Articles


Assessment of Trace Elements Concentration in various Aquatic Ecosystems of Nedumangadu and Neyyatinkara Taluk of Thiruvananthapuram District in Kerala, India

Shaji.E,

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3422-3430

In the present study an attempt has been made on trace element analysis on various ponds connected to
Neyyar river basin in Thiruvananthapuram District of Kerala. The study was carried out for two years i.e.
January 2012 to December 2013. For the study period ten sites were selected and was conducted to
determine the seasonal changes of trace elements (Cu, Cd, Cr, Fe, Mn, Zn, Co and Pb). The concentration
of Cadmium in pond ecosystem ranges from 0.001 mg/l to 0.028 mg/l. The trace element concentrations are
below the permissible limit in all ponds except Cadmium. The concentration of cadmium is higher in one
pond (Thavalayilakulam). Co was not found in any of the ponds during the study period. The trace elements
were determined by atomic Absorption Spectrophotometer, Thermo ICE-3500 series. All the data were
analysed statically using one-way ANOVA to investigate the seasonal significant relationship in the ponds.

Physico-Chemical Characteristics of Surface Water Quality of Urban Ponds in Thiruvananthapuram District, Kerala

Shaji.E,

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3431-3437

In the present study an attempt has been made on physico-chemical characteristics of urban ponds located
in Thiruvananthapuram district of Kerala. The study was carried out for a period of one year i.e. January
2012 to December 2012. Seasonal details have been collected and analysed with single factor ANOVA.
Different parameters were like pH, Temperature, Turbidity, Electical Conductivity(EC),Total Dissolved
Solids(TDS),Total Alkalinity(TA),Chloride, Total Hardness(TH),Dissolved Oxygen(DO),Biological Oxygen
Demand(BOD),Nitrate- Nitrogen. The result of the present study indicated that the water quality of all the
ponds lies below the permissible limit. (WHO)

Thermal & Catalytic Conversion from Biogas to Hydrogen

Sareriya

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3438-3441|

INTRODUCTION
The objective of this project is to develop
economically viable process for the production of
high purity hydrogen from locally available fossil
and renewable feed stocks with minimal
environmental impact.
The innovative approach is based on the
development of a feedstock catalytic process that
allows converting both fossil (e.g., natural gas)
and renewable feedstock into high-purity
hydrogen production: 1) catalytic pyrolysis of
methane

Review of Torque Limiter Timer Belt Spindle Drive for Overload Protection

K.A.Patil,

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3442-3448

Torque is the one of the most important parameter in drive technology. The size of the torque and the type of
torque stress plays a considerable part in the operational safety of drives. Torque limiting clutch is a
mechanical device which disengages immediately in case of an overload and disconnects input and output. This
paper describes the development of Torque limiter timer Belt spindle drive for overload protection. The main
purpose of safety spring ball clutch is to protect the system from overloads, but we are using it as torque
limiting device. In addition, it is shown how the model can be used for further investigations and developments

Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario

Dr Pratima Gautam (Dean)

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3449-3457

In this paper we present a survey on Bluetooth technology regarding the threats and
vulnerability attacks during data transfer on its security mechanism. Bluetooth technology uses the
personal area network (PAN). It is the kind of wireless Ad-hoc network. Low cost, low power, low
complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth
Technology has many benefits like replacement of cable, easy file sharing, wireless synchronization and
internet connectivity. As Bluetooth Technology becomes widespread, vulnerabilities in its security
protocols are increasing which can be potentially dangerous to the privacy of a user’s personal
information. Security in Bluetooth communication has been an active area of research for last few years.
The article presents various security threats and vulnerability attacks on Bluetooth technology and also
how to restrict them

