vehicle are
some of the reasons[4,5] for the formation of pollutants. Aldehydes which are intermediate com173
18.
19.
20.
21.
22.
23.
24.
25.
26.
Directional valve,
Air compressor,
Rotometer,
Heater,
Air chamber,
Catalytic chamber,
CO/HC analyzer,
Filter,
Round bottom flasks containing DNPH solution,
Engine,
Electrical swinging field dynamometer,
Loading arrangement,
Fuel tank,
Torque indicator/controller sensor, 6. Fuel
rate indicator sensor,
Hot wire gas flow indicator,
Multi channel temperature indicator,
Speed indicator,
Air flow indicator,
Exhaust gas temperature indicator,
Mains ON,
Engine ON/OFF switch,
Mains OFF,
Motor/Generator option switch,
Heater controller,
Speed indicator,
Table1- Data of CO emissions (%) with different test fuels with different configurations of
the engine at different operating conditions of
catalytic converter with different catalysts
Table 2- Data of UBHC emissions (ppm) with
different test fuels with different configurations
of the engine at different operating conditions of
catalytic converter with different catalysts
Table3-Data of Formaldehyde emissions (%
Concentration) with different test fuels with different configurations of the engine at different
operating conditions of catalytic converter with
different catalysts
Table 4-Data of Acetaldehyde emissions
(%Concentration) with different test fuels with
different configurations of the engine at different
operating conditions of catalytic converter with
different catalysts
DISCUSSION
From Fig.3, it could be observed that methanol blended gasoline decreased CO emissions
at all loads when compared to pure gasoline
operation on CCE and CE, as fuel-cracking reactions were eliminated with methanol. The combustion of methanol produces more water vapor
than free carbon atoms as methanol has lower
C/H ratio of 0.25 against 0.50 of gasoline. Methanol has oxygen in its structure and hence its
blends have lower stoichiometric air requirements compared to gasoline. Therefore more
oxygen that is available for combustion with the
blends of methanol and gasoline, leads to reduction of CO emissions. Methanol dissociates
in the combustion chamber of the engine forming hydrogen, which helps the fuel-air mixture to
burn quickly and thus increases combustion velocity, which brings about complete combustion
of carbon present in the fuel to CO2 and also CO
to CO2 thus makes leaner mixture more combustible, causing reduction of CO emissions. CCE
reduced CO emissions in comparison with CE.
Copper or its alloys acted as catalyst in combustion chamber, whereby facilitated effective combustion of fuel leading to formation of CO2 instead of CO. Similar trends were observed by
other researchers also[7] with pure gasoline operation on CCE.
175
From Fig.4, it could be noticed that at leaner mixtures marginal increase in CO emissions, and at
rich mixtures drastic increase in CO emissions
were observed with both test fuels
Pure
Gasolin e
Set-A
S
5.0
Set-B
Set-C
M
5.0
Methanol
blended
gasoline
S M
3.0 3.0
Gasohol
Pure Gasoline
S
3.5
3.0
4.0
1.8
2.1
2.0
3.0
1.2
1.5
Gasohol
M
3.5
S
4.0
M
4.0
S
2.4
M
2.4
S
2.9
M
2.9
2.3
2.8
2.4
3.2
1.44
1.92
1.9
2.32
1.5
2.1
1.6
2.4
0.96
M S M S
600 420 420 450
480 252 335 270
360 168 250 180
M
450
360
270
From Table-3 and Table-4, it could be noticed that the formaldehyde emissions in the exhaust decreased considerably with the use of
catalytic converter, which was more pronounced
with an air injection into the converter. Methanol
blend increased formaldehyde emissions considerably due to partial oxidation compared to pure
gasoline. The low combustion temperature lead
to produce partially oxidized carbonyl (aldehyde)
compounds with gasohol. CCE decreased formaldehyde emissions when compared to CE. The
trend exhibited by acetaldehyde emissions was
same as that of formaldehyde emissions. However, acetaldehyde emission was observed to be
more with ethanol blend compared to methanol
blend of gasoline in both versions of the engine
(Table-4).
TABLE 3 : DATA OF FORMALDEHYDE EMISSIONS
(% CONCENTRATION)
Set
Set-A
Set-B
Set-C
M
6.8
5.9
5
S
13.6
10.2
3.5
M S M
13.6 9.31 9.31
12 5.0 7.1
5 3.93 5.8
Set
Set-A
Set-B
Set-C
M
4.9
5.3
3.1
S
9.3
7.7
3.9
M
9.3
9.5
5.6
S
12.6
7.5
5.2
M
12.6
9.3
7.2
The partial oxidation of ethanol during combustion predominantly leads to formation of acetaldehyde. Copper (catalyst) coated engine
decreased aldehydes emissions considerably by
effective oxidation when compared to CE. Catalytic converter with air injection drastically decreased aldehyde emissions in both versions of
the engine due to oxidation of residual aldehydes
in the exhaust.
CONCLUSION
CO emissions in exhaust decreased by 40%
www.ijsir.co.in
177
7.
8.
9.
ACKNOWLEDGEMENTS
10.
11.
Murali Krishna, M.V.S. and Kishor, K., Control of pollutants from copper coated spark ignition engine with
methanol blended gasoline, Indian J. of Env. Prot.,
25(8), 732-738 , 2005.
12.
13.
14.
15.
2.
3.
4.
178
www.ijsir.co.in
convergence speed and it can be realized simply for less parameters need adjusting. PSO has
been mainly used to solve Bi-objective generation scheduling, optimal reactive power dispatch
and to minimize total cost of power generation.
Yet, the applications of ACO and PSO to solve
Security constrained OPF, Contingency constrained OPF, Congestion management incorporating FACTS devices etc. Of a deregulated
power system are to be explored out.
TABLE I : SUITABLE METHODS FOR SOLVING THE
VARIOUS OPTIMIZATION PROBLEMS OF ELECTRICAL ENGINEERING.
Objective
function to be
optimized
Suitable method(s)
LP, NR
Economic
dispatch
Economic
AI
dispatch with
non-smooth cost
function
Economic
Fuzzy
emission
dispatch
NLP, OP, IP, AI
Reactive power
optimization
Optimal
AI
location of
FACTS device
Social welfare
QP, AI
Congestion
management
AI
Security
constrained
OPF
NLP, IP
Reason to use
that method
Fast methods
Nonlinear
problem
Suitable for
conflicting
objectives
Accurate
methods
Multi objective
non-linear
problem
Multi objective
non-linear
problem
Multi objective
non-linear
problem
Stable
convergence
and emerged from earlier experiments with algorithms that modeled the flocking behavior seen
in many species of birds .In simulations, birds
would begin by flying around with no particular
destination and spontaneously formed flocks until
one of the birds flew over the roosting area. Due
to the simple rules the birds used to set their directions and velocities, a bird pulling away from
the flock in order to land at the roost would result
in nearby birds moving towards the roost. Once
these birds discovered the roost, they would land
there, pulling more birds towards it, and so on
until the entire flock had landed. Finding a roost
is analogous to finding a solution in a field of
possible solutions in a solution space. The manner in which a bird who has found the roost, leads
its neighbors to move towards it, increases the
chances that they will also find it. This is known
as the socio-cognitive view of mind. The sociocognitive view of mind means that a particle
learns primarily from the success of its neighbors .The concept of the PSO consists of, at each
time step, changing the velocity of (accelerating)
each particle toward its pbest and lbest locations (local version of PSO). Acceleration is
weighted by a random term, with separate random numbers being generated for acceleration
toward pbest and lbest locations. In the past several years, PSO has been successfully applied
in many research and application areas. It is
demonstrated that PSO gets better results in a
faster, cheaper way compared with other methods.
A. Basic Terms Used in PSO
The basic terms used in PSO technique are
stated and defined as follows [11]:
1. Particle X (I): It is a candidate solution
represented by a k-dimensional real-valued vector, where k is the number of optimized parameters. At iteration i, the jth particle X (i,j) can be
described as:
X i (i ) = [ X j 1 (i ); X j 2 (i );.....X jk (i );.....X jd
Where:
xs are the optimized parameters
d represents number of control variables
2. Population: It is basically a set of n particles at iteration i.
pop (i )= [ X 1 (i ), X 2 (i ), .........X n (i)]T
www.ijsir.co.in
In a minimization problem with only one objective function f, the individual best of the jth
particle Xj*(i) is updated whenever f (Xj*(i)) < f
(Xj*(i-1)). Otherwise, the individual best solution
of the jth particle will be kept as in the previous
iteration.
7.Global best X** (t): Global best is the best
position among all of the individual best positions
achieved so far.
8. Stopping criteria: Termination of the
search process will take place whenever one of
the following criteria is satisfied:
B. Advantages of PSO
Many advantages of PSO over other traditional optimization techniques can be summarized as follows :PSO is a population-based
search algorithm. This property ensures PSO to
be less susceptible in being trapped on local
minima. PSO makes use of the probabilistic transition rules and not deterministic rules. Hence,
PSO is a kind of stochastic optimization algorithm that can search a complicated and uncertain area. This makes PSO more flexible and
robust than conventional methods. PSO can easily deal with non-differentiable objective functions
because PSO uses payoff (performance index
or objective function) information to guide the
search in the problem space. Additionally, this
property relieves PSO of assumptions and approximations, which are often required by traditional optimization models. PSO has the flexibility to control the balance between the global and
local exploration of the search space. This unique
feature of a PSO overcomes the premature convergence problem and enhances the search capability which makes it different from Genetic
Algorithm (GA) and other heuristic algorithms.
C. Flowchart for Basic Particle Swarm Optimization Algorithm
OPF USING PSO Step 10: If one of the stopping criteria is satisfied then we go
A. The Objectives: Minimization of Reactive Power to Step 11. Otherwise, we go to Step
5.
182
Transmission Loss
Static network-related system Voltage Stability Margin (VSM) depends on the availability
of reactive power to support the transportation
of real power from sources to sinks. In practice,
the QL is not necessarily positive. The expression for reactive power loss minimization is as
below:
www.ijsir.co.in
Step 7: Modify the velocity v of each particle according to the mentioned equation.
V (k,j,i+1) = w*V(k,j,i) + C1*rand*(pbestx (j,k)
- x(k,j,i)) + C2*rand*(gbestx (k) - x(k,j,i)) .....(a)
Step 8: Position of each particle is also
modified according to the mentioned equation.
If a particle violates its position limits in any
dimension, its position is set at the proper limit.
x( k , j , i 1) x( k , j 1,i ) v( k , j , i)
Step 9: Evaluation of each particle is done
according to its updated position by running
power flow and calculate the fitness function. If
the evaluation value of each particle is better than
the previous pBest then the current value is set
to be pBest . If the best pBest is better than gBest
, the value is set to be gbest.
Step 10: If one of the stopping criteria is
satisfied than we go to step 11 otherwise we go
to step 5.
www.ijsir.co.in
183
SIMULATION RESULTS
The OPF using PSO has been carried out
on the IEEE 30 bus system. The OPF solution
has been attempted for minimizing the reactive
power loss by considering the (i) Generated PV
and slack bus voltages, (ii) Voltage limits for load
bus voltages as control variables.
