IJSRP JUNE 2012 Online Print Version - IJSRP.ORG
IJSRP JUNE 2012 Online Print Version - IJSRP.ORG
IJSRP JUNE 2012 Online Print Version - IJSRP.ORG
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
International Journal of Scientific<br />
and Research Publications<br />
<strong>Print</strong> <strong>Version</strong>, Volume 2, Issue 6<br />
<strong>JUNE</strong> <strong>2012</strong> Edition<br />
ISSN 2250-3153<br />
<strong>IJSRP</strong><br />
www.ijsrp.org<br />
<strong>IJSRP</strong> INC.<br />
<strong>JUNE</strong> <strong>2012</strong><br />
<strong>Online</strong> <strong>Print</strong> <strong>Version</strong>
International Journal of Scientific and Research Publications, Volume 2, Issue 1, January <strong>2012</strong> 1<br />
ISSN 2250-3153<br />
International Journal of Scientific and Research Publications<br />
GENERAL INFORMAION:<br />
<strong>IJSRP</strong>, International Journal of Scientific and Research Publications publish monthly journal under ISSN<br />
2250-3153.<br />
ONLINE VERSION<br />
http://www.ijsrp.org/e-journal.html<br />
PRINT VERSION<br />
http://www.ijsrp.org/print-journal.html<br />
All the respective authors are the sole owner and responsible of published research and research papers<br />
are published after full consent of respective author or co-author(s).<br />
For any discussion on research subject or research matter, the reader should directly contact to<br />
undersigned authors.<br />
COPYRIGHT<br />
Copyright©<strong>2012</strong> <strong>IJSRP</strong>.<strong>ORG</strong>,<br />
<strong>IJSRP</strong> INC.<br />
All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or<br />
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or<br />
otherwise, except as described below, without the permission in writing of the Publisher.<br />
Copying of articles is not permitted except for personal and internal use, to the extent permitted by<br />
national copyright law, or under the terms of a license issued by the national Reproduction Rights<br />
Organization.<br />
All the published research can be referenced by readers/scholars/researchers in their further research with<br />
proper citation given to original authors.<br />
DISCLAIMER<br />
Statements and opinions expressed in the published papers are those of the individual contributors and not<br />
the statements and opinion of <strong>IJSRP</strong>. We assumes no responsibility or liability for any damage or injury<br />
to persons or property arising out of the use of any materials, instructions, methods or ideas contained<br />
herein. We expressly disclaim any implied warranties of merchantability or fitness for a particular<br />
purpose. If expert assistance is required, the services of a competent professional person should be sought.<br />
Contact Information:<br />
Editor: editor@ijsrp.org<br />
Website: http://www.ijsrp.org<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 2<br />
ISSN 2250-3153<br />
Table of Contents<br />
Effect of Vedic Chanting (Homas, Yagyas, Meditation) on crime rate (Oct 2011) ............................................... 9<br />
Dr. Rohit Sabharwal, Ms. Kinjal Dalal................................................................................................... 9<br />
APPROXIMATION OF FUNCTION BELONGING TO W (Lp, () t<br />
) CLASS BY (E, q) (N, pn) MEANS OF<br />
ITS FOURIER SERIES ........................................................................................................................................ 13<br />
H. L. RATHORE*, U. K. SHRIVASTAVA** ..................................................................................... 13<br />
Design and Implementation of Cipher Algorithm using Randomized Alphanumeric Characters ....................... 20<br />
Sudhakar Kumar Singh ......................................................................................................................... 20<br />
Nutritional Status of Children (0-24 Months) In Jammu Kashmir and Ladakh Regions .............................. 23<br />
Yasmeen Khan and Nelofar Khan ........................................................................................................ 23<br />
The Correlational Study of the Vertical Jump Test and Wingate Cycle Test as a Method to Assess Anaerobic<br />
Power in High School Basketball Players ............................................................................................................ 30<br />
Purvi K. Changela, Sarla Bhatt ............................................................................................................. 30<br />
SQL Server Query Optimization Techniques - Tips for Writing Efficient and Faster Queries ........................... 36<br />
Navita Kumari ......................................................................................................................................... 36<br />
A Comparative Study on Concomitant of Order Statistics and Record Statistics for Weighted Inverse Gaussian<br />
Distribution ........................................................................................................................................................... 40<br />
Kishore K. Das*, Bhanita Das** and Bhupen K. Baruah*** ............................................................. 40<br />
Design and Stress Analysis of Watt and Porter Governor .................................................................................... 48<br />
*Ravindra Singh Rana, **Rajesh Purohit, *Alok Singh..................................................................... 48<br />
Reviews on the Influences of Alloying elements on the Microstructure and Mechanical Properties of Aluminum<br />
Alloys and Aluminum Alloy Composites ............................................................................................................. 54<br />
R. S. Rana, Rajesh Purohit, and S Das ................................................................................................. 54<br />
Evaluating Demand Response of Hydro Plant with Mixed Pumped Storage ....................................................... 61<br />
N. Venkateswarlu, M. Velmurugan, and S.Udaya Baskar ............................................................................. 61<br />
Tamil Speech Recognition using Semi Continuous Models................................................................................. 65<br />
Hanitha Gnanathesigar .......................................................................................................................... 65<br />
Complex Dynamics in a Mathematical Model of Tumor Growth with Time Delays in the Cell Proliferation ... 70<br />
M. Saleem and Tanuja Agrawal ............................................................................................................ 70<br />
Fuzzy Spanning Tree Flow-Equivalent Algorithm ............................................................................................... 77<br />
Dr. G.Nirmala, K.Uma ........................................................................................................................... 77<br />
A Model Approach to Off-line English Character Recognition ........................................................................... 84<br />
Binod Kumar Prasad*, Goutam Sanyal** ........................................................................................... 84<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 3<br />
ISSN 2250-3153<br />
Fuzzy Sub - Trigroup – Trilevel Properties .......................................................................................................... 89<br />
1 G.Nirmala, 2 S.Suganthi ........................................................................................................................................ 89<br />
Adjustment problems of Educable Mentally Retarded ......................................................................................... 93<br />
Dr. Bharati ROY ..................................................................................................................................... 93<br />
Design of Efficient XTEA Using Verilog ............................................................................................................ 98<br />
Shweta Gaba, Iti Aggarwal, Dr. Sujata Pandey ................................................................................... 98<br />
Performance analysis & Optimization of WDM-EPON for Metropolitan Area Networking ............................ 103<br />
Tripuresh Joshi, Arvind Kumar Jaiswal, Mukesh Kumar ............................................................... 103<br />
Next Generation of Internet Protocol for TCP/IP Protocol Suite ....................................................................... 107<br />
Miss. Soni Samprati .............................................................................................................................. 107<br />
Evaluation of Anticarcinogenic and Antimutagenic Effects of Triphala Extract ............................................... 112<br />
R.C.Agrawal, Rajani............................................................................................................................. 112<br />
Object Detection in Remote Sensing Images: A Review ................................................................................... 118<br />
Er. Tanvi Madaan, Er. Himanshu Sharma ........................................................................................ 118<br />
Genetic Variability Studies for Qualitative and Quantitative traits in Popular Rice (Oryza sativa L.) Hybrids of<br />
India .................................................................................................................................................................... 121<br />
V. Ravindra Babu 1 *, K. Shreya 2 , Kuldeep Singh Dangi 2 , G. Usharani 2 , P. Nagesh 3 ..................... 121<br />
Thyristor Based Speed Control Techniques of DC Motor: A Comparative Analysis ........................................ 126<br />
Rohit Gupta, Ruchika Lamba, Subhransu Padhee ........................................................................... 126<br />
Automatic Face Detection Using Color Based Segmentation ............................................................................ 133<br />
Yogesh Tayal, Ruchika Lamba, Subhransu Padhee.......................................................................... 133<br />
DESIGN AND EVALUATION OF CHITOSAN CONTAINING MUCOADHESIVE BUCCAL PATCH OF<br />
FLUXOTINE HCL ............................................................................................................................................. 140<br />
NARESH KSHIRASAGAR*, NARESH THAMADA, V.N.BALAJI KUMAR NAIK, M.SUSHMA<br />
GOPAL .................................................................................................................................................. 140<br />
CHILD WELFARE PROGRAMME IN COLONIAL MYSORE ..................................................................... 145<br />
Dr. THRIVENI ...................................................................................................................................... 145<br />
Live Migration of Virtual Machines in Cloud .................................................................................................... 148<br />
Ashima Agarwal, Shangruff Raina ..................................................................................................... 148<br />
Regulation and Accounting Treatment of Future and Option in Indian Derivative Market ............................... 153<br />
Matloob Ullah Khan, Dr. Ambrish Gupta and Dr. Sadaf Siraj ....................................................... 153<br />
P-FUZZY SUBALGEBRA AND ITS PROPERTIES ....................................................................................... 159<br />
Dr. G. NIRMALA 1 , S.PRIYADARSHINI 2 ......................................................................................... 159<br />
Energy Conservation through Roof Surface Evaporative Cooling for Air Conditioning System ...................... 162<br />
R.B. Lokapure, J.D.Joshi ..................................................................................................................... 162<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 4<br />
ISSN 2250-3153<br />
A Carrier Based Compact Model for Long Channel Undoped and Doped Body Symmetric Double Gate<br />
MOSFETS........................................................................................................................................................... 167<br />
Neha Goel, Dr.Vandana Nath .............................................................................................................. 167<br />
Removal of Multiple Access Interference in DS-CDMA System ...................................................................... 171<br />
And ................................................................................................ 171<br />
Modeling of Liquid-Liquid Extraction in Spray Column Using Artificial Neural Network .............................. 177<br />
S.L. Pandharipande, Aashish Nagdive, Yogesh Moharkar .............................................................. 177<br />
Testing Market Efficiency of Indian Stock Market ............................................................................................ 187<br />
Mr. Divyang J Joshi .............................................................................................................................. 187<br />
<strong>Online</strong> Shopping and the Transaction Protection in E-Commerce: A case Of <strong>Online</strong> Purchasing in Libya. ..... 191<br />
Abdulghader.A.Ahmed, Hadya.S.Hawedi .......................................................................................... 191<br />
DIEL Variations of Physico-Chemical Factors and Planktonpopulation in a Swamp Of Harda, Purnia, Bihar<br />
(India) .................................................................................................................................................................. 205<br />
R.SIDDHARTHA, RANJANA KUMARI, K.D.TANTI* AND B.N.PANDEY .............................. 205<br />
Effect of Various Concentration of Octacosane, Pentacosane and Tricosane on Foraging Behavior of<br />
Trichogrammatids ............................................................................................................................................... 209<br />
Shipra Mathur, Asfiya Zayeem, Srikanth Kanameni, Monica Tibrewal, Nitish Wadhwa, Priti<br />
Arora and Archna Kumar ................................................................................................................... 209<br />
Awareness of Health Insurance in Andhra Pradesh ............................................................................................ 214<br />
Jangati Yellaiah ..................................................................................................................................... 214<br />
Comparative Study of Sign Language Recognition Systems ............................................................................. 219<br />
Ms. Rashmi D. Kyatanavar, Prof. P. R. Futane ................................................................................. 219<br />
Age Related Changes in the Parasympathetic Control of the Heart ................................................................... 222<br />
Vinutha Shankar MS, Shivakumar Veeraiah .................................................................................... 222<br />
The Folk Medicinal Plants of the Mao Naga in Manipur, North East India ....................................................... 228<br />
Adani Lokho .......................................................................................................................................... 228<br />
Women and Soap-Operas: Popularity, Portrayal and Perception ....................................................................... 236<br />
Dr. Aaliya Ahmed ................................................................................................................................. 236<br />
Global and Factor Domination in Fuzzy Graph .................................................................................................. 242<br />
G.Nirmala 1 , M.Sheela 2 ......................................................................................................................... 242<br />
Active Device Usage in Filter Design – An Overview ....................................................................................... 246<br />
SHEIKH AJAZ BASHIR ....................................................................................................................... 246<br />
N.A.SHAH .............................................................................................................................................. 246<br />
Tracking of Reference Signals by Advanced Unified Power Flow Controller .................................................. 253<br />
K. Manoz Kumar Reddy ...................................................................................................................... 253<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 5<br />
ISSN 2250-3153<br />
Robust Digital Watermarking Using MDKP ...................................................................................................... 259<br />
Mr A. Chandra, Ms. T. Kavitha .......................................................................................................... 259<br />
Evaluation of antifungal activities of certain plant against Fusarium udum Butler causing wilt in pigeonpea<br />
(Cajanus cajan (L.) Millsp.) ............................................................................................................................... 263<br />
Tongbram Ranjana Devi and GKN Chhetry ..................................................................................... 263<br />
Recent Developments in Signal Encryption – A Critical Survey ....................................................................... 267<br />
S. Rajanarayanan and A. Pushparaghavan ....................................................................................... 267<br />
Impact of Seasonal and Habitat variation on composition of Total Lipid content in Muscle and Liver of Labeo<br />
gonius (Ham) ...................................................................................................................................................... 274<br />
B.K. Deka*, R. Mahanta* and U.C. Goswami** ............................................................................... 274<br />
Retrieving Stream of Video Frames Using Query Processing............................................................................ 279<br />
Ramancha Sandhyarani 1 , Shiramshetty Gouthami 2 and Baggani Ratna 3 ..................................... 279<br />
Screening of phaseolus vulgaris Cultivars Growing in Various Areas of Jammu and Kashmir for Anthracnose<br />
Resistance ........................................................................................................................................................... 283<br />
Balbir Kour, Gurmeet Kour, Sanjana Kaul, Manoj K. Dhar .......................................................... 283<br />
Love, Desire, and Theological Issues in Indo-Iranian Myths: A Comparative Introduction ............................ 291<br />
Abbas Saeedipour ................................................................................................................................. 291<br />
Performance Evaluation of DHT Based multi-path Routing Protocol for MANETs ......................................... 296<br />
Gurmukh Singh, Dr. Savita Gupta, Sukhvir Singh ........................................................................... 296<br />
Secure Data Hiding Algorithm Using Encrypted Secret message ...................................................................... 301<br />
Harshitha K M, Dr. P. A. Vijaya ......................................................................................................... 301<br />
Biodiesel Production and Process Optimization ................................................................................................. 305<br />
Rajarshi Kar, Oindrila Gupta, Mukundu Kumar Das ..................................................................... 305<br />
A study of Intellectual Property Management in Industries & Academics & ways for collaboration in India .. 311<br />
First Author - Pankaj Prabhakar Borkar .......................................................................................... 311<br />
Second Author - Dr. Ashutosh A. Paturkar ....................................................................................... 311<br />
Prequalification Science Practical Activities for the Production of Effective Science Teachers: a Strategy for<br />
Sustainable National Development ..................................................................................................................... 316<br />
Jamil Mikhail Y..................................................................................................................................... 316<br />
Education: A Solution to the Contemporary Challenges of a Common Woman in a typical Hausa-Fulani<br />
Dominated Society in Nigeria ............................................................................................................................. 320<br />
Jamil Mikhail Y..................................................................................................................................... 320<br />
Circular Disk Monopole Antenna for Broadband Applications ......................................................................... 325<br />
B.Saidaiah #1 , A.Sudhakar *2 , K. Padma Raju #3 .................................................................................. 325<br />
Implementation Scheme for <strong>Online</strong> Medical Diagnosis System Using Multi Agent System with JADE ......... 329<br />
Mr.Shibakali Gupta, Arindam Sarkar, Indrani Pramanik, Banani Mukherjee ............................ 329<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 6<br />
ISSN 2250-3153<br />
Multicarrier modulation with OFDM for 4G networks ...................................................................................... 335<br />
M.Gopu*, Dr. Ritesh Khanna** ......................................................................................................... 335<br />
Study and Comparison Performance of On-demand AODV and DSR, along with the traditional proactive<br />
DSDV Routing Protocols for MANET ............................................................................................................... 339<br />
Vijendra Rai*, Jaishree Jain** ............................................................................................................ 339<br />
―Automated Innovation Analysis & Human Resource Management System‖ .................................................. 345<br />
Prashik Nagkirti, Sagar Kunjir, Ganesh Rajput, Swapnil Patil ...................................................... 345<br />
X-Ray Satellites in the Lα1 Region of 4d Transition Element ........................................................................... 348<br />
Dr. Sameer Sinha *, Ajay Vikram Singh**, Kedar Nath Singh*** ................................................. 348<br />
Characterization of Sulphamic Acid Single Crystal by Optical Techniques ...................................................... 353<br />
Dr. Rita A. Gharde, Divakar T. Chunarkar....................................................................................... 353<br />
Design of a 32 DOF Andro Humanoid Robot using Cascaded Computational Intelligence .............................. 357<br />
S Shyam.R.Nair, Prof. Manjula Pramod ............................................................................................ 357<br />
Image Processing Operations for 3d Image ........................................................................................................ 364<br />
Mrs. A. Padmapriya, S.Vigneshnarthi ................................................................................................ 364<br />
Transient Analysis of Mac Protocol in Sensor Networks ................................................................................... 370<br />
Mada Amarnadh, M. Venkata Dasu ................................................................................................... 370<br />
Measures to combat tuberculosis in colonial Mysore ......................................................................................... 374<br />
Dr. Thriveni ........................................................................................................................................... 374<br />
Condition based reporting of multi-machine monitoring system using GSM .................................................... 380<br />
Jinia Datta(Das), Soumyajit Datta, Sumana Chowdhuri and Jitendranath Bera .......................... 380<br />
Income Elasticities of Demand for major consumption items. ........................................................................... 385<br />
Case study of Kashmir University Teachers ....................................................................................................... 385<br />
Samira Khan.......................................................................................................................................... 385<br />
Enhancing a Future version of the Nigerian SME Technology Incubation Model: Lessons for other developing<br />
countries .............................................................................................................................................................. 390<br />
Nkem Okpa Obaji 1 , Aslan Amat Senin 2 , Cameron Keith Richards 3 ............................................... 390<br />
The Effect of Ionic Composition on Structural and Optical Properties of CdxZn1-xS Thin films Grown by Spray<br />
pyrolysis .............................................................................................................................................................. 393<br />
Ravangave L. S. 1 , Biradar U. V. 2 , Misal S. D. 3 ................................................................................. 393<br />
Hybrid Algorithm for Segmentation of Left Ventricle in Cardiac MRI ............................................................. 398<br />