Determination of Galactomannan by 1HNMR & 13CNMR Method

Sunil Kumar Rajput

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3458-3460|

Random distribution of D-galactose rsidue in side chains of Hibiscus cannabinus mannan has been
confirmed by NMR analysis.
Purified polysaccharide isolated from H. cannabinus seeds on hydrolysis with M trifluoroacetic acid (4h at
1000
c), using paper chromatography and solvent n-butanol; Isopropanol : water (11:6:3) as solvent revealed
the presence of galactose : Mannose in the ratio of 1:3. The structure estabished by usual chemical method.
Investigation has been done by 1H and 13C NMR spectra of galactomannon. Present structure determination
based on complete assignments for protons and carbons as below:
The 1H NMR spectrum showed, in the anomeric region, two absorptions. The signals at 4.9 ppm (J1 ~ 2.9
Hz) and 4.6 ppm (J1,2~1.0 Hz) are assigned to H-1 of α-D-galactopyranosyl and β-D-mannopyranosyl units,
respectively2 which, therefore, should be in the expected 4C1 conformation2
. The integration of the anomeric
proton resonances indicated a 1:3 ratio of galactose to mannose in the polymer.
In the 13C NMR spectrum all the different carbon lies are well separated and are in accord with those
reported for gum3
. Their chemical shifts are in good agreement with those reported in the literature3-5
. The
spectrum clearly differentiated the three structural units of the polymer namely, 6-0-substituted and
unsubstituted internal (1 4) linked β-D-mannopyranosyl units of the backbone and terminal (nonreducing) α-D-galactopyranosyl units. Integration of the anomeric carbon resonances at 101.8 and 103.0
ppm indicated a D-galcto—D-mannan molar ratio of 1.0:3. The peaks at 63.6 and 64.1 ppm were observed
for the methylene carbon atoms3 5. Three resonances in the C-4 (Man) region were observed. Accordingly,

Survey: Automated Process of Revaluation

Vishakha Kaprekar

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3461-3464

To automate the process of submission of revaluation form we come up with the technology of ERevaluation. In this project we provide the modules as students and admin where the student will fill in the
details for the evaluation form and then submit the form by uploading necessary documents. In admin
module the admin will login and check for the details and then approve/disapprove the form. Once approved
the details will go to the account department. Exam cell admin will be notified about the amount paid and
the revaluation process will be completed.Thus the system optimizes the human effort involved and also
reduces the overall time consumed in the process of conducting and evaluating examinations.

An Approach for Security Measures of Black Hole Attack in MANET

Prachi Goyal

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3465-3474

Mobile Ad Hoc Network (MANET) is a major next generation wireless technology which is mostly used in
future. MANET is a collection of communication devices or nodes that wish to communicate without any
fixed infrastructure and predefine organization of available links. In a MANET mobile node will be
increases and moveable, so that attacker will be attack by a malicious node which brings great challenges
to the security of Mobile Ad Hoc network. The Black hole attack is one of such security issue in MANET.
Our focus is specifically is on ensuring the security against the Black hole attack with the help of the
popular routing protocol which is mostly used in MANET. Mobile Ad hoc Networks (MANET) are the
extension of the wireless networks. They plays important role in real life applications such as military
applications, home applications etc. these networks are exposed by a lot of security attacks such as
alteration, Denial of service attack, Fabrication attack etc. Black hole attack is one of the dangerous
active attacks on the MANET. In this research paper an efficient approach for the detection and removal
of the Black hole attack in the Mobile Ad Hoc Networks (MANET) is described. The algorithm is
implemented on AODV (Ad hoc on demand Distance Vector) Routing protocol. The algorithm can detects
both the single Black hole attack and the Cooperative Black hole attack. The beauty of the algorithm
described in this paper is that it not only detects the black hole nodes in case when the node is not idle but
it can also detect the Black hole nodes in case when a node is idle as well

DDOS using Intrusion Detection System in Wireless Mobile Ad hoc Network

Yassir Farooqui

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3475-3479|

Wireless Mobile Ad hoc Network (MANET) doesn’t have a fix framework and doesn’t have a fix routing
facility. Every device or node in MANET will traverse on its own in any side and modify its connections with
other nodes and devices periodically. Nodes movability is very immense and it traverse speedily, this arouses
a problem of network partitioning Security is the major concern for network to give best outcome. Intrusion
detection is to protect network from an unknown or known attack There are many security attack in MANET
and DDOS(Distributed Denial Of Service) is one of them. The DDOS attack, which is consuming all of the
computing or communication resources necessary for the service, is known very difficult to protect. Most
important objective is observing the result of DDOS packet drop. we develop safe IDS to find this kind of
attack and also block it. MANET has great strength to be applied in various applications like battlefield,
traffic surveillance, building etc. So in this paper we elaborate about various types of DDOS attack and how
to protect from them