The simulation has been carried out on the
system having an Intel core i5 2.67 GHz processor with 4 GB of RAM in MATLAB 7.7.0 environment. Results are viewed as reactive power loss
as objective function. For the studies, the population size is considered as 50 Generated PV and
slack bus voltages between 0.95 to 1.15, Voltage limits for load buses are 0.95 to 1.05
A. Various Case studies:
TABLE II : THE ABOVE STUDY HAS BEEN SUMMARIZED UNDER THE FOLLOWING CASES
Case
no.
Reactive loss
applying PSO
In Mvar
79.5
Name
before
75
74 .9
74 .7
74 .6
u.74.5
.
Case
2
i
n
Case
1
74 .4
s 7 4.3
Bus
No.
1
2
3
4
5
6
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
184
Voltage
Magnitude
as per IEEE
specification
In p.u.
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Voltage
Magnitude
before
applying
PSO
In p.u.
1
0.98
0.953318
0.944309
0.95
0.944243
1
0.983506
1
0.967354
0.962282
0.969677
0.963589
0.951564
0.948617
0.952909
0.955973
0.956607
0.950896
0.944794
0.942281
0.923133
0.949998
0.94009
0.928441
0.91598
Voltage
Magnitude
after
applying
PSO
In p.u.
1.032481
1.015079
0.994568
0.98718
0.987554
0.989664
1.046949
1.031638
1.047678
1.016218
1.011325
1.01818
1.012103
1.000944
0.998025
1.002041
1.004804
1.005427
1.000395
0.994448
0.992299
0.974157
0.999746
0.986903
0.979388
0.967615
l
o
sse 74.2
M V R
74 .1
74
73 .9
73 .8
73 .7
73 .6
73 .5
0 1 2
6 7 8 9
1 0 1 1 12 13 14 1 5 1 6 17 18 19 20 2 1 2 2 2 3 2 4 25 26 27 2 8 2 9 30 31 32 33 3 4 3 5 3 6 3 7 38 3 9 4 0 41 4 2 4 3 44 45 46 4 7 4 8 49 50
4.
5.
Jean-Carlos Hernandez, Particle Swarm Optimization: Basic Concepts, Variants and Applications in
Power Systems, Student Member, IEEE, and Ronald
G. Harley, Fellow, IEEE
6.
B.
7.
8.
Vladimiro Miranda Nuno Fonseca, Epso Best-OfTwo-Worlds Meta-Heuristic Applied To Power System
Problems , INESC Porto Instituto de Engenharia
de Sistemase Computadores do Porto, Portugal &
FEUP Faculdade de Engenharia da Universidade
do Porto, Portugal
9.
10.
11.
12.
CONCLUSION
This paper focuses on single objective
Optimal Power Flow ( OPF) problem considering reactive loss minimization optimization. The
various research findings can be summarized as
follows implementing a single OPF objective
function optimization algorithm based on the
Particle Swarm Optimization (PSO). An algorithm
is developed and applied to a practical power
system network. The developed OPF algorithm
offers to : provide a flexibility to add or delete
any system constraints and objective functions,
having this flexibility it will help electrical engineers in analyzing other system scenarios and
contingency plans, calculate the optimum generation pattern as well as all control variables in
order to minimize reactive loss together with
meeting the transmission system limitations, reactive loss decrease after applying PSO and bus
voltages uplift after applying PSO ,to find the
optimum setting for system control variables that
achieve a minimum objective
REFERENCES
1.
2.
3.
Nakhon Ratchasima Power Loss Minimization Using Optimal Power Flow Based on Particle Swarm Optimization, U. Leeton, University of Technology, THAILAND 30000
www.ijsir.co.in
185
ABSTRACT
Pollution, in general, may be defined as the addition of undesirable, unwanted or objectionable
foreign matter to water, air and land which adversely change the natural quality of the environment
and results in harmful effect on human, plant and animal life. The pollution caused by industries
or industrial processes are termed as industrial pollution. Pollution includes water, air, noise,
solid waste and radioactive waste. This paper critically discusses in brief the aspect of water,
air, noise, solid waste and radioactive waste pollutants in the environment and the concerned
government regulations thereof. (a) Water Pollution: it is caused by industrial effluents, surface
run off, waste water discharge, toxic/chemical elements in waste water.(b) Air Pollution: it is
caused due to release of chemicals, particulates into the atmosphere e.g. carbon monoxide
(CO), sulphur dioxide (SO2), nitrogen dioxide (NO2), hydrogen sulphide (H2S) etc. (c) Noise
Pollution: it is caused by industrial processes, machine operations, construction activities, working
of earth moving equipments, operation of generators, loco movement inside the factory etc.(d)
Solid Waste Pollution: any material which is discarded because of its negligible value comes
under solid waste. Such solid wastes generated, domestically or industrially, create one of the
major concerns for the environment. (e) Radioactive Waste Pollution: radioactive wastes are
generated from the nuclear fuel cycle right from mining of uranium, fuel fabrication through
reactor operations and subsequent reprocessing of the spent fuel. These wastes are also
generated from use of radio-nuclides in medicines, research and industries. There is much
legislation enacted by the Government of India to control the environmental pollution. A few
important ones are: (a)The Environment (Protection) Act, 1986 (b)The Water (Prevention and
Control of Pollution) Act, 1974 (c) The Air (Prevention and Control of Pollution) Act, 1981 (d)
The Noise Pollution (Regulation and Control) Rules, 2000 (e) The Municipal Solid Wastes
(Management and Handling) Rules, 2000 (f)The Atomic Energy (Safe Disposal of Radioactive
Wastes) Rules, 1987 .These legislations are complete in totality and cover the most important
aspects, but our level of pollution control is not up to the level of developed countries. The basic
reason for which is the lack of awareness amongst the people and weak implementation of
legislations by the law enforcing authorities.
Keywords : Industrial pollution, Pollution control, Pollution control legislations, Environmental
pollution, Radioactivity, Environmental acts and rules.
INTRODUCTION
Pollution caused by industries is becoming
a serious concern for all. Government tries to
ensure that industries take adequate safety
measures to treat the effluents from their plant
before disposing off the effluents so that the
186
b.
c.
Air Pollution
Air in atmosphere is a reserve of oxygen and
carbon dioxide without which survival of plant and
animal is not possible. The other gases in the
atmosphere perform vital functions that maintain
living environment in balance.
Dust and Fume, generated by industries, try
to become air borne and then spread in the
surrounding atmosphere. Pollutants include
oxides of carbon, nitrogen, sulphur,
hydrocarbons, inorganic/organic acids,
insecticides etc. Air pollutants contain 22
minerals. Most of them are very poisonous.
The industries must control the emission
limits of the exhausts as per the set norm of the
Pollution Control Boards and avoid unrestricted
discharge of solid and gaseous pollutants to the
atmosphere.
It is always suggested that the industries
should consider the dust / fume generation
aspects seriously while designing their
equipment and should try to minimize the same.
Unavoidable dust and fume generated in the
process should be controlled at the source of
generation through the system of capture,
extraction, conveying, and collection. In some
cases fine dusts are suppressed with the help of
fine mist / fog.
Many large polluting industries have some
Dust Extracting System installed already but
187
e. Headache.
f. Sleep disturbance.
g. Annoyance.
h. Speech problem.
i. Aggression.
j. Anxiety.
k. Withdrawal.
b.
l. Psychological problem.
m. Cardiac arrest
Solid Waste Pollution
All materials which are thrown away
because of no value are called solid waste. The
solid waste that we generate, industrial or
domestic, represents one of the major
environmental challenges. The enhancement in
industrialization resulted in vast increase in the
amount of refuse generated per person.
Types of Solid Wastes
c.
a.
d.
b.
c.
d.
Noise Pollution
Industrial noise refers to noise that is created
in the factories which is jarring and unbearable.
Sound becomes noise when it becomes
unwanted and unpleasant. Heavy industries like
ship building and steel making have long been
associated with noise induced hearing loss.
b.
c.
d.
www.ijsir.co.in
www.ijsir.co.in
matters.
a.
b.
c.
d.
Effects Observed
Threshold of audibility
50
85
Hearing impairment
110
120
Pain threshold
130
140
150
Burning of skin
160
190
a.
All
authorities,
while
planning
developmental activity or carrying out
functions relating to town and country
planning shall take into consideration all
aspects of noise pollution as a parameter
of quality of life to avoid noise menace and
to achieve the objective of maintaining the
ambient air quality standards in respect of
noise.
b.
c.
192
Violation
Whoever, in any place covered under the
silence zone, commits any of the following
offence; he shall be liable for penalty under the
provision of the Rule:
www.ijsir.co.in
a.
b.
c.
d.
Complaints / Punishment
a.
b.
b.
i.
ii.
Implementation of Rules
a.
b.
www.ijsir.co.in
193
(f)
www.ijsir.co.in
2.
3.
4.
5.
6.
7.
8.
195
ABSTRACT
In response to the global warming crisis, in Rio deo Janeiro of Brazil, the 1992 UN Conference
on the Environmental and Development clearly raised the concept of sustainable development.
Through this conference more than 150 countries had established United Nations Framework
Convention on Climate Change, which was called UNFCCC for short. UNFCCC is the first
convention to take full control of greenhouse gas emissions including carbon dioxide discharge
and is an international convention to fight global warming which is causing a lot of adverse
effect to the development of society and economy. After that, in December 1997, the third
Conference of the Parties (COP) under the UNFCCC held in Kyoto of Japan, which aimed at
limiting carbon emissions in developed countries. In this way, we can curb global warming.
Carbon trading is a advances format, where firms or countries buy and sell carbon permits as
part of a program to trim out carbon emission. It is a widespread method and countries utilise it
in order to meet their obligations specified by international Kyoto Protocol (1997) of United
Nations Framework Convention on Climate Change; namely the reduction of carbon emissions
in order to mitigate future climate changes. It specifically targets carbon dioxide calculated in
terms of CO2 equivalent or CO2. Currently, future contracts in carbon credits are actively traded
in European Exchanges (ECX).The European Union Emission Trading Scheme (EU ETS) is
the largest multinational, greenhouse emissions scheme in the world and is committed to reduce
8% 1990 levels of emission in 2008-2012.Carbon Development Mechanism (CDM) is another
trading project which is administered by the CDM executive which reports and is accountable to
the Conference of Parties(COP) Carbon Trading. In India, though we are potentially the largest
market for carbon credits on the MCX, we still need to implement proper policies to allow trading
of certified emission reductions (CERs), carbon credit. To increase the market for carbon trading
Forward Contracts (Regulation) Amendment Bill has been introduced in the Parliament. Thus
we see that Carbon Trading is definitely the Greenest pastures for business trading for the
small and large scale private and governmental sectors in India with opportunities for everyone.
So, in this paper, we have reviewed and put forward the technologies and market standards
that we can set so that the concept of carbon trading can have its roots in India too.
Keyword: Carbon Permits, Kyoto Protocol, Carbon Development Mechanism (CDM), Carbon
Footprint .Carbon trading in India
INTRODUCTION
Increase in GHGs mostly the Carbon dioxide
is the serious problem of the era. The problem
with humans contributing so much carbon dioxide
is that Earths natural system is overwhelmed and
196
2.
3.
4.
5.
6.
