E-ISSN: 2456-2033

Our Indexing
News & Events
IJAREM: Volume 1 - Issue 3 (June 2015)

 

1. Energy Investigation and Conservations of Condiment Produced From Bambara Nut (Vigna Subterranean)
Anjorin, I. Babatunde, Sanusi, M. Saheed and Hussein, J. Babatunde
Abstract
The investigation on energy requirement and conservation approaches of condiment produced from bambara nut was the aim of this paper since it provides information on energy involved during commercialization and for researchers. Data on energy utilization and conservation patterns were obtained based on time taken, gender involved and quantity and sources of energy using standard energy equations. A total of 36.56±1.73MJ/kg where thermal energy accounted for 82% and manual energy amounting to 18% were the only forms of energy used during production process. Conservation approach I resulted in mean energy of 25.64±1.73MJ/kg where electrical energy, manual energy and thermal energy accounted for 1.49MJ (6%) 4.40 MJ (17%) and 21.04MJ (77%) respectively. Conservation approach II conserved the energy further to 24.41±1.73MJ/kg as the operation was thermal energy dependent, followed by manual and electrical energy with energy values of 18.54, 4.38 and 1.49MJ equivalent to 76%, 18% and 6% accordingly. Boiling and drying were identified as the most energy demanding operations while soaking was the least consuming energy operation at all levels. However, conservation approach II where LPG was used during boiling operation allows energy reduction to be 33.25% when compared with production process in converting bambara nut into condiment.
Abstract Online: 30-June-2015

 

2. Hot in-place recycling technology in asphalt concrete pavement repair
Wu Dengrui
Abstract
This paper describes the characteristics of the hot in-place recycling technology in highway asphalt pavement repair. Around the key and the key points of quality control and highway maintenance operations features, the article has been allocated production factors rationally and developed a practical quality assurance measures, which has played a huge role in enhance the quality of repair highway asphalt pavement and road maintenance promotion of new technology.
Abstract Online: 30-June-2015

 

3. Optimizing the use of multi cores by image processing application in desktop
M. Pavithra, G. Abin
Abstract
Now a days, we see multi core processors everywhere, a customer who uses a multi core processor expects it to be that many times faster than a single core processor but do those computers actually give that expected output is an unanswered question, hence in this paper we are planning to optimize an existing code in such a way that it utilizes those multiple cores efficiently. The application that we are going to optimize in this paper is image processing application which is one of the most used applications by today's desktop users. Our paper will efficiently bring out the processor utilization by the application chosen for the paper.
Abstract Online:30-June-2015

 

4. Manning Roughness Coefficient Study on Materials Non Cohesive with Using Entropy to Open Channel Fl
HARI WIBOWO, SURIPIN, ROBERT KODOATIE, ISDIYANA
Abstract
Application of entropy in open channel models presenting relevant aspects of theoretical issues and practical useful for cross-sectional velocity distribution. The ratio between the average velocity and the maximum depends on the local morphology. Recent research has suggested formulation Manning roughness, n, based on the ratio and the ratio between the position where the velocity is zero and the maximum, y0/ymax, the flow depth of the flow regime. Based on the experience of stable flow, analysis entropy dependence on n parameters, and M for flow depth, proposes an equation y0/ymax to know the bed channel roughness coefficient. The results showed a good linear relationship between estimate n and n entropy calculation and n with the bedform. Obtained from linear regression analysis of the data relationships flume ncalculate= 0,5803netropi + 0,010 with good correlation (R2 = 0.864) using the entropy parameter (M) = 0.8197, while for the data in a natural channel ncalculate = 0.754 netropy+ 0.006 with good correlation (R2 = 0,877) with (M) = 0,914. It also has a fault tolerance (0.005 to 0.293)%, which is still below the tolerance.
Abstract Online: 30-June-2015

 