Energy Aware 32 Bit Arithmetic and Logical Unit for Error Tolerant Applications

Mamta Ratre , Jitendra Singh

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3480-3486

In this era of high end devices, the power efficient architecture is taking responsibility so as to reduce the
cost for maintenance. This becomes the critical task for embedded based device, graphical based processor
and similar DSP processors which suffers with low power. The core of every embedded device and processor
which in turn uses ALU as the workhorse. As we know if workhorse require less power, speed and area so
based on that workhorse complete system will make justice with SPAA metrics (Speed, Power, Area and
Accuracy). This paper proposed an architecture of 32 bit General Purpose ALU .The critical power
dissipation can be avoided by the application of clock gating of the hardware required and improving
architectural approach for this in which we divide ALU is four sub block of 8-8 bit. These 32 bit ALU is
identify input bit and according to that it will perform operation. Proposed architecture is combination of
four 8 bit ALU which is accurate, semi accurate and approximate. Due to these logic we can save power
consumption. The synthesized architecture is implemented by Hardware descriptive language (Verilog).
Analysis is performing on FPGA (Field Programmable Gate Array) level.

New Technology to Find Talents -Event Champs

Vinita Sharma, Swati Padwal, Prof. Ruchi Tawani

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3487-3490

To promote the students to showcase their talent – Event Champs. Social networking site is a web site that
provides a venue for people to share their activities with family, friends and colleagues or to share their
interest in a particular topic. . In this, students can get the information about different events held in the
college or outside college, which are posted by different committees like CSI, ACM, etc. Students can
register themselves through this site for a particular event. When a student registers for an event, he/she
will get specific points. Committee group will announce names of winners for that event. These names will
be broadcasted to everyone and winners will get specific points for that. The news related to that event will
be notified to the participants. After each semester, students having highest point with become EVENT
CHAMP of that semester. Student, who is part of any committee, will get additional points.

An Efficient Algorithm to Mine Non Redundant Top K Association Rules

Amardeep Kumar, Arvind Upadhyay

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3491-3500

Association rule mining is employed the foremost well-liked fiction within the field of analysis of knowledge
mining. This paper presents a survey of some commonest techniques, that square measure often used for
mining association rules from a knowledge set.
Association mining may be a cardinal and advantageous researched data processing proficiency. However,
looking on the choice of the arguments (the minimum support and minimum confidence), current algorithms
will become terribly slow associated generate an exceptional large quantity of results or generate none or too
few results, eliding helpful data, as a results of in apply users have restricted resources for analyzing the
results and thus square measure usually only fascinated by discovering a particular amount of results, and fine
standardization the parameters is time overwhelming. To handle this disadvantage, we tend to tend to propose
associate formula to mine the top-k association rules, where k is that the variability of association rules to be
found and is ready by the user. The formula utilizes a replacement approach for generating association rules
named rule growths and includes several optimizations experimental results show that the formula has
marvelous performance and quantify ability that it's associate advantageous completely different to classical
association rule mining algorithms once the user would like to manage the number of rules generated.

Intentional Caching in Disruption Tolerant Network

Sincy Thomas1 , Syamamol T

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 01 (2016), 1 January 2016 , Page 3501-3504

Disruption Tolerant Network (DTN) is a networking architecture that is designed to provide communications in
the most unstable and stressed environments. DTN route network messages through intermittently connected
mobile devices. It uses carry-and-forward method for data transmission. The greatest challenge in DTN
network is to reduce the data access delay between the sender and receiver. The solution is to intentionally
cache data into a set of Network Caching Nodes (NCNs), which have high accessibility and buffer capacity. Its
specify an efficient scheme for selecting NCNs and its associative caching nodes. Latest data items are cached
on the NCNs and cache replacement is based on the popularity of data. Through the simulation verify the
performance of the system