KYOTO PROTOCOL:
United Nations Framework Convention on
Climate Change
The Kyoto Protocol is an historical
agreement. It was the first international
agreement in which many of the worlds industrial
nations concluded a verifiable agreement to
reduce their emissions of six greenhouse gases
198
a)
b)
c)
b)
c)
200
www.ijsir.co.in
b)
c)
Trading of CERs
As a welcome scenario, India now has two
www.ijsir.co.in
CRITICISMS
One criticism of carbon trading is that it is a
form of colonialism, where rich countries maintain
their levels of consumption while getting credit
for carbon savings in inefficient industrial projects
(Liverman, 2008, p. 16). Nations that have fewer
financial resources may find that they cannot
afford the permits necessary for developing an
industrial infrastructure, thus inhibiting these
countries economic development. Other
criticisms include the questionable level of
sustainable development promoted by the Kyoto
Protocols Clean Development Mechanism.
Another criticism is of non-existent emission
reductions produced in the Kyoto Protocol due
to the surplus (hot air) of allowances that some
countries have. For example, Russia has a
surplus of allowances due to its economic
collapse following the end of the Soviet Union
(Liverman, 2008, p. 13). Other countries could
buy these allowances from Russia, but this would
not reduce emissions. Rather, it would simply be
a redistribution of emissions allowances. In
practice, Kyoto Parties have as yet chosen not
to buy these surplus allowances (PBL, 2009)
In China some companies started artificial
production of greenhouse gases with sole
purpose of their recycling and gaining carbon
credits. Similar practices happened in India.
Earned credits were then sold to companies in
US and Europe.
203
http://carbontradexchange.com/knowledge/what-iscarbon-credit
STRUCTURING ISSUES
Corporate and governmental carbon
emission trading schemes (a trading system
devised by economists to reduce CO2 emissions,
204
http://carbontradexchange.com/
http://www.carbontradewatch.org/publications/
carbon-trading-how-it-works-and-why-it-fails.html
2.
www.ijsir.co.in
7.
8.
5.
6.
FERN: www.fern.org
Point Carbon: http://www.pointcarbon.com/
REDD Monitor: www.redd-monitor.org
SinksWatch: www.sinkswatch.org
9.
10.
www.ijsir.co.in
205
ABSTRACT
Advancement in technology in recent years has transformed the purpose of communication
and encouraged the emergence of new communication channels based on internet technology,
that have fashioned bold new approaches in the management of the marketing mix. The growing
importance of social media marketing has come with a revolution in the IMC approach. The low
cost and greater benefits have been the major reason for the success of the social media
marketing. The study reveals how the consumer awareness generated by social media leads
to success in the marketing communications. The continuous updates about the products on
the social media generate interest which leads to higher customer involvement and hence
enjoys the top of mind recall.
Keywords: Social media marketing, consumer awareness, consumer involvement, top-of-mind
recall.
INTRODUCTION
During the last decade, the business world
has experienced and reached to an absolutely
new horizon of technological advancements. The
consumers have started experiencing a
substantial change in their lifestyles due to the
internet, and mobile technology. The way of
learning, working, living, and communicating has
changed dramatically. Brain Solis (2010) states,
the democratization of information, transferring
people from content readers into publishers, it is
the shift from a broadcast mechanism , one-to many and many to many model, rooted in
conversations between authors, people and
peers. Blackshaw and Nazzaro stated that a
variety of new sources of online information that
are created, initiated, circulated and used by
consumers intent on educating each other about
products, brands, services, personalities, and
issues (Blackshaw & Nazzaro , 2004). Griffin
(1997) stated that, with the increase in social
media networking, building a relationship with
your targeted audience and conversing with them
has become a major part of marketing adopting
the erstwhile pull marketing strategy. Social
media offers a quicker and more cost-effective
way to reach highly targeted markets than
206
2.
3.
4.
5.
6.
Lead generation
7.
STATEMENT OF PROBLEM
It is observed that the social media is
considered as the latest tool for promoting a
brand and creating a competitive advantage over
the competitors by enjoying consumers top of
the mind recall. It has become very necessary to
study how the effective strategy be applied to
social media that it efficiently manages to build a
brand and reap benefits of customer preference.
OBJECTIVE
The objective of the research is to explore
how social media is helping in brand building and
how consumers perceive it.
SUB OBJECTIVE
1.
2.
3.
HYPOTHESIS
1.
207
2.
3.
RESEARCH METHODOLOGY
Sample size: 50
DATA INTERPRETATION
With the help of questionnaire and personal
interview analysis;
1.
2.
3.
HYPOTHESIS TESTING
The hypothesis testing is done at 5% level
of significance and as the sample size is 50, use
normal distribution as an approximation to the
sampling distribution. Z test is done to prove the
hypothesis.
As we conduct a one tailed test, i.e. left
tailed test, at the level of significance at 5%
208
n=50
www.ijsir.co.in
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
209
IMPORTANCE OF LIFE INSURANCE IN MEETING OUT FINANCIAL NEEDS AND SECURITY IN CURRENT SCENARIO
WITH CHALLENGES AND EMERGING TRENDS
1
*Address for correspondence : Jyoti Agarwal, Research Scholar, Bhagwant University, Ajmer,
Rajasthan, India, email: agarwaljyotilko@gmail.com
ABSTRACT
From the above discussion it is evident that life insurance industry expanded tremendously
from 2000 onwards in terms of number of offices, number of agents, new business policies,
premium income etc. Further, many new products (like ULIPs, pension plans etc.) and riders
were provided by the life insurers to suit the requirements of various customers. However, the
new business of such companies was more skewed in favor of selected states and union territories. During the period of study, most of life insurance business was underwritten in the last
four months of the year. Private life insurers used the new business channels of marketing to a
great extent when compared with LIC. Investment pattern of LIC and private insurers also
showed some differences. Solvency ratio of private life insurers was much better than LIC in
spite of big losses suffered by them.
INTRODUCTION
The journey of human life, from womb to
tomb is full of woes, worries and unlimited needs.
Man is endowed with highly intellectual ability
which encourages him for the betterment and
advancement of his life so as to achieve happiness and comfort, also benefiting in that process
all those who depend on him for economic security, which gave rise to the business of insurance.
The insurance is primarily a social device
adopted by civilized society for mitigating the incidence of loss of income to families by unforeseen contingencies. Life Insurance Corporation
of India (LIC) came into existence on 1st September, 1956 after nationalization of all the 245
companies engaged in life insurance business.
From its very inception, the Corporation has
made impressive growth always striving for further improvement. American psychologist
Abraham Maslows theory of hierarchy of needs
has calibrated human needs into five stages: (1)
Physiological needs ( 2) Safety/Security needs (
3) Social needs, 4) Ego needs and 5) Self Actu210
alization/Self Fulfillment needs. In the present socioeconomic scenario, the human needs can be
restructured in a FEP module i.e. on financial,
emotional and philosophical aspects and here
we will throw light on these three with reference
to insurance.
While earlier studies on life insurance sector mainly focused upon LIC, it was only after
reforms in this sector that certain studies covering private players have taken place. Among
early studies, Arora (2002) highlighted that LIC
was likely to face tough competition from private
insurers having large established network and
their trained intermediaries throughout India.
Verma (2003) analyzed the various type of products offered by public sector giant and the new
global players in the private sector. Kumar and
Taneja (2004) highlighted the opportunities and
challenges before the insurance industry in India due to liberalization, globalization and
privatization. Kulshrestha and Kulshrestha (2006)
highlighted that demand for life insurance in rural India was expanding at the annual rate of 18
www.ijsir.co.in
Profits/Loss (+) ()
Operating
expenses
(Rs. crores)
Total
Premium
(Rs. crores)
2000-01
3706.56
34892.02
2001-02
4260.40
49821.91
2002-03
4621.09
54628.49
2003-04
5186.50
63533.42
2004-05
6241.26
75127.28
2005-06
6041.55
90792.22
2006-07
7080.86
127822.84
2007-08
8309.32
149789.99
2008-09
9064.29
157288.04
2009-10
12245.82
186077.31
2010-11
16980.28
203473.40
2011-12
14914.40
202889.28
2012-13
16707.66
208803.58
Financial Aspect
Finance plays a crucial role in a human life.
Every human being exerts himself to acquire financial power, using his muscle power and intellectual power; so that he can have that money
power. The financial needs can be split into four
Ss, i) Swapping, ii) Saving, iii) Stocking and iv)
Securing. While people roll in the first three steps,
i.e. Swapping, Saving and Stocking gradually in
that order; the fourth one, i.e. Securing lacks
behind. Man seems to relegate financial security to a lower down position. Financial security
is as important need in the personal financial
planning of an individual as other needs are.
Hence it deserves the full attention for enduring
financial stability. Insurance is a firm fulcrum for
providing this stability. Yet people are by instinct
averse to insurance. This can be attributed to
the peculiar characteristics of insurance, such
as, intangibility of the product and benefits appearing to come to fruition at too distant a future.
2000-01
316.65
2001-02
821.79
2002-03
496.97
2003-04
551.81
2004-05
708.37
2005-06
631.58
2006-07
773.62
2007-08
844.63
2008-09
957.35
2009-10
1060.72
2010-11
1171.80
2011-12
1313.34
Emotional Aspect
2012-13
1489.92
www.ijsir.co.in
211
those agents who operate in the rural and semiurban areas. As agents still contribute 78.69%
of total business, their success is critical for the
success of the life insurance industry in India.
The productivity of the agents is low because
of miss-selling of ULIPs. Barring a small proportion of agents who have got MDRT or similar recognition for the consistency of their performance,
a very large number of agents have failed to become true professionals. They are mostly part
timers and do not even have the inner motivation to grow. If insurance industry has to grow,
the same way, the skills, competencies and attitudes of all agents have to get a total face lift.
Professionalizing a vast sales force is a big challenge for all insurers. The average number of
policies sold by the agents in 2011-12, proves
that an insurance agent, on an average, has not
been able to make a career out of his job. If an
agent is not fully devoted in this profession on a
regular basis, it is very difficult for him to bring
quality business and also to give proper services
to the customers.
Perhaps the biggest challenge is the lack of
proper insurance awareness. Even after 57 years
LIC was formed , many people still do not understand the value of insurance properly. Although
LIC did a commendable job in spreading the
message of insurance, most people still can not
distinguish insurance from other forms of investments. That is why only a few products are demanded by the market. Our agents have failed
to market need based insurance. At best, insurance is sold as a savings instrument or an investment instrument. Most of the agents continue
to push products which give more commissions
or where service obligations are less. Agents
could have been the ideal medium for generating insurance awareness as they are in direct
contact with the customers. But lack of competency, professionalism and integrity on the part
of many of the agents (and of other intermediaries as well) have prevented them from improving insurance awareness to the extent it should
have been.
Recent Trends in the life insurance industry
The good news is that the insurers are trying their best to meet the challenges. Recent
trends in the industry show that the insurers are
213
fast changing the way of their functioning. Insurers are now trying to sell a blend of linked and
non-linked products. They are also trying to sell
more of long term products. This is a step in the
right direction. People indeed need more of long
term insurance products, covering them protection throughout their working life. This will also
ensure consistency of business for the insurers.