R.Sreemathy 1 , Rekha S. Patil 2 , Priyanka Shirude 3 ............................................................................ 398<br />
Effect of in-plane forces on frequency parameters ............................................................................................. 402<br />
A.K.L. Srivastava, S.R.Pandey ............................................................................................................ 402<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 7<br />
ISSN 2250-3153<br />
An Efficient Synthesis of Bio Active Azetidinones and Thiazolidinones of 3-METHYL-1-PHENYL-1H-<br />
PYRAZOL-5-OL ................................................................................................................................................ 421<br />
Ravindra Kumar*, Abha Shukla**, and D.S.Tyagi*** .................................................................... 421<br />
Colposcopy and carcinoma buccal mucosa: finding significance, a pilot study ................................................. 428<br />
Dr.Abhishek Singh Nayyar 1 , Dr.Gayitri H.C. 2 , Dr.Mubeen Khan 3 , Dr.U.D.Bafna 4 , Dr.Siddique<br />
Ahmed 5 ................................................................................................................................................... 428<br />
On a class of g**-closed sets in topological spaces and some mappings ...................................................... 435<br />
Dr. D.Saravanakumar, K.M.Sathishkumar ....................................................................................... 435<br />
The White Tiger: Quest of Existence.................................................................................................................. 440<br />
Prof. Sakate Bharat Shamarao ............................................................................................................ 440<br />
Integrity Checking Mechanism with Effective 1nd Realistic Approach in Distributed Database ..................... 442<br />
Pallavi Saxena, Nitin Dubey, Sonali Pathak ....................................................................................... 442<br />
Empowerment of Women in India- An Attempt to Fill the Gender Gap (June, <strong>2012</strong>) ...................................... 447<br />
Dr. Ravi N. Kadam ............................................................................................................................... 447<br />
Energy Efficient Multi Hop Clustering Protocol for Wireless Networks ........................................................... 450<br />
M.Shankar, G.JegaJothi, S. Karthigaiveni, M.Ganesan, L Dinesh ................................................. 450<br />
Migration of Mobicents SIP Servlets on Cloud Platform ................................................................................... 457<br />
Mr. Manish Giri, Sachin Waghmare, Balaji Bandhu, Akshay Sawwashere, Atul Khaire ............ 457<br />
Study of Fast Frequency Hopping Spread Spectrum and Jamming Systems ..................................................... 461<br />
Er.Nilesh Agrwal**, Er.Navendu Nitin**, Manjay Yadav* ............................................................. 461<br />
The Compliance of Temporary Soft Lining Materials-An in vivo & vitro study ............................................... 464<br />
Dr. N.Shanmuganathan, Dr.T.V.Padamanabhan, Dr.R.Subramaniam, Dr.S.Madhankumar ..... 464<br />
A Case Report – MELAS Syndrome .................................................................................................................. 471<br />
Dr Hariom Meena*, Dr Ramraj Meena*, Dr Surendra Khosya * ................................................... 471<br />
Research Directions in Quantum Cryptography and Quantum Key Distribution .............................................. 474<br />
Ms. Deepa Harihar Kulkarni ............................................................................................................... 474<br />
Controller Performance Evaluation for Concentration Control of Isothermal Continuous Stirred Tank Reactor<br />
............................................................................................................................................................................. 477<br />
Vishal Vishnoi, Subhransu Padhee, Gagandeep Kaur ...................................................................... 477<br />
Design of Fractional Order PID Controller for Speed Control of DC Motor ..................................................... 484<br />
Rinku Singhal, Subhransu Padhee, Gagandeep Kaur ...................................................................... 484<br />
FUZZY GRAPHS ON COMPOSITION, TENSOR AND NORMAL PRODUCTS ........................................ 493<br />
Dr. G.NIRMALA* and M.VIJAYA** ................................................................................................ 493<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 8<br />
ISSN 2250-3153<br />
Text Fusion in Medical Images Using Fuzzy Logic Based Matrix Scanning Algorithm ................................... 499<br />
Pinki Jain, Anu Aggarwal (Guide) ...................................................................................................... 499<br />
Impact of Peace and Disturbances on Tourism and Horticulture in Jammu and Kashmir ................................. 506<br />
RAJNI SHARMA, VINOD KUMAR SHARMA AND VAR INDER SINGH WARIS ................. 506<br />
Fate of Metals in Fish under Variable Sewage Input in Fish Ponds ................................................................... 513<br />
Paulami Maiti * and Samir Banerjee ** ........................................................................................... 513<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 9<br />
ISSN 2250-3153<br />
“Jai Guru Dev”<br />
Effect of Vedic Chanting (Homas, Yagyas, Meditation) on<br />
crime rate (Oct 2011)<br />
Abstract- Every sound generated in this universe has great<br />
impact on human body and its surroundings. Ancient sages;<br />
through power of meditation had found the benefits of various<br />
chants and its impact on the surroundings. Vedic Chantings<br />
(Homas, Yagyas, Meditation) leads to healthy body, mind and<br />
soul which is more in sync with law of nature. Today there are<br />
meditation, chantings been performed for holistic growth of<br />
human and nature. This was studied by analyzing crime<br />
registrations in four zones of Mumbai. The study has shown that<br />
Vedic chants reduce crime rate.<br />
Keywords- Crime - an action or an instance of negligence that<br />
is deemed injurious to the public welfare or morals or to the<br />
interests of the state and that is legally prohibited , Navratri –<br />
Festival of lord Durga celebrated for 9 days in India, Sattva –<br />
positive vibes and energy, Vedic Chanting - Homas, Yagyas,<br />
Meditation<br />
T<br />
I. INTRODUCTION<br />
here is negativity spread all over the planet, mainly due to<br />
change in lifestyle, global warming, pollution and the rising<br />
population. Due to excessive working hours, unemployment,<br />
competition and corruption a common man falls prey to<br />
depression, anxiety, helplessness, leading to violence betrayal of<br />
trust, loss of brotherhood in the family and society etc.<br />
Our ancient rishis and yogis used to chant mantras and perform<br />
various pujas, to eradicate negativity from the surroundings. This<br />
ancient technique, which when followed as per the rites and<br />
rituals of the vedic culture, brings positivity in the environment.<br />
The environment includes all the living beings in the cosmos.<br />
Each and every small organism is influenced by the chanting and<br />
the vibrations created in the space. The positive energy in the<br />
surrounding increases, leading to more of peace and nonviolence<br />
and an up-liftment in thoughts, work, health and<br />
reduction of stress in individuals and society.<br />
Meaning of Navratri: Nava‘ means ‗nine‘ and ‗Ratri‘ is made up<br />
of ‗Ra‘, which also means ‗night‘ and ‗Tri‘ meaning the ‗the<br />
three aspects of our life – the Body, the Mind and the Soul. So<br />
‗Navaratri‘ means ‗giving rest to all the three aspects of our life,<br />
for nine days‘.<br />
Each day during Navratri has special implications: yagyas,<br />
poojas and homas are performed. Among the things offered to<br />
the fire are hundreds of different herbs, fruits, garments, and<br />
mantras, all creating a gloriously divine atmosphere to drown in.<br />
The significance of Vedic Chanting (Homas, Yagyas,<br />
Meditation): These are not for the sages, who perform them, but<br />
Dr. Rohit Sabharwal, Ms. Kinjal Dalal<br />
The Art of Living<br />
for the entire Universe, for all the misery, sorrow, and pain in the<br />
world. The blessings of the yagyas and poojas teach the whole of<br />
humanity and a lot of good comes out of these – peace, strength,<br />
prosperity, success and faith.<br />
II. LITERATURE REVIEW<br />
There is research conducted on effects of various vedic<br />
chantings on intellect. It was concluded that vedic chanting<br />
showed significant increase scoring in both the memory tests and<br />
considerable reduction in total error and total time taken for<br />
cancellation tests compared to non-chanting practitioners (Sripad<br />
Ghaligi 1 ,H.R. Nagendra & Ramachandra Bhatt, 2006).<br />
Every one attending to such Homas, Yagyas, Meditation (Vedic<br />
Chanting) before has given a review that they experience peace<br />
of mind, there is more relaxation which gives a feeling of<br />
something settling within, experiencing meditative state of mind.<br />
They have experienced decrease in illness and more of positive<br />
energy within. However, there is no specific research conducted<br />
which studies and proves to have reduced the crime rate due to<br />
Vedic chanting (Homas, Yagyas, Meditation).<br />
METHODOLOGY<br />
The data as made available by Assistant Commissioner of<br />
Police (ACP), West Region, Mumbai, record of the crimes in the<br />
zones of Bandra Kurla Complex, Kherwadi, Bandra and Mahim<br />
for the above mentioned dates has been used.<br />
TYPE OF RESEARCH<br />
This is an ex-post facto research. As the variables tested are<br />
assumed to have relation among themselves. Researcher can only<br />
report on what is happened. The aim is to look for patterns,<br />
hypotheses or ideas that can be tested and will form the basis for<br />
further research and betterment for society.<br />
STUDY DESIGN<br />
The objective of this study is to demonstrate the effect of<br />
Vedic Chanting (Homas, Yagyas, Meditation) on crime rate. It is<br />
opinionated that attending pujas and homas bring in high level of<br />
sattva or positive energy in self and surroundings thereby<br />
reduction in crime will be seen.<br />
Zone Data: The data was collected as per that given by the<br />
Assistant Commissioner of Police research cell. The Mumbai<br />
Police has designed format for recording the crime rate for the<br />
entire Brihan Mumbai. On the basis of the format; the following<br />
1 Corresponding Author<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 10<br />
ISSN 2250-3153<br />
zones were selected as sample for study namely Bandra Kurla<br />
Complex, Kherwadi, Bandra and Mahim. The Zone, where the<br />
chanting was performed was the Bandra zone.<br />
HYPOTHESES<br />
Vedic Chanting (Homas, Yagyas, Meditation) reduce the crime<br />
rate during the period it is performed.<br />
Independent Variable: The period chosen: previous to the<br />
Navratri week, during Navratri and after the Navratri week.<br />
Dependent Variable: The crime rate for the period prior to<br />
Navratri, During Navratri and after Navratri is chosen.<br />
PLACE OF CONDUCTING RESEARCH<br />
Mumbai. Maharashtra, India.<br />
The vedic chants are performed in Mumbai 2011, Bandra Kurla<br />
Complex zone during the Navratri period. Thus four surrounding<br />
zones from Mumbai are selected namely Bandra Kurla Complex,<br />
Kherwadi, Bandra and Mahim for the concentric evaluation of<br />
research.<br />
DATA COLLECTION<br />
Data was collected from the Mumbai police website and<br />
Assistant Commissioner of Police, West Region Bandra and<br />
Mahim region.<br />
Period<br />
considered<br />
Table 1: Details of Week considered for research<br />
Abbrevation: R - Registered Crime<br />
O=Observed<br />
E=Expected<br />
Week 1 Week 2 Week 3 Week 4<br />
19.09.11<br />
to<br />
25.09.2011<br />
(Pre - event)<br />
Week1<br />
26.09.2011 to<br />
02.10.2011<br />
DATES CHOSEN FOR RESEARCH<br />
Data for the year 2011 - previous to the Navratri week<br />
(19.09.2011 – 25.09.2011), during Navratri (average of the two<br />
weeks – 26.09.2011 – 02.10.2011 and 03.10.2011 - 09.10.2011)<br />
and after the Navratri week (10.10.2011 – 16.10.2011) is<br />
considered.<br />
During Navratri Dates for data:<br />
The festival of Navratri was held from 26 th September<br />
2011(Wednesday) to 5 th October 2011 (Wednesday). For<br />
research; average of data of the following two weeks specifically,<br />
from Monday to Sunday 26 th September 2011 – 2 nd October 2011<br />
(2 nd week) and 3 rd October 2011 to 9 th October 2011 (3 rd week) is<br />
considered as Navratri week.<br />
III. RESEARCH AND FINDINGS<br />
Data was run through the Chi-square test. Since the calculated<br />
value was found to be 0.57 which was lesser than table value of<br />
5.99, thus, null hypothesis was accepted at 5% level of<br />
significance.<br />
03.10.2011<br />
to<br />
09.10.2011<br />
Table 2: Period considered and No. of crime registered<br />
(During event) Week<br />
2&3<br />
No. of<br />
crime<br />
registered 26 31 31<br />
Expected Frequency = Sum of week 1 + Week 2&3 + Week 4 / 3<br />
= 26+31+31/3<br />
= 88/3<br />
=29.33<br />
10.10.2011<br />
to<br />
16.10.2011<br />
(Post - event)<br />
Week 4<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 11<br />
ISSN 2250-3153<br />
Computation<br />
Ho = Homas, Yagyas, Meditation (Vedic Chanting) reduce the crime rate during the period it is performed<br />
H1 = Homas, Yagyas, Meditation (Vedic Chanting) does not reduce the crime rate during the period it is<br />
performed<br />
Table 3: Calculation of observed and expected frequency<br />
(O-<br />
Period O E O-E E)2 (O-E)2/E<br />
29.3 -<br />
1 26 3 3.33 11 0.38<br />
29.3<br />
2 31 3 1.67 3 0.10<br />
29.3<br />
3 31 3 1.67 3 0.10<br />
88 88<br />
x2 = Sumation (O-E)2/E = 0.57<br />
df = 3 - 1 = 2<br />
table value at 5% for 2 df = 5.99<br />
Since the calculated value = 0.57 is lesser than table value of 5.99, null hypothesis is accepted at 5% level of<br />
significance.<br />
The results show that vedic chants reduce crime rate.<br />
Details of the calculations has been mentioned in the<br />
Annexure<br />
In addition to the data collected the public opinion was summed<br />
up to:<br />
i. During any festival where there are masses of people<br />
the Police security is increased; Inorder to avoid<br />
adverse conditions there are many rules set prior to<br />
any public event. This is helps the police to<br />
maintain discipline among the crowd; leading to<br />
decrease in crime.<br />
ii. People have become more aware and avoid going to<br />
places where there are mishaps likely to happen.<br />
iii. People who attended meditations and various vedic<br />
chants experienced happy and meditative state of<br />
mind, they felt light, positive towards life and their<br />
goals and experienced more productive in their<br />
routine life. They became more inclined towards<br />
doing work for betterment of themselves their<br />
family members and their society.<br />
IV. CONCLUSION<br />
The data collected shows that there is reduction of crime,<br />
during the period of Navratri when the vedic chants are<br />
performed.<br />
Generally, Navratri is associated with Garba or Dandiya; a<br />
festival celebrated at night and chances are high for a greater<br />
number of mishaps to take place, due to there being more people<br />
0.57<br />
around the city, outside their homes, at night. However, the data<br />
collected shows that there were less crimes reported during the<br />
Navratri period for the selected sample zones. Thus, it is proved<br />
that Vedic Chants reduce crime rate during the period it is<br />
performed.<br />
LIMITATIONS<br />
The crimes which are registered only are taken into<br />
consideration.<br />
RECOMMENDATIONS<br />
The results prove that vedic chants reduce crime rate, thus, to<br />
maintain the impact of positivity in the surrounding these chants<br />
should take place more frequently.<br />
ACKNOWLEDGEMENT<br />
Special thanks to Mrs. Nayana, Mr. Sujit Bankar, Mr. S.<br />
Kadam, Prof.Preeti Shirodkar, Prof. Pallavi Mhatre, Dr.Nirmala<br />
Joshi, Prof. Pranjal Muley, our family members, friends and well<br />
wishers.<br />
REFERENCES<br />
[1] http://nopr.niscair.res.in/handle/123456789/6747<br />
[2] http://www.mumbaipolice.org/<br />
[3] Murthy S N, Bhojanna U. Business Research Methods – 2 nd Edition. New<br />
Delhi: Excel Books, 2007.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 12<br />
ISSN 2250-3153<br />
AUTHORS<br />
First Author - Dr. Rohit Sabharwal, B.D.S, M.D.S<br />
(Periodontist), MAR Dental College, Pune,<br />
drrohitsab@gmail.com<br />
Second Author - Ms. Kinjal Dalal, MA (Industrial<br />
Psychology), Don Bosco Institute of Management and Research,<br />
Mumbai, kinjal.dbit@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 13<br />
ISSN 2250-3153<br />
APPROXIMATION OF FUNCTION BELONGING TO<br />
W (Lp, () t ) CLASS BY (E, q) (N, pn) MEANS OF ITS<br />
FOURIER SERIES<br />
H. L. RATHORE*, U. K. SHRIVASTAVA**<br />
* Department of Mathematics, J. K. Institute of Engineering, Bilaspur (C. G.), India<br />
E-mail: hemlalrathore@gmail.com<br />
** Department of Mathematics, Govt. Girl‘s P. G. College, Bilaspur (C. G.), India<br />
Abstract- The present paper deal with approximation of a function belonging to the W(Lp, (t)) class by product summability method.<br />
Here product of Euler (E,q) summability method and Nörlund (N, pn) method has been taken. A new estimate on degree of<br />
approximation of a function belonging to W(Lp, (t)) class has been determined by (E, q) (N, pn) summability of a Fourier series.<br />
Mathematics Subject Classification: 42B05, 42B08<br />
Index Terms- Degree of approximation, W(Lp, (t)) class, (E, q) (N, pn) summability, Fourier series, Conjugate series of a Fourier<br />
series<br />
L<br />
I. DEFINITION AND NOTATIONS<br />
et f be a 2π-periodic function in L[-π, π]. The Fourier series associated with f at a point x is defined by<br />
<br />
1 1<br />
f ( x) a0 ancosnxbnsinnxa0Anx (1.1)<br />
2 n1 2 n1<br />
With partial sum sn (f; x)<br />
where<br />
<br />
1<br />
an f x cos<br />
nx dx<br />
and<br />
The Lp norm is defined by<br />
<br />
<br />
1<br />
bn f x sin<br />
nx dx<br />
<br />
<br />
1<br />
2<br />
p<br />
p <br />
<br />
<br />
1<br />
a0 f x dx<br />
<br />
f p <br />
0<br />
f x dx<br />
,<br />
p 1<br />
and the degree of approximation En (f) is given by (Zygmund [6]).<br />
Enfmin Tn<br />
f x Tnxp<br />
,<br />
in term of n, where Tn (x) is a trigonometric polynomial of degree n.<br />
A function<br />
f Lip <br />
if<br />
f x t f x t <br />
<br />
<br />
for n = 1.2.3……….<br />
for 0 1 ,<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 14<br />
ISSN 2250-3153<br />
f x Lip , p<br />
and<br />
1<br />
2<br />
<br />
<br />
for 0x 2if.<br />
p<br />
p<br />
<br />
<br />
<br />
f x t f x dx t<br />
0<br />
<br />
t <br />
Given a positive increasing function ,<br />
and<br />
p 1<br />
,<br />
1<br />
2<br />
p<br />
<br />
<br />
p,<br />
<br />
f W<br />
L t<br />
We observe that<br />
We write<br />
, 0 1,<br />
,<br />
<br />
f Lip t p<br />
p<br />
<br />
<br />
f x t f x dx t<br />
0<br />
<br />
if<br />
1<br />
2<br />
p<br />
<br />
<br />
p<br />
<br />
sin <br />
<br />
fxtfx x dx t<br />
0<br />
<br />
0<br />
p <br />
<br />
<br />
<br />
<br />
if<br />
<br />
t t<br />
p<br />
,<br />
0<br />
<br />
W L , t Lip t , p Lip , p Lip<br />
1<br />
<br />
2<br />
t f x t f x t 2 f x <br />
<br />
n<br />
un sn uk<br />
Let n0<br />
th<br />
be an infinite series with sequence of n partial sum k 0<br />
<br />
<br />
P p 0<br />
n k<br />
n0<br />
P 0 p<br />
, 1 1<br />
The Nörlund means of the sequence {sn} is given by (Hardy [2])<br />
1 n<br />
t p s<br />
N<br />
n<br />
Pn<br />
k0<br />
nk k<br />
p 1<br />
(Mc Fadden [3])<br />
and a sequence {pn} of real constant such that<br />
N<br />
t<br />
If n s<br />
as n , then the sequence {sn} is summable to s by Nörlund method.<br />
The Euler means (E, q) is given by (Hardy [2])<br />
n<br />
q 1 n nk En n <br />
q<br />
sk<br />
1 q<br />
k0<br />
k ,<br />
q<br />
E<br />
If n s<br />
as n , then the sequence {sn} is summable to s by Euler method. The (E, q) transform of the (N, pn)<br />
un<br />
transform define the (E, q) (N, pn) transform of the partial sum {sn} of series n0<br />
. The (E, q) (N, pn) means defines a sequence<br />
q<br />
E N tn <br />
q<br />
E N<br />
n<br />
by<br />
n<br />
q<br />
E N 1 n tn q<br />
k n 1 q<br />
k0<br />
nk k 1<br />
P<br />
pkr<br />
k r0<br />
sr<br />
t s<br />
If<br />
as n , then the sequence {sn} is said to summable by (E, q) (N, pn) method to s.<br />
1 1 <br />
<br />
t <br />
<br />
, where denotes the greatest integer not greater than t .<br />
<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 15<br />
ISSN 2250-3153<br />
Particular Cases : Two particular cases of (E, q) (N, pn) means are :<br />
1) (E, q) (C, 1) if pn = 1, n<br />
n1 pn<br />
<br />
1<br />
, 0<br />
2) (E, q) (C, ) if<br />
The following theorems are due to Binod Prasad Dhakal [1].<br />
Theorem A : If<br />
1<br />
1<br />
p <br />
,<br />
f : R R<br />
is 2π – periodic function, Lebesgue integrable on [-π , π] and Lip(α, p) class function for<br />
p 1<br />
, then the degree of approximation of f by the (E,1) (N, pn) mean of its Fourier series is given by :<br />
EN<br />
n<br />
<br />
t x f x<br />
<br />
1<br />
<br />
<br />
<br />
p<br />
1<br />
p <br />
1 n 1<br />
n 1<br />
n k<br />
EN<br />
tn n pkrsr<br />
2 k0 k P r 0<br />
Where, k <br />
(E, 1) (N, pn) means of Fourier series (1.1).<br />
,<br />
is<br />
II. MAIN THEOREM<br />
The degree of approximation of function belonging to the Lipschitz class by (E, q) (C, 1) and by (E, 1) (N, p n) mean has discussed<br />
by a number of researchers like S.K. Tiwari and Chandrashekhar Bariwal [5] and Binod Prasad Dhakal [1]. But till now no work seem<br />
to have been done to obtain the degree of approximation of the function belonging to<br />
mean of its Fourier series.<br />
p,<br />
<br />
W L t<br />
In an attempt to make study in this direction, one theorem on the degree of approximation of function of<br />
product summability mean of the form (E, q) (N, pn) has been determined as following.<br />
Theorem : If<br />
q<br />
<br />
f : R R<br />
is 2π – periodic, Lebesgue integrable [-π, π] and belonging to the class<br />
E N<br />
tnx using on its Fourier series (1.1) is given by.<br />
(2.1)<br />
Provided<br />
(2.2)<br />
and<br />
(2.3)<br />
<br />
t<br />
q<br />
1<br />
E N 1 P <br />
tn f ( n 1) <br />
p<br />
n 1<br />
<br />
<br />
satisfies the following conditions :<br />
1<br />
p<br />
<br />
P<br />
n1<br />
t ()<br />
t<br />
<br />
p 1 <br />
sin t dt<br />
<br />
<br />
(<br />
t) n1<br />
<br />
<br />
<br />
n1<br />
<br />
1<br />
p<br />
P<br />
<br />
<br />
t (<br />
t) sin t <br />
<br />
<br />
dt n <br />
()<br />
t <br />
<br />
1<br />
<br />
class by (E, q) (N, pn) product<br />
p,<br />
<br />
W L t<br />
p,<br />
<br />
W L t<br />
,<br />
class by<br />
p 1<br />
by<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 16<br />
ISSN 2250-3153<br />
Where is an arbitrary number such that<br />
such that<br />
1 p .<br />
n k<br />
q<br />
E N 1 n nk 1<br />
t q . p<br />
n <br />
1<br />
q k k Pk<br />
r<br />
n kr and 0 0<br />
Lemma 1 : If<br />
q(1 ) 1 0<br />
, conditions (2.2) and (2.3) hold uniformly in x and where<br />
sr is (E,q) (N,pn) means of Fourier series (1.1).<br />
q <br />
q E N t n 1<br />
Then n<br />
Proof :<br />
q <br />
1 <br />
n k<br />
1 n 1 sin r t<br />
nk E N t .<br />
2<br />
n n q<br />
p<br />
kr 21qk 0 k Pk<br />
r 0 sin t<br />
<br />
<br />
2<br />
<br />
0 t for n 1<br />
1 <br />
n 1 n nk k q<br />
sin r t<br />
E N t <br />
2<br />
n n p<br />
kr 21qk 0 k P r 0 sin t<br />
<br />
k<br />
2<br />
r <br />
n k 2 1 sin t<br />
1 n 1 nk 2<br />
n q<br />
p<br />
kr 21qk 0 k P r 0 sin t<br />
<br />
<br />
k<br />
2<br />
q<br />
2 1<br />
n k<br />
1 n k<br />
nk q p<br />
n <br />
21 k P<br />
q<br />
n<br />
kr <br />
k0 r0<br />
k<br />
k0<br />
n 1 n nk <br />
q<br />
k<br />
21 k<br />
( n 1)<br />
q <br />
n<br />
k0<br />
<br />
Lemma 2 : If n<br />
q 1 E N t <br />
n <br />
t for 1 t<br />
<br />
<br />
n and<br />
Proof :<br />
q <br />
2 1<br />
E N t is given as in lemma 1, then<br />
<br />
n<br />
<br />
k0<br />
p P<br />
nk n nk n<br />
q q<br />
<br />
<br />
k sin 1 kt , sin 2<br />
t t <br />
<br />
1 <br />
n k<br />
1 n 1 sin r t<br />
nk E N t <br />
2<br />
n n q<br />
p<br />
kr 21qk 0 k P r 0 sin t<br />
<br />
<br />
k<br />
2<br />
1 <br />
n k<br />
1 n 1<br />
sin r t<br />
2<br />
q<br />
p<br />
<br />
nk n<br />
kr 21qk0k P r0<br />
k sin t<br />
2<br />
n k<br />
1 n 1 nk q<br />
p<br />
21<br />
n qt k0k P r0<br />
n<br />
1 <br />
<br />
p P<br />
nk n<br />
t k0<br />
<br />
,<br />
k<br />
kr n<br />
<br />
k0<br />
n n k<br />
n <br />
<br />
q<br />
1q k <br />
1 <br />
n<br />
1 1<br />
1<br />
p q<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 17<br />
ISSN 2250-3153<br />
III. PROOF OF THEOREM<br />
Following Titchmarsh [4], the n th partial sum sn(x) of the Fourier series is given by<br />
(3.1)<br />
The (N, pn) transform of the sequence {sn (x)} is given by<br />
(3.2)<br />
The (E, q) transform of<br />
1 <br />
<br />
1 (<br />
t)sin n t<br />
s ( ) ( )<br />
2<br />
n x f x <br />
dt<br />
t<br />
2 0 sin<br />
2<br />
1 <br />
1 sin n t<br />
t x f x t p<br />
2<br />
dt<br />
n<br />
N<br />
n ( ) ( ) (<br />
) k r<br />
2 P <br />
n 0 k 0 sin t<br />
<br />
2<br />
N tnx is given by<br />
<br />
n k<br />
q<br />
E N 1 (<br />
t)<br />
n nk 1<br />
t ( ) . sin 1<br />
n f x k r<br />
n<br />
2 1 <br />