5. EnergyUsage and Conservation Approaches in Production of Condiment (ogiri) from Melon seeds (Citrullus vulgaris)
Sanusi, M. Saheed and Anjorin, I.Babatunde, Hussein J.Babatunde
Abstract
The production of condiment (ogiri) from melon seeds has attracted interest of researchers and industrialists, as the production involves series of unit operations which are energy dependent. Studies on energy usage and conservation approaches would provide valuable information for commercial producers of these product in order to conserve energy usage. Therefore, estimation of the energy usage and conservation approaches was the focus of this study.Data on energy inputs in each unit operation were obtained by direct measurement and fitted into standard equations.Mean total energy for processing 1kg of raw melon seeds into condiment using traditional approach and conservation approaches I and II were estimated to be 141.75 ± 1.16 MJ, 83.36 ± 1.14 MJ and 73.57 ± 1.73 MJ respectively. Boiling operations were identified as most energy intensive operation with energy values of 126 ± 3.46MJ ≈ 88.89%, 37.96 ± 1.13 MJ ≈ 45.54%, 28.18 ± 0.68MJ ≈ 38.29% for traditional approach and conservation approaches I and II respectively. Mashing operations were identified as the least energy consuming operations with energy values of 0.13 ± 0.01 MJ ≈ 0.09%, 0.13 ± 0.01 MJ ≈ 0.15%, and 0.13 ± 0.02MJ ≈ 0.17% for traditional approach and conservation approaches I and II respectively.Conservation approach II saved 48.09% of energy input as compared with traditional approach and also conserve 11.7% when compared with conservation approach I.
Abstract Online: 30-June-2015

 

6. Hard Turning of AISI D2 Steel by CBN, using protecting atmosphere to improve Fatigue life and reduction of White layer thickness
S. Abdul Kalam1, A. Azad, R. Vajubunnisa Begum
Abstract
Hard turning (above 45HRC) has become an economically, environmentally, and technically competitive process when compared with grinding. During hard turning, formation of white layer on turned surface of component. The thickness of the white layer is usually several micrometers; the presence of it causes great component's performance, such as fatigue life. Hard turning is very real due to the existence of white layer, which is presumed detrimental to component life. A component free of a white layer can have a life six times that of a white layer component. As the white layer increases in thickness, the fatigue life decreases [1]. There are some factors that need to be considered for white layer formation during hard turning. The mechanism of rapid heating and quenching resulting in transformation products, Surface reaction with the environment Such as nitriding, carburizing and oxide ploughing, Plastic flow producing a homogeneous structure or one with a very fine grain structure [2]. Experiments were performed machining of hardened D2 Steel under dry and gas using chamfered CBN tool inserts. Experimental techniques were used in the analyzing scanning electron microscopy (SEM), Field emission scanning electron microscopy (FESEM) were utilized for the surface topography characterization; chemical characterization (phase study) was carried out by means of Energy dispersive X – ray spectroscopy (EDAX) techniques; and Surface textures produced by means of non contact techniques. The result shows to improve the fatigue life of component enhancement and achieve improved product's functional performance in hard turning by the reduction of White layer thickness.
Abstract Online: 30-June-2015

 

7. IMPROVING ATM SECURITY CHECKS USING FINGER RECOGNITION
IGWE, AGU FELIX, ENE, I.I
Abstract
This paper x-rays how ATM security can be checked and improved by using finger Recognition.This was achieved by sending fingerprints to finger sensor which converts
patterns and signals from analogue to digital form through an analogue-to-digital converter(ADC).In this paper,a programming language known as VisualDsp++ was used to enable fingerprint sensor to generate data.The data gotten from an individual is stored in the database of the system, if a customer of a particular bank comes to withdraw money from the ATM machine,it crosschecks whether the owner's data stored in the database matches with the data of the person that wants to make withdrawal,if it matches with the one in the database,access is granted to the preson,if it does not match, access is denied from the person who wants to make withdrawal.
Abstract Online: 30-June-2015

 