Many insurers, especially the private insurers are
now successfully marketing term assurance
among the youth. This is great as the youth can
get a large cover at the minimum of premium.
Term assurance carries no maturity value and
therefore it is heartening that the new generation is able to pick up a product which is pure
insurance. But, while granting a huge cover, the
insurers have to assess the quality of each risk
carefully because if a claim is repudiated later, it
can shake the confidence of the people in the
institution called life insurance .
Another important trend in insurance industry is that a large volume of selling is happening
online. Some private insurers have been doing
business online for quite some time. Since the
new generation is tech savvy and makes a lot of
buying online, insurers are rightly catching the
young customers in the internet. After all, an insurer has to be present wherever the customers
are i.e. purely customer friendly . The insurers
are rightly doing a lot of marketing and brand
building activities in the social media.
214
www.ijsir.co.in
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
CONCLUSION
From the above discussion it is evident that
life insurance industry expanded tremendously
from 2000 onwards in terms of number of offices,
number of agents, new business policies, premium income etc. Further, many new products
(like ULIPs, pension plans etc.) and riders were
provided by the life insurers to suit the requirements of various customers. However, the new
business of such companies was more skewed
in favor of selected states and union territories.
During the period of study, most of life insurance
business was underwritten in the last four months
of the year. Private life insurers used the new
business channels of marketing to a great extent when compared with LIC. Investment pattern of LIC and private insurers also showed
some differences. Solvency ratio of private life
insurers was much better than LIC in spite of big
losses suffered by them.
www.ijsir.co.in
215
ABSTRACT
Indian retail industry is one of the sunrise sectors with huge growth potential. According to the
Investment Commission of India, the retail sector is expected to grow almost three times its
current levels to $660 billion by 2015. However, in spite of the recent developments in retailing
and its immense contribution to the economy, retailing continues to be the least evolved industries
and the growth of organized retailing in India has been much slower as compared to rest of the
world. Undoubtedly, this dismal situation of the retail sector, despite the on-going wave of
incessant liberalization and globalization stems from the absence of an FDI encouraging
policy in the Indian retail sector. In this context, the present paper attempts to analyze the
strategic issues concerning the influx of foreign direct investment in the Indian retail industry.
Moreover, with the latest move of the government to allow FDI in the multiband retailing sector,
the paper analyses the effects of these changes on farmers and agri -food sector. The findings
of the study point out that FDI in retail would undoubtedly enable India Inc. to integrate its
economy with that of the global economy. Thus, as a matter of fact, FDI in the buzzing Indian
retail sector should not just be freely allowed but should be significantly encouraged.
Keywords: Organized retail, Globalization, Foreign direct investment, Strategic issues and
Prospects, Farmers and Agri-food sector.
INTRODUCTON
Retailing is one of the most important sectors
of India economy. It provides 9% employment to
the total workforce and contributes around 15%
to the Indian GDP. It could have been a welcome
step in strengthening Indias FDI regime with
making it in tune with countrys needs. The FDI
policy has been moving away from the license
mentality of protection against imagined foreign
dictators towards a more open, healthy and
competitive environment. This policy would have
provided a window for the world class retailer
Hermes, Tiffany & Co and Wal- Mart etc. to set
their foot in the booming Indian retail sector. The
Indian Government believes that the opportunity
of FDI in multiband retail and further liberalization
of single-brand retail trade will facilitate greater
216
b)
c)
2.
3.
4.
5.
provide
FDI
ON
VARIOUS
220
Farmer groups
Various farmer associations in India have
announced their support for the retail reforms.
For example:
1. Shriram Gadhve of All India Vegetable
Growers Association (AIVGA) claims his
organization supports retail reform. He
claimed that currently, it is the middlemen
commission agents who benefit at the cost
of farmers. He urged that the retail reform
must focus on rural areas and that farmers
receive benefits. Gadhve claimed, A better
cold storage would help since this could help
prevent the existing loss of 34% of fruits and
vegetables due to inefficient systems in
place. AIVGA operates in nine states
including Maharashtra, Andhra Pradesh,
West Bengal, Bihar, Chattisgarh, Punjab and
Haryana with 2,200 farmer outfits as its
members.
2. Bharat Krishak Samaj, a farmer association
with more than 75,000 members says it
supports retail reform. Ajay Vir Jakhar, the
chairman of Bharat Krishak Samaj, claimed
a monopoly exists between the private guilds
of middlemen, commission agents at the
sabzi mandis (Indias wholesale markets for
vegetables and farm produce) and the small
shopkeepers in the unorganized retail
market. Given the perishable nature of food
like fruit and vegetables, without the option
of safe and reliable cold storage, the farmer
is compelled to sell his crop at whatever price
he can get. He cannot wait for a better price
and is thus exploited by the current monopoly
of middlemen. Jakhar asked that the
government make it mandatory for organized
retailers to buy 75% of their produce directly
from farmers, bypassing the middlemen
monopoly and Indias sabzi mandi auction
system.
3. Consortium of Indian Farmers Associations
(CIFA) announced its support for retail
reform. Chengal Reddy, secretary general of
CIFA claimed retail reform could do lots for
Indian farmers. Reddy commented, India has
600 million farmers, 1,200 million consumers
and 5 million traders. I fail to understand why
political parties are taking an anti-farmer
www.ijsir.co.in
www.ijsir.co.in
b)
c)
2.
3.
4.
5.
6.
7.
2.
221
3.
4.
5.
6.
7.
222
www.ijsir.co.in
Impact on Consumers
Supermarkets
and
existing
www.ijsir.co.in
Policies
for Competitiveness with
Inclusiveness in the Supermarket Revolution:
As the supermarket revolution proceeds in
developing countries, governments have several
options for helping small farmers participate in
supermarket channels (or gain access to viable
alternatives) and traditional retailers coexist or
compete with the modern retail sector.
Option 1: Regulate Modern Retail. To the extent
developing countries have regulated modern
retail; their goal has been to reduce the speed
and scope of its spread. The regulations have
mainly limited the location and hours of modern
retail. On balance, these regulations have done
little to limit supermarket spread, partly because
although regulations tend to target large-format
stores (and thus not limit small traditional stores),
modern retail comes in a wide variety of formats,
including neighborhood stores and convenience
stores.
Option 2: Upgrade Traditional Retail. A number
of good examples of programs to upgrade
traditional retail exist. Of particular interest are
those of East and Southeast Asia, such as in
China, Hong Kong, the Philippines, Singapore,
223
12.
13.
14.
15.
16.
17.
REFERENCES
18.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
www.ijsir.co.in
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
225
ABSTRACT
Six Sigma is a proven business strategy for improving the organizations effectiveness and
achieving higher levels of performance. Six Sigma applications have proved its success in
product and process / service Industries by deploying any one of its models like DMAIC or
DFSS during implementation. In the recent times, educational institutions are attempting to
leverage the success of industries in improving their efficiency and the quality of service that
are delivered by them. In the context of educational institutions, the customer and products are
complex phenomenon to describe unlike an industry. Engineering educational institutions, under
the globalised industrial scenario faces lots of challenges in their service offerings of quality
education and also in their output of students as products for employment in industry. This
issue of quality in higher education is a concern not only for the stake holders, but also for the
society at large. There have been many initiatives at the national level by government and other
interested stake holders at the macro level. Attempts have been made in this work to deliver a
broader framework of DMAIC approach to impact quality of engineering education at the micro
level of institutions themselves by leveraging the success of industries in applying six sigma for
complex problems. The scope of the work also includes review the published literatures related
to this work
Keywords: Six Sigma, DMAIC, Engineering Education, Educational Enterprise, Engineering
Colleges
INTRODUCTION
Six Sigma and its Success with Industries
Quality is a measure for success of any
organization. It helps in setting metric for
achieving higher goals of accomplishments from
the historical data of the own organization and
for bench marking the current level of
performance with leaders in the particular domain
towards setting targets for achievements. It also
helps in continuous improvement and excel in
the given function. There have been many
initiatives of quality in the industries for achieving
higher standards like Zero Defects, TQM, 5S and
many others. Quality Gurus like Deming, Juran
and many others during various phases have
226
Fig. 7: DMAIC Model for EEE - Roles and Responsibilities CTQ Flow Down from System to Individual vs
Achievement of Quality from Individual to System
230
REFERENCES
1.
2.
www.ijsir.co.in
4.
10.
11.
5.
12.
6.
13.
14.
15.
7.
8.
9.
www.ijsir.co.in
231
ABSTRACT
Though hospitals make relatively insignificant contribution to the total garbage mountain, they
have an obligation to deal with bio-medical waste in an effective and safe manner being
hazardous and infectious in nature. Because of its composition, there are significant risks
associated with hospital waste. Infections are the most common health hazards associated
with poor hospital waste management, which has been magnified with the advent of AIDS and
hepatitis B virus infections and increase in the prevalence of disease in the health care providers
(HCP). Good collection, handling, transport, treatment and ultimate disposal procedures are
essential for well-being of patients, hospital staff, the community and the environment. Although
the risk posed by bio-medical waste can never be totally eradicated, it can be significantly
reduced by careful planning. An effective programme of hospital waste management can have
distinct economic benefits such as cost saving linked to waste reduction and improved purchasing
power. Ministry of Environment and Forest, Government of India, notified the rules for
management and handling of bio-medical waste called Bio-medical waste (Management and
Handling) Rules 1998.These rules apply to all hospitals that generate, collect, receive, store,
transport, treat, dispose or handle bio-medical waste in any form .It is extremely unfortunate
that medical waste regulation has never before focused on the immediate and extremely high
risk faced by the hospital workers and waste handlers. There is no mention of workers safety,
procedure, training and operation and monitoring the activities. Now, hospital waste management
is one of the thrust areas which is drawing the attention of health authorities and the government.
Biomedical waste is generated by the health care providers. Therefore, it becomes the
responsibility of this group to segregate and manage the waste in such a way, that it is no
longer hazard for them, public and environment.
INTRODUCTION
Medical care is vital for our life, health and
well-being. Hospital is a place to provide medical
care and serve the patient. But the wastes
generated from the medical activities carried on
during patient care have many adverse and
harmful effects to the environment including
human beings. The huge amount of the Hospital
Waste can be hazardous, toxic and even fatal
because of their high potential for diseases
transmission. Because of its composition, there
are significant risks associated with Hospital
Waste. Infections are the most common health
232
2.5
U.S.A.
4.5
France
2.5
Spain
3.0
India
1.5
(b) Hazardous/non-hazardous
Hazardous
www.ijsir.co.in
15%
10%
Non-hazardous
85%
(c) Composition
By weight
Plastic
14%
Combustible
Quantity (kg/bed/day)
45%
18%
Non-combustible
20%
Indian Scenario
country wide
waste
generation (approx.)
Approx. beds-10 lakhs
Total waste generated
per day
15 lakh Kg
Govt. Hospital-
9.45 lakh Kg
Pvt./Corporate -
5.25 lakh Kg
0.30 lakh Kg
BIOMEDICAL WASTE
Any solid, fluid and liquid or liquid waste,
including its container and any intermediate
product, which is generated during the diagnosis,
treatment or immunisation of human being or
233
B) Laboratory Waste:
i)
C) Non-clinical Waste:
This includes wrapping paper, office paper,
and plastic that has not been in contact with
patient body fluid.