<br />
q p r tdt<br />
q<br />
2<br />
0 sin t <br />
k0 k Pk<br />
r0<br />
2<br />
<br />
<br />
n1<br />
q q<br />
( ) (<br />
) <br />
n <br />
n<br />
t E N t dt t E N t dt<br />
0<br />
<br />
<br />
n1<br />
(3.3)<br />
I1 I2<br />
(say)<br />
Applying Hölder‘s inequality,<br />
1<br />
1<br />
1<br />
q q<br />
p p <br />
q<br />
n 1 <br />
t 1<br />
t sin t n<br />
tENt n <br />
<br />
<br />
0 t t sin t <br />
0<br />
<br />
<br />
<br />
<br />
I dt dt<br />
1<br />
<br />
q q<br />
n1 n t <br />
1<br />
<br />
<br />
<br />
dt<br />
1<br />
<br />
n1 t<br />
0 <br />
<br />
<br />
1<br />
1<br />
q<br />
n t <br />
<br />
.<br />
n 1 dt<br />
1<br />
<br />
n1 <br />
t 0 <br />
<br />
<br />
n1<br />
1<br />
<br />
1q <br />
t dt<br />
n 1 <br />
<br />
<br />
0 <br />
<br />
1 1 q <br />
1<br />
q<br />
<br />
<br />
1 n1<br />
t<br />
n 1<br />
<br />
<br />
0<br />
1 1 1 q<br />
.<br />
n 1<br />
n 1<br />
<br />
<br />
<br />
1 1<br />
p <br />
n1 . <br />
n 1<br />
<br />
<br />
(3.4)<br />
1<br />
q<br />
<br />
0<br />
q <br />
()<br />
t E N t dt<br />
n<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 18<br />
ISSN 2250-3153<br />
Now,<br />
2<br />
1<br />
1<br />
p p q q<br />
<br />
<br />
q<br />
<br />
t t sin t ENt. t <br />
<br />
<br />
n<br />
. <br />
<br />
<br />
<br />
t <br />
t sin t <br />
<br />
<br />
n1 n1<br />
<br />
I dt dt<br />
1<br />
1<br />
q<br />
<br />
q<br />
t <br />
<br />
<br />
1 <br />
t <br />
<br />
<br />
n1<br />
<br />
1<br />
q q<br />
n dt<br />
<br />
y dy <br />
1 2<br />
1 y y <br />
<br />
<br />
n1<br />
1<br />
<br />
<br />
n 1 .<br />
n1<br />
1 <br />
q <br />
1<br />
(3.5)<br />
Now combining (3.3), (3.4) & (3.5), we get<br />
1 1q1 <br />
n y<br />
n 1<br />
<br />
<br />
q<br />
1<br />
E N 1 p <br />
tn x f x n1 <br />
n1 1 <br />
1 1<br />
q<br />
n1 n1<br />
n1 1 1 1 q<br />
.<br />
n 1<br />
<br />
n1 <br />
1 1 p<br />
.<br />
n 1<br />
<br />
n1 <br />
1 1 p <br />
n1 <br />
n1 since<br />
1<br />
<br />
1<br />
p p<br />
2<br />
q<br />
<br />
1<br />
E N 1 p <br />
<br />
tn x f x n 1<br />
dx<br />
p<br />
n 1<br />
0 <br />
<br />
1<br />
2<br />
p <br />
1 1 p <br />
n 1<br />
dx n 1<br />
<br />
<br />
<br />
0<br />
<br />
<br />
<br />
1 1 p <br />
n1 <br />
n1 This completes the proof of the main theorem.<br />
IV. COROLLARIES<br />
1 1<br />
1<br />
p q<br />
Following corollaries can be derived from our main theorem.<br />
tt Corollary – 1 : β = 0 and <br />
f W<br />
Lp , t ,<br />
then the degree of approximation of a function<br />
0 1 is given by<br />
q<br />
E N<br />
1<br />
<br />
<br />
tn x f x 1 <br />
p n1 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 19<br />
ISSN 2250-3153<br />
Which is reduces to the Theorem A due to Binod Prasad Dhakal<br />
Corollary – 2 : If p in corollary 1, then for 0 1.<br />
Where<br />
q q<br />
E N sub<br />
1 <br />
E N<br />
tn x f x tn x f x <br />
x <br />
n1 , for 0 1<br />
n k<br />
q<br />
E N 1 n nk 1<br />
t q<br />
p<br />
kk Pk<br />
r<br />
n<br />
1 q<br />
0<br />
sr<br />
n kr in the (E, q) (N, pn) means of Fourier series (1.1).<br />
REFERENCES<br />
[1] Dhakal, Binod Prasad, Approximation of Function Belonging to Lip , p<br />
Class by (E, 1) (N, pn) Means of<br />
its Fourier series, KATHMANDU University Journal of Science, Engg. and Technology Vol. 7 No.1, Sept.<br />
2011, PP, 1 – 8.<br />
[2] Hardy G.H., Divergent Series, Oxford University Press, 1949.<br />
[3] McFadden L, Absolute Nörlund Summability, Duke Math. J., 9 (1942) 168 - 207.<br />
[4] Titchmarsh, E.C., The Theory of functions, Second Edition, Oxford University Press, 1939.<br />
[5] Tiwari, Sandeep Kumar and Bariwal Chandrashekhar, Degree of Approximation of Function Belonging to the Lipschitz Class by (E, q) (C, 1) Means of its<br />
Fourier Series. IJMA 1 (1), Oct. – 2010, 2 – 4.<br />
[6] Zygmund A, Trigonometric series, Cambridge University Press, 1959.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 20<br />
ISSN 2250-3153<br />
Design and Implementation of Cipher Algorithm using<br />
Randomized Alphanumeric Characters<br />
Sudhakar Kumar Singh<br />
School of Computing Science and Engineering, VIT University, Vellore - 632014,<br />
TamilNadu India<br />
Abstract- Cryptography is the technique that is used to ensure<br />
the safety of communication over the network in most of the<br />
computer communication systems. The strength of a<br />
cryptographic algorithm is based on the difficulty of<br />
cryptanalysis imposed over system. Our proposed Algorithm<br />
provides the best security analysis, in terms of computational<br />
time and effective environment over the network. As we are<br />
aware of the security of communication has attracted the<br />
attention towards the design of new Algorithm.<br />
It is a combination of some of the best known encryption<br />
algorithms in existence. Here, we apply the concept of RAC<br />
(Randomized Alphanumeric Characters) proceeding with some<br />
computation to reach the goal of cipher text. The algorithm that<br />
we are proposing in our work is the resultant of some existing<br />
algorithms that uses the strengths of one algorithm to compensate<br />
the weakness of other by applying RAC as well as applying a<br />
technique which is similar to Bit-Stuffing.<br />
Keyword- Cryptography, Security, RAC, cipher text.<br />
I. INTRODUCTION<br />
The concept of cryptography begins thousands of years ago; it<br />
takes number of versions based on the standards and the analysis<br />
which ensures the standards of cryptography. Encryption is the<br />
technique of changing the format of plaintext to cipher text<br />
which is unrecognizable and useless to unauthorized party.<br />
Decryption is the just reverse of encryption. It can be done in<br />
three ways (I) Secret key (symmetric): uses a single key for both<br />
encryption and decryption (II) Public key (asymmetric): uses two<br />
keys one for encryption and other for decryption. (III) Hash<br />
function (one way cryptography). In our proposed algorithm we<br />
are using concept of XOR operation and bit stuffing in a specific<br />
way.<br />
II. EXISTING ALGORITHMS:<br />
Several algorithms are available for the cryptography like<br />
RSA, IDEA etc all these are used for the purpose of data<br />
security. Each and every algorithm has its own public keys and<br />
private keys with some special features and may use different<br />
mathematical concepts to maintain the standards of<br />
cryptography.<br />
RSA: RSA is based on Public Key and Private Key, where<br />
Public Key is made known to others while private key must be<br />
kept in secret.<br />
The step below shows how RSA keys are generated.<br />
1. Two large prime numbers, p and q are chosen.<br />
2. Compute the product of these two N=p.q.<br />
3. Compute υ (N) = (p − 1) (q − 1)<br />
4. e is the public key, chosen randomly<br />
5. Find private key, d. d must be satisfy<br />
e.d = 1 mod υ (N)<br />
For encryption: - Cipher, c = me mod υ (N)<br />
For decryption: - Message, m = ce mod υ (N)<br />
IDEA: IDEA is based on public key.<br />
The steps below show how IDEA key are generated.<br />
1. Original text is divided into 64-bit blocks.<br />
2. Each 64-bit block is further divided into four 16-bit subblocks:<br />
X1, X2, X3, X4.<br />
3. The 128-bit IDEA session key is divided into eight 16-bit keyblocks:<br />
Ki, 1, Ki, 2, Ki, 3, Ki, 4, Ki, 5, Ki, 6, Ki, 7, Ki, 8.<br />
4. Addition and Multiplication are perform on each block of Xn<br />
and Ki, j.<br />
5. The combination of operations is performed eight times to get<br />
the final encryption.<br />
III. PROPOSED ALGORITHM<br />
Our proposed algorithm uses Randomized Alphanumeric<br />
Character and applying XOR operation with message and the<br />
technique of Bit-stuffing in specific way. We used asymmetric<br />
private key and the public key which increases the efficiency<br />
level of encryption algorithm .Here one 8-bit public key is<br />
randomly selected among several generated Alphanumeric<br />
Characters and one 5-bit private key. These may vary in real life<br />
environment.<br />
Encryption Flowchart of our proposed algorithm is given below.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 21<br />
ISSN 2250-3153<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 22<br />
ISSN 2250-3153<br />
IV. PROPOSED ALGORITHM PROCESS<br />
Encryption Algorithm<br />
1. Generate N number of 8-bit Alphanumeric Characters<br />
randomly.<br />
2. Randomly select any one among them, denoted as ‗A‘, and 5-<br />
bit SECRET KEY assigned as ‗B‘.<br />
3. Convert ‗A‘ and ‗B‘ in binary format.<br />
4. Compute the quotient of these two Q=A/B.<br />
5. Perform XOR operation with Message ‗M‘ and quotient ‗Q‘,<br />
TEXT = M XOR Q.<br />
6. Scanned TEXT and perform the Bit-Stuffing as per flowchart.<br />
7. In this way we get the encrypted message as CIPHERTEXT.<br />
Decryption Algorithm<br />
1. Remove the extra bit from CIPHERTEXT.<br />
2. Perform the XOR operation with ‗TEXT‘ and quotient ‗Q‘.<br />
3. In this way we get the original message ‗M‘.<br />
V. WORKING EXAMPLE<br />
Encryption:<br />
1. Input: Public Key as ‗A‘=SCSE04, Secret Key as ‗B‘=VIT<br />
and Message as ‗M‘=11MSC<br />
2. Conversion to binary format:<br />
Message as M=11MSC<br />
[1=0000001, 1=0000001, M=1001101, S=1010011, C=1000011]<br />
M=00000010000001100110110100111000011 (11MSC)<br />
Public key A= SCSE04<br />
[S=1010011, C = 1000011, S= 1010011, E=1000101, 0=<br />
0000000, 4= 0000100]<br />
A= 101001110000111010011100010100000000000100<br />
(SCSE04)<br />
Secret key B=VIT<br />
[V=1010110, I=1001001, T=1010100]<br />
B=101011010010011010100 (VIT)<br />
3. Quotient ‗Q‘; Q=A/B=111101101111110110001<br />
4. TEXT = M XOR Q.<br />
TEXT=100000010110110110110011.<br />
5. CIPHERTEXT = TEXT with Bit-stuffing using SECRET<br />
KEY, (Case: 2)<br />
CIPHERTEXT =<br />
100000010111011001110110001111010010011010100<br />
[Encrypted Message (CIPHERTEXT) =<br />
100000010111011001110110001111010010011010100]<br />
Decryption:<br />
It is just reverse of encryption.<br />
1. Input as CIPHERTEXT =<br />
100000010111011001110110001111010010011010100<br />
Case 1: Remove the bit after 111 patterns and concatenate.<br />
Removed bits =001010010011010100<br />
Comparison of removed bits with SECRET KEY bits,<br />
here mismatched, so break and go to next case.<br />
Case 2: Remove the bit after 11 patterns and concatenate.<br />
Removed bits=101011010010011010100<br />
Comparison of removed bit with SECRET KEY bits,<br />
here it matched, so go to next phase.<br />
2. Performing XOR operation with TEXT and Quotient. In this<br />
manner we get the original message.<br />
Message M = 00000010000001100110110100111000011<br />
(11MSC)<br />
VI. CONCLUSION<br />
Overall RSA, DES and IDEA are very strong encrypting<br />
algorithms in existence, they do have their weaknesses: RSA<br />
contains lengthy and complex computations, while the purpose<br />
of initial and final permutation is not clear in DES algorithm,<br />
whereas IDEA uses a single and lengthy key. By combining the<br />
concept of above mentioned algorithms, our proposed algorithm<br />
uses the strength of these two algorithms to in order to reduce the<br />
weaknesses. As the result, our proposed cipher algorithm is one<br />
of the strongest, simplest and fastest encryption algorithms.<br />
REFERENCES<br />
[1] S.C. Coutinho,University Press (India) Private Limited (2003).The<br />
Mathematics of Ciphers ,Number Theory and RSA Cryptography.<br />
Department of Computer science Federal University of Rio de Janeiro Rio<br />
de Janerio, Brazil<br />
[2] Evolution of Cryptography Mohd Zaid Waqiyuddin Mohd Zulkifli,<br />
Evolution of Cryptography, 17th January 2007.<br />
[3] Data Encryption and Decryption process Using Bit Shifting and Stuffing<br />
(BSS) Methodology, B.Ravi Kumar et al. / International Journal on<br />
Computer Science and Engineering (IJCSE).<br />
[4] Wikipedia, The Free Encyclopedia, from http://en.wikipedia.org/wiki/RSA<br />
[5] Wikipedia, the Free Encyclopedia, from<br />
[6] http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm<br />
[7] Wikipedia, The Free Encyclopedia, from<br />
http://en.wikipedia.org/wiki/Data_Encryption_Standard<br />
[8] CareerRide.com, from http://www.careerride.com/Networking-DESweakness-and-strength.aspx<br />
AUTHORS<br />
First Author – Sudhakar Kumar Singh, M.SC (Computer<br />
Science), VIT University Vellore, Sksingh<strong>2012</strong>@yahoo.com.<br />
Second Author – Hariom Kumar, M.SC (Computer Science)<br />
Third Author – K Praveen Kumar, M.SC (Computer Science)<br />
Fourth Author – K Ramesh Babu, Faculty of VIT University.<br />
Vellore.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 23<br />
ISSN 2250-3153<br />
Nutritional Status of Children (0-24 Months) In<br />
Jammu Kashmir and Ladakh Regions<br />
Abstract- This paper discusses the results of an analysis on<br />
community based cross sectional study of infant growth faltering<br />
and feeding practices in three regions of Jammu Kashmir and<br />
ladakh for which data has been collected during 2004-2006 and<br />
compiled in March 2007.results indicate a statistically significant<br />
positive association between malnutrition and feeding practices.<br />
Feeding practices in all the three regions studied were not as per<br />
internationally accepted recommendations. Around 66% of<br />
mothers gave pre-lacteal feeds, most common being sugar water,<br />
honey, plain water, artificial milk and Jaggery. Pre-lacteal<br />
feeding was common in Jammu and Kashmir regions but was not<br />
very common in Ladakh. In all the three regions, as the age of<br />
the studied children advanced from 0 to 2 years, the prevalence<br />
rate of malnutrition exhibited a parallel increase. This pattern<br />
was observed in higher frequency among infants from middle<br />
and lower income groups. Chronic malnutrition evidenced by<br />
stunting with insignificant inter-regional differences (P>0.01)<br />
was observed in 14.1%, 17.2% and 16.8% of the children in<br />
Jammu, Kashmir and Ladakh.<br />
Current malnutrition was more prominent in Kashmir as<br />
29.3% children were underweight as against 16.2% in Jammu<br />
and 15.8% in Ladakh (p< 0.01). Acute malnutrition also showed<br />
significant inter-regional difference (P
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 24<br />
ISSN 2250-3153<br />
crushing the hair at a right angle to the scale and the height read<br />
from the lower edge of the ruler to the nearest 0.5cm. (Jelliffe<br />
DB 1966).<br />
Children were categorized as malnourished or normal by<br />
placing their measurements on the three most commonly used<br />
anthropometric indices viz weight-for-height, height-for-age and<br />
weight-for-age. The calculation of the three indices of child<br />
malnutrition involved comparison with an international reference<br />
population as recommended by the World Health Organization<br />
(Dibley etal 1987a) (Dibley etal 1987 b).A Z-score cut-off point<br />
of
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 25<br />
ISSN 2250-3153<br />
(10.0)<br />
Normal 540<br />
(79.0)<br />
379<br />
(74.0)<br />
7.233 (.124)ns<br />
parenthesis represents percentage<br />
** Association is found highly significant (p0.01).<br />
TABLE 2<br />
73 (72.0) 992 (76.7)<br />
Nutritional Present NFHS-2 All India<br />
Status<br />
Study J&K Levels<br />
Stunting 15.5% 39% 47%<br />
Wasting 13.8% 12% 16%<br />
Under Weight 21.3% 35% 46%<br />
UNICEF (2000) shows the prevalence of nutritional stunting among under age five children in India as 47% which is among the<br />
highest in world, wasting as 16% and underweight problem as 46%. NFHS-2 Jammu and Kashmir reported 35% as underweight, 12%<br />
as wasted and 39% stunted in the age group less than three years.<br />
TABLE 3: INFLUENCE OF FEEDING PRACTICES ON WEIGHT OF INFANTS<br />
Feeding Practices<br />
Under weight<br />
Normal<br />
Type of first feed given<br />
after birth<br />
Prelacteal feed 181(21.2) 672(78.8)ns<br />
Breast milk 95(21.6) 345(78.4)<br />
Exclusive breast 0-6months 72(17.3) 345(82.7)<br />
**<br />
>=6 months 72(32.7) 148(67.3)<br />
Colostrums<br />
Fed 197(19.2) 831(80.8)<br />
**<br />
Not fed 79(29.8) 186(70.2)<br />
Initiation of top milk ns 0-3months 62(21.0) 233(70.0)<br />
4-6 months 20(19.8) 81(80.2)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 26<br />
ISSN 2250-3153<br />
Type of top milk<br />
ns<br />
Weaning<br />
**<br />
Type of first semi solid<br />
ns<br />
>6months 73(24.5) 225(75.5)<br />
Commercial 62(22.8) 210(77.2)<br />
Animal 93(22.0) 329(78.0)<br />
Early 23(15.4) 126(84.6)<br />
Timely 34(21.3) 126(78.8)<br />
Late 71(34.9) 137(65.9)<br />
Commercial 40(18.8) 173(81.2)<br />
Home made 88(28.9) 216(71.1)<br />
** Association is found highly significant (p6months 47(15.8) 251(84.2)<br />
commercial 41(15.1) 231(84.9)<br />
animal 63(14.9) 359(85.1)<br />
early 11(07.4) 138(92.6)<br />
timely 15(9.4) 145(90.6)<br />
late 54(26.0) 154(74.0)<br />
Type of first semi solid ns commercial 26(12.2) 187(87.8)<br />
Home made 54(17.8) 250(82.2)<br />
** Association is found highly significant (p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 27<br />
ISSN 2250-3153<br />
TABLE 5: INFLUENCE OF FEEDING PRACTICES ON HEIGHT FOR AGE<br />
Feeding practices<br />
Type of first feed given after<br />
birth<br />
Ns<br />
Exclusive breast<br />
**<br />
Colostrums<br />
Ns<br />
Initiation of top milk<br />
Ns<br />
Type of top milk<br />
Ns<br />
Weaning<br />
**<br />
Stunted<br />
Normal<br />
Prelacteal feed 122(14.3) 731(85.7)<br />
Breast milk 79(18.0) 361(82.0)<br />
0-6months 39(09.4) 378(90.6)<br />
> =6 months 66(30.0) 154(70.0)<br />
Fed 154(15.0) 874(85.0)<br />
Not fed 47(17.7) 218(82.3)<br />
0-3months 46(15.6) 249(84.4)<br />
4-6 months 07(06.9) 94(93.1)<br />
>6months 63(21.1) 235(78.9)<br />
Commercial 45(16.5) 227(83.5)<br />
Animal 71(16.8) 351(83.2)<br />
Early 22(14.8) 127(85.2)<br />
Timely 24(15.0 136(85.0)<br />
Late 65(31.3) 143(68.0)<br />
Type of first semi solid* Commercial 32(15.0) 181(65.0)<br />
Home made 79(26.0) 225(74.0)<br />
**Association is found highly significant (p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 28<br />
ISSN 2250-3153<br />
Lesser percentage of stunting was observed when Children were exclusively breast fed at
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 29<br />
ISSN 2250-3153<br />
of commercial infant foods. Scientific report No.4 Nutrition foundation of<br />
India.<br />
[5] Jones, G; Steketee, R.W; Blake, R.E. et al (2003). Child survival study,<br />
Lancet, 362. July 5, 65-71.<br />
[6] Jelliffe DB. (1966). the Assessment of Nutritional Status of the<br />
Community, Monograph Series No. 53, World Health Organization<br />
Geneva: 10<br />
[7] National Family Health Survey; (NFHS-2) Jammu and Kashmir (1998-99),<br />
International Institute for Population Sciences, Mumbai,<br />
[8] International Institute for Population Sciences (IIPS). 1995. National<br />
Family Health Survey (MCH and Family Planning), India 1992-93.<br />
Bombay: IIPS.<br />
[9] WHO/ UNICEF; (2000); protecting promoting and supporting<br />
breastfeeding. The special role of maternity services. Joint WHO/UNICEF<br />
statement WHO Geneva.<br />
[10] Victoria C.G. Vanghan P.J. (1984) prolonged breastfeeding associated with<br />
malnutrition Am J. Clin Nutr. 39: 307.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 30<br />
ISSN 2250-3153<br />
The Correlational Study of the Vertical Jump Test and<br />
Wingate Cycle Test as a Method to Assess Anaerobic<br />
Power in High School Basketball Players<br />
Abstract- Basketball is a prime example of a sport that<br />
predominantly utilizes anaerobic metabolism. The Wingate cycle<br />
and vertical jump tests have been used to assess anaerobic power<br />
in athletes for the purpose of providing information of anaerobic<br />
performance in a given sports. The lack of research in the field of<br />
more sport specific tests to assess anaerobic performance has<br />
lead to the development of the present proposed investigation.<br />
Aims & Objectives: A study to correlate the vertical jump test<br />
and wingate cycle test as a method to assess anaerobic power in<br />
high school basketball players.<br />
Materials & Methods: A correlational study was conducted on<br />
100 high school basketball players between the age group of 14-<br />
18 years (15.6000 ± 1.14286 (SD)) was included from various<br />
sprts institutes of Rajkot. Subjects were selected by simple<br />
random sampling techniques. On the first day, anthropometric<br />
measurements and the vertical jump test were performed. Peak<br />
and mean anaerobic power were determined using equations<br />
based on each subject‘s individual vertical jump height in<br />
centimeters (cm), body mass in kilograms (kg), and height in<br />
centimeters (cm). On the second day, the subjects were<br />
performed the 30-second Wingate cycle ergometer test. Peak and<br />
mean anaerobic power over the 30-seconds, were calculated by a<br />
computer program during the test.<br />
Results: Data were analyzed by Pearson Correlation coefficient<br />
which showed significant positive correlation between average<br />
power (r = 0.970, p > 0.05) & peak power of vertical jump test<br />
and Wingate test (r = 0.263, p > 0.05), demonstrating the validity<br />
of the vertical jump as a field test of anaerobic power.<br />
Conclusion: The result suggested that vertical jump tests may be<br />
accept as field measures of anaerobic power in high school<br />
basketball players.<br />
Keywords- Vertical jump test, Wingate cycle test, Anaerobic<br />
power<br />
A<br />
I. INTRODUCTION<br />
naerobic power, or anaerobic fitness, represents a local<br />
characteristic of a muscle that exists independent of blood<br />
and oxygen supply to that muscle. 1 It is the ability of the body‘s<br />
musculature to generate significant amounts of power is<br />
considered to be a strong predictor of athletic success. 2 Currently<br />
anaerobic power tests are implemented in both clinical and field<br />
settings and assess an athlete‘s capability to produce both power<br />
Purvi K. Changela, Sarla Bhatt<br />
Shri K K Sheth Physiotherapy College, Rajkot, India<br />
Email: changelapurvi@gmail.com<br />
and speed in a short period of time or over a relatively short<br />
distance. 3<br />
Basketball is a sport that mainly utilizes anaerobic<br />
metabolism 4 that would benefit from anaerobic testing<br />
procedures which incorporate sport specific movements.<br />
Functional movements, such as jumping and sprinting, are<br />
significantly related to playing time and performance in<br />
basketball. 3,4 Therefore, it seems logical that testing procedures<br />
that incorporate anaerobic power and sports specific movements<br />
would provide a valuable tool to assess and monitor components<br />
of basketball performance. 3<br />
To date, numerous tests have been used in an attempt to<br />
successfully measure anaerobic power and output in basketball<br />
players, however no particular test has gained acceptance as a<br />
standard measure of anaerobic power in basketball players. 3 The<br />
Wingate cycle and vertical jump tests have been commonly used<br />
tests to assess anaerobic power in athletes for the purpose of<br />
providing vital information regarding anaerobic performance of<br />
athletes in a given sports. 5,6<br />
The Wingate anaerobic test on a cycle ergometer has been<br />
used in laboratory settings both as an assessment of anaerobic<br />
performance and as a means to analyze physiological responses<br />
to supramaximal exercise. 6 The test was designed to be simple to<br />
administer; non-invasive; intended to measure muscle<br />
performance; 6 safe to assume that peak power which is a<br />
reflection of the ability of either the arms or the legs to produce<br />
high amounts of mechanical power and mean power reflects the<br />
endurance of the muscle groups involved in the test, 3 but the<br />
major drawback of it is expensive method and require equipment<br />
which is not feasible for administration to a wide variety of<br />
population.<br />
The most common field test which is used is the vertical jump<br />
test to evaluate anaerobic fitness improvements. It has been<br />
stated the vertical jump test is a more true power test used to<br />
measure both vertical jumping distance and power output. 3 The<br />
height that is achieved on the vertical jump has a direct<br />
correlation with the amount of force that is produced by muscle<br />
fibers. 7 During the vertical jump, total jump height and peak<br />
power can be measured and the mechanical work performed to<br />
accomplish the jump could be determined by using the distance<br />
that was measured. 5 Compare to wingate cycle ergometer test,<br />
this test is inexpensive, easy to aseess and equipment is also not<br />
needed, so we can easily use it as a field test.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 31<br />
ISSN 2250-3153<br />
There exists conflicting opinions on the nature of<br />
contributions of various energy systems used in anaerobic power<br />
tests. 3 During a vertical jump test, power output required to<br />
attain maximal jump height and complete a single test is reached<br />
between one and two seconds which suggests that only the ATP-<br />
PC energy system is utilized since the test duration is so short. 8,9<br />
However, the Wingate anaerobic cycle test requires contributions<br />
was estimated to be 84% from all of the three main energy<br />
systems. 3<br />
Despite the introduction of the previously mentioned<br />
anaerobic power tests, research in the area of anaerobic<br />
performance is still lacking. A prevailing lack of interest in<br />
anaerobic performance as a component of health and fitness has<br />
led to the development of anaerobic tests used today. 3 Even<br />
today, health professionals and fitness appraisers exclusively<br />
associate physical fitness and work capacity with only aerobic<br />
fitness. Reasons associated with a lack of interest in measuring<br />
anaerobic power to assess fitness levels can be the lack of<br />
motivation of subjects, use of suboptimal resistance when<br />
calculating power output, measuring mean power rather than<br />
peak power, and the limitation of exercise equipment. 10<br />