8. AN EMPIRICAL STUDY ON SHAVING CREAM SELECTION BEHAVIOUR IN SILIGURI SUBDIVISION OF DARJEE
Mr. Shomnath Dutta
Abstract
Since Indian men are becoming more grooming conscious brands that hitherto being associated with women only are now nearly tripping over & tuning themselves to cater to the specific personal care needs of men to have a metro-sexual look of which, shaving plays a vital cue. This paper attempts to analyse the buying intention and attitudinal preference while buying a particular brand of shaving cream in the growing market of Siliguri city of North Bengal using Fishbein's Model. Next in later half of the paper, two sample Z-test is adopted to identify whether employment status of male does have any influence in selecting shaving cream brands with respect to some major purchasing variables as identified from Fishbein's Model.
Abstract Online: 30-June-2015

 

9. Leakage Power Reduction Using Power Gated Sleep Method
Parameshwari Bhoomigari, D.v.r. Raju
Abstract
Now a day's low power circuits are most popular, in the circuit as the scaling increase the leakage powers increases. So for removing these kinds of leakages we are using many types of power gating techniques and to provide a better power efficiency. In this paper by using low power VLSI design techniques we are going to analyze the different types of power gated circuits. We are going to display the comparison results between different nano-meter technologies. Micro-wind Layout Editor & DSCH software tools are used for simulations & circuit design. The results were tabulated.
Abstract Online: 05-July-2015

 

10. Impact of religion on purchase behaviour of luxury brands
Dr. R. Srinivasan, Dr. R. K. Srivastava &Prof. Sandeep Bhanot
Abstract
Purpose and objectives of the study: In this study, we aim to understand the influence of religion on the frequency of buying luxury products, influence to buy luxury products and intention to purchase the same brand that they have previously purchased. Also we study the different luxury value dimensions like financial value, functional value, individual value and social value and how these are influenced by religion of the consumer.
Research Methodology: Data was collected from 1200 respondents in Mumbai. These people belonged to people of both genders, different occupations, income groups, religions, age groups, education and marital status.
Results: It is found that there is no relation between religion and frequency of buying luxury products. There is a relation between religion and kind of luxury product that consumers intend to buy. Hindus, Muslims and Christians prefer to buy apparel and mobile phones while Parsis have shown a preference for watches.
There is a relation between religion and the place from which they buy luxury brands. Hindus, Muslims and Christians prefer to buy luxury brands from malls and speciality stores while Jains prefer to buy luxury brands from company outlets.
There is no relation between religion and influence to buy luxury products. Also, there is no relation between religion and intention to repurchase the brand. It is also found that there is a significant difference in the perception of uniqueness value, quality value, self-identity value, materialistic value, hedonic value, usability value, financial value and prestige value with respect to religion.
Managerial implications: Luxury brand companies can target the right target segment by understanding how religion influences the purchase of luxury brands and whether there is any significant difference in financial value, functional value, individual value and social value with respect to religion of the consumer. They can devise strategies to enable the right target segment to access their products easily.
Abstract Online: 05-July-2015

 

11. Convective Heat Transfer Analysis in a Circular Tube with Different Types of Internal Threads of Constant Pitch
Ronak Dipakkumar Gandhi
Abstract
This work presents an experimental study on the mean Nusselt number, friction factor and thermal enhancement factor characteristics in a circular tube with different types of internal threads of 120 mm pitch under uniform wall heat flux boundary conditions. In the experiments, measured data are taken at Reynolds number in range of 7,000 to 14,000 with air as the test fluid. The experiments were conducted on circular tube with three different types of internal threads viz. acme, buttress and knuckle threads of constant pitch. The heat transfer and friction factor data obtained is compared with the data obtained from a plain circular tube under similar geometric and flow conditions. Thevariations of heat transfer and pressure loss in the form of Nusselt number (Nu) and friction factor (f) respectively is determined and depicted graphically. It is observed that at all Reynolds number, the Nusselt number and thermal performance increases for a circular tube with buttress threads as compared with a circular tube with acme and knuckle threads. These are because of increase in strength and intensity of vortices ejected from the buttress threads. Subsequently an empirical correlation is also formulated to match with experimental results with ± 8% and ± 9%, variation respectively for Nusselt number and friction factor.
Abstract Online:05-July-2015