D) Radioactive waste:
This describes waste resulting from nuclear
medicine treatments, cancer therapies and
medical equipment that uses radioactive
isotopes. Pathological waste that is contaminated
with radioactive material is treated as radioactive
waste rather than infectious waste.
E) Kitchen waste:
Sharps
Infectious
Pathological
Radioactive
Pharmaceuticals
www.ijsir.co.in
A SERIOUS
SUPREME
COURT
b)
c)
d)
e)
f)
g)
APPROACH FOR
MANAGEMENT
HOSPITAL
WASTE
OF
VARIOUS
THE
WASTE
3. COLLECTION OF WASTE:
Collection of bio-medical wastes should be
done as per rules in colour coded plastic bags
as mentioned in the earlier table. There is a need
to be vigilant so that intermixing of different
categories of waste is not done inadvertently by
the patients, attendants or visitors. The
containers for collection should be strategically
located at all points of generation as mentioned
in the earlier table. The process of collection
should be documented in a register, the coloured
polythene bags should be replaced and the
garbage bin should be cleaned with disinfectant
regularly.
4. STORAGE OF WASTE:
Storage refers to the holding of bio-medical
waste for a certain period of time, after which it
is sent for treatment and disposal. In other words
it means that the duration of time wastes are kept
at the site of generation and transit till the point
of treatment and final disposal.
5. TRANSPORTATION OF WASTE
of
Type
Waste
Treatment
Contain
Categ
Options as per
ers
Yellow
Plastic bag
Red
Disinfected
ory
Schedule 1
1,2,3,
Incineration/d
eep burial
3,6,7
Autoclaving/Mi
Container/
cro
Plastic bag
Chemical
waving/
Treatment
Blue/
Plastic
4,7
White
bag/punctu
cro
translu
re
chemical
cent
container
proof
Autoclaving/Mi
waving/
treatment
and
destruction/sh
redding
Black
236
Plastic bag
5,9,10
Disposal
(Solid
secured
landfill
in
www.ijsir.co.in
7. SAFETY MEASURES17
7.1 Safety Measures for the Medical and Paramedical Staff
The following instructions need to be notified
and strictly adhered to:
Clear directives in the form of a notice to be
displayed in all concerned areas.
Issuance of all protective clothes such as,
gloves, aprons, masks etc. without fail.
Sterilisation of all equipment and issue of only
properly sterilised equipment and tool, such
as, surgical tools to the medical personnel
and maintenance of registers for this
purpose.
www.ijsir.co.in
8. TRAINING
Each and every hospital must have well
planned awareness and training programme
for all personnel working in the institute
including
administrators,
medical,
paramedical and sanitary staff.
The administration of the establishment,
whether big or small, should provide written
instructions to all the departments generating
or managing waste, stating the policy of the
organisation and the decisions taken which
are to be adhered to.
All the medical professionals must be made
aware of Bio-medical Waste (Management
and Handling) Rules 1998.
Training should be conducted to all
categories of staff in appropriate language/
medium and in an acceptable manner.
A core group of trainers should be trained for
continued in-house training of the
administrative, para-medical and sanitation
staff.
8. MANAGEMENT AND ADMINISTRATION
A Hospital Waste Management Committee
should be constituted in each hospital for proper
implementation of Bio-Medical Waste
Management Rules 98, under the chairmanship
of the Medical Superintendents. It is a broad
based committee with representatives from
hospital administration, clinical departments,
pathology and microbiology departments and has
powers to take decisions on all matters relating
to bio-medical waste management in their
respective hospitals. Heads of each hospital will
have to take authorization for generation of waste
from appropriate authorities as notified by the
concerned State /U.T. Government, well in time
and to get it renewed as per time schedule laid
down in the rules. The annual reports, accident
reports, as required under BMW rules should be
submitted to the concerned authorities as per
BMW rules format.
9. MEASURES FOR WASTE MINIMIZATION
Proper collection and segregation of
biomedical waste are important. At the same
time, the quantity of waste generated is equally
238
II.
2.
3.
4.
5.
239
7.
8.
REFERENCES
1.
2.
3.
4.
240
5.
6.
7.
8.
9.
12. Colour coding and type of container for disposal of biomedical wastes
13. Label for transport of bio-medical waste containers/
bags
14. Schedule II of the bio-medical waste (management and
handling) rules, 1998
15. Hospital waste: an environmental hazard and its
management,by: Dr. Hem Chandra
16. Biomedical Waste (Management and Handling) Rules
1998
17. hospital waste an environmental hazard and its
management,by: Dr. Hem Chandra
18. P.S.Jaswal, NishthaJaswal, Environmental Law,
Allahabad Law Agency, 3rd Edition, pg.430
19. Rule 8 of The Bio-Medical Waste (Management and
Handling) Rules, 1998.
20. P.S.Jaswal, NishthaJaswal, Environmental Law,
Allahabad Law Agency, 3rd Edition, pg.430.
21. Rule 9(2) of The Bio-Medical Waste (Management and
Handling) Rules, 1998.
22. Rule 14 of The Bio-medical Waste (Management and
Handling) Rules, 1998.
23. P.S.Jaswal, NishthaJaswal, Environmental Law,
Allahabad Law Agency, 3rd Edition, pg.431.
www.ijsir.co.in
ABSTRACT
The financial performance of SIDBI in recent years is critically analyzed in this paper. The
research paper suggests the recommendations for improvement in financial performance of
SIDBI.
(IV) TOOLS FOR ANALYSIS-
INTRODUCTION
The Small Industries Development Bank of
India (SIDBI) was set up in 1990 under an Act
of Parliament- the SIDBI Act, 1989. The charter
establishing SIDBI envisaged SIDBI to be the
principal financial institution for the promotion,
financing and development of industries in the
small scale sector and to coordinate the functions
of other institutions engaged in similar
activities.SIDBI commenced its operations on
April 2, 1990, by taking over the outstanding
portfolio and activities of IDBI pertaining to the
small-scale sector.
CURRENT RATIO
RESEARCH METHODOLOGY
(I) RESEARCH DESIGN
Descriptive Research
INTERPRETATION
SIDBI
YEAR
2011
2012
2013
CURRENT
1.11
155129/146804
181856/202099
= 1.05
= 0.899
5.41
14.29
RATIO
%
11
CHANGE
241
INTERPRETATION
80
quick
ratio
60
40
percenta
ge
change
20
0
2011 2012 2013
2011
2012
2013
GROSS
1.30
6.41
7.55
30.00
393.07
17.78
INTERPRETATION
The Quick Ratio is seen as 0.72, 0.67, and
0.16 for 2011, 2012, and 2013 respectively. It is
decreasing from 2011 to 2013.
MARGIN RATIO
CHANGE (%)
LEVERAGE RATIOS
600
gross margin
ratio
400
0.002
200
total debt
ratio
0.001
percentag
e change
0
2011 2012 2013
percentage
change
INTERPRETATION
YEAR
2011
2012
2013
TOTAL DEBT
RATIO
0.00
0.00
0.0014
CHANGE (%)
0.00
0.00
0.00
DUPONT ANALYSIS
INTERPRETATION
In the total debt ratio, we can see that the
ratio is constant 0.00 in the year 2011and 2012
respectively and then it increased and became
0.0014 in the year 2013.
TURNOVER RATIO
YEAR
2011
2012
2013
TURNOVER
0.99
0.68
0.13
RATIO
CHANGE %
98
-31.31
-80.88
RATIO
FORMULAE
2011
2012
2013
a)Turnover ratio
1.84
3.91
1.18
1.30
6.41
7.55
c)Operating leverage
0.58
0.86
2.71
d)Return on Net
a*b*c
13.87
21.55
24.14
4.09
6.13
6.80
f)Financials
0.55
0.58
0.57
Leverage Income
EBIT
g)Financial leverage
0.56
0.44
0.37
e*f*g
1.25
1.56
1.43
Retained Earnings /
0.75
0.76
0.76
0.94
1.19
1.09
Asset(RONA)
(B/S)
h)Return on equity
200
turnover
ratio
100
0
-100
242
percentage
change
(ROE)
i)Retention ratio
h*i
www.ijsir.co.in
30
RONA
20
10
ROE
0
2011
2012
2013
INTERPRETATION
From the above Graphical Presentation it is
clear that the Return on Net Assets is increasing
year by year which is a good sign for the
enterprise. On the other hand, the values of the
Return on Equity and Equity Growth are facing
the fluctuations as they are first increasing and
then they tend to fall.
FINDINGS
www.ijsir.co.in
REFERENCES
1.
2.
3.
www.sidbi.co.in
243
ABSTRACT
Environmental degradation is the complex process involving transformation and material loss
from any one of the environmental components. Environmental degradation arises by natural
processes or by man-made activities. The primary knowledge about environmental degradation,
causes and consequences of environmental degradation and planning measures about
environmental degradation are the three main parameters selected to know the cognition about
environmental degradation in different geographical environment in the Jalgaon district of the
Maharashtra state considered for the study. Among the geographical environment, parameters
sslike location, slope of land, physiography, climate, soils, resources, accessibility, socioeconomic status, population etc. are considered to demarcate the tribal and non-tribal zones
of the study region. Geographical environmental zones and their relation with environmental
degradation cognition were studied with the help of statistical method.
Keywords : Material Loss, Natural Process, Consequences, Cognition Process
INTRODUCTION
The major form of environmental
degradation varies from region to region,
depending upon the geographical environment.
The major causes of environmental degradation
are water pollution and scarcity, air pollution,
global atmospheric changes, solid and
hazardous wastes, congestion and noise in
various areas, soil loss, forest loss in rural areas,
depletion of raw materials and energy resources,
ecosystem losses. The main consequence of the
environmental degradation is on health,
productivity and amenity in the region. In this
research article, investigators have studied the
role of geographical environmental factors on
cognition about environment degradation.
STUDY REGION
In this research work, Jalgaon district of
Maharashtra state is selected for study due to
sizable variations in geographical environment.
244
AND
RESEARCH
% of Population
(Females)
Primary
Knowled
ge
in
Env.
Degradat
ion
Cognition
about
cause
&
Consequen
ces
of Env.
Degradatio
n
Planning
about
Env.
Degradat
ion
Primary
Knowled
ge
in
Env.
Degradat
ion
Cognition
about
cause
&
Consequen
ces
of Env.
Degradatio
n
Planning
about
Env.
Degradat
ion
Borkheda
53.50
38.50
28.50
52.50
35.80
25.70
Nimade
54.30
37.40
27.50
51.60
36.90
26.50
Garbardi
51.50
40.15
29.30
50.15
38.50
28.50
Haripura
52.80
40.80
28.50
51.80
39.80
27.30
Mohamma
50.70
dali
35.90
25.10
51.00
36.80
23.10
Lalmati
47.80
37.80
28.50
50.10
37.50
25.50
Jamne
51.90
38.90
26.10
50.80
35.30
25.90
Sakshtrali 52.80
39.40
27.80
51.50
32.10
26.10
Langda
amba
53.50
38.50
28.50
52.80
33.50
27.50
Chichati
52.50
39.50
29.10
51.50
34.10
28.90
Avg.