Assessment of anaerobic power by various tests are frequent in<br />
the literatures, however, to date there has been no single test<br />
recognized as both a general indicator of anaerobic power as well<br />
as sport-specific in nature that has lead to the development of the<br />
present proposed investigation.<br />
II. METHODOLOGY<br />
Study design: Correlational study design<br />
Sampling Technique: Simple Random Sampling<br />
Sample collection: 100 high school basketball players between<br />
the age group of 14-18 years15.6000 ± 1.14286 (SD)) were<br />
included.<br />
Study Setting: Various Sports academic institute of Rajkot.<br />
Inclusion Criteria:<br />
1. Age 14-20 years.<br />
2. Healthy male and female high school basketball players.<br />
3. Subjects with regular participation of more than 2 hours<br />
a day, 3 days per week.<br />
Exclusion Criteria:<br />
1. History of any cardiovascular, musculoskeletal,<br />
neurological problem.<br />
2. History of smoking.<br />
3. Subjects with regular participation in any athletic<br />
activity<br />
4. Anemia.<br />
5. History of metabolic disorders.<br />
6. Uncooperative subjects<br />
Materials used:<br />
1. Monark Cycle (894 E)<br />
2. Weighing machine<br />
3. Wall<br />
4. Chalk<br />
5. Inch tape<br />
6. Paper and Pen<br />
III. TESTING PROCEDURE<br />
The proposed title and procedure were being approved by<br />
ethical committee members. The potential risk and benefits, as<br />
well as the underlying rationale for the investigation, were<br />
explained to 100 high school Basketball players, written consent<br />
was taken from subjects who fulfilled the inclusion and exclusion<br />
criteria and they were randomly selected.<br />
All the pariticipants had to undergo 2 days of study<br />
investigation. On the 1 st day, participants were given overview of<br />
the study. All the participants then were given opportunity to ask<br />
the question about the test that they would be performing.<br />
Anthropometric data that includes weight (kg), height (cms) and<br />
BMI were taken and the Verticle Jump Test were asked to<br />
perform. On Day 2, Wingate cycle ergometer test were done on<br />
the participants.<br />
The procedures of the Verticle Jump Test and Wingate Cycle<br />
Ergometer Test were performed as follows:<br />
PROCEDURE:<br />
Day 1: Vertical Jump Test: 9<br />
Prior to the vertical jump test, the subjects were lead<br />
through an 8-10 minute dynamic warm-up which consisted of<br />
squats, lunges, quad stretches and 20, 30, and 40 yard<br />
progressive jogging exercises. The player chalks the end of her<br />
finger tips and stands side onto the wall, keeping both feet<br />
remaining on the ground, reached up as high as possible with one<br />
hand and marked the wall with the tips of the fingers (M1) The<br />
player from a static position jumped as high as possible and<br />
marked the wall with the chalk on her fingers (M2). The therapist<br />
measured and record the distance between M1 and M2.The<br />
player repeated the test 3 times. The therapist recorded the best<br />
of the 3 distance and used this value to assess the player‘s<br />
performance.<br />
Powerpeak (W) = [78.6 · VJ (cm)] + [60.3 · BM (kg)] –[15.3 ·<br />
ht (cm)] -1,308<br />
Poweravg (W) = [43.8 · VJ (cm)] + [32.7 · BM (kg)] –[16.8 ·<br />
ht (cm)] + 431<br />
Where: VJ = Vertical Jump BM = Body Mass<br />
(Weight) ht = Height<br />
Day 2: Wingate cycle ergometer test: 3<br />
This test required the player cycle as fast as possible for<br />
30 seconds. The therapist weighs the player (kg). The player<br />
warm up for 10 minutes. The therapist recorded the flywheel<br />
resistance required as follows:<br />
Player‘s weight x 0.08.<br />
The therapist gave the command ―GO‖ and starts the<br />
stopwatch and the player pedals as fast as possible with no<br />
flywheel resistance. After maximum rpm had reached, flywheel<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 32<br />
ISSN 2250-3153<br />
resistance was applied and the player continued to pedal as fast<br />
as possible until 30 seconds has elapsed.After 30 seconds the<br />
player was aked to stop pedalling. Peak power and mean power<br />
were calculated by using computarized softwear.<br />
Outcome Measure:<br />
1. Peak Anaerobic Power<br />
2. Mean Anaerobiv Power<br />
IV. DATA ANALYSIS<br />
Data were analyzed by Pearson Correlation Coefficient to<br />
show the correlation between average power & peak power of<br />
vertical jump test and Wingate cycle test to measure the anerobic<br />
power in high school athletes at ≤ 0.05 with Cl of 95%<br />
V. RESULTS<br />
Table 1: Distribution of age groups<br />
Frequency Percent<br />
Cumulative<br />
Percent<br />
14 10 20.0 20.0<br />
15 14 28.0 48.0<br />
16 14 28.0 76.0<br />
17 10 20.0 96.0<br />
18 2 4.0 100.0<br />
Total 50 100.0<br />
Table 2: Gender Proposition<br />
Frequency Percent<br />
male 27 54.0<br />
female 23 46.0<br />
Total 50 100.0<br />
Table 3: Correlation of average power of vertical jump test & wingate cycle test in high school basketball players.<br />
Pearson<br />
Correlation<br />
Sig (2-tailed)<br />
Pearson<br />
Correlation<br />
Sig. (2-tailed)<br />
Mean<br />
668.0200<br />
SD N Verticle jump test<br />
mean power<br />
231.15314<br />
50 1<br />
394.7080<br />
43.23900<br />
50<br />
0.031<br />
0.833<br />
Wingate<br />
power<br />
0.031<br />
0.833<br />
cycle mean<br />
1<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 33<br />
ISSN 2250-3153<br />
Table 4: Correlation of peak power of vertical jump test & wingate cycle test in high school basketball players.<br />
Pearson<br />
Correlation<br />
Sig (2-tailed)<br />
Pearson<br />
Correlation<br />
Sig. (2-<br />
tailed)<br />
Mean SD<br />
773.7200 221.65951<br />
447.5940 65.82322<br />
N<br />
50<br />
50<br />
Verticle jump<br />
test mean<br />
power<br />
1<br />
Wingate cycle mean<br />
power<br />
The above table shows there was a positive correlation between the two variables i.e. average power (r = 0.031, p > 0.05) and & peak<br />
power (r = 0.044, p > 0.05) of vertical jump test and Wingate cycle test, demonstrating the validity of the vertical jump test as a field<br />
test of anaerobic power in high school athletes.<br />
0.044<br />
0.759<br />
0.044<br />
0.759<br />
Graph 1: Correlation of average power of vertical jump test & wingate cycle test in high school basketball players.<br />
Graph 2: Correlation of average power of vertical jump test & wingate cycle test in high school basketball players.<br />
1<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 34<br />
ISSN 2250-3153<br />
VI. DISCUSSION<br />
The results of the present study indicated that there was a<br />
positive correlation between the average power (r = 0.031, p ><br />
0.05) & peak power (r = 0.044, p > 0.05) of vertical jump test<br />
and Wingate cycle test, thereby supporting the experimental<br />
hypothesis.<br />
Vertical Jump and Wingate anaerobic power tests rely<br />
heavily on ATP/PC energy system contributions to<br />
produce/sustain maximal anaerobic power. Also, weight had a<br />
considerable impact on performance on these two tests. The<br />
heavier subjects in the current investigation had higher anaerobic<br />
power outputs on both the Vertical Jump and Wingate tests.<br />
Previously, the vertical jump and Wingate power tests have been<br />
administered to athletes and recreationally active individuals to<br />
assess anaerobic contributions, and are considered relatively<br />
valid and reliable as suggested in the literatures. 3<br />
The results of this study appear consistent with other studies<br />
examining power performance in both a jump test and the<br />
WAnT. The moderate correlations observed (r= 0.031 and r =<br />
0.044 ) in both peak and mean power, respectively between these<br />
2 modes of anaerobic power assessments were greater than that<br />
recently reported by Hoffman et al., 11 but less than that<br />
previously reported by Bosco et al.. 12 The differences between<br />
these studies are not easily explainable.However, in the study<br />
conducted by Hoffman et al., the subjects were elite-level<br />
basketball players. Considering that the jumping test is a more<br />
specific anaerobic power test for these athletes, their ability to<br />
generate power may be quite different when using other modes<br />
of assessment. Perhaps in a more diverse subject population, as<br />
seen in this present study and that of Bosco et al, the less specific<br />
the test is to the subject group the stronger the correlation<br />
between 2 different modes of assessment.<br />
The differences between these modes of anaerobic power<br />
assessment (cycling vs. jumping) may also relate to the<br />
significant differences observed in power outputs between these<br />
tests. By recruiting a greater muscle mass (both legs acting<br />
simultaneously and the inclusion of upper-body musculature), the<br />
jump tests appears to result in a significantly greater power<br />
expression. This is consistent with several studies examining<br />
power performance using different modes of assessment. 11,12 In<br />
addition, the greater power outputs observed in the jumping test<br />
may also be related to a greater recovery of mechanical energy<br />
that is stored in the elastic elements of the body during the<br />
countermovement.<br />
The present study used equations developed by Johnson and<br />
Bahamonde (1996) to predict vertical jump power in watts (W)<br />
from height, mass, and vertical jump height. When performing<br />
the tests, the subjects with greater heights and/or weights<br />
exhibited an ability to generate greater power outputs.This<br />
suggests that individuals taller and/or heavier would be predicted<br />
to a have higher anaerobic power output shows increased<br />
dependency of anthropometric variables (especially body weight)<br />
in the determination of anaerobic power in the tests. 9<br />
The limited ability to predict basketball performance from<br />
tests of anaerobic power is an indication that other variables are<br />
responsible for success on the basketball court. Basketball<br />
performance may be better predicted if the anaerobic tests mimic<br />
sport-specific movements and skills. Tests that incorporate<br />
jumping, sprinting speed, agility, muscular strength and<br />
endurance, and hand-eye coordination would provide a valuable<br />
tool to assess and monitor basketball performance. 3<br />
VII. CONCLUSION<br />
The result suggested that vertical jump tests may be accept as<br />
a field measures of anaerobic power in high school female<br />
basketball players.<br />
LIMITATION AND FURTHER RECOMMENDATION<br />
The sample size was small for the study. Verbal<br />
encouragement can be administered by all people monitoring the<br />
testing procedures will give false positive result. Fatigue could<br />
have been limiting factors since test were performed. We can<br />
recreate the current investigation using a larger sample size with<br />
female athletic populations in Anaerobic Power tests.<br />
Comparison of anaerobic power test can be done with result of a<br />
similar age, gender, and anthropometric measurements can be<br />
done.<br />
ACKNOWLEDGMENT<br />
I wish to express my thanks to respectable Principal of the<br />
institute Dr Sarla Bhatt & Milin Nandani, student of MPT for<br />
their kind support and guidance in making the research easy and<br />
providing all the help in completion of the research and all my<br />
colleagues and students for their valuable suggestions. Last but<br />
not least I would like to thank all participants for their<br />
contribution in the present study.<br />
REFERENCES<br />
[1] Fleck, S.J., and Kraemer, W.J. Designing Resistence Training Programs,<br />
2nd ed. Champaign,IL: Human Kinetics, 1997.<br />
[2] Bompa, T.O. Periodization of Strength. Toronto, Ontario: Veritas<br />
Publishing Inc, 1993.<br />
[3] Stauffer KA. The comparison of the Max Jones Quadrathlon With the<br />
verticle jump and Wingate Cycle Tests as a method to access anaerobic<br />
power in female Division I College Basketball Players. University of<br />
Pittsburgh 2005.<br />
[4] Hoffman JR., Epstein S., Einbinder M., and Weinstein Y. The Influence of<br />
Aerobic Capacity on Anaerobic Performance and Recovery Indices in<br />
Basketball Players. Journal of Strength and Conditioning Research,1999;<br />
13(4), 407-11.<br />
[5] Adams, G.M. Exercise Physiology Laboratory Manual, 3rd ed. Boston,<br />
MA: McGraw- Hill, 1998.<br />
[6] Inbar, O., Bar-Or, O., and Skinner, J.S. The Wingate Anaerobic Test.<br />
Champaign, IL: Human Kinetics, 1996.<br />
[7] Tom Evans. The Effects of Static Stretching on Vertical Jump<br />
Performance. Thesis submitted toThe Graduate College of Marshall<br />
UniversityIn partial fulfillment of the Requirements for the Degree of<br />
Master of Science in Health and Physical Education. Marshall University,<br />
May 2006.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 35<br />
ISSN 2250-3153<br />
[8] Harman, E.A., Rosenstein, M.T., Frykman, P.N., Rosenstein, R.M., and<br />
Kraemer, W.J.. Estimation of Human Power Output From Vertical Jump.<br />
Journal of Applied Sport Science Research, 1991; 5(3), 116-20.<br />
[9] Johnson DL and Bahamonde R.. Power Output Estimate in University<br />
Athletes. Journal of strength and Conditioning Research, 1996 ; 10(3), 161-<br />
66.<br />
[10] Brooks, G.A., Fahey, T.D., White, T.P., and Baldwin, K.M. Exercise<br />
Physiology:Human Bioenergetics and its Applications, 3rd ed. Mountain<br />
View, CA: Mayfield Publishing<br />
Company, 2000.<br />
[11] Hoffman, J.R., S. Epstein, M. Einbinder & Y. Weinstein. A comparison<br />
between the Wingate anaerobic power test to both vertical jump and line<br />
drill tests in basketball players. J. Strength Cond. Res. 2000 : 14:261–64.<br />
[12] Bosco, C., P. Luhtanen & P.V. Komi. A simple method for measurement<br />
of mechanical power in jumping. Eur. J. Appl. Physiol. 1983 ; 50:273–82.<br />
First Author – Purvi K. Changela, Lecturer, Shri K K Sheth<br />
Physiotherapy College, Rajkot<br />
Second Author – Sarla Bhatt, Principle, Shri K K Sheth<br />
Physiotherapy College, Rajkot<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 36<br />
ISSN 2250-3153<br />
SQL Server Query Optimization Techniques - Tips for<br />
Writing Efficient and Faster Queries<br />
Abstract- SQL statements can be used to retrieve data from<br />
the any database. To get same results we need to write different<br />
SQL queries. For better performance we need to use best, faster<br />
and efficient queries. So we need SQL query tuning based on the<br />
business and user requirements. This paper covers how these<br />
SQL queries can be optimized for better performance. Query<br />
optimization subject is very deep but we will try to cover the<br />
most important points. In this paper I am not focusing on, indepth<br />
analysis of database but simple query tuning tips & tricks<br />
which can be applied to gain immediate performance gain.<br />
T<br />
I. INTRODUCTION<br />
he best way to tune performance is to try to write your<br />
queries in a number of different ways and compare their<br />
reads and execution plans. Here are various techniques that you<br />
can use to try to optimize your database queries. Query<br />
optimization is an important skill for SQL developers and<br />
database administrators (DBAs). In order to improve the<br />
performance of SQL queries, developers and DBAs need to<br />
understand the query optimizer and the techniques it uses to<br />
select an access path and prepare a query execution plan. Query<br />
tuning involves knowledge of techniques such as cost-based and<br />
heuristic-based optimizers, plus the tools an SQL platform<br />
provides for explaining a query execution plan.<br />
II. QUERY PERFORMANCE OVERVIEW USING<br />
STATISTICS IO<br />
There are different ways to determine the best way to write<br />
queries. Two of common methods are looking at the number of<br />
logical reads produced by the query and looking at graphical<br />
execution plans provided by SQL Server Management Studio.<br />
For determining the number of logical reads, you can turn the<br />
STATISTICS IO option ON. Consider this query:<br />
SET STATISTICS IO ON<br />
SELECT * FROM tablename<br />
The following is returned in the Messages window in SQL<br />
Server Management Studio:<br />
Table ‗tablename‘. Scan count 1, logical reads 33, physical reads<br />
0, read-ahead reads 0, lob logical reads 0, lob physical reads 0,<br />
lob read-ahead reads 0.<br />
There are several bits of data returned by STATISTICS IO, but<br />
we are concerned with the logical reads portion because it will<br />
tell us the number of pages read from the data cache. This is the<br />
most helpful because it will stay constant when I run the same<br />
Navita Kumari<br />
Innovation Centre - Baba Farid Group of Institutions<br />
query, which is important because there are sometimes external<br />
factors that might vary the execution time of my queries, such as<br />
locking by other queries. When tuning SQL queries, our goal<br />
should be to get the number of logical reads as low as possible.<br />
As fewer logical reads typically lead to faster execution times.<br />
III. GENERAL TIPS FOR QUERY OPTIMIZATION<br />
Specific Column Names instead of * in SELECT Query<br />
The SQL query becomes faster if you use the actual columns<br />
names in SELECT statement instead of than '*'. So we need to<br />
restrict the queries result set by selecting only the particular<br />
columns from the table, rather than all columns from a particular<br />
table. This results in performance benefits, as SQL Server will<br />
return only particular columns to the client, not all columns of a<br />
table. This will help reduce the network traffic and also boost the<br />
overall performance of the query.<br />
Example: Write the query as<br />
SELECT col_1, col_2, col_3, col_4, subject FROM<br />
table_name;<br />
Instead of:<br />
SELECT * FROM table_name;<br />
Alternatives of COUNT (*) for returning total tables row count<br />
If we need to return the table's row count, we can use alternative<br />
ways instead of the SELECT COUNT (*) statement. As<br />
SELECT COUNT (*) statement makes a full table scan to return<br />
the table's row count, it can take much time for the large tables.<br />
There is another way to determine the total row count of a table.<br />
We can use sysindexes system table. There is a ROWS column in<br />
the sysindexes table. This ROWS column contains the total row<br />
count for each table in a particular database. So, we can use the<br />
following select statement instead of ―SELECT COUNT (*):<br />
SELECT rows FROM sysindexes WHERE id = OBJECT_ID<br />
('table_name') AND indid < 2‖. So we can improve the speed of<br />
such queries thus resulting in better performance.<br />
Try to avoid HAVING Clause in Select statements<br />
HAVING clause is used to filter the rows after all the rows are<br />
selected and is used like a filter. Try not to use HAVING clause<br />
for any other purposes.<br />
For Example: Write the query as<br />
SELECT Col_1, count (Col_1)<br />
FROM table_name<br />
WHERE col_1!= ‗testvalue1‘<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 37<br />
ISSN 2250-3153<br />
AND col_1!= ‗testvalue1‘<br />
GROUP BY col_1;<br />
Instead of:<br />
SELECT Col_1, count (Col_1)<br />
FROM table_name<br />
GROUP BY Col_1<br />
HAVING Col_1!= ‗testvalue1‘ AND Col_1!= ‗testvalue2‘;<br />
Try to minimize number of sub query blocks within a query<br />
Sometimes we may have more than one sub query in our main<br />
query. We should try to minimize the number of sub query block<br />
in our query.<br />
For Example: Write the query as<br />
SELECT col_1<br />
FROM table_name1<br />
WHERE (col_2, col_3) = (SELECT MAX (col_2), MAX<br />
(col_3)<br />
FROM table_name2)<br />
AND col_4 = ‗testvalue1‘;<br />
Instead of:<br />
SELECT col_1<br />
FROM table_name1<br />
WHERE col_2 = (SELECT MAX (col_2) FROM<br />
table_name2)<br />
AND col_3 = (SELECT MAX (col_3) FROM table_name2)<br />
AND col_4 = ‗testvalue1‘;<br />
Try to use operators like EXISTS, IN and JOINS appropriately<br />
in your query<br />
a) Usually IN has the slowest performance.<br />
b) IN is efficient, only when most of the filter criteria<br />
for selection are placed in the sub-query of a SQL<br />
statement.<br />
c) EXISTS is efficient when most of the filter criteria<br />
for selection is in the main query of a SQL statement.<br />
For Example: Write the query as<br />
SELECT * FROM table1 t1<br />
WHERE EXISTS (SELECT * FROM table2 t2 WHERE<br />
t2.col_id = t1.col_id)<br />
Instead of:<br />
SELECT * FROM table1 t1<br />
WHERE t1.col_id IN (SELECT t2.col_id FROM table2 t2)<br />
Use EXISTS instead of DISTINCT when using table joins that<br />
involves tables having one-to-many relationships.<br />
For Example: Write the query as<br />
SELECT d.col_id, d.col2<br />
FROM table1 d<br />
WHERE EXISTS (SELECT 'X' FROM table2 e WHERE<br />
e.col2 = d.col2);<br />
Instead of:<br />
SELECT DISTINCT d.col_id, d.col2<br />
FROM table1 d, table2 e<br />
WHERE e.col2 = e.col2;<br />
Try to use UNION ALL instead of UNION, whenever possible.<br />
The UNION ALL statement is faster than UNION, because<br />
UNION ALL statement does not consider duplicate s, and<br />
UNION statement does look for duplicates in a table while<br />
selection of rows, whether or not they exist.<br />
For Example: Write the query as<br />
SELECT id, col1<br />
FROM table1<br />
UNION ALL<br />
SELECT id, col1<br />
FROM table2;<br />
Instead of:<br />
SELECT id, col1, col2<br />
FROM table1<br />
UNION<br />
SELECT id, col1<br />
FROM table2;<br />
We should try to carefully use conditions in WHERE<br />
clause.<br />
For Example: Write the query as<br />
SELECT id, col1, col2 FROM table WHERE col2 > 10;<br />
Instead of:<br />
SELECT id, col1, col2 FROM table WHERE col2 != 10;<br />
Write the query as<br />
SELECT id, col1, col2<br />
FROM table<br />
WHERE col1 LIKE 'Nav%';<br />
Instead of:<br />
SELECT id, col1, col2<br />
FROM table<br />
WHERE SUBSTR(col1,1,3) = 'Nav';<br />
Write the query as<br />
SELECT Col1, Col2<br />
FROM table<br />
WHERE Col3 BETWEEN MAX (Col3) and MIN (Col3)<br />
Instead of:<br />
SELECT Col1, Col2<br />
FROM table<br />
WHERE Col3 >= MAX (Col3)<br />
and Col3
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 38<br />
ISSN 2250-3153<br />
SELECT id, Col1, Col2<br />
FROM table<br />
WHERE Col2 < 25000;<br />
Instead of:<br />
SELECT id, Col1, Col2<br />
FROM Table<br />
WHERE Col2 + 10000 < 35000;<br />
IV. SOME MORE TIPS FOR OPTIMIZATION OF<br />
QUERIES/ TABLES/ STORED PROCEDURES IN<br />
SQL SERVER<br />
a. Table should have minimum of one clustered<br />
index and appropriate number of non clustered<br />
indexes, which should be created on columns<br />
of table based on query which is running<br />
following the priority order as WHERE<br />
clause, then JOIN clause, then ORDER BY<br />
clause and finally the SELECT clause.<br />
b. Avoid using Triggers if possible; incorporate<br />
the logic of trigger in a stored procedure.<br />
c. Table should have a primary key.<br />
d. Try to use constraints for selection instead of<br />
using triggers, whenever possible. Constraints<br />
are efficient than triggers enhance<br />
performance. So, you should use constraints<br />
instead of triggers, whenever possible.<br />
e. Try to use table variables instead of temporary<br />
tables as table variables require less locking<br />
resources as well as less logging resources than<br />
the temporary tables, so table variables should<br />
be used whenever possible.<br />
f. Avoid the use of views or replace views with<br />
original tables.<br />
g. Try to avoid the use of DISTINCT clause,<br />
where ever possible. As the DISTINCT clause<br />
will result in performance degradation, we<br />
should use this clause only when it is necessary<br />
or unavoidable.<br />
h. Try to add SET NOCOUNT ON statement into<br />
your stored procedures as it stops the message<br />
indicating the number of rows affected by a<br />
SQL statement.<br />
It also reduces network traffic, because our<br />
client will not receive any message indicating<br />
the number of rows affected by a SQL<br />
statement.<br />
i. Try to use TOP keyword or the SET<br />
ROWCOUNT statement in the select<br />
statements, if we need to return only the first n<br />
rows. This can improve performance of our<br />
queries, as the smaller result set will be<br />
returned. It can also reduce the traffic between<br />
the server and the clients.<br />
j. Try to use user-defined functions to keep the<br />
encapsulated code for reuse in future.<br />
The user-defined functions (UDFs) contain one<br />
or more SQL statements that can be used to<br />
encapsulate code for reuse. Using UDFs can<br />
also reduce the network traffic.<br />
k. If possible move the logic of UDF to SP as<br />
well.<br />
l. If you need to delete all rows of a table, try to<br />
use TRUNCATE TABLE command instead of<br />
DELETE command. Using the TRUNCATE<br />
TABLE is a faster way to delete all rows of a<br />
tables, because it removes all rows from a table<br />
without logging each row delete.<br />
m. Remove any unnecessary joins from tables.<br />
n. If there is cursor used in query, see if there is<br />
any other way to avoid the usage of this (either<br />
by SELECT … INTO or INSERT … INTO,<br />
etc).<br />
Try to avoid using cursors whenever possible.<br />
As SQL Server cursors can result in some<br />
performance degradation as compared to select<br />
statements. Try to use correlated sub-queries or<br />
derived tables for row-by-row operations on<br />
tables.<br />
o. When writing a sub-query (a SELECT<br />
statement within the WHERE or HAVING<br />
clause of another SQL statement):<br />
1. Try to use a correlated (refers<br />
to at least one value from the<br />
outer query) sub-query when<br />
the return is relatively small<br />
and/or other criteria are<br />
efficient i.e. if the tables<br />
within the sub-query have<br />
efficient indexes.<br />
2. Try to use a non-correlated<br />
(does not refer to the outer<br />
query) sub-query when<br />
dealing with large tables<br />
from which you expect a<br />
large return (many rows)<br />
and/or if the tables within the<br />
sub-query do not have<br />