 

12. A Numerical Study on Unsteady Natural Convection Flow with Temperature Dependent Viscosity past an Isothermal Vertical Cylinder
Md. A Hossain, R. K. Mondal, R. Ahmed, S. F. Ahmmed
Abstract
Aim of this paper is to investigate the boundary layer flow and heat transfer of unsteady laminar free convection flow past a semi-infinite isothermal vertical cylinder immersed in air. The fluid viscosity is adopted to vary the temperature. An explicit finite difference method has been devoted to solve the governing non-dimensional boundary layer equations. A parametric study is accomplished to interpret the influence of variable viscosity on the velocity and temperature profiles. The numerical consequences disclose that the viscosity has significant influence on transient velocity and temperature profiles, average skin friction coefficient and average heat transfer rate. The conclusion indicates that when the viscosity parameter increases the temperature and skin friction coefficient increases but the velocity near the wall and Nusselt number decreases. We have also shown the effect of viscosity variation parameter on isotherms and streamlines.
Abstract Online: 05-July-2015

 

13. OPTIMIZE THE TOOL PIN PROFILE ON ALUMINIUM AA6063 FRICTION STIR WELDED BUTT JOINT
K. Satheesh kumar, G.Rajamurugan, D.Yuvaraj
Abstract
In this study, aluminium AA6063 plate of 6mm thickness plate were welded by friction stir butt joint using different tool probe of cylinder and pentagon with constant parameter of rotational speed transverse speed and axial force of 1600 rpm, 25 mm/min and 5kN.The effect of welding parameter was evaluated in different mechanical properties of hardness distribution and tensile properties for axial weld zone. The significant optimal transverse feed is achieved with high weld quality and excellent joint properties when compared to cylinder tool. In this Pentagon tool gives the excellent result was obtained both tensile strength as well as hardness in order to improve productivity.
Abstract Online: 05-July-2015

 

14. Optimization of process parameters using Abrasive Flow Machining By Taguchi Method : A Review
Vikas dhull, Dr. sanjay kajal
Abstract
Abrasive Flow Machining (AFM) is an effective way to polish unsymmetrical surfaces and interior structure of parts, which are difficult to reach by conventional machining. The material to be machined may be cylindrical or any complex shape. Various process parameters are Material Removal Rate, Machining Time, and Abrasive Mesh size that affects the performance of AFM. The objective of this paper is to study the effects of process parameter related to it such as material removal rate, surface finishing etc.
Abstract Online: 05-July-2015

 

15. BLACK HOLE Attack: A NEW Detection Technique
WAJAHAT GH MOHD, Meena Chaudhary, Musheer vaqur, Diwaker Mourya
Abstract
Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of security attacks. This paper proposes a technique to detect the black-hole attack using multiple base-stations and a check agent based technology. This technique is Energy efficient, Fast, Lightweight and Reduces message complexity. An effective solution is proposed that uses multiple base stations to improve the delivery of the packets from the sensor nodes reaching at least one base station in the network, thus ensuring high packet delivery success. The proposed technique is more efficient than the previous techniques and gives better results. Check agent is a software program which is self-controlling and it moves from node to node and checks the presence of black-hole nodes in the network. Routing through multiple base stations algorithm is only activated when there is a chance of black-hole attack on the network. This method prevents the black hole attack imposed by both single and multiple black hole nodes. The tool used to implement the proposed algorithm is NS2, which is an object oriented event drive software package. The result of the simulation study expected to get good network performance by minimizing the packet losses as well as effectively prevent the black hole attack against wireless sensor networks. A solution to avoid the blackhole attack has been proposed. The solution will be implemented in NS-2.
Abstract Online: 05-July-2015

 

IJAREM Features