52.13
38.68
27.89
51.37
36.03
26.50
Sample
Villages
% of Population (Males)
% of Population (Females)
Hingone
65.50
52.50
Cognition
Primary about
Planning
Knowledg e cause & about Env.
in Env. Consequen Degradati
Degradati ces of Env. on
on
Degradatio
n
45.90
64.50
51.50
42.80
Mohorale
66.80
53.80
42.95
65.80
52.30
41.90
Bhadali
67.50
54.50
43.80
66.60
53.50
42.80
65.30
53.00
45.80
65.80
50.80
44.50
Anjale
68.35
52.80
49.30
68.20
51.90
45.90
Dhanova
69.15
51.50
46.50
67.50
51.30
45.50
6.20
52.30
45.80
65.10
51.50
44.80
Fattehpur
65.50
51.90
46.60
63.30
52.00
46.50
Bodwad
62.50
50.80
47.50
61.50
51.00
46.80
Anturli
65.90
51.50
46.30
64.30
51.20
45.50
Avg.
60.27
52.46
46.04
65.26
51.70
44.70
Sample
Villages
Nashirabad
Mehunbare
Cognition
Primary about
Planning
Knowledg cause & about Env.
e in Env. Consequen Degradati
Degradati ces of Env. on
on
Degradation
REFERENCES
1.
2.
3.
4.
5.
6.
7.
www.ijsir.co.in
247
ABSTRACT
Delivering high quality service to passengers is important for airlines to survive, gaining
competitive advantages through repeated customer patronage, preferred transportation supplier
status, market share gains and eventually increased profitability for the airlines . Airline
companies have realized the importance of satisfied customers to find a place for themselves
in this competitive world and initiated many projects to measure service quality and satisfy the
customers by improving service quality. Based on this, in this study, in order to evaluate
customers satisfaction at Domestic Airlines, with special reference to Indian Airlines the factors
affecting customers experience were analyzed using weighted SERVQUAL SCALE & GAP
ANALYSIS methodology.
This research paper evaluates the underlying forces of service quality- influences on passengers
satisfaction in domestic Airline, with special reference to Indian Airlines. The study examines
which dimensions have a positive influence on service quality and which dimensions have the
most and least important impact on service quality in domestic air travel, as perceived by Indian
airline passengers. The findings of this study are based on the analysis of a sample of 300
respondents. The findings reveal that the service quality dimensions are positively related to
customers satisfaction.
Keywords: Service Quality, Customers Satisfaction, Service Quality Dimensions, GAP
Analysis, CRM.
INTRODUCTION
An essential aspect of managing service
quality is the identification of client expectations,
and then designing the service system to focus
on these requirements. The airline business
must aim at fulfilling the individual customers
needs or even reaching beyond these. The
airline companies have realized that they have
to listen to consumers to survive in a competitive
market.(Booth M;2000) and airline companies
also have become aware of the importance of
having happy customers (Riddleberger EJ;IBM
Global Business Services;2009). The prerequisite of the customer s satisfaction is
understanding and knowing what they want.
248
DEMOGRAPHIC ANALYSIS
GENDER
Total No of Respondents %
N=300
192
64%
108
36%
MALE
FEMALE
MARITAL STATUS
MARRIED
207
69%
UNMARRIED
93
31%
AGE
21-30
72
24%
31-40
87
29%
41-50
93
31%
51-60
48
16%
BACKGROUND
URBAN
273
91%
RURAL
27
09%
EDUCATION
INTERMEDIATE
27
09%
GRADUATE
132
44%
POST GRADUATE
111
37%
PhD.
9
03%
Dr/ Engg/ Other
21
07%
Proffessional
Reason to Fly300
36%
Business
108
37%
Jobs
111
14%
Education
42
13%
Others
39
Frequent Flyer
231
77%
Since How Long
FlyingMore then one Years 111
37%
More then three years. 90
30%
Less then one year
69
23%
Common way to
purchase ticket
On- Line
258
86%
Other.
42
14%
age group 51 to 60 years . Regarding
background of respondents there were
91% urban respondents who were using
Indian Airlines flights , while remaining 09%
respondents belonged to rural background
.Regarding education level of respondents , it is
found that 09% respondents were having
education up to Intermediate, 44% Graduate,
37% Post Graduate, 03% having PhD, while 07%
were doctors, engineers and others
professionals. It is found that the main reason
to use airlines flights by the respondents was
251
Total YES f
No f
%
RESPONSIVENES,
ASSURANCE,
TANGIBILITY ,
EMPATHY,
RELIABILITY i.e.
Mean Yes f
f %
Mean Gap(D)=
(Expected
service
Perceived
service).
Gap(D)=
(Expected
service
Perceived
service).
D =E-P
D = E-P
(~ Mean)
( ~ f %)
(RATER MODEL)
& ATTRIBUTES
Reponsiveness
1. Get Informations
about time of
300
service.
2. Prompt& accurate 300
services.
3. Efficient Check
in & Baggage
300
Handling services
4. Willingness to
help
300
5-Prompt handling
of
request/complaints
300
ASSURANCE :
6. Knowledge to
answer customers'
questions.
D= - 0.04 D=
~0 4%
D= 0.07
D=
~ 07%
D= 0.18
D= - 0.03
D= 18%
D= 0
~3%
D= 0.06
D=
~06%
300
294 98% 0.98 291 98% 0.98
D= 0
D=
~0%
252
D= - 0.02 D=
~02%
D= - 0.08 D=
~8%
Gap Analysis
The difference between expectations minus
perceptions (D=E-P). A negative difference
indicates on the average that perceived reality
exceeds expectations that should produce
satisfied customers. On the other hand, a
positive difference indicates that on the
average. Perception of service delivery failed
to meet the expected level of service quality
indirectly producing dissatisfied customers.
(Parasuraman et al).
1. It is found in study that majority of
respondents 99% are satisfied with
service quality attribute of getting proper
information about time of various services
of the Indian Airlines. There is ve GAP ;
D= -0.04, in expected services and
perceived services ,which indicates
customers are satisfied with this service
quality.
2. The study reveals that there is positive
gap D= 0.07 regarding Prompt and
Accurate services of the Indian Airlines.
A positive difference indicates that on the
average, perception of service delivery
failed to meet the expected level of service
quality indirectly producing dissatisfied
customers. So it indicates that customers
are dissatisfied with Prompt and Accurate
services of the Indian Airlines. So there is
need to improve this service quality
,because customers satisfaction depends
on service quality and finally makes profit
to company.
3. Regarding Efficient check in & Baggage
Handling services, of the Indian Airlines, it
is found that there is +ve GAP ,D= 0.18, in
expected service mean and perceived
service mean. . So it indicates that
customers are dissatisfied with this
services quality of the Indian Airlines. So
improvement is needed for this service
quality also.
4. It is found that there is ve GAP (D= 0.03), in service quality dimension of
willingness to help to passengers by the
Indian Airlines staff. It indicates that
customers of Indian Airlines are satisfied
www.ijsir.co.in
2.
253
7.
4.
8.
9.
5.
6.
254
www.ijsir.co.in
ABSTRACT
Moral judgment involves a cognitive capacity to define situation in terms of right and duties.
Pre-adolescent can see themselves better from other peoples view and thus develop awareness
for moral issues. The sample consisted of 300 children, 150 of which were in the age group of
14-16 years and 150 in the age group of 17-19 years. Sex ratio was also maintained. Moral
judgment was measured by Moral judgment Test developed by Meera Verma and Durga Nand
Sinha. Results revealed a significant difference in the moral judgment ability between two groups
with older children (17-19 years) scoring higher than younger ones (14-17 years), which
suggested that maturity is a necessary (though not sufficient) condition for development of
moral judgment ability.
Key words: Morality, Judgment ability, Teenagers
INTRODUCTION
Morality, which is defined as the sum of an
individuals way of behaving that is judged
through persons ethical rightness or wrongness,
refers to how human beings come to resolve
discrepancies between their centered egoistic
needs and obligations to act in favor. The ability
to make moral judgment plays an important role
in the development of morality. Moral judgment
involves a cognitive capacity to define situation
in terms of rights and duties. It is the ability to
evaluate the situations and moral issues as right
or wrong keeping in view the knowledge of moral
standards. Developmental theorizing and
research have centered on the three moral
components mentioned below.
An affective, or emotional, component that
consists of the feelings (guilt, concern for other
feelings) that surround right or wrong actions and
motivate moral thoughts and actions.
A cognitive component that centers on the
way we conceptualize right and wrong and make
decisions about how to behave.
www.ijsir.co.in
S.
Character
No.
Dimension
1
Principle
Idealistic
2
Dependable loyal
3.
Has integrity
4.
Caring-Trustworthy
5.
Fair
6.
Confident
Sample traits
Clear values, concerned about doing right,
highly development conscience, law abiding.
Responsible, loyal, reliable faithful, honorable.
Consistent, rational, hard working.
Honest, trustful, sincere, kind, considerate.
Virtuous, fair, just.
Strong, self assured self confident.
256
OBJECTIVES:
Bearing in mind all the points discussed, the
present study focuses on the following objectives:
*
HYPOTHESES:
i) There will be a significant difference in moral
judgment ability of 14-16 years and 17-19
years age groups.
ii) There will be no significant difference in moral
judgment of boys and girls.
SAMPLE AND SAMPLING PROCEDURE
The sample for the study consisted of 300
students in the age group 14-19 years. The
sample further comprised of 150 children in 1416 years age group and 150 in 17-19 years age
group. The ratio between boys and girls was also
maintained in each category i.e. 75 boys and 75
www.ijsir.co.in
Age Group
Subject
14-16 Years
Boys
75
Girls
75
Boys
75
Girls
75
17-19 Years
(N=150)
(N=150)
Boys
Girls
Boys
Girls
(N=75)
(N=75)
(N=75)
(N=75)
Age Group
RESEARCH DESIGN :
When more than one independent variable
is included in a study, a factorial design is
necessary. By using 2 x 2 factorial design the
researcher has studied the significant impact of
gender and age.
TOOLS USED:
Moral Judgment Test by Meera Verma &
Durganand Sinha (1967)
General- Information Performa
ANALYSIS OF DATA:
FREQUENCY
DISTRIBUTION
SELECTED VARIABLES
FOR
Age Group
14-16 Years
150
17-19 Years
150
www.ijsir.co.in
Very
High
Average
High
Ability Ability`
Low
Very
Ability
Low
Ability
Total
Ability
14-16 years
27
25
59
17
22
150
17-19 years
12
25
85
13
15
150
Total
39
50
144
30
37
300
257
Age Group
Mean
25.8
Standard
Deviation
Score
Age
32.8
7.9
26.8
7.8
29.7
6.8
4.9*
2.2*
Subject
Mean
Standard
Group
14-16
Boys
27.4
5.1
years
Girls
29.7
7.8
17-19
Boys
30.6
2.5
years
Girls
29.9
12.3
5.5
258
2.1 *
.53
ii).
14.
Kahn, J.V. 1983. Moral reasoning of Piagetian matched retarded and non-retarded children and
adolescents. Journal of Genetic Psychology. 143 (1) :
69-77.
15.
16.
17.
18.
19.
20.