efficient indexes.<br />
3. Ensure that multiple subqueries<br />
are in the most<br />
efficient order.<br />
4. Remember that rewriting a<br />
sub-query as a join can<br />
sometimes increase<br />
efficiency.<br />
p. Use char/varchar columns data type, instead of<br />
nchar/nvarchar data type if we do not need to<br />
store Unicode data. The char/varchar data<br />
value uses only one byte to store one character;<br />
whereas the nchar/nvarchar value uses two<br />
bytes to store one character, so the char/varchar<br />
columns use two times less space to store data<br />
as compared to nchar/nvarchar data columns.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 39<br />
ISSN 2250-3153<br />
q. Try to use stored procedures instead of heavy<br />
queries as they can reduce network traffic,<br />
because our client will send to server only<br />
stored procedure name (along with some<br />
parameters) instead of heavy and lengthy<br />
queries text. Stored procedures can be used to<br />
enhance security. For example, we can give<br />
different users, different set of permissions to<br />
execute the stored procedure to work with the<br />
restricted set of the columns and data.<br />
r. We should try to return an integer value from a<br />
RETURN statement instead of returning an<br />
integer value as a part of a record set. As the<br />
RETURN statement exits from a stored<br />
procedure unconditionally, so the statements<br />
following the RETURN statement are not<br />
executed. The RETURN statement is generally<br />
used for error checking, but we can also use<br />
this statement to return an integer value for any<br />
other reason. Using RETURN statement can<br />
improve performance as SQL Server will not<br />
create a record set.<br />
s. Try to drop indexes that are not being used.<br />
Because each index takes up disk space and<br />
slow the DML operations, we should drop<br />
indexes that are not used. We can use Index<br />
Wizard to identify indexes that are not being<br />
used in our SQL queries.<br />
t. We should try to create indexes on columns<br />
that have integer values rather than character<br />
values. Because the integer values have less<br />
size than the size of characters values, so we<br />
can reduce the number of index pages which<br />
are being used to store the index keys. This<br />
finally reduces the number of reads required to<br />
read the index and enhances the overall index<br />
performance.<br />
u. If we need to join several tables very<br />
frequently, then we should consider creating<br />
index on the joined columns which can<br />
significantly improve performance of the<br />
queries against the joined tables.<br />
v. Try to avoid any operations on the fields,<br />
where ever possible. Some operations will<br />
prevent the use of index on a field even if it<br />
exists—for example,<br />
ltrim(rtrim(FieldColumnName)) as such<br />
operations will degrade the performance. For<br />
example, instead of using the<br />
condition cast(DateColumn as varchar(20)) =<br />
@dateStr, we should try to convert @dateStr to<br />
an expression of datetime type and then<br />
compare it to DateColumn value.<br />
V. CONCLUSION<br />
Query optimization has a very big impact on the performance<br />
of a DBMS and it continuously evolves with new, more<br />
sophisticated optimization strategies. Query optimization is a<br />
common task performed by database administrators and<br />
application designers in order to tune the overall performance of<br />
the database system. Even if you have a powerful infrastructure,<br />
the performance can be significantly degraded by inefficient<br />
queries. So, we should try to follow the general tips as mentioned<br />
above to get a better performance of queries. Optimization can be<br />
achieved with some efforts if we make it a general practice to<br />
follow the rules. The techniques described in this paper allow<br />
basic optimization of queries, tables, indexes and stored<br />
procedures for performance gains. The main focus was on query<br />
optimizations.<br />
REFERENCES<br />
[1] Sunderi Dejan, Microsoft SQL Server 2005 Stored Procedure Programming<br />
in T-SQL & .NET, Third Edition, McGraw-Hill, 2006, ISBN:0072262281.<br />
[2] Dave Pinal, SQL SERVER – Optimization Rules of Thumb – Best Practices<br />
– Reader's Article. April 26, 2008.<br />
http://blog.sqlauthority.com/2008/04/26/sql-server-optimization-rules-ofthumb-best-practices-readers-article/<br />
[3] Andrei Volkov, SQL Server Optimization, http://msdn.microsoft.com/enus/library/aa964133(v=sql.90).aspx.<br />
[4] SQL Server 2005 Books <strong>Online</strong>, Introducing SQL Trace.<br />
http://technet.microsoft.com/en-us/library/ms191006.aspx.<br />
[5] SQL Server 2005 Books <strong>Online</strong>, Understanding plan forcing.<br />
http://msdn2.microsoft.com/en-us/library/ms186343.aspx.<br />
[6] SQL Tuning or SQL Optimization. http://beginner-sql-tutorial.com/sqlquery-tuning.htm<br />
[7] SQL Server Optimization Tips.<br />
http://santhoshgudise.weebly.com/uploads/8/5/4/7/8547208/sql_server_opti<br />
mization_tips-1.doc<br />
[8] Optimize MS SQL Server. http://omarabid.hubpages.com/hub/Optimize-<br />
MS-SQL-Server<br />
[9] SQL Spark. http://sqlspark.blogspot.in/2011/07/best-ways-to-write-sqlquery.html<br />
[10] MySQL Load Balancing PHP script. http://www.f1teksolutions.com/<br />
[11] What are the most common SQL Optimizations.<br />
http://stackoverflow.com/questions/1332778/what-are-your-most-commonsql-optimizations<br />
[12] Index Optimization Tips. http://www.mssqlcity.com/Tips/tipInd.htm<br />
[13] Review, Change, or Delete Transferred or Imported data.<br />
http://turbotax.intuit.com/support/iq/Import/Review--Change--or-Delete-<br />
Transferred-or-Imported-Data/GEN12079.html.<br />
AUTHORS<br />
Navita Kumari, M.C.A., Innovation Centre - Baba Farid Group<br />
of Institutions and navitakamra@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 40<br />
ISSN 2250-3153<br />
A Comparative Study on Concomitant of Order Statistics<br />
and Record Statistics for Weighted Inverse Gaussian<br />
Distribution<br />
Kishore K. Das*, Bhanita Das** and Bhupen K. Baruah***<br />
Abstract- A study on bivariate and trivariate weighted<br />
inverse Gaussian distribution (WIGD) using a specific concept of<br />
pseudo distribution has been attempted in this paper. Product<br />
moment of bivariate pseudo WIGD has been obtained.<br />
Distribution of -th concomitant of order statistics for the<br />
resulting distribution has been obtained with some ordering<br />
properties. An extension to bivariate concomitant for trivariate<br />
pseudo WIGD also has been discussed. Concomitant of second<br />
order upper record statistics and joint distribution of second and<br />
fourth order concomitant of upper record statistics for bivariate<br />
pseudo WIGD have been studied along with their properties.<br />
Numerical values of survival functions have been computed for<br />
comparison of concomitant of order statistics and record<br />
statistics. This study reveals that for both concomitant of order<br />
statistics and concomitant of second order upper record statistics<br />
for WIGD survival probability decreases as time increases for<br />
fixed values of the parameters and it increases for increasing<br />
value of shape parameter holding time and scale parameter as<br />
fixed.<br />
Index Terms- WIGD, Bivariate pseudo distribution,<br />
Concomitant, Order statistics, Record statistics.<br />
O<br />
*Department of Statistics, Gauhati University, Guwahati-781014, India<br />
***Department of Chemistry, Gauhati University, Guwahati-781014, India<br />
I. INTRODUCTION<br />
rder statistics and record statistics are used extensively in<br />
statistical models and inference and both describes random<br />
variables arranged in order of magnitude. Usually, the ordered<br />
values of independent and identically distributed (IID) samples<br />
arranged in ascending order of magnitude are known as order<br />
statistics (Aleem, 1998). The simplest and most important<br />
functions of order statistics is the sample cumulative distribution<br />
function (cdf) . Suppose are jointly<br />
distributed random variables then arranging the in increasing<br />
order of magnitude, are said to be smallest,<br />
second smallest and largest order statistics.<br />
**Corresponding Author<br />
Bhanita Das<br />
Department of Statistics<br />
Gauhati University, Guwahati-781014<br />
Assam, India<br />
Phone: +9108822233531(M); Fax: +91- 0361-2700288<br />
E-mail: bhanitadas83@gmail.com<br />
According to David, (1981) if is a random sample<br />
from a continuous population with probability density function<br />
(pdf) and cumulative distribution function (cdf) and<br />
are the order statistics obtained by arranging<br />
the random sample in increasing order of magnitude, then the<br />
probability density function (pdf) of -th order statistics<br />
is given by<br />
Study of bivariate order statistics motivated us to go for<br />
concomitant of order statistics. To develop order statistics, for<br />
bivariate and multivariate distributions, concomitant variables<br />
play a significant role and are used in situations where<br />
knowledge of initial values of a characteristic is important. The<br />
term concomitant of order statistics was first induced and applied<br />
extensively by David, (1973). According to Hanif, (2007) in<br />
collecting any data for an observation several characteristics are<br />
often recorded, some of them are considered as primary and<br />
others can be observed from the primary data automatically. The<br />
later one is called concomitant or going along with variables,<br />
explanatory variables or covariables. Suppose we have a random<br />
sample of size from an absolutely continuous bivariate<br />
population . For , let and be the order<br />
statistics of and sample values respectively, then the value<br />
associated with is called concomitant of the -th order<br />
statistics or an induced order statistics and is denoted by<br />
(Bhattacharya, 1974). The distribution of -th concomitant<br />
is given by David and Nagaraja, (2003) as<br />
where is the -th order statistics and is the<br />
conditional distribution. Shahbaz and Shahbaz, (2011) have<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 41<br />
ISSN 2250-3153<br />
extended the distribution of concomitant of order statistics to<br />
bivariate concomitant of order statistics when a random sample is<br />
available from trivariate distribution function .<br />
According to Shahbaz and Shahbaz, (2011) the distribution of<br />
bivariate concomitant is given as<br />
where is the conditional distribution.<br />
Literature review reported that concomitant of order statistics<br />
were studied for several bivariate pseudo distributions under<br />
assumption of identically and independently distributed (IID) or<br />
independent samples (Shahbaz et al., 2009b; Shahbaz and<br />
Ahamad, 2009a and Shahbaz and Shahbaz, 2010). The pseudo<br />
distributions are new induction to statistical probability<br />
distribution theory and the idea was developed by Filus and<br />
Filus, (2006) and concept is used by various authors to derive<br />
several bivariate distributions from the existing univariate<br />
distribution to measure the failure rate of reliability. These<br />
distributions have found applications in situations where standard<br />
probability distributions are not suitable. The general setup for<br />
the density function of bivariate pseudo distributions is given by<br />
Filus and Filus, (2006) as<br />
where is some function of random variable .<br />
Concomitant of record statistics is also a new branch of<br />
statistics with several applications to measure the failure rate of<br />
reliability (Chandler, 1952 and Ahsanullah, 2010). Concomitant<br />
of record statistics can arise in several applications. Suppose<br />
individuals are to be selected on the basis of measurement of an<br />
attribute (say income) whose high value is desirable. Suppose<br />
(say expenditure) is an associated attribute which is known to<br />
be correlated with . While is easy to measure, is not. So the<br />
individuals are first measured on the basis of their values and<br />
only those having value bigger (or smaller) than all previous<br />
observations on qualify to be measured for their values and<br />
sequence of values thus measured are concomitant of records.<br />
Many such examples arise in the real field where concomitant of<br />
records are useful.<br />
In many practical situations it has been found that the only<br />
available data are records. Record values are observations that<br />
exceed or fall below current extreme value on a sequence of<br />
random variables. Considering a sequence of pair wise r.v.'s<br />
when the experimenter is interested in studying just<br />
the sequence of records of the first component, the second<br />
component associated with a record value of the first one is<br />
termed as the concomitant of that record value (Amini and<br />
Ahmadi, 2005). Record values were first discussed by Chandler,<br />
(1952). Feller, (1966) has given some examples of record values<br />
in the context of gambling problems. Nevzorov, (1988)<br />
mentioned several applications of record values. Various<br />
distributional properties of upper record values have been found<br />
in Ahsanullah, (1995) and Nagaraja, (1988).<br />
For a random variable distribution of -th upper record,<br />
has been given by Ahsanullah, (1995) as<br />
Where and is the distribution<br />
function of .<br />
The joint distribution of -th and -th upper records,<br />
and has been obtained by Ahsanullah, (1995) using<br />
the following expression<br />
where .<br />
Ahsanullah, (1995) obtained the distribution of -th concomitant<br />
of upper record statistics as<br />
where is the distribution of -th upper record statistics<br />
given in equation (1.5). Ahsanullah, (1995) has also given joint<br />
distribution of concomitant of -th and -th upper record values<br />
as<br />
where is given in equation (1.6).<br />
According to David and Galambos, (1974); Balasubramanian and<br />
Beg, (1998) and Beg and Ahsanullah, (2008) concomitants of<br />
order statistics attracted a considerable amount of attention in the<br />
literature but concomitants of record statistics received<br />
comparatively little attention. Therefore, in this paper an attempt<br />
has been made to study concomitant of order statistics and<br />
concomitant of record statistics for WIGD which has its<br />
applicability in drinking water quality data (Das et al., (2011))<br />
using the concept of bivariate pseudo distribution.<br />
In the estimation of water quality parameters a large number<br />
physico-chemical parameters are found to be interrelated with<br />
each other showing positive or negative correlation among them.<br />
So bivariate distribution theory is applicable in such cases. In<br />
water quality data it is reported that iron (Fe) and arsenic (As) are<br />
positively correlated with each other, whereas, Fe and fluoride (F)<br />
are negatively correlated. From the estimated value of Fe we can<br />
observe the probable concentration of As as well as F in water.<br />
Similarly, microbial concentration in water also can be estimated<br />
from DO data. For these type of situations the concept of<br />
concomitant arises naturally.<br />
Bivariate Pseudo WIGD<br />
II. RESULTS AND FINDINGS<br />
According to Das et al., (2011) the pdf of WIGD is given by<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 42<br />
ISSN 2250-3153<br />
Suppose that the random variable (r.v.) also has WIGD with parameter where is some function of having pdf<br />
Defining equation (2.1) and (2.2) as a compound distribution of two r.v.‘s the bivariate pseudo WIGD has the density<br />
Considering in equation (2.3) the distribution becomes<br />
The product moment of equation (2.4) is<br />
Concomitant of Order Statistics for Bivariate Pseudo WIGD<br />
To obtain the distribution of -th concomitant we first find out the distribution of -th order statistics for marginal distribution of<br />
given in equation (2.1) as<br />
Also the conditional distribution of given for equation (2.4) is<br />
Using equations (3.1) and (3.2) in equation (1.2), the distribution of -th concomitant of order statistics for bivariate pseudo WIGD is<br />
obtained as<br />
Where<br />
The expression for -th moment of the -th concomitant for bivariate pseudo WIGD is obtained as<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 43<br />
ISSN 2250-3153<br />
Survival function for -th concomitant of order statistics for bivariate pseudo WIGD is<br />
The conditional hazard rate of given is<br />
Which is decreasing function in and .<br />
Again the conditional survival function<br />
is decreasing function in , therefore according to properties given by Tahmasebi and Behboodian, (2010) it follows that has<br />
increasing failure rate (IFR) distribution and (entropy ordering) for and is stochastically decreasing and is<br />
denoted by SD( .<br />
Extention to Bivariate Concomitant from Trivariate Pseudo Distributions<br />
The trivariate pseudo WIGD has been defined as a compound distribution of three random variables. Suppose that the random<br />
variable has WIGD with pdf given in equation (2.1) and the r.v. and also has WIGD with parameter and<br />
respectively with pdf<br />
And<br />
Then the compound distribution of equations (2.1), (4.1) and (4.2) gives trivariate pseudo WIGD as<br />
Using and , the density given in (4.3) becomes<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 44<br />
ISSN 2250-3153<br />
The product moment of trivariate WIGD is obtained as<br />
The conditional distribution of given and can be obtained by using<br />
Therefore,<br />
For trivariate pseudo WBSD the -th order moment is<br />
Considering , the conditional mean for trivariate pseudo WIGD is<br />
And , gives<br />
Variance of trivariate pseudo WIGD is<br />
Again we have,<br />
Using equations (3.1) and (4.5) in equation (1.3) the pdf of bivariate concomitant from trivariate pseudo WIGD is obtained as<br />
Distribution of Concomitant of Record Statistics for WIGD<br />
Distribution of -th concomitant of upper record statistics for bivariate pseudo WIGD has been obtained as a particular case of<br />
and only for identically and independently distributed cases. The distribution of -th concomitant of record statistics can be obtained<br />
by using equation (1.7). The distribution given in equation (1.7) requires the distribution of -th record statistics given in equation<br />
(1.5) for r.v. and conditional distribution. If r.v. follows WIGD, then using the cdf of WIGD and equation (1.5) the distribution of<br />
-th record statistics for WIGD is obtained by using<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 45<br />
ISSN 2250-3153<br />
Where . Using equation (1.5) the distribution of second order upper record statistics for bivariate pseudo WIGD is<br />
Using the distribution of second order upper record statistics for WIGD and conditional distribution of WIGD distribution of<br />
second order concomitant of upper record statistics for bivariate pseudo WIGD is obtained as<br />
The -th moment about origin for concomitant of upper record statistics for bivariate pseudo WIGD is obtained as<br />
The survival function of the second order concomitant of upper record statistics for bivariate pseudo WIGD is<br />
Joint Distribution of Second and Fourth Order Concomitant of Upper Record Statistics for Bivariate Pseudo WIGD<br />
The joint distribution of two concomitant of record statistics can be obtained using equation (1.8).But expression (1.8) requires the<br />
joint distribution of two record statistics given in equation (1.6). Therefore first we derive the joint distribution of two record statistics.<br />
The joint distribution for random variables and for WIGD is as follows<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 46<br />
ISSN 2250-3153<br />
Now, using the conditional distribution of given of bivariate pseudo WIGD and joint distribution of and in<br />
equation (6.1), the joint distribution of second and fourth concomitant is obtained as<br />
Where<br />
Numerical Values of Survival Functions for Concomitant of Order Statistics and Concomitant of Record Statistics for<br />
Bivariate Pseudo WIGD<br />
To study the survivability of concomitant of order statistics and<br />
second order upper record statistics numerical values of the<br />
survival functions for bivariate pseudo WIGD have been<br />
obtained for different values of the parameter and using<br />
equations (3.5) and (5.3). From Table 1 and Table 2 it is clear<br />
that for both concomitant of order statistics and concomitant of<br />
second order upper record statistics for WIGD survival<br />
[1]<br />
[2]<br />
[3]<br />
Ahsanullah, M. (2010). ―Concomitant of upper<br />
record statistics for bivariate pseudo Weibull<br />
distribution‖. Applications and Applied<br />
Mathematics, 5(10):1379-1388.<br />
Aleem, M. (2006). ―Concomitant of order statistics from inverse Rayleigh<br />
distribution‖. Pakistan Journal of Statistics and Operation Research,<br />
2(1):45-48.<br />
Amini, M., & Ahmadi, J. (2005). ―On moments of the concomitants of<br />
probability decreases as increases for fixed values of the<br />
parameters and and it increases for increasing value of<br />
holding and as fixed.<br />
[4]<br />
classic record values and nonparametric upper bounds for the mean under<br />
the Farlie-Gumbel-Morgenstern model‖. Journal Statistical Research of<br />
Iran, 1(2):123-125.<br />
Balasubramanian, K., & Beg, M. I. (1998). ―Concomitant of order statistics<br />
in Gumbel‘s bivariate exponential distribution‖. Sankhya, 60, Series B:<br />
Table 1: Numerical values for survival functions of -th concomitant of 399-406.<br />
order statistics for WIGD<br />
[5] Beg, M. I., & Ahsanullah, M. (2008). ―Concomitants of generalized<br />
2.0 3.0 4.0 5.0 6.0 7.0<br />
order statistics from Farlie Gumbel Morgenstern distributions‖.<br />
Statistical Methodology, 5:1-20.<br />
0.01 0.99569<br />
0.02 0.98784<br />
0.03 0.97774<br />
0.04 0.96583<br />
0.05 0.95239<br />
0.06 0.93762<br />
0.99765 0.99847 0.99890 0.99916 0.99946<br />
0.99337 0.99569 0.99691 0.99765 0.99847<br />
0.98784 0.99209 0.99433 0.99569 0.99719<br />
0.98132 0.98784 0.99129 0.99337 0.99569<br />
0.97395 0.98304 0.98784 0.99074 0.99398<br />
0.96583 0.97774 0.98404 0.98784 0.99209<br />
[6]<br />
[7]<br />
[8]<br />
Bhattacharya, P. K. (1974). ―Convergence of sample paths of<br />
normalized sums of induced order statistics‖. The Annals of Statistics,<br />
2:1034-1039.<br />
Chandler, K. N. (1952). ―The distribution and frequency of record<br />
values‖. Journal of Royal Statistical Society, 14:220-228.<br />
Das, K. K., Das, B., & Baruah, B. K. (2011). ―Development of New<br />
Probability Model with Application in Drinking Water Quality Data‖,<br />
0.07 0.92163 0.95703 0.97199 0.97991 0.98470 0.99004 Advances in Applied Science Research, 2(4):306-313.<br />
0.08 0.90456 0.94761 0.96583 0.97549 0.98132 0.98784 [9] David, H. A. (1981). ―Order Statistics”. Wiley, New York, 2nd edition.<br />
0.09 0.88648 0.93762 0.95929 0.97079 0.97774 0.98550 [10] David, H. A. (1973). ―Concomitants of order statistics‖. Bulletin of<br />
0.10 0.86747 0.92709 0.95239 0.96583 0.97395 0.98304<br />
Table 2: Numerical values for survival functions second order<br />
concomitant of upper record statistics for WIGD<br />
5.0 5.1 5.2 5.3 5.4 5.5<br />
REFERENCES<br />
[9] Ahsanullah, M. (1995). ―Record Statistics”. Nova Science, USA.<br />
(6.2)<br />
.001 0.97918 0.97979 0.98037 0.98092 0.98145 0.98195<br />
.002 0.94121 0.94293 0.94456 0.94612 0.94761 0.94903<br />
.003 0.89217 0.89532 0.89832 0.90117 0.90390 0.90650<br />
.004 0.83425 0.83908 0.84368 0.84807 0.85225 0.85625<br />
.005 0.76872 0.77546 0.78187 0.78799 0.79382 0.79939<br />
.006 0.69645 0.70528 0.71369 0.72171 0.72936 0.73667<br />
.007 0.61809 0.62918 0.63975 0.64983 0.65945 0.66863<br />
.008<br />
.009<br />
0.53412<br />
0.44496<br />
0.54764<br />
0.46105<br />
0.56053<br />
0.47639<br />
0.57281<br />
0.49101<br />
0.58453 0.59572<br />
www.ijsrp.org<br />
0.50496 0.51828<br />
0.01 0.35094 0.36974 0.38766 0.40474 0.42104 0.43661
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 47<br />
ISSN 2250-3153<br />
International Statistical Institute, 45:295-300.<br />
[11] David, H. A., & Galambos, J., (1974). ―The asymptotic theory of<br />
concomitants of order statistics‖. Journal of Applied Probability, 11:762-<br />
770.<br />
[12] David, H. A., & Nagaraja, H. (2003). ―Order Statistics”. John Wiley &<br />
Sons, New York, 3rd edition.<br />
[13] Feller, W. (1966). ―An Introduction to Probability Theory and its<br />
Applications‖.Volume 2. Wiley, New York.<br />
[14] Filus, J. K., & Filus, L. Z. (2006). ―On some new classes of multivariate<br />
probability distributions‖. Pakistan J. Statistics, 21(1):21-42.<br />
[15] Hanif, S. (2007). ―Concomitants of Ordered Random Variables‖. Ph.D<br />
Thesis, National College of Business Administration & Economics, Lahore.<br />
[16] Nagaraja, H. N. (1988). ―Record values and related statistics: A review‖.<br />
Communication in Statistics: Theory and Methods, 17:2223–2238.<br />
[17] Nevzorov, V. B. (1988). ―Records‖. Theory of Probability and its<br />
Aplications, 32:201-228.<br />
[18] Shahbaz, S., & Shahbaz, M. Q. (2011). ―The trivariate pseudo Rayleigh<br />
distribution‖. World Applied Sciences Journal, 12(12):2279-2282.<br />
[19] Shahbaz, S., & Shahbaz, M. Q. (2010). ―On bivariate concomitants of order<br />
statistics for pseudo exponential distribution‖. Middle East J. Scientific<br />
Research, 6(1):22-24.<br />
[20] Shahbaz, S., Shahbaz, M. Q., & Mohsin, M. (2009b). ―On concomitants of<br />
order statistics for bivariate pseudo exponential distribution‖. World<br />
Applied Sciences Journal, 6(8):1151-1156.<br />
[21] Shahbaz, S., & Ahmad, M. (2009a). ―Concomitants of order statistics for<br />
bivariate pseudo Weibull distribution‖. World Applied Sciences Journal,<br />
6(10):1409-1412.<br />
[22] Tahmasebi, S., & Behboodian, J. (2010). ―A short note on entropy ordering<br />
property for concomitants of order statistics‖. World Applied Sciences<br />
Journal, 9(3):257-258.<br />
AUTHORS<br />
First Author – Kishore K. Das, M. Sc., Ph.D<br />
Department of Statistics, Gauhati University,<br />
Guwahati, Assam, India<br />
Second Author – Bhanita Das, M. Sc., Ph.D<br />
Department of Statistics, Gauhati University,<br />
Guwahati, Assam, India<br />
Third Author – Bhupen K. Baruah, M. Sc., Ph.D<br />
.<br />
.<br />
Department of Chemistry, Gauhati University,<br />
Guwahati, Assam, India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 48<br />
ISSN 2250-3153<br />
Design and Stress Analysis of Watt and Porter Governor<br />
*Ravindra Singh Rana, **Rajesh Purohit, *Alok Singh<br />
*Assistant Professor Department of Mechanical Engineering M.A.N.I.T, Bhopal (M.P.), India<br />
**Associate Professor Department of Mechanical Engineering M.A.N.I.T, Bhopal (M.P.), India<br />
Abstract- The function of the governor is to maintain the speed<br />
of an engine within specified limits whenever there is a variation<br />
of load.. This device can be used in almost all vehicles. The<br />
objective our investigation to identify the stress concentration<br />
areas, areas which are most susceptible to failure when governor<br />
is rotating about its axis, also the value of these stresses is<br />
measured. This analysis is carried out with the help of PRO E.<br />
The displacement of the various elements of the SPINDLE from<br />
the base is also calculated and the graphs are plotted. Effect of<br />
the ―WEIGHT OF THE ARMS‖ is the major area of concern for<br />
our study and all the calculations are done considering the weight<br />
of the arms. Weight of the arms acts on the centroid of the arms<br />
and when the governor assembly rotates, centrifugal force starts<br />
acting on the centroid of the arms and tends to deflect the arms,<br />
this deflection or bending is to be minimized. In our work, we<br />
have done the Stress analysis on a particular configuration of<br />
governor assembly and then various materials are suggested on a<br />
theoretical basis.<br />
Index Terms- PRO E, Spindle, Weight of the Arms.<br />
A<br />
I. INTRODUCTION<br />
Governor, or speed limiter, is a device used to measure and<br />
regulate the speed of a machine, such as an engine. A<br />
classic example is the centrifugal governor, also known as the<br />
watt. [1-3] Centrifugal governors were used to regulate the<br />
distance and pressure between millstones in windmills since the<br />
17th century. Early steam engines employed a purely<br />
reciprocating motion, and were used for pumping water an<br />
application that could tolerate variations in the working speed. It<br />
was not until the Scottish engineer James Watt introduced the<br />
rotative steam engine, for driving factory machinery, that a<br />
constant operating speed became necessary. Between the years<br />
1775 and 1800, Watt, in partnership with industrialist Matthew<br />
Bolton, produced some 500 rotati-vebeam engines. At the heart<br />
of these engines was Watts self-designed "conical pendulum"<br />
governor: a set of revolving steel balls attached to a vertical<br />
spindle by link arms, where the controlling force consists of the<br />
weight of the balls. Building on Watts design was American<br />
engineer Willard Gibbs who in 1872 theoretically analyzed<br />
Watts‘s conical pendulum governor from a mathematical energy<br />
balance perspective. During his graduate school years at Yale<br />
University, Gibbs observed that the operation of the device in<br />
practice was beset with the disadvantages of sluggishness and a<br />
tendency to overcorrect for the changes in speed it was supposed<br />
to control. The objective our investigation to identify the stress<br />
concentration areas, areas which are most susceptible to failure<br />
when governor is rotating about its axis, also the value of these<br />
stresses is measured. Analysis is carried out with the help of PRO<br />
E. The displacement of the various elements of the SPINDLE<br />
from the base is also calculated using PRO E and the graphs are<br />
plotted. Different materials for different parts are used that are<br />
theoretically justified.<br />
II. MATERIALS FOR DIFFERENT PARTS<br />
2.1 Spindle and Arms: The spindle of the governor is made<br />
of STAINLESS STEEL. The properties of stainless steel are<br />
given below: Physical Properties, Density= 0.29 lbs/in3(8.03<br />
g/cm3) ,Modulus of Elasticity ksi (MPa) 28.0 x 103 (193 x 10^3)<br />
in tension 11.2 x 103 (78 x 10^3) in torsion. STAINLESS<br />
STEEL is used because of its high MODULUS OF<br />
ELASTICITY in tension and the high modulus of elasticity in<br />
tension means high bending strength, which is the major cause<br />
for failure of the spindle, it is for this reason that stainless steel is<br />
used for the design of spindle. Apart from that the Corrosion<br />
resistant property of stainless steel and its stress concentration<br />
corrosion resistance justify the use of stainless steel for both<br />
spindle and arms.<br />
2.2 Base: The base of the governor assembly is made up of<br />
Fe30. This material is used because it has very good Vibrations<br />
Damping capacity. It is a prerequisite for the governor or any<br />
machine that the base should be stable and it should not vibrate,<br />
it is for this reason that Fe30 is used.<br />
2.3 Sleeve and Head: The sleeve of the governor is made up<br />
of BRONZE. Sleeve is that part of governor which moves<br />
relatives to spindle so there is always FRICTION associated with<br />
it, and when there is friction, then when the sleeve is moving<br />
upwards friction acts downwards and retards its speed and when<br />
it moves downwards friction acts upwards, in this way for a<br />
given height of governor there are two speeds on the controlling<br />
curve which results in the INSTABILITY of the governor. The<br />
friction of the governor is therefore be kept as low as possible,<br />
Bronze is a material which is self-lubrication and it has very low<br />
coefficient of friction.<br />
2.4 Pins and Bushes: Self-lubricating bushings (lubrication<br />
free bushings) are made up of one of two basic compositions:<br />
PTFE-Based Metal-Polymer Materials<br />
Thermoplastic-Based Metal-Polymer Materials<br />
III. DESIGN OF GOVERNOR<br />
3.1 Design of Watt Governor: The Design of Watt Governor<br />
involves determining the Minimum and maximum speed of the<br />
Governor. The minimum speed occurs when the sleeve is at its<br />
rest or initial position.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 49<br />
ISSN 2250-3153<br />
.<br />
Here, AB- length of the arm (cm),BC = r = Radius of rotation<br />
(cm) ,AC =h = Height of the Governor (cm)<br />
30° = α = Angle of inclination Length AB =41cm; BC= 146mm;<br />
α= 30º Height of governor, WKT hı = AB * cosα<br />
= 14.6 * cos30º= 12.64 cm or .126 m<br />
But hı= 895/Nı² , Nı²= 895/.126<br />
Minimum speed, Nı=84.2 rpm. ,Assume sleeve lift =20mm<br />
h2 = hı – 20 mm= 106.4 mm or .1064 mMax speed N2² =<br />
895/h2=> 895/ .335N2= 91.46 rpm<br />
Speed range % = (N1 ≈ N2)/ N2= (91.77 – 84.22) / 84.22= 8.37<br />
%<br />
DESIGN OF SHAFT:<br />
Diameter of the shaft„d‟ = 13 mm, For d< 20 mm;<br />
τ=σy / 2 where σy is the yield stress (N/mm^2) ,σy = 380<br />
N/mm^2. From DDB.=><br />
τ= 190 N /mm², where τ is the shear stress in N/mm^2<br />
Basic Specifications:<br />
W.K.T.T=п /16 *τd³ , Where T-torque in the shaft „Nmm‟<br />
=п /16 * 190* 13³= 81962.18 Nmm => 81.962 Nm<br />
Power = 2пNT/60, Max speed N= 91.77<br />
rpm= 2*п*91.77* 81.962 / 60=454.94 W<br />
The power obtained is less than that of the power rating of a<br />
FHP motor which is 746 W and hence the design is safe for 13<br />
mm diameter of shaft.<br />
3.2 Design of Porter Governor: The porter governor is a<br />
modification of a watts governor; with central load attached to<br />
the sleeve. This leads to larger centrifugal forces here high<br />
speeds are required to bring the fly balls to the same radius. The<br />
design of porter governor involves determining the minimum and<br />
maximum speed of the governor. The minimum speed occurs<br />
when the sleeve is at its rest or initial position. The only<br />
difference between the watt and porter governor is the inclusion<br />
of a dead weight as shown in the figure.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 50<br />
ISSN 2250-3153<br />
(1) Power supply (2) 230 V AC, Single phase, Variance.<br />
Materials :( 1) Spindle: Stainless Steel (2) Fly balls:<br />
Cast Iron (3) Arms: Stainless steel(4) Frame: Mild<br />
steel(5) Dead weight: cast Iron<br />
Governor Mechanism: Speed of rotation, N= (m+M)/m *<br />
895/h,Where m is Mass of the ball (kg)M – Mass of the dead<br />
weight (kg)h – Height of the governor (cm) ,r– Radius of rotation<br />
(cm),α – Angle of inclination,Fc– Centrifugal force = m ώ^2 r.,<br />
Where ώ= 2 π N/ 60. N- Speed of rotation (rpm), Here m= .4 kg<br />
M= 1.6 kgi) Height of Governor: h =√ (AB²- BC²), Here the<br />
Length of the arms is equal, Radius of rotation, r ı = AB sin α=<br />
.146 * sin 30º= .534 m Hı = AB cosα = 12.64 cm Speed N² = (m<br />
+ M)/m * 895 / h1= (.4 + 1.4)/.4*895/ .1246N =179.21 rpm<br />
DESIGN OF SHAFT:<br />
For solid shaft d= 13 mm,<br />
τ=σy/ 2 where τ is the shear stress in N/mm² ,σy = 380 N/mm^2.<br />
From DDB. τ= 380/ 2 = 190 N/mm²<br />
Torque ,T =п / 16 *τd³=п / 16 * 190 * 13³=81.962 Nmiv)<br />
Power = 2пNT/60= 2п*179.21*81.962/60 = 723.26 WP < [P] i.e.<br />
The power obtained is less than that of the power rating of a FHP<br />
motor which is 746 W and hence the design is safe for 13 mm<br />
diameter of shaft. Hence design is safe<br />
Specifications of Bearing: A Bearing is a machine element<br />
which is mounted on shafts for free and smooth rotation. The<br />
bearing facilitates the rotation of the shaft along its axis without<br />
any vibration. Generally for this purpose roller ball bearing is<br />
chosen and we have done the same. The various stresses acting<br />
on a roller ball bearing are (i) Radial force acting on the<br />
bearing.(ii) Axial thrust on the bearing The design of bearings is<br />
done on the basis of the stresses induced, the size of the setup<br />
and its specifications<br />
(i)The figure shows the dimensions of the bearing chosen. A<br />
roller ball bearing of ID 26 mm and OD 52mm<br />
(ii)The ID is chosen as 26mm so as to fix the sleeve rigidly on<br />
the bearing.<br />
Design Procedure:<br />
(i)The design of bearings is done on the basis of the stresses<br />
induced and the size of the setup.<br />
(ii) The radial force acting on the governor is given by F = torque<br />
/ distance. (N)F = 81.951 / .30Radial force F = 275 N<br />
(iii) For F = 275 N and the inner diameter d = 26 mm, The<br />
bearing to be chosen is SKF 6006. SKF 6206 and SKF 6306. Out<br />
of which SKF6206 is highly recommended and chosen by us.<br />
Additional Bearing:<br />
Two more bearings are required for free flow movement of the<br />
spindle connected to the motor with the help of a pulley. The<br />
bearing of inner diameter13 mm is required so that the Shaft is<br />
rigidly supported by the frame.<br />
Design:<br />
The Radial Force acting on the Governor is given by F = torque /<br />
distance. (N)=81.962/ 36Radial Force F = 216.75 N. For F =<br />
216.75 N and the inner diameter d = 12 mm, The Bearing to be<br />
chosen is SKF 6006. SKF 6206 and SKF 6306. Out of which<br />
SKF 6206 is highly recommended and chosen by us.<br />
Hurdles Faced: (i)We experienced bending the spindle while trying to fix the<br />
bearing in position which later led to wobbling of the spindle.<br />
Hence we changed a new one later.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 51<br />
ISSN 2250-3153<br />
(ii) Due to irregular speed control the arms bent while rotating<br />
which we replaced later with a new arm of harder material to<br />
overcome that problem.<br />
(iii) We also experienced turbulence of the entire setup while<br />
operating due to less weight of frame for which we added some<br />
extra weight for stability.<br />
(iv)Fixing the bearing in position caused failure of bearings<br />
because of hard impact by hammer for which we replaced the<br />
faulty bearing later.<br />
IV. RESULTS AND DISCUSSION<br />
(1.) From the stress analysis of the various parts of the<br />
governor assembly we are able to identify the stress<br />
Displacement of the Spindle<br />
STRESSES on various elements<br />
concentration areas, which are most susceptible to fail, so to<br />
avoid failure we have to increase the strength in those areas and<br />
to achieve this diameter of the shaft should be increased near the<br />
base because this is the portion where stress concentration is<br />
highest, so we have to provide a step a to increase the area which<br />
is accompanied by fillet which has some radius to avoid stress<br />
concentration.<br />
(2.) As can be seen from the stress analysis the area near the<br />
joint of the arm and the spindle head has high stress<br />
concentration so the thickness of the arms should be a SPLINE<br />
with high thickness near the joint and low at the centre, spline<br />
design is chosen because we do not have to increase the weight<br />
of the arms.<br />
Strain at various elements of the assembly<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 52<br />
ISSN 2250-3153<br />
Limitations of our Study:<br />
(i) Bending of the spindle, because of the forces acting on the<br />
spindle head by the arms.<br />
(ii) High sensitivity which results in HUNTING.<br />
(iii) Woobling of the whole structure because of low weight.<br />
V. FUTURE SCOPE<br />
(i) Analysis on different materials for spindles and arms.<br />
(ii) Dynamic analysis of the governor will give more accurate<br />
results and also calculate the combined stresses acting on the<br />
various parts of the governor.<br />
(iii) Application of springs to avoid the problem of HUNTING.<br />
(iv) The governors extend their scope in all kind of vehicles.<br />
They can be employed in hydro plants assessment.<br />
(v)They can also be used in speed sensing devices which employ<br />
digital speed governors.<br />
(vi) The introduction of analog and digital speed governors have<br />
created a rage among the automobile industries<br />
Stress Curve with respect to spindle head semi perimeter<br />
Strain energy curve wrt spindle head<br />
Displacement Magnitude w.r.t. spindle head<br />
VI. CONCLUSION<br />
(i) Thus governor plays an important role in speed control.<br />
(ii) It ensures regulation of speed at any conditions<br />
(iii)To study the effect of varying the mass of the center sleeve in<br />
porter governor<br />
REFERENCES<br />
[1] WWW.ANSWERS.COM/TOPIC/GOVER-DE<br />
[2] WWW.ENOTES.COM/TOPIC/GOVER-DE<br />
[3] HTTP//EN.WIKIPEDIA.<strong>ORG</strong>/WIKI/GOVER-DE<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 53<br />
ISSN 2250-3153<br />
AUTHORS<br />
First Author –Ravindra Singh Rana, Assistant Professor<br />
Department of Mechanical Engineering<br />
M.A.N.I.T.Bhopal(M.P.), Email: ravindrarana74@gmanil.com<br />
Second Author – Rajesh Purohit, Associate Professor<br />
Department of Mechanical Engineering M.A.N.I.T.Bhopal(M.P.)<br />
Third Author – Alok Singh, Assistant Professor Department of<br />
Mechanical Engineering M.A.N.I.T.Bhopal(M.P.)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 54<br />
ISSN 2250-3153<br />
Reviews on the Influences of Alloying elements on the<br />
Microstructure and Mechanical Properties of Aluminum<br />
Alloys and Aluminum Alloy Composites<br />
R. S. Rana, Rajesh Purohit, and S Das<br />
Department of Mechanical Engineering, Maulana Azad National Institute of Technology,<br />
Bhoapl-462051, India<br />
Abstract- In recent year‘s aluminum and aluminum alloys are<br />
widely used in automotive industries. These are light weight<br />
(density of about 2.7g/cc),having good malleability and<br />
formability, high corrosion resistance and high electrical and<br />
thermal conductivity. High machinability and workability of<br />
aluminum alloys are prone to porosity due to gases dissolved<br />
during melting processes. However, in the engineering<br />
application pure aluminum and its alloys still have some<br />
problems such as relatively low strength, unstable mechanical<br />
properties. The microstructure can be modified and mechanical<br />
properties can be improved by alloying, cold working and heat<br />
treatment in this regards, this paper reports the influences of<br />
some alloying elements on the microstructures and mechanical<br />
properties of Aluminum alloys and aluminum alloy composites.<br />
Keywords- Aluminum alloy, aluminum alloy composites,<br />
Machinability, alloying, Heat treatment, Cold working<br />
A<br />
I. INTRODUCTION<br />
luminium and aluminium alloy are gaining huge industrial<br />
significance because of their outstanding combination of<br />
mechanical, physical and tribological properties over the base<br />
alloys. These properties include high specific strength, high wear<br />
and seizure resistance, high stiffness, better high temperature<br />
strength, controlled thermal expansion coefficient and improved<br />
damping capacity.[1]. These properties obtained through addition<br />
of alloy elements, cold working and heat treatment. Alloying<br />
elements are selected based on their effects and suitability. The<br />
alloying elements may be classified as major and minor<br />
elements, microstructure modifiers or impurities, however the<br />
impurity elements in some alloys could be major elements in<br />
others[2]. In this paper the influences of alloying Such as Major<br />
elements (Si ,Cu ,Mg), Minor elements(Ni, Sn) ,Microstructure<br />
modifier elements(Ti, B, Sr ,Be ,Mn ,Cr) and Impurity<br />
elements(Fe, Zn) on microstructures and mechanical properties<br />
of aluminium alloys are reviewed.<br />
II. EFFECTS OF MAJOR ALLOYING ELEMENTS IN ALUMINIUM<br />
It's the foremost preliminary step for proceeding with any<br />
research work writing. While doing this go through a complete<br />
thought process of your Journal subject and research for it's<br />
viability by following means:<br />
The major alloying elements in Aluminum and aluminium alloys<br />
typically include Silicon (Si), copper (Cu) and magnesium (Mg).<br />
2.1 Silicon(Si): Silicon is the most important single alloying<br />
element used in majority of aluminum casting alloys.[2] It is<br />
primarily responsible for so –called good castability (high<br />
fluidity,low shrinkage),low density(2.34g/cm3)which may be<br />
advantage in reducing total weight of cast component and has<br />
very low solubility in Aluminum therefore precipitates as<br />
virtually pure Si which is hard and improve the abrasion<br />
resistance. Si reduces thermal expansion coefficient of Al-Si<br />
alloys. Machinability is poor with addition of silicon in<br />
Aluminum. [3].Depending on the Si concentration in weight<br />
percentage, the Al-Si alloy systems are divided into three major<br />
categories: Hypoeutectic (
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 55<br />
ISSN 2250-3153<br />
2.2 Effect of Cu addition: copper effect the strength and<br />
hardness of aluminum casting alloys, both heat treated and not<br />
heat treated and at both ambient and elevated service<br />
temperature. It also improve the machinability of alloys by<br />
increasing matrix hardness,.[2] On the down side, copper<br />
generally it reduces the corrosion resistance of aluminum and in<br />
certain alloys and tempers, it increase stress corrosion<br />
susceptibility[2].S.G. Shabestari et al [5] Investigate the effect of<br />
copper and solidification condition on the microstructure and<br />
mechanical properties of Al-Si-Mg alloys . copper in the range<br />
of 0.2-2.5wt% has been used in A356 aluminum alloy and cast at<br />
different solidification condition(sand, graphite, copper and cast<br />
iron molds). It has been found that Ultimate tensile strength of<br />
the alloys increased with heat treatment(T6), mold cooling<br />
rate(graphite) and copper content upto 1.5% . UTS increase<br />
because of precipitation of copper bearing phase in the<br />
interdendritc space cause by increasing copper. It has been found<br />
that the best mechanical properties with about 1.5% Cu in Al si-<br />
Mg alloy solidified in the graphite moulds.<br />
2.3 Effect of Mg addition: Magnesium (Mg). Provides<br />
substantial strengthening and improvement of the workhardening<br />
characteristics of aluminium. It can impart good<br />
corrosion resistance and weldability or extremely high Strength<br />
[6, 7]. . Silicon combine with magnesium to form the hardening<br />
phase Mg2Si that provides the strengthening [2]..Zhengang Liu<br />
at el[8] investigate the influence of Mg addition on graphite<br />
particle distribution in the Aluminum alloy matrix composites.in<br />
this studied Mg as surface active agent was added into<br />
commercial alumimum to prevent the graghite particles from<br />
clustering and improve the physical and mechanical properties of<br />
aluminum matrix. The results show that contents of graphite<br />
increase with increasing Mg contents. The graphite particle<br />
distribute uniformly in the particle reinforced PMMC with<br />
0.6Wt%Mg. however, the agglomeration of graphite particles is<br />
observed in matrix when Mg contents is more than 1Wt% Mg.<br />
the proper Mg addition amount is beneficial to enhance the<br />
mechanical properties of the graphite particles reinforced<br />
aluminum alloy matrix composites and the abrasion resistance of<br />
the materials due to uniformaly distribution of hard particles and<br />
reduction of friction coefficient.<br />
2.4 Effect of Mg and Si addition: Shubin Ren et.al[9]<br />
Investigate the effect of Mg and Si alloy element in the<br />
aluminum on the thermo-mechanical properties of pressureless<br />
infiltrated SiCp/Al composites. Si and Mg addition to the<br />
aluminum can improve the wettability of SiC by the aluminum<br />
The results showed that, when the Si content was lower than 6<br />
wt% or the Mg content was lower than 4 wt%, the composites<br />
showed poor thermo-physical properties because of higher<br />
porosity due to relative density of infiltrating SiCp/Al composites<br />
is very low in the composites resulting from the poor wettability<br />
between Al and Si. Increasing the Si content to the aluminum can<br />
enhance the elastic modulus, thermal dimensional stability and<br />
thermal conductivity of the composites and reduce the coefficient<br />
of thermal expansion (CTE) of the composites. However,<br />
excessive Si beyond 12 wt% can reduce the thermal conductivity<br />
and bending strength of the composites. An optimum content of<br />
Mg addition to aluminum was found to be 4–8 wt%, at which the<br />
composites exhibited good thermo-mechanical properties.<br />
However, as the Mg content was increased beyond 8 wt%, the<br />
higher porosity in the composites resulting from the lower<br />
pressure of the magnesium led to lower thermo-mechanical<br />
properties.<br />
III. EFFECT OF MINOR ELEMENTS:<br />
3.1 Effect of Ni addition: JE Hanafee et al[10] Investigate the<br />
effect of nickel on hot hardness of aluminum alloys It is shown<br />
that nickel can be utilized to improve the hot hardness (up to 600<br />
F) of aluminum-silicon (10 to 16 per cent silicon) casting and<br />
forging alloys. The maximum benefits are realized by developing<br />
a large volume and favourable distribution of nickel aluminide.<br />
The addition of more than the eutectic amount of silicon was not<br />
particularly helpful in improving hot hardness. While the<br />
addition of more than the eutectic amount of nickel did improve<br />
hot hardness.<br />
F. Hernández-Méndez, A. Altamira no-Torres et al[11]<br />
Investigate the Effect of Nickel Addition on Microstructure and<br />
Mechanical Properties of Aluminum-Based Alloys. Alloys were<br />
produced by powders metallurgy. Characterization results<br />
indicate that the microstructure of the aluminum-nickel alloys<br />
present a thin and homogeneous distribution of an intermetallic<br />
compound in the aluminum‘s matrix, identified as Al3Ni.<br />
Furthermore, it was find out that the amount of intermetallic<br />
Al3Ni increase as the nickel content in the alloy rises. Regarding<br />
the mechanical properties evaluated; it was establishes that the<br />
hardness, compression and flexion resistances also were<br />
improved due to the presence of the intermetallic compound.<br />
3.2 Effect of tin addition: Tin (Sn) used in aluminum casting<br />
alloys for reducing friction in bearing and bushing applications.<br />
Alloying element Tin in emergency conditions can provide<br />
short-term liquid lubrication to rubbing surfaces if such<br />
bearings/bushings severely overheat in service..[2]<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 56<br />
ISSN 2250-3153<br />
IV. MICROSTRUCTURE MODIFYING ELEMENTS<br />
Include titanium (Ti), boron (B), strontium (Sr),phosphorus (P),<br />
beryllium (Be), manganese (Mn) and chromium (Cr)[2]<br />
4. 1 Effect of Ti addition:<br />
Majed Jaradeh, et al[12] investigate the Effect of titanium<br />
additions on the microstructure of DC-cast AA 3003 aluminium<br />
alloys. Some improved corrosion properties can be obtained<br />
from increasing the Ti contents in aluminium alloys to a level<br />
above the normal practice for grain refinement. However,<br />
increasing the Ti content above the peritectic point, 0.15%, can<br />
influence the grain refinement and cause casting difficulties. It<br />
was found that with normal Ti contents in the range of 0.015%,<br />
the grain refinement is effective. However, upon larger Ti<br />
additions to levels around 0.15% the grain structure becomes<br />
coarser .N. Saheb , T. Laoui et al[13] Investigate the effect of Ti<br />
addition(up to 4Wt%) to Al–Si eutectic alloy. The addition of Ti<br />
to Al–Si eutectic alloy resulted in the precipitation of the<br />
intermetallic compound Al3Ti phase, which induced an increase<br />
in the micro hardness of the binary alloy. Among the Ticontaining<br />
alloys, the increase in Ti content improved their wear<br />
resistance as a result of increase in the microhardness due to the<br />
presence of relatively hard-phase Al3Ti. However, these alloys<br />
showed higher wear rates (thus lower wear resistance) compared<br />