CONCLUSION
It was concluded from the research findings
that cognitive maturity is closely related to mature
moral judgment. This is not surprising as a high
level of abstract thinking is required in the
development of evaluation of intent, rational
ethical standards and sensitivity to the roles,
perceptions and feelings of others. Also, definite
shifts in moral judgment occur with increase in
chronological age, as older subjects were found
higher in moral judgment.
Further, certain
antecedent conditions like sex, fathers education
showed negligible impact on moral judgment but
mothers education was found to be of paramount
importance.
REFERENCES
1.
2.
3.
4.
21.
5.
22.
23.
6.
7.
24.
8.
25.
26.
9.
10.
27.
28.
11.
12.
www.ijsir.co.in
259
30.
33.
34.
31.
32.
260
www.ijsir.co.in
*Address for correspondence: Prof. Sunil Kumar Singh, Principal, Geeta P. G. College of Education,
Panipat, Haryana, India,
e-mail: sksingh.ms@gmail.com
ABSTRACT
Higher education in India has seen massive growth in recent years. On one hand, this growth
promises to produce more skilled individuals to fulfill needs of ever growing Indian economy
and on the other hand it poses a huge challenge for the governing bodies like UGC, AICTE and
others to maintain or improve the quality of education. An integrated Higher Education Service
System (HESS) at a national level can be one of the key ICT initiatives to help India become a
provider of world-class education. This system can provide deep visibility to governing bodies
at a university and student level to analyze their performance and hence gear up for future
requirements. HESS will enable various stakeholders to leverage the improved operational
efficiency in various key processes like grants, utilization certificates, approval processes,
feedback mechanism etc. With deeper visibility and increased operational efficiency the Indian
Higher Education System would be bolstered not only to satisfy the needs of students by making
them more employable but also combat possible competition from foreign universities.
Keywords : e-Governance, Higher Education Service System, Integrated System
INTRODUCTION
OPERATIONAL CHALLENGES
www.ijsir.co.in
(1) Universities/Colleges
www.ijsir.co.in
264
www.ijsir.co.in
POSSIBLE ROADBLOCKS
265
REFERENCES
1.
2.
3.
4.
Ministry
of
Education
www.education.nic.in
5.
6.
http://www.education.nic.in
7.
8.
9.
CONCLUSION
Higher Education Service System (HESS)
is a concept that can possibly revolutionize the
governance in higher education. It has the
capability of improving quality of higher education
and increasing number of employable students.
Despite its great potential to help the higher
education in India, the success of this concept
will be based on a great coordination and support
from governing bodies and universities/colleges.
266
Website: http://
www.ijsir.co.in
ABSTRACT
Education of women is most important for development of society in a holistic way. Education
helps the women in improving their status within her family and it brings a reduction in inequalities.
With an aim to encourage education to women at all levels and to remove gender bias in
providing knowledge and education, there is urgent need to establish schools, colleges and
universities exclusively for women in various states of the country. Although some schemes
have been launched by central government and state governments in our country to educate
girls, especially from marginalized families of below poverty line (BPL), followed by giving a
package of incentives in the form of providing free books, uniform, boarding and lodging, clothing,
midday meals, scholarships etc., these are not sufficient considering the population size of the
country. Concerted efforts involving educationists, social workers and policy makers are
warranted in this important sector for overall development of the country.
Keywords: Women education, Development
INTRODUCTION
Education is considered a key instrument
for the change which is responsible for national
development. It is true fact If you educate a
boy, you educate an individual, but if you educate
a girl , you educate a family, society and untimely
the nation. Education liberates women from
ignorance and enhances their self esteem. It
enabled them to choose their own way and look
after their families in better way. Womens
education brings about more vigilant enhancing
ability to rear and bring up children in a better
way. There is a positive correlation between
women literacy rate and life expectancy. While
illiteracy is invariably associated with poverty,
malnutrition, deprivation, high mortality, high
population growth and all other aspects of
underdevelopment; womens education becomes
imperative. When women are educated, their
dependence may disappear or decrease.
Education helps women to resist exploitation,
besides of course empowering them to be selfreliant. The National Policy on Education 1986
www.ijsir.co.in
Male Literacy
to Total Male
Population
(%)
Female
Literacy to
Total Female
Population (%)
1951
24.95
7.95
1961
34.44
12.95
1971
39.52
18.70
1981
46.82
24.82
1991
64.2
39.2
2001
75.85
54.16
2011
82.14
65.46
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
CONCLUSION
This paper reveals that there has been
considerable improvement in participation of girls
during the post-Independence period, yet it
continues to be below 50% both at primary and
upper primary levels of school education.
Although the increase in enrolment has been
more significant at the upper primary level as
compared to primary level have a sufficient
progress has been made.
www.ijsir.co.in
269
ABSTRACT
A good higher education system is required for overall development of a nation. A
remarkable growth in the higher education sector had made the administration of higher
education institutions intricate. Many researches reveal that the integration of ICT helps to
reduce the intricacy and enhance the overall administration of higher education. Electronic
Governance (e-Governance) is the use of Information and Communication Technologies
(ICT) for the planning, implementation, and monitoring of government programs, projects,
and activities. E-Governance is expected to help deliver cost-effective and easy-to-access
citizen services, and improve processing of transactions both within the government, and
between the government and other agencies. E-Governance is understood as a set of
activities involving the effective contribution of information and communication technology
(ICT) for strengthening administration and management in higher education system . In
India, it has declined somewhat over the past three decades due to remarkable increase in
the number of colleges and universities and their privatization. It has become very important
for the government to keep track of their functioning. Educational institutions may have
various requirements that include computerization and management of processes such as
registration, admission, student information, classes, time table, transport, attendance,
library, salary and expenses, examinations, performance, grades, hostels, security and
reports. Many of the software providers allow their clients to choose from the available
modules to suit their needs to monitoring of these aspects. In this study, an attempt has
been made to discuss the concept of E-Governance and use of latest application in higher
education sector.
Keywords: E-Governance, Information and Communication Technologies (ICT), Indian
higher education system (IHS), IMS (Management Information System)
INTRODUCTION
e- Governance can transform citizen
service, provide access to information to
empower citizens, enable their participation in
government and enhance citizen economic and
social opportunities, so that they can make better
lives, for themselves and for the next generation.
Formation of communication transactions,
integration of various stand-alone systems and
services between Government-to-Citizens (G to
C),
Government-to-Business
(G
to
B),Government-to-Government( G to G) as well
270
General Administration
Inventory Management
Staff administration
[2]
(i)
MODELS
OF
PRIVATE
SECTOR
PARTICIPATION IN HIGHER EDUCATION
Benefits to students
(i)
REFERENCES
1.
2.
3.
www.ijsir.co.in
275
5.
6.
276
7.
8.
9.
SudipSuklabaidya, AngshuMaanSen(International
Journal of Emerging Trends & Technology in Computer
Science.Volume 2, Issue 3, May June 2013)
Challenges and Prospects of E-governance in
Education.
10.
www.ijsir.co.in
ABSTRACT
Education influences economic development directly and also indirectly. The direct impact is
through productivity, employment, composition of the labour force, division of labour, mobility of
labour, and other such factors. The indirect impact is through savings, limiting family size,
inculcating right attitudes and skills, and by removing obstacles to social change and progress.
It facilitates attitudinal changes for modernization and social transformation. This study
investigates the growth of higher education in India during the period 1950 to 2005. The objective
of this study is to analyze growth of higher education in India using the year wise growth rate
formula. The result shows that the there is satisfactory growth of higher education in India
During study period.
Keywords: Education Influences, Economic Development, Productivity, Employment,
Modernization
INTRODUCTION
Developing countries and developed ones
have rapid economic development as the primary
objective. Human beings play a crucial role in
this development. Gerald M, Meir has aptly
remarked: The key to development is human
being and his (her) abilities, values and attitudes
must be changed in order to accelerate the
process of development (Meir G.M., 1975).
Education plays a key role in this process.
Theoretical and empirical researches have
substantiated the fact that investment in human
capital formation of a country plays a fundamental
role in improving the efficiency and productivity
of human beings, and through them the various
factors that complement and supplement the
production process. This investment in people,
especially through the medium of education has
attracted the attention of economists across the
world. A properly planned education system
contributes significantly to the growth and
economic development of a country (Agrawal P.,
1982). The modern university system in India
www.ijsir.co.in
AND
RESEARCH
Empirical Results
Table 1: Growth of Institutions, Enrolment and
Teachers in Higher Education in India
Year
Teachers
1950-51
28
578
174
24
1960-61
45
1819
557
62
1970-71
93
3227
1956
190
1980-81
123
4738
2752
244
1990-91
184
5748
4925
271
2004-05
348
17625
10481
472
Universities Colleges
Enrolment Teachers
1950-51 to 1960-61
4.86
12.15
12.34
9.96
1960-61 to 1970-71
7.53
5.90
13.38
11.85
1970-71 to 1980-81
2.84
3.92
3.47
2.53
1980-81 to 1990-91
4.11
1.95
5.99
1.06
1990-91 to 2000-01
3.75
6.85
5.48
3.84
2000-01 to 2004-05
11.22
12.14
5.69
4.55
Academic Institutions
Total number up to:
Type of Universities and other
1947 1966 1980 1993
Academic Institutions till 2006
Central Universities
3
5
8
10
Institutions recognized as 'Deemed
5
11 12 30
Universities'
2
9
9
10
Institutions of National Importance
18 56 81 112
State General Universities
State Agriculture Universities
--6
20 25
28 87 130 187
Total
2006
18
95
13
176
40
342
4.
5.
6.
7.
8.
REFERENCES
1.
2.
3.
280
www.ijsir.co.in
ABSTRACT
Value-based education promotes a thought provoking and interactive environment for the
students through the values incorporated in the curriculum. It promotes quality education and
holistic development of each child for a bright future. Teachers play an important role in helping
students imbibe the values. Professional development is vital in integrating values in the
classroom. Understanding the principles and aim of values education enable teachers to create
effective learning environment for values education. This article suggests steps to construct a
value based curriculum towards quality education. This also emphasizes the importance and
need for teacher training for better outcome on the topic, and also suggests a plan to prepare
teachers as values educators.
INTRODUCTION
Value based education instills educational
and cultural values among students and aims at
achieving multi-faceted development of a human
being namely intellectual, physical, spiritual, and
ethical development. The values incorporated in
a value-based curriculum may include
cooperation, responsibility, happiness, simplicity,
unity, peace, respect, love, tolerance, honesty,
humility, and freedom. The main purpose of
holistic education is to prepare students to meet
the challenges of living as well as academics.
Multiple studies have reported that value based
education is a holistic approach to students
education, one that provides complete education
of body and mind through innovative approaches
and critical educational thinking.
Education can be considered as a means
to impart general and specific information;
teaching skills and most importantly inculcate
values. The present system of education is
almost wholly geared to the first, a little to the
second and only marginally to the third (Burra,
2007). The neglect of ethical values, which
www.ijsir.co.in
1.
2.
3.
4.
5.
6.
7.
8.
9.
284
www.ijsir.co.in
2.
3.
4.
5.
6.
7.
8.
9.