with the binary alloy due to the tendency for embrittlement and<br />
microcracking brought about by Al3Ti particles. Heat treatment<br />
of the Ti-containing alloys at 200◦C for 6 h improved further<br />
their wear resistance.<br />
4.2 Effect of Titanium & Boron:<br />
Titanium (Ti) and boron (B) are used to refine primary<br />
aluminum grains. Titanium, added in aluminum alloy, forms<br />
TiAl3, which serves to nucleate primary aluminum dendrites.<br />
More frequent nucleation of dendrites means a large number of<br />
smaller grains. Grain refinement is illustrated in Figure 1<br />
Figure 1: Illustration of grain-refined aluminium<br />
Grain refining is better when titanium and boron are used in<br />
combination. Master alloys of aluminum with 5% titanium and<br />
1% boron are commonly used additives for this purpose.<br />
Titanium with boron form TiB2 and TiAl3, which together are<br />
more effective grain refiners than TiAl3 alone..[2]<br />
4.3 Effect of strontium addition: Strontium, Sodium, Calcium<br />
and Antimony These elements are added to eutectic or<br />
hypoeutectic aluminum silicon casting alloys to modify the<br />
morphology and microstructure of the eutectic silicon phase,<br />
eutectic silicon solidifies in a relatively coarse continuous<br />
network of thin platelets, shown in Figure 2. That morphology<br />
provides abundant stress risers and thus limits to achieve<br />
maximum strength and ductility. Modification with one of the<br />
above elements can changes the eutectic silicon into a fine<br />
fibrous or lamellar structure (Figures 2b and 2c).[2]<br />
Figure 2a:Unmodified Figure 2 b: Modified Figure 2c: Supermodified<br />
A. Razaghia, M. Emamy et al[14] Investigate the effect of<br />
strontium as a modifier on the microstructures and tensile<br />
properties of two castable particulate metal matrix composites<br />
The particulate metal matrix composites had similar matrix alloy<br />
(A357) but different reinforcing fine particles (silicon carbide<br />
and alumina). Results showed that the addition of 0.03%<br />
strontium makes a modest improvement to the yield strength,<br />
ultimate tensile strength and elongation percentage values, and<br />
the scatter of these properties, but makes a significant<br />
improvement to minimum strength and elongation results.<br />
Microstructural examinations by scanning electron microscope<br />
and energy dispersive spectroscopy analysis of metal matrix<br />
composites showed segregation of strontium on both the silicon<br />
carbide and alumina particles. Further results showed that the<br />
addition of higher strontium levels contributes to the overmodification<br />
of the eutectic silicon and promotes the formation<br />
of an Al–Si–Sr intermetallic compound on the particle/matrix<br />
interface.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 57<br />
ISSN 2250-3153<br />
Fig. 3: Optical micrograph of A357: (a) non-modified, (b) modified with 0.01%Sr, (c) modified with 0.02%Sr, (d) Modified with<br />
0.03%Sr, (e) modified with 0.05%Sr, and (f) modified with 0.1%S<br />
4.4 Effect of Manganese & Chromium: Manganese or in<br />
combination,with manganese (Mn) and chromium (Cr) change<br />
the morphology of the iron-rich Al5FeSi phase (Figure 4a) from<br />
its typical platelet/acicular form to a more cubic<br />
Al15(MnFe)3Si2 form (Figure 4b) that is improve the ductility.<br />
[2]‘‘.<br />
Figure 4a: Fe-richAl5FeSi Figure4b: Cubic Al15(MnFe)3Si2<br />
form.phase in platelet form<br />
4.5 Effect of Mn addition: Soo Woo Nam and Duck Hee<br />
Lee[15] Investigate the effect of Mn on the Mechanical Behavior<br />
of Al Alloys.. Recently, it was found that as the manganese<br />
content increases over 0.5 wt.% in aluminum alloys, both yield<br />
and ultimate tensile strength increase significantly without<br />
decreasing ductility. Adding manganese to aluminum<br />
alloys enhances the tensile strength as well as<br />
significantly improves low-cycle fatigue resistance.<br />
Corrosion resistance is also improved by the addition<br />
of manganese.<br />
V. EFFECT OF IMPURITY ELEMENTS :<br />
5.1 Effect of zinc addition: Zinc is only present in aluminum<br />
casting alloys of 7XX series,. Otherwise, zinc is present merely<br />
as an acceptable impurity element in many secondary (scrapbased)<br />
die casting alloys. As such, zinc is quite neutral; it neither<br />
enhances nor detracts from an alloy‘s properties. [2]. ZHU Meijun,<br />
DING Dong-yan et al[16] Investigate the effect of Zn<br />
content on tensile and electrochemical properties of 3003 Al<br />
alloy. The effect of Zn addition on the microstructure, tensile<br />
properties and electrochemical properties of as-annealed 3003 Al<br />
alloy was investigated. It was found that High density<br />
precipitates are observed in the Zn-containing alloys and the<br />
alloy with 1.8% Zn addition also has rod-like precipitates.. The<br />
alloy with 1.5% Zn addition has the highest ultimate tensile<br />
strength. M.C. Carroll, P.I. Gouma et al [17]. Studied effect<br />
of Zn addition on the grain boundry precipitation and corrosion<br />
of Al. Stress corrosion cracking (SCC) concerns in aluminum<br />
alloys containing Mg levels greater than 3.5%have been largely<br />
attributed to the formation of the beta-phase (Al3Mg2) at grain<br />
boundaries. It has been demonstrated that the beta-phase need not<br />
be continuous in order to provide a path for crack propagation,<br />
but aging treatments, exposure to intermediate to high<br />
temperatures, and excessively corrosive environments can all<br />
contribute to early failure of Al-Mg alloys due to SCC. Proof of<br />
the presence of a corrosion-prone secondary phase can be<br />
demonstrated easily through exfoliation testing and the<br />
associated lining of grain boundaries, which can be confirmed<br />
optically. Additions of Zn to these Al-Mg alloys in levels of 1–<br />
2wt% have been shown to be more SCC resistant due to the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 58<br />
ISSN 2250-3153<br />
formation of a stable ternary Al-Mg-Zn phase , the pie phase.<br />
Recent studies have shown that Al-5083 variants which contain<br />
even minor levels of Zn (0.68–0.70wt%) perform much better<br />
during exfoliation testing. Zinc additions of 0.68–0.70wt% to<br />
sensitized 5083-based Al-Mg-Mn alloys precludes the formation<br />
of b-phase precipitates, resulting instead in the formation of a<br />
chemically and structurally distinct Al-Mg-Zn t-phase at grain<br />
and subgrain boundaries. The t-phase appears to be more<br />
resistant to corrosion than the b-phase.<br />
5.2 Effect of iron addition: John A. Taylor [18] Investigate the<br />
effect of Iron in Al-Si Casting Alloys This paper discusses the<br />
various sources of iron and how it enters aluminum alloys, the<br />
way that iron leads to the formation of complex inter-metallic<br />
phases during solidification, and how these phases can adversely<br />
affect mechanical properties, especially ductility, and also lead to<br />
the formation of excessive shrinkage porosity defects in castings.<br />
The paper offers guidelines to the levels of iron that can be<br />
tolerated, how to maintain these levels and how to minimize the<br />
negative effects of iron. Author suggested some Practical<br />
guidelines for addition of iron in Al-Si casting alloys:<br />
Wherever possible, iron levels in Al-Si alloys should be<br />
kept as low as practical in order to avoid the detrimental<br />
effects on mechanical properties, particularly ductility<br />
and fracture toughness. This means minimizing iron<br />
contamination through careful selection of raw materials<br />
(i.e. ingots, silicon, etc.) and the maintenance of good<br />
refractory coatings on all steel tools used to prepare and<br />
handle melts.<br />
Iron levels above the critical level for the silicon content<br />
of the alloy should be avoided as these can cause serious<br />
loss of ductility in the final cast product and decreased<br />
casting productivity through increased rejects due to<br />
shrinkage porosity, and particularly ―leakers‖.<br />
The critical iron content (in wt%) for an alloy can be<br />
calculated using Fe crit ≈ 0.075 x [%Si] – 0.05.<br />
If solidification/cooling rates are very high (e.g. high<br />
pressure die casting), super critical iron contents may<br />
not be detrimental, but as the cooling rate decreases<br />
(gravity die casting → sand casting, etc.) the probability<br />
of super critical iron levels causing problems<br />
dramatically increases<br />
Traditional heat treatment regimes for Al-Si alloys, e.g.<br />
T6, do not alter the nature of the offending Fecontaining<br />
phases. As-cast inter-metallic is retained and<br />
although the overall performance of an alloy may be<br />
improved by heat treatment, it would be better still with<br />
low iron levels initially.<br />
Additions of Mn to neutralize the effects of iron are<br />
common, at Mn:Fe ratios of ~ 0.5, however, the benefits<br />
of this treatment are not always apparent. Excess Mn<br />
may reduce β-phase and promote α-phase formation,<br />
and this may improve ductility but it can lead to hard<br />
spots and difficulties in machining. Mn additions do not<br />
always improve castability and reduce porosity in high<br />
Fe alloys. Its affect is sensitive to alloy composition.<br />
The addition of Mn to melts with high iron levels can<br />
also promote the formation of sludge, if the sludge<br />
factor (derived by [%Fe] + 2[%Mn] + 3[%Cr]) exceeds<br />
a particular value for a given alloy and melt holding<br />
temperature. This is a serious problem for die-casters<br />
who use low melt temperatures and high impurity<br />
secondary alloys<br />
5.3 Effects of beryllium addition: Y. Wang, Y. Xiong [19]<br />
Investigate effects of beryllium (Be) in Al–7Si–0.4Mg–0.2Ti–<br />
xFe–xBe cast alloy. The results show that beryllium addition<br />
changes the shape of iron-rich compound from needle or plate<br />
shapes to Chinese scripts or polygons. And the iron-rich<br />
compound (named Be–Fe) is aggregated when the composition<br />
of Fe is high. The aggregation of Be–Fe phase is the main crack<br />
nucleus in the alloy. It is also found that Be–Fe is formed during<br />
peritectic reaction on titanium-rich particle and located inside the<br />
a-Al. These lead to the higher mechanical properties of the alloy<br />
with Be addition.& findings are-<br />
(1) The Fe phase is one of the main deterioration to the<br />
mechanical properties of cast aluminium alloy, especially the bphase<br />
in the alloy leads to poor mechanical properties.<br />
(2) Beryllium addition changes the morphology of iron-rich<br />
compounds to Chinese scripts and polygons And aggregative<br />
Be–Fe phases are found in high Fe contained alloy. Be–Fe<br />
phases are local inside the a-Al.<br />
(3) The fracture always takes place on iron-rich compounds. In<br />
the Be-containing alloy with iron, the crack propagation on Fephase<br />
was deterred during fracture, and this is considered to be<br />
beneficial to the fracture toughness of the alloy.<br />
(4) The mechanical properties of Be-containing alloy improve<br />
significantly. This is contributed to the alternation of Fe phase<br />
shape.<br />
(5) It is expected to exceed the permissible exposure limit in the<br />
low beryllium content alloy(B0.5%) industry.<br />
5.4 Effect of iron and beryallium addition: Murali, S and<br />
Trivedi, A and Shamanna et[20] al investigate the effect of iron<br />
and combined iron and beryllium additions on the fracture<br />
toughness and microstructures of squeeze-cast Al-7Si-0.3Mg<br />
alloy. An increase in iron content significantly decreases fracture<br />
toughness. Trace additions of beryllium completely neutralize the<br />
detrimental effect of iron.<br />
5.5 Effect of rare earth elements: It is well known that trace<br />
element additions to aluminum alloys can strongly influence the<br />
precipitation process, including modifying the dispersion,<br />
morphology and crystal structure of the resulting<br />
precipitations[21-23].Studies on rare-earths as micro-alloying<br />
elements showed that they had beneficial effects on the<br />
mechanical properties of aluminum alloys. It was reported that<br />
addition of Ce to Al-Cu-Mg-Ag alloy improved the thermal<br />
stability of the Ω phase thus raised the service temperature of this<br />
alloy[24]. LI et al[25]demonstrated that adding 0.1%−0.2%<br />
(mass fraction) Y improved the tensile properties of 2519 alloy at<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 59<br />
ISSN 2250-3153<br />
room and elevated temperatures for Y changed the size and<br />
density of θ′ phase. It was indicated that Nd was mainly<br />
distributed in form of intermediate compound AlCuNd, which<br />
exerted a restraining force on the grain boundaries and enhanced<br />
the mechanical properties of 2519 alloy at high temperature<br />
[26].Some recent researches showed that Yb was considered as<br />
an effective micro-alloying element in aluminum alloys. It was<br />
reported that Yb addition improved the mechanical properties of<br />
Al-Cu-Mg-Ag alloy and Al-Zn-Mg-Cu-Zr alloy [27-28].<br />
Furthermore, complex additions of Yb, Cr and Zr to Al-Zn-Mg-<br />
Cu alloy significantly enhanced the resistance to recrystallization<br />
[29].<br />
VI. CONCLUSION<br />
Alloying elements are selected based on their effect and<br />
Suitability. Silicon lowers the melting point and increase the<br />
fluidity(improve casting characteristics ) of Aluminum. A<br />
moderate increase in strength is also provided by Silicon<br />
addition. Magnesium provides substantial strengthening and<br />
improvement of work harding characteristic of aluminium alloy.<br />
It can impart good corrosion resistance and weldability or<br />
extremely high strength. Copper has a greatest impact on the<br />
strength and hardness of aluminum casting alloys, both heat<br />
treated and not heat treated and at both ambient and elevated<br />
service temperature. It improve the machinability of alloys by<br />
increasing matrix hardness. Nickel (Ni) enhances the elevated<br />
temperature strength and hardness. Tin(Sn) improves antifriction<br />
characteristic and fluidity of aluminum casting alloys. it decrease<br />
electrolytic potential which is desirable in sacrificial anodes..It is<br />
concluded that selection of alloying element depends on use of<br />
materials requirement.<br />
REFERENCES<br />
[1] Das S., Mondal D.P., Sawla S., Ramkrishnan N.; Synergic effect of<br />
reinforcement and heat treatment on the two body abrasive wear of an<br />
Al–Si alloy under varying loads and abrasive sizes, Wear, Vol. 264 (2008):<br />
pp. 47–59.)<br />
[2] http://wpedia.goo.ne.jp/enwiki<br />
[3] http://www.keytometals.com/Article80.htm, retrieved on 16th April 2011<br />
[4] G.T. Abdel-Jaber et al ―Solidification and Mechanical Properties behavior<br />
of Al-Si Casting Alloys‖ International Journal of Mechanical &<br />
Mechatronics Engineering IJMME-IJENS Vol: 10 No: 04<br />
[5] S.G. Shabestari, H. Moemeni Effect of copper and solidification conditions<br />
on the microstructure and mechanical properties of Al–Si–Mg alloys<br />
Journal of Materials Processing Technology 153–154 (2004) 193–198<br />
[6] Davis, J. R., Corrosion of Aluminum and Aluminum alloys, 1999,<br />
Ohio,ASM International.<br />
[7] Mondolfo, L. F., Aluminum alloys: Structure and Properties, 1976,London,<br />
Butterworths<br />
[8] Zhengang Liuy, Guoyin Zu, Hongjie Luo, Yihan Liu and Guangchun Yao J.<br />
Influence of Mg addition on graphite particle distribution in the Aluminum<br />
alloy matrix composites Mater. Sci. Technol., 2010, 26(3), 244-250.<br />
[9] Shubin Ren , Xinbo He, Xuanhui Qu, Islam S. Humail, Yan Li ― Effect of<br />
Mg and Si in the aluminum on the thermo-mechanicalproperties of<br />
pressureless infiltrated SiCp/Al composites Composites‖ Science and<br />
Technology 67 (2007) 2103–2113.<br />
[10] J E Hanafee Effect of Nickel on Hot Hardness of Aluminum-Silicon Alloys<br />
Materials Science › Miscellaneous Papers volume 71<br />
page514-520<br />
[11] F. Hernández-Méndez, A. Altamira no-Torres et ―Effect of Nickel Addition<br />
on Microstructure and Mechanical Properties of Aluminum-Based Alloys‖<br />
[12] Majed Jaradeh, Torbjorn Carlberg ―Effect of titanium additions on the<br />
microstructure of DC-cast aluminium alloys‖, Materials Science and<br />
Engineering A 413–414 (2005) 277–282<br />
[13] N. Saheb , T. Laoui , A.R. Daud, M. Harun , S. Radiman, R. Yahaya<br />
―Influence of Ti addition on wear properties of Al–Si eutectic alloys‖Wear<br />
249 (2001) 656–662<br />
[14] A. Razaghia, M. Emamy et al ― Sr effect on the microstructure and tensile<br />
properties of A357aluminum alloy and Al2O3/SiC-A357 cast composites‖<br />
M A T E R I A L S C H A R A C T E R I Z A T I O N 6 0 ( 2 0 0 9 ) 1 3 6 1<br />
– 1 3 6 9<br />
[15] Soo Woo Nam and Duck Hee Lee ―the effect of Mn on the Mechanical<br />
Behavior of Al Alloys.‖ METALS AND MATERIALS, Vol. 6, No. 1 (2000),<br />
pp. 13-16<br />
[16] ZHU Mei-jun, DING Dong-yan ― Effect of Zn content on tensile and<br />
electrochemical properties of 3003 Al alloy‖ Transition of non ferrous<br />
metal society china 20(2010)2118-2123<br />
[17] M.C. Carroll, P.I. Gouma ―EFFECTS OF Zn ADDITIONS ON THE<br />
GRAIN BOUNDARYPRECIPITATION AND CORROSION OF Al-<br />
5083‘‘ Scripta mater. 42 (2000) 335–340<br />
[18] John A. Taylor ―The Effect of Iron in Al-Si Casting Alloys‖ Cooperative<br />
Research Centre for Cast Metals Manufacturing (CAST) The University of<br />
Queensland Brisbane, Australia page 1-10<br />
[19] Y. Wang *, Y. Xiong ―Effects of beryllium in Al–Si–Mg–Ti cast alloy‖<br />
Materials Science and Engineering A280 (2000) 124–127<br />
[20] Murali, S and Trivedi, A and Shamanna et al “Effect of iron and combined<br />
iron and beryllium additions on the fracture toughness and microstructures<br />
of squeeze-cast Al-7Si-0.3Mg alloy‟‟. In: Journal of Materials Engineering<br />
and Performance, 5 (4). pp. 462-468<br />
[21] [6] SOFYAN B T, RAVIPRASAD K, RINGER S P. ―Effects of<br />
microalloying with Cd and Ag on the precipitation process of Al-4Cu-<br />
0.3Mg(wt %) alloy at 200 ℃” [J]. Micron, 2001, 32:851−856.<br />
[22] RINGER S P, HONO K, POLMEAR I J, SAKURAL T. ―Nucleation of<br />
precipitation in aged Al-Cu-Mg-(Ag) alloys with high Cu: Mg ratios‖ [J].<br />
Acta Materialia, 1996, 44(5): 1883−1898.<br />
[23] BARLAT F, LIU J.‖ Precipitate-induced anisotropy in binary A1-Cu<br />
alloys‘‘ [J]. Materials Science and Engineering A, 1998, 257: 47−61<br />
[24] XIAO D H, WANG J N, DING D Y, YANG H L. ―Effect of rare earth Ce<br />
addition on the microstructure and mechanical properties of an Al-Cu-Mg-<br />
Ag alloy‖ . Journal of Alloys and Compounds, 2003,352: 84−88.<br />
[25] LI H Z, LING X P, LI F F, GUO F F, LI Z, ZHANG X M. ―Effect ofY on<br />
microstructure and mechanical properties of 2519 aluminum alloy [J].<br />
Transaction of Nonferrous Metals Society of China, 2007,17(6):<br />
1191−1198.<br />
[26] ZHANG X M, WANG W T, LIU B, CHEN M A, LIU Y, GAO Z G,YE L<br />
Y, JIA Y Z. ― Effect of Nd addition on microstructures and heat-resisting<br />
properties of 2519 aluminum alloy‖. The Chinese Journal of Nonferrous<br />
Metals, 2009, 19(1): 15−20. (in Chinese)<br />
[27] XIAO D H, HUANG B Y. ―Effect of Yb addition on precipitation and<br />
microstructure of Al-Cu-Mg-Ag alloys‖ Transactions of Nonferrous<br />
Metals Society of China, 2007, 17(6): 1181−1185.<br />
[28] FANG H C, CHEN K H, ZHANG Z, ZHU C J. ―Effect of Yb addition on<br />
microstructures and properties of 7A60 aluminum alloy‖ .Transactions of<br />
Nonferrous Metals Society of China, 2008, 18(1):28−32.<br />
[29] CHEN K H, FANG H C, ZHANG Z, CHEN X, LIU G. ―Effect of Yb, Cr<br />
and Zr additions on recrystallization and corrosion resistance of Al-Zn-Mg-<br />
Cu alloys‖ [J]. Materials Science and Engineering A, 2008,497: 426−431<br />
[30] FANG Hua-chan CHEN Kang-hua, ZHANG Zhuo, ZHU Chang-jun<br />
―investigate the Effect of Yb additions on microstructures and properties of<br />
7A60 aluminum alloy.‖transition non ferrous metals society china 18(2008)<br />
28-32<br />
First Author – Ravindra Singh RanaAssiatant Professor,<br />
Department of Mechanical Engineering Maulana Azad National<br />
Institute of Technology Bhopal (M.P.) India,<br />
ravindrarana74@gmail.com<br />
Second Author – Dr. Rajesh Purohit, Associate Professor,<br />
Department of Mechanical Engineering Maulana Azad National<br />
Institute of Technology Bhopal(M.P.)India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 60<br />
ISSN 2250-3153<br />
Third Author – Dr. S. Das Scientist, Advanced Materials<br />
Processing Research Institute Bhopal (M.P.) India,<br />
sdas88@hotmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 61<br />
ISSN 2250-3153<br />
Evaluating Demand Response of Hydro Plant with Mixed<br />
Pumped Storage<br />
Abstract- Demand response plays a key role in balancing<br />
the demand and supply in an electricity grid. Though the<br />
demand response measures implemented with industrial<br />
and large commercial consumers are very effective, some<br />
alternate solutions may be required in the case of systems<br />
predominated by domestic loads. Pumped storage schemes<br />
(PSS) are widely used for demand side management (DSM)<br />
applications due to their high efficiency and quick response rate.<br />
But PSS often become unavailable if the environmental<br />
issues are considered. A practical method is to upgrade an<br />
existing hydro plant to a mixed pumped storage plant. This<br />
paper proposes a method to determine the optimum capacity<br />
of a mixed pumped storage unit/units which can be augmented to<br />
an existing hydro plant. In addition the proposed approach can be<br />
easily extended for scheduling applications in deregulated<br />
environment.<br />
Index Terms- energy storage, power demand, hydrology,<br />
power system economics, pumped storage.<br />
.<br />
I<br />
N. Venkateswarlu, M. Velmurugan, and S.Udaya Baskar<br />
Department of EEE<br />
Audisankara College of Engineering & Technology, Gudur, Nellore Dist<br />
I. INTRODUCTION<br />
n an electricity grid, electricity consumption and<br />
production must balance at all times. Any mismatch in the load<br />
generation balance results in violation of power system<br />
parameters. To keep the parameters under limits, the system<br />
operator continuously monitors the grid and adjusts the<br />
generation to match the load. The small variations in demand get<br />
automatically adjusted with governor action. The capacity of the<br />
power system to respond to the changes in demand is crucial as<br />
system reliability and stability are also likely to be affected in<br />
extreme cases. In addition to the technical issues, commercial<br />
interests may have to be forgone unless sufficient planning is<br />
done.<br />
Usually the system operator manages the mismatch<br />
between demand and supply with the spare capacity available in<br />
the running units. Often, the mismatch is carried over to the<br />
nearby control areas through deliberate transactions (planned<br />
energy transfer involving open access) or otherwise<br />
(unscheduled interchange). However, during peak hours, which<br />
are remarkable in some parts of the country, where the demand is<br />
predominated by domestic and commercial load with low base<br />
industrial load, the spare capacity of running units is not<br />
sufficient to maintaining the load-generation balance. In areas<br />
where the irrigation requirement is high, part compensation can<br />
be provided by restricting the permitted hours of consumption of<br />
irrigation load. Kerala is a typical power system with high peak<br />
demand and load factor in the range of 70%. The change of<br />
demand during the onset and decay of evening peak hours runs to<br />
15 – 25 MW/minute.<br />
To keep the generation follow the demand so as to keep the<br />
system parameters under limits, the system operator has to<br />
ensure sufficient capacity to meet the peek demand.The<br />
additional requirement posed on the system during peak hours<br />
has to be met by the marginal capacity available with the<br />
power system. For turbine technology based thermal<br />
generation, the generally acceptable lower level of continuous<br />
generation is 75%. Hence, the additional requirement during<br />
peak hours which goes above 25% capacity of running thermal<br />
units pose a commercial question for the system operator. As<br />
internal combustion engine based generation which are capable<br />
to peaking operation to a certain extent are costly, the first<br />
alternative goes to hydro power. Economics of operation requires<br />
the management of incremental demand during peak with hydro<br />
power, which is operationally flexible for start stops at lowest<br />
cost and part load operation, ability for quick response to<br />
demand changes etc. However, the environmental concern,<br />
especially in the tropical area, is the main hurdle in tapping the<br />
hydro potential. Shortage of hydro potential to meet the peek<br />
demand results in underutilization of the capacity of thermal<br />
units, which are generally designed to operate for base load.<br />
This low utilization factor of generation plants and<br />
uneconomical operation have sparked utilities to invest in energy<br />
storage systems (ESS) such as pumped storage plants,<br />
compressed air energy storage plants, battery energy storage<br />
systems(BES) and superconducting magnetic energy storage<br />
systems(SMES) etc.[1]. Recently significant amount of<br />
researches are reported on ESS, especially on superconducting<br />
magnetic energy storage[2], battery storage[3],flywheel energy<br />
storage[4] and their applicability on power system[5] are<br />
described. With energy storage , energy can b stored on off- peak<br />
load period and dispatched on peak load period [6] proposes a<br />
determination methodology for optimizing the size of ESS<br />
integrated with a thermal power system. Schemes meant for<br />
reduction of peak demand by encouraging off-peak electricity<br />
usage and hence optimized energy efficiency are referred<br />
collectively as demand side management (DSM)[7]. Many<br />
utilities offer Demand Response (DR) programs that offer<br />