285
EDITORIAL POLICY
The criteria for publication are originality high scientific quality and interest to a multidisciplinary
audience. Papers not sufficiently substantiated by experimental detail will not be published. Any
technical queries will be referred back to the author although the Editors reserve the right to make
alterations in the text without altering the technical content. Manuscripts submitted under multiple
authorships are reviewed on the assumption that all listed authors concur with the submission and
that a copy of the final manuscript has been approved by all authors. If accepted, the manuscripts
shall not be published elsewhere in the same form in either the same or another language without the
consent of the Editors.
International Journal of Scientific and Innovative Research insists on ethical practices in both human
and animal experimentation. Evidence for approval by a institutional Ethics Committee (for both human
as well as animal studies) must be supplied by the authors on demand. Animal experimental procedure
should be on humane as possible and the details of anesthetics and analgesics used should be
clearly stated. The ethical standards of experiments must be in accordance with the guidelines provided
by the CPCSEA (animal) and ICMR (human). The journal will not consider any paper which is ethically
unacceptable. A statement on ethics committee permission must be included in all research articles
under the Materials and Methods section. Authors must be careful when they reproduce text, tables
and illustrations from other sources. Plagiarism will be viewed seriously. All accepted papers are
subject to editorial changes. All rights are reserved to editor-in-chief, International Journal of Scientific
& Innovative Research (IJSIR). IJSIR will be published bi-annually in the month of July (JanuaryJune issue) and January (July-December issue) every year.
IJSIR would take much care in making your article published without much delay with your kind cooperation.
286
INSTRUCTION TO AUTHORS
The International Journal of Scientific and Innovative Research is a bi-annually published online
/ offline Journal which publishes innovative research papers, reviews, mini-reviews, short
communications and notes dealing with all branches of science, technology and engineering, health
and agriculture. All manuscripts are subject to rapid peer review. Those of high quality (not previously
published and not consideration for publication in another journal) will be published without delay.
MANUSCRIPT FORMAT
The preferred format of all manuscript is MS Word or RTF. Illustrations (figures) and images
must be inserted in the manuscript at the position they should appear when published.
PREPARATION OF MANUSCRIPTS
RESEARCH PAPER
The language of the journal is English. Each manuscript should be typed double-spaced on A4
(8.5" x 11") paper size with 1 inch margins. It should be arranged in the following order: Title, Abstract,
Keywords, Introduction, Materials and Methods, Results, Conclusion, Acknowledgement, References.
Title Page
Title page should contain title of the paper in bold face, title case (font size 14), names of the
authors in normal face, upper case (font size 12) followed by the address in normal face lower case.
The author to whom all correspondence be addressed should be denoted by an asterisk mark. The
title should be as short as possible and precisely indicate the nature of the work in the communication.
Names of the authors should appear as initials followed by surnames. At the bottom left corner of the
title page, please mention *Address For correspondence and provide a functional e-mail address.
Address of the corresponding author to whom all correspondence may be sent should be given only
if is different from the address already given under authors names.
Abstract
Should start on a new page after the title page and should be typed in single-space to distinguish
it from the Introduction. Abstracts should briefly reflect all aspects of the study, as most databases list
mainly abstracts.
Key-words
Provide four to six appropriate key words after abstract.
Introduction
Shall start immediately after the abstract, as the next paragraph, but should be typed in doublespace. The Introduction should lead the reader to the importance of the study; tie-up published literature
with the aims of the study and clearly states the rationale behind the investigation.
Materials and Methods
Shall start as a continuation to introduction on the same page. All important materials used along
with their source shall be mentioned. The main methods used shall be briefly described, citing
references. Trivial details may be avoided. New methods or substantially modified methods may be
described in sufficient detail. The statistical method and the level of significance chosen shall be
clearly stated. IJSIR prefers to publish work that has been subjected to an appropriate statistical test
at one level of significance.
www.ijsir.co.in
287
Results
All findings presented in tabular or graphical form shall be described in this section. The data
should be statistically analyzed and the level or significance stated. Data that is not statistically
significant need only to be mentioned in the text no illustration is necessary. All tables and figures
must have a title or caption and legend to make them self-explanatory. Results section shall start after
materials and methods section on the same page.
Discussion
This section should follow results, deal with the interpretation of result, convey how they help
increase current understanding of the problem and should be logical. Unsupported hypothesis should
be avoided. The Discussion should state the possibilities the results uncover that need to be further
explored. There is no need to include another title such as Conclusions at the end of Discussion.
Results and discussion of results can also be combined under one section, Results and Discussion.
Acknowledgements
Should be given after the text and not in the form of foot-notes.
References
Should be numbered consecutively in the order in which they are first mentioned in the text (not
in alphabetic order). Identify references in text, tables and legends by Arabic numerals in superscript
in square brackets. References cited only in tables or figure legends should be numbered in accordance
with the sequence established by the first identification in the text of the particular table or figure.
Journal Articles
Singh N., Verma P., Pandey B.R., Gilca M. Role of Withania somnifera in Prevention and Treatment
of Cancer: An Overview. International Journal of Pharmaceutical Sciences and Drug Research. 2011;
3(4): 274-279.
A Book
Singh N, Gilca M. Herbal Medicine Science embraces tradition a new insight into the ancient
Ayurveda. Edn 1, Lambert Academic Publishing (Germany), 2010, pp. 115-116.
A chapter in a Book
Nadkarni KM, Indian Materia Medica. Edn 3, Vol. I, Popular Prakashan, Mumbai, 2000, pp. 242-246.
A Report
World Health Organization. The World Health Report 2004: changing history.
Geneva: WHO; 2004.
Conference Proceedings
Stock A, Signal Trasduction in Bacheria. In the Proceedings of the 2004 Markey Scholars
Conference. 2004, pp. 80-89.
A Thesis
Strunk, JL. The extraction of mercury from sediment and the geochemical partitioning of mercury
in sediments from Lake Superior, M.S. thesis, Michigan State Univ. East Lansing, Ml, 1991
Illustrations
Tables Should be typed on separate sheets of paper and should not preferably contain any
molecular structures. Only MS word table format should be used for preparing tables. Tables should
288
www.ijsir.co.in
show lines separating columns but not those separating rows except for the top row that shows
column captions. Tables should be numbered consecutively in Arabic numerals and bear a brief title
in capital letters normal face. Tables should not be very large that they run more than one A4 sized
page.
Figures
Should be on separate pages but not inserted within the text. Figures should be numbered
consecutively in Arabic numerals and bear a brief title in lower case bold face letters below the figure.
Graphs and bar graphs should preferably be prepared using Microsoft Excel and submitted as Excel
graph pasted in MS Word.
Abbreviations, Units Etc
Authors should follow internationally agreed rules especially those adopted by the IUPAC-IUB
Commission on Biochemical Nomenclature (CBN). The journal will essentially follow the rules defined
in the IUPAC Manual of symbols and terminology for physico-chemical quantities and units.
Short Communications
The journal publishes exciting findings, preliminary data or studies that did not yield enough
information to make a full paper as short communications. These have the same format requirements
as full papers but are only up to 10 pages in length in total. Short Communications should not have
subtitles such as Introduction, Materials and Methods, Results and Discussion all these have to be
must into the running text. Short Communications preferably should have only 3-4 illustrations.
Review Articles
Should be about 15-30 pages long, contain up-to-date information, comprehensively cover relevant
literature and preferably be written by scientists who have in -depth knowledge on the topic. All format
requirements are same as those applicable to full papers. Review articles need not be divided into
section such as materials and methods and results and discussions, but should definitely have an
abstract and introduction if necessary.
Submission of Manuscript
All manuscripts (must be in English and in MS Word format) and should be submitted via our
online system or through e-mail editorijsir02@gmail.com, as an attachment for quick evaluation.
Manuscript Charges
There is no charge for the processing of papers but author(s) of each accepted paper is required
to pay a publication charge of Rs. 2,000 for Indian authors and US $ 125 for foreign authors before
the accepted paper is published.
Copyright and Permissions
Submission is a representation that the manuscript has not been published previously and is not
under consideration for publication elsewhere. Authors would be required to sign a form (to be supplied
by the Editor) transferring copyright before the manuscript can be published. By submitting a manuscript
to the editor or publisher you are deemed to have granted permission to publish the manuscript.
Ethical Matters
Authors using experimental animals and human subjects in their investigation must seek approval
from the appropriate Ethical Committee. The method section must include a statement to prove that
the investigation was approved and that informed consent was obtained.
www.ijsir.co.in
289
Galley Proofs
Proofs will sent via e-mail as an Acrobat PDF (Portable Document Format) file. Acrobat Reader will
be required in order to read the PDF.
Manuscript Submission Process:
1.
2.
Download Cover letter -fill the necessary fields and scan it and send to our email address
along with manuscript or Upload through Online Manuscript submission option.
3.
4.
Download Copy Right Form and Sign it (by the corresponding/main author) and send
its scanned copy only to Email ID editorijsir02@gmail.com.
(Without this signed undertaking your paper would not get displayed.)
290
www.ijsir.co.in
Individual Subscription
Institutional Subscription
Note: Subscriber should submit the subscription form to email ID: editorijsir02@gmail.com
Subscribers Name: (It includes first name, last name and professional credential (if any)
NAME .........................................................................................
INSTITUTIOANAL/ INDIVIDUAL ADDRESS.................................
......................................................................................
STATE .............. CITY...................
PIN CODE ................... COUNTRY..................................
PHONE NUMBER(S) ............................................................................
E-MAIL ADDRESS..........................................................................
PAYMENT DETAILS:
AMOUNT..................................................
SUBSCRIPTION RATE
SIGNATURE
www.ijsir.co.in
291
UNDERTAKING*
I _____________________________________________________________ (corresponding author),
working as __________________ (Designation), in __________________(Department/Affiliation),
do hereby submit the manuscript No. _____ entitled: ______________________________________,
authors _________, _____________, _______________ (names of all authors) for publication in
International Journal of Scientific and Innovative Research.
I / We declare that this is an original research work and is not previously published or presented
elsewhere in any language and is also not in consideration in any other journal simultaneously.
I /we, all authors of the above manuscript are agree that the content of this manuscript will not
be copyrighted, submitted, or published elsewhere (including the internet), and is also not plagiarized
from any language.
I/We also solemnly affirm that not any brand name of drug/product/manufacturer was included
in this manuscript to avoid legal hindrance and I / We will responsible to face any dispute, pointed out
by anyone in future.
Signature
Affiliation
1.____________________________________
________________
__________________
2.____________________________________
________________
__________________
3.____________________________________
________________
__________________
*This undertaking must be submitted along with submission of the manuscript in IJSIR.
292
www.ijsir.co.in
COVER LETTER
Date
Place
From
(Name and Address of the corresponding author)
To,
Editor-in-Chief
International Journal of Scientific and Innovative Research (IJSIR)
Sir,
Ref:
Title
Type
Subject
Branch
In reference to the above title, I as a corresponding author submit the manuscript for
publication in International Journal of Scientific and Innovative Research. I undertake that
animal study (if any) was taken after the prior approval of country/institutional ethical committee.
This manuscript has not been published or considered for publication by any other journal or
elsewhere. Kindly consider the manuscript for publication in your journal.
Thank you
www.ijsir.co.in
293