incentives for reducing loads for short periods during times of<br />
peak demand. Among the DSM schemes, pumped storage<br />
schemes are widely used because of their availability, high<br />
efficiency and quick response rate[8]. The PSS do not affect the<br />
natural load curve but it‘s double face characteristics (load or<br />
generator) helps to avoid the unnecessary peak plant construction<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 62<br />
ISSN 2250-3153<br />
and also the better utilization of the existing base power<br />
plants[9].<br />
II. MIXED PUMPED STORAGE OPERATION IN EXISTING<br />
PLANTS<br />
The principle behind a pumped storage plant is simple and<br />
proven. During off-peak time , water is pumped from a lower<br />
reservoir to a higher reservoir consuming energy at a cheap rate.<br />
The pumped water is stored in the upper reservoir and is released<br />
in a controlled way during peak time generating electricity. So a<br />
pumped storage plant can be considered as a pseudo customer<br />
who can shift its load from peak time to off peak time. One of the<br />
disadvantages of the pumped scheme from the cost point of view<br />
is the low utilization factor of the generator unit, especially when<br />
the market rate of power is not conducive due to the absence<br />
of price differential between generating mode and pumping<br />
mode operation schedules during some part of the year.<br />
A previous study [10] tried to estimate the optimum<br />
capacity of pumped storage generation that could be added to<br />
Kerala power system so as to optimize on the cost of energy<br />
procured. The results indicated around 300MW in the next 5 year<br />
horizon. However, conceiving a new pumped storage plant is<br />
just unthinkable in the environmentally fragile western ghat area,<br />
the only possible hydel source for Kerala. Hence alternate<br />
solutions were considered.<br />
In the design and conceptualization of hydro electric plants,<br />
the hydrology of the area and expected inflow are the main<br />
parameters deciding the total reservoir capacity. But, the size of<br />
the reservoir is often limited by the optimum submergence that<br />
can be permitted. Such optimization, however, leads to a<br />
situation of under utilization of the hydrological potential at the<br />
location. The unit size and total capacity of the generating<br />
station is to be optimized on cost, which again depends on the<br />
utilized hydro potential. Thus the reservoir is likely to spill<br />
during peak rainy season and may not be able to cater the peak<br />
demand fully.<br />
The present study is to explore the possibility of mixed<br />
pumped storage operation by introducing one or a set of pumped<br />
storage units in a station where the storage capacity of the<br />
reservoir is constrained by design. A mixed pumped storage is a<br />
plant where there is conventional hydro generation in addition to<br />
the pumped storage operation. It has the advantage of improved<br />
generation capacity of the plant and better utilization factor of the<br />
units, thereby reducing the overall cost of generation. In the<br />
proposed methodology such units function as generators during<br />
the monsoon period utilizing the extra capacity which is<br />
otherwise spilled off and operate as a pumped storage scheme<br />
when the inflow is less than the generation capacity of the station<br />
during other than monsoon season.<br />
III. PROPOSED METHODOLOGY<br />
For examining the scope of mixed pumped storage operation,<br />
an existing hydro plant with a significant spill during<br />
monsoon and extra storage capacity during summer is selected.<br />
The reservoir data of the plant for 5 years is collected. These<br />
data are classified into following 3 categories based on the<br />
reservoir storage level.<br />
1 storage between 80% to 100% of full storage capacity<br />
2 storage between 50% to 80% of full storage capacity<br />
3 storage less than 50% of full storage capacity<br />
Category 1<br />
This period mainly consists of the monsoon period which<br />
presents a situation of spillage of the reservoirs in spite of full<br />
generation from the station. This is due to the inflow through<br />
streams which are active only during the active monsoon period.<br />
An additional generation capacity can be thought of to utilize this<br />
spillage which is computed as follows:<br />
Let S be the average spillage in million units for a day during this<br />
season.<br />
The capacity P1 in MW to utilize this spillage = S.1000<br />
24<br />
The spillage during this season can be avoided by utilizing this<br />
additional capacity as a generator for 24 hours in a day.<br />
Category 2<br />
Category 2 is a period where the installed generation capacity in<br />
the station is capable of controlling the inflow. In this season<br />
the proposal is to introduce an additional generation<br />
capacity which is meant for peak hours by controlling the<br />
generation during off peak hours. The limiting capacity<br />
corresponds to the capability of reservoir to reduce the<br />
generation from the existing units so as to preserve water for the<br />
additional unit without compromising on the water discharge to<br />
the river. The additional generation is considered during peak<br />
hours (say 4 hours). The computation is based on the average rate<br />
of inflow during this period.<br />
Let i be the inflow rate in a day in this season.<br />
Total inflow for 4 hours I= i.4 mu.<br />
Unit size P2 in MW required to deplete this inflow= I.1000<br />
4<br />
Category 3<br />
In the situation represented by category 3, the inflow will not be<br />
sufficient to keep the existing generators work round the clock.<br />
This season correspond to pumped storage operation. The<br />
maximum limit of capacity is obtained from the extra storage<br />
possible. This is a very high value. But practically the size of the<br />
lower reservoir fixes the upper limit of the capacity whose<br />
computation is beyond the scope of this study.<br />
The unit size can be fixed by finding the optimum value on the<br />
basis of further studies on environment impact and other<br />
related matters.<br />
Case study<br />
As an illustration, Peringalkkutthu hydro plant operated by<br />
Kerala Electricity Board and connected to Southern Electricity<br />
Grid of Indian power system is considered. The plant has a total<br />
capacity of 48MW with 4 units of 8MW capacity and one unit<br />
having 16MW. The reservoir data is analyzed for 2006-10. The<br />
additional capacities that can be introduced in each category are<br />
found by the proposed methodology and the values are shown in<br />
table1.<br />
Table 1: Addition of Mixed Storage Capacity<br />
Category Capacity (MW)<br />
Duration of the<br />
year ( % )<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 63<br />
ISSN 2250-3153<br />
1 16 30<br />
2 12 15<br />
3 - 55<br />
IV. RESULTS AND DISCUSSION<br />
It is seen that the capacities that can be added to category 1<br />
and 2 are 16 MW and 12 MW respectively. The upper limit of<br />
the capacity suitable for category 3 is fixed on the basis of the<br />
extra storage possible in this season whereas the size of the lower<br />
reservoir fixes the lower end whose calculation is beyond the<br />
scope of this study. However, this capacity can be fixed as the<br />
optimum capacity that can produce maximum returns.<br />
A. Determination of optimum capacity<br />
The optimum capacity is the one which produces maximum<br />
annual returns. Since there is a maximum limit for the capacity<br />
for each mode of operation, the income for different capacities is<br />
not linear. The total annual income (B) for each capacity is<br />
calculated by calculating the income obtained in each mode of<br />
operation assuming an average market price for each season. The<br />
price is taken as the day ahead market clearing price (MCP) of<br />
the southern region (SR) in the Indian Energy Exchange for the<br />
year 2010 [11]. Commercial figures of plant characteristics are<br />
not readily available Indian context. Hence figures as shown in<br />
table 2 as per a study on European system [12] are considered for<br />
the analysis. The annual fixed cost (C) is calculated with the<br />
following assumptions:<br />
Investment =Rs.3crore/MW assuming the availability of upper<br />
reservoir and the power evacuation system<br />
Interest/returns @10%<br />
Life of the plant =35 years<br />
Depreciation (assuming straight line depreciation with<br />
10% residual value) =2.57%<br />
Operation & maintenance cost=1% of investment<br />
Then the annual returns R=B-C<br />
The annual returns for different capacities are shown below:<br />
Figure 1. Average annual returns Vs pump capacity<br />
Table 2: Pumped Storage Characteristics<br />
Efficiency 65-80%<br />
Duration of power<br />
supply<br />
Hours up to days<br />
Capacity 10MW -1GW<br />
Total capital cost<br />
2700-3300 USD/KW<br />
(upgrade<br />
600USD/KW)<br />
From the figure it is clear that the optimum capacity of pumped<br />
storage which can be installed in Peringalkkuthu station is 16<br />
MW. It can be seen that the annual returns come around 90<br />
million rupees so that the pay back period is almost 5 years. This<br />
methodology can be used to find the optimum capacity of the<br />
additional mixed pumped storage unit/units which can be<br />
augmented to any existing hydro plant where there is significant<br />
spillage during monsoon and excess storage capacity during<br />
summer.<br />
B. Determination of unit size:<br />
Determination of unit size has to take into account the<br />
possibility of full load operation in all possible cases of<br />
operation. Another point considered is regarding the availability<br />
of the unit in case of a breakdown. In consideration of<br />
these aspects, the additional 16 MW capacity can be installed as<br />
two units of 8 MW size.<br />
C. Sump reservoir capacity:<br />
The sump reservoir capacity corresponds to the maximum<br />
water that has to be stored in the sump for pumping to the main<br />
reservoir. The pumping is expected for a period which<br />
corresponds to the generation in the pumped storage mode of<br />
operation. This is assumed as 4 hours in this study. Hence, the<br />
effective sump capacity can be taken as the water equivalent<br />
corresponding to this generation. From the data of the existing<br />
station, assuming the water/energy ratio (2.86 for this plant) as<br />
almost the same as that of the existing unit, the effective storage<br />
of the sump reservoir can be determined as 0.185 MCM.<br />
V. CONCLUSION<br />
We have shown that there is a large hydro potential in many of<br />
the existing hydro plants which can be tapped easily for efficient<br />
and economic operation of power systems. Capacity addition of<br />
the station with a mixed pumped storage scheme is studied in<br />
detail in this paper. Though many studies have been made on the<br />
optimum operation of pumped storage schemes, the concept of a<br />
mixed plant and the part operation of the unit as a pure generator<br />
are not seen deliberated in detail in literatures. The cost impact<br />
is also studied with this mode of operation. The addition of<br />
capacity is ensured year round, contributing to the additional<br />
hydro requirement for effective demand side management and<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 64<br />
ISSN 2250-3153<br />
hence optimise the cost of power procurement. The proposed<br />
method is extremely simple for the system managers to adopt and<br />
implement.<br />
REFERENCES<br />
[1] V.T. Sulzberger and I. Zeinoski, "The Potential for Application of Energy<br />
Storage Capacity on Electrical Utility Systems in The United States-Part<br />
I," IEEE Transactions on Power Apparatus and Systems, Vol.PAS-95,<br />
No.6, pp. 1872-1881, November/December 1976.<br />
[2] Luongo C.A, ‗Superconducting storage systems‘, IEEETrans. Magn.,<br />
1996, 32, pp. 2214–2223<br />
[3] Mcdowall. J, ‗Conventional battery technologies-Present and future‘.<br />
Proc. 2000 IEEE Power EngineeringSociety Summer Meeting, July<br />
2000, vol. 3, pp. 1538–1540<br />
[4] Taylor.P, Johnson L, Reichart. K, Dipietro P, Philip J, Butlar .P, ―A<br />
summary of the state of the art of superconducting magnetic energy<br />
storage systems, flywheel energy storage systems, and compressed air<br />
energy storage systems‖ .SAND99-1854, Sandia National Labs, 1999<br />
[5] Ribeiro P.F, Johnson B.K, Crow M.L, Arsoy A, Liu Y , ‖Energy storage<br />
systems for advanced power applications‖, Proc.IEEE, 2001, 19, (12),<br />
pp. 1744–1756<br />
[6] S.Chakraborty, T.Senjyu, H.Toyama, A.Y.Saber.T. unabashi,<br />
―Determination methodology for optimising the energy storage size for<br />
power system‖, IET Gener. Transm. Distrib., 2009, Vol. 3, Iss. 11, pp.<br />
1987–999<br />
[7] Sheen J.N, ―Economic profitability analysis of demandside<br />
management program‖ , Energy Conversion and Management,2005, 46,<br />
(18–19), pp. 2919–2935<br />
[8] Ibrahim H,Ilinca A, Perron J, ―Energy storage systems–characteristics<br />
and comparisons‖, Renewable and Sustainable EnergyReviews, 2008,12,<br />
(5), pp. 1221–1250<br />
[9] Peter Kadar: ―Pumped Storage Hydro Plant model for educational<br />
purposees‖ ICREPQ‘ 09 International Conference on Renewable Energy<br />
and Power Qualiry; Valencia,Spain, April 15-17, 2009.<br />
[10] P.G.Latha,S.R.Anand,Imthias Ahamed,G.Madhu,‖A Different<br />
Approach on Pumped Storage Scheduling‖,AECT 2011,4 th National<br />
Conference on Advanced Energy Conversion Technologies.<br />
MIT,Manipal,India,Feb 03-05,2011<br />
[11] Market clearance price in power exchange (www.iexindia.com)<br />
[12] G Tobias Geschler,‖ Survey of energy storage options in Europe,<br />
London‖ Research International Ltd, London, March 2010.<br />
AUTHORS<br />
First Author – N. Venkateswarlu, Department of EEE<br />
Audisankara College of Engineering & Technology, Gudur,<br />
Nellore Dist.<br />
Second Author – M. Velmurugan, Department of EEE<br />
Audisankara College of Engineering & Technology, Gudur,<br />
Nellore Dist.<br />
Third Author – S.Udaya Baskar, Department of EEE<br />
Audisankara College of Engineering & Technology, Gudur,<br />
Nellore Dist.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 65<br />
ISSN 2250-3153<br />
Tamil Speech Recognition using Semi Continuous Models<br />
Abstract- In this paper novel approach for implementing Tamil<br />
Language Semi continuous speech recognition based on Hidden<br />
Markov Models is discussed. Tamil and other Indian languages<br />
share phonological features which are rich in vowel and<br />
consonant realizations. The same phone in different words has<br />
different realizations. This can be overcome by employing<br />
phone-in-context. Therefore triphone models were chosen as<br />
suitable sub-word units for acoustic training. The system is<br />
trained with speech corpus of 37 Tamil phones. Speech corpus<br />
consisted of 0.35 hours of speech. Training was done using<br />
Carnegie Mellon University (CMU)‘s SphinxTrain acoustic<br />
model Trainer. Accuracy of the training is measured by decoding<br />
using PocketSphinx.<br />
Index Terms- Speech Recognition, Tamil Phones, Acoustic<br />
Model, Hidden Markov Model, Training<br />
S<br />
I. INTRODUCTION<br />
peech is human‘s most efficient mode of communication and<br />
is an alternative to traditional methods of interaction with a<br />
computer. Beyond efficiency, humans are comfortable and<br />
familiar with speech as it is the natural mode of communication.<br />
Tamil is a Dravidian language spoken predominantly in the state<br />
of Tamilnadu in India and Sri Lanka. It is the official language of<br />
the Indian state of Tamilnadu and also has official status in Sri<br />
Lanka and Singapore [9].<br />
II. TAMIL PHONOLOGY<br />
Tamil phonology is characterised by the presence of<br />
retroflex consonants and multiple rhotics[7]. Tamil phonemes are<br />
categorized into vowels, consonants, and a secondary character,<br />
the āytam.<br />
A. Vowels<br />
With respect to orthography, vowels occur in their isolated<br />
character only in the beginning position of words. In all the other<br />
positions, such as medial and final positions, they are realized in<br />
the form of a secondary symbol.<br />
TABLE I: Tamil Vowels [5,8]<br />
S. No Vowel VL VH VF LR<br />
1. அ s l b -<br />
2. ஆ l l b -<br />
3. இ s h f -<br />
4. ஈ l h f -<br />
Hanitha Gnanathesigar<br />
Informatics Institute of Technology, Sri Lanka,<br />
5. உ s h b +<br />
6. ஊ l h c +<br />
7. s m f -<br />
8. d c - -<br />
9. d c - -<br />
10. எ s m b +<br />
11. ஏ l m c +<br />
12. ஐ d c - +<br />
VL Vowel Length (s)hort, (l)ong, (d)ipthong, sc(h)wa,<br />
(g)eminate<br />
VH Vowel Height (h)igh, (m)id, (l)ow, (c)losing, (o)pening<br />
VF Vowel Frontness front, mid, back<br />
LR Lip Rounding (+) Yes, (-) No<br />
B. Consonants<br />
There are 18 consonants in Tamil Language.<br />
ஓ ட த ந<br />
ஒ ஞ ண<br />
ன ப<br />
However depending on the context certain consonants are<br />
pronounced differently increasing the number of consonant<br />
phonemes to 25. Nasal consonants , ண, , ஒ and are<br />
pronounced variously based on the environment in which they<br />
occur. The consonants with which these nasals occur include ,<br />
த ட and .<br />
க is pronounced 'g' after nasal consonants.<br />
Eg: அங்க<br />
க is pronounced 'h' between vowels and after ர் and ய்.<br />
Eg: தல், ஊர்ள்<br />
க is pronounced 'k' in word initial position and in clusters<br />
Eg: ர<br />
ச is pronounced 's' between vowels and optionally in word initial<br />
position<br />
Eg: ஆரஓ, சஓவ்ாய்<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 66<br />
ISSN 2250-3153<br />
ஓ is pronounced 'ch' in word initial position and in clusters<br />
Eg: சஓவ்ாய், தச்ரஓ<br />
ஓ is pronounced 'j' after nasal consonants<br />
Eg: தஞ்சு<br />
ட is pronounced D after nasal consonants and between vowels<br />
Eg: ண்டி, ஏடம்<br />
ட is pronounced t in word initial position and in clusters<br />
Eg: டாம், தட்டு<br />
is pronounced dh after nasal consonants and between vowel<br />
Eg: தந்து, அது<br />
is pronounced th in word initial position and in clusters<br />
Eg: ிழ். தத்து<br />
த is pronounced b after nasal consonants and between vowels<br />
Eg: ம்தி, அதாம்<br />
த is pronounced p in word initial position and in clusters<br />
Eg: தடி, அப்தா<br />
TABLE II<br />
Tamil Consonants [5,8]<br />
S. No Consonant IPA TC PA CV<br />
1. k p v -<br />
2. g p v +<br />
3. h f g -<br />
4. ஒ ŋ n v +<br />
5. ஓ tʃ f p +<br />
6. ஓ s f a -<br />
7. ஓ ʝ f p +<br />
8. ஞ ɲ n p +<br />
9. ட ʈ p r -<br />
10. ட ɖ p r +<br />
11. n n a +<br />
12. t p a -<br />
13. d p a +<br />
14. ɳ n r +<br />
15. த P p b -<br />
16. த b p b +<br />
17. m n b +<br />
18. j m p +<br />
19. R t u +<br />
20. ன l m a +<br />
21. v f l +<br />
22. L m v +<br />
23. ப ɭ m r +<br />
24. ந r t a +<br />
25. ண N n u +<br />
TC Type of Consonant (n)asal, (p)losive, (f)ricative,<br />
appro(x)imant, (t)rill, flap or (t)ap, late(r)al fricative, lateral<br />
approxi(m)ant, ( l)ateral flap<br />
PA Place of Articulation (b)ilabial, (l)abio-dental, (d)ental,<br />
(a)lveolar, p(o)st-alveolar, (r)etroflex, (p)alatal, (v)elar,<br />
(u)vular, p(h)aryngeal, (e)piglottal, (g)lottal<br />
CV Consonant Voicing (+) Yes, (-) No, NA Not Applicable<br />
S.<br />
No<br />
TABLE III<br />
Tamil Phonemes<br />
ARPABET IPA Tamil<br />
1. AH ʌ அ - அம்ா<br />
2. AA aː ஆ - ஆம்<br />
3.<br />
4.<br />
IH ɪ இ - இது<br />
IY i ஈ - ஈ<br />
5. UH ʊ உ - உனம்<br />
6. UW uː ஊ - ஊர்<br />
7. EH ɛ - ண்தது<br />
8. EY əɪ - ற்நம்<br />
9. AY aɪ - கா<br />
10. AO ɔ எ - எரு<br />
11. OH ɔː ஏ - ஏடு<br />
12. AW aʊ ஐ<br />
13. K k - அக்ா<br />
14. G g - அங்க<br />
15. HH h - தல்<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 67<br />
ISSN 2250-3153<br />
16. NG ŋ ஒ - அங்க<br />
17. CH tʃ ஓ - தச்ரஓ<br />
18. S s ஓ - ஆரஓ<br />
19. J ʝ ஓ - தஞ்சு<br />
20. NC ɲ ஞ - தஞ்சு<br />
21. T ʈ ட - தாட்டு<br />
22. D ɖ ட - ாடு<br />
23. NX n - ண்<br />
24. TH t̪ - தத்து<br />
25. DH d̪ - அது<br />
26. NH ɳ - தந்து<br />
27. P P த - தத்து<br />
28. B b த - காதம்<br />
29. M m - ரன<br />
30. Y j - சாய்ா<br />
31. RR R - ர<br />
32. L l ன - தல்<br />
33. V v - சஓவ்ாய்<br />
34. Z L - ிழ்<br />
35. LL ɭ ப - டவுள்<br />
36. R r ந - ரந<br />
37. N N ண - ான்<br />
III. CHOICE OF SUB-WORD UNIT FOR TRAINING<br />
The number of words in Tamil is around 3 lakhs (approx.).<br />
Hence maintaining a large vocabulary is also difficult when the<br />
system needs to use Tamil[10]. For a language with large<br />
vocabulary like Tamil, training all the words adequately is<br />
problematic. Also memory requirement grows linearly with<br />
number of words. A syllable is a larger unit than a phone since it<br />
encompasses two or more phone clusters. These phone clusters<br />
account for the severe contextual effects. Tests on measuring<br />
accuracy of syllable-based Automatic Speech Recognition (ASR)<br />
reveals that the baseline results were much higher than<br />
monophone ASR and slightly worse than fine-tuned triphone<br />
ASR[2]. For both the phone and word recognition, triphone<br />
model reduced word error rate (WER) by about 50% [11]. In this<br />
scenario, when the vocabulary is high and speakers are limited,<br />
triphone based model is suitable.<br />
IV. TRAINING<br />
Hidden Markov Model based system, like all other speech<br />
recognition systems, functions by first learning the characteristics<br />
(or parameters) of a set of sound units, and then using what it has<br />
learned about the units to find the most probable sequence of<br />
sound units for a given speech signal. The process of learning<br />
about the sound units is called training. Acoustic models for<br />
Tamil language is created using SphinxTrain. SphinxTrain is<br />
CMU‘s open source acoustic model trainer[6]. It consists of a set<br />
of programs, each responsible for a well defined task and a set of<br />
scripts that organizes the order in which the programs are called.<br />
A. Transcript File<br />
The trainer also needs to be told which sound units you want<br />
it to learn the parameters of, and at least the sequence in which<br />
they occur in every speech signal in your training database. This<br />
information is provided to the trainer through transcript file. In<br />
this the sequence of words and non-speech sounds are written<br />
exactly as they occurred in a speech signal, followed by a tag<br />
which can be used to associate this sequence with the<br />
corresponding speech signal.<br />
UTAVIYI KAADCHIPADUTTUVATIL TAVARU <br />
(utt13)<br />
KURAL KADDUPAATTU URUPADI PEECINAAL<br />
MEELMEESIYI KADDUPADUTTA UTAVUM (utt14)<br />
B. Control File<br />
This file consists of name of each audio file used for training.<br />
utt1<br />
utt2<br />
utt3<br />
utt4<br />
C. Dictionary Files<br />
This file maps every word to a sequence of sound units, to<br />
derive the sequence of sound units associated with each signal.<br />
There are two dictionaries. One in which legitimate words in the<br />
language are mapped sequences of sound units and another in<br />
which non-speech sounds are mapped to corresponding nonspeech<br />
or speech-like sound units. Former is the language<br />
dictionary and the latter filler dictionary.<br />
AAYATTAM AA Y AH TH TH AH M<br />
ADIVU AH D AY V UH<br />
ADUTTA AH D UH TH TH AH<br />
SIL<br />
SIL<br />
SIL<br />
D. Phone List<br />
This tells the trainer what phones are part of the training set. It<br />
is made by listing all the above identified ARPABET phones<br />
without duplicates and arranged alphabetically.<br />
AA<br />
AH<br />
AO<br />
AY<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 68<br />
ISSN 2250-3153<br />
E. Language Model<br />
Statistical tri-gram language models were built using the Sphinx<br />
Knowledge Base Tool for a corpus of 334 sentences and 85<br />
unique words.<br />
F. Development of speech Corpus<br />
Contemporary speech recognition systems derive their power<br />
from corpus based statistical modeling, both at the acoustic and<br />
language levels. Corpus is a large collection of written or spoken<br />
texts available in machine readable form accumulated in<br />
scientific way to represent a particular variety or use of a<br />
language [4]. It serves as an authentic data for linguistic and<br />
other related studies. Statistical modeling, of course, presupposes<br />
that sufficiently large corpora are available for training. For<br />
Tamil language such corpora, particularly acoustic ones, are not<br />
immediately available for processing[3]. Therefore necessary<br />
speech corpora are developed in-house. All the utterances of the<br />
transcript files are recorded and corpus is developed based on<br />
following parameters.<br />
TABLE IV<br />
Speech Corpus Parameters<br />
Parameter Value<br />
File Type mswav<br />
File Extension Wav<br />
Sampling Rate 16 kHz<br />
Depth 16 bits<br />
Mono/Stereo Mono<br />
Feature File Extension mfc<br />
Vector Length 13<br />
G. Training of acoustic models with sphinxTrain<br />
It consists of following steps [6].<br />
1. Flat-start monophone training: Generation of monophone seed<br />
models with nominal values, and re-estimation of these models<br />
using reference transcriptions. This is also called flat<br />
initialization of CI model parameters.<br />
2. Baum-Welch training of monophones: Adjustment of the<br />
silence model and re-estimation of single-Gaussian monophones<br />
using the standard Viterbi alignment process.<br />
3. Triphone creation: Creation of triphone transcriptions from<br />
monophone transcriptions and initial triphone training. This step<br />
creates CD untied model files and flat initialization of model<br />
files.<br />
4. Training CD untied models: Again the Baum-Welch algorithm<br />
is iteratively used. This takes 6 – 10 iterations.<br />
5. Building decision trees and parameter sharing: A group of<br />
similar states is called a senone. Senone is also called as a tied<br />
state. Then the senones are trained.<br />
6. Mixture generation: Split single Gaussian distributions into<br />
mixture distributions using an iterative divide-by-two clustering<br />
algorithm and re-estimation of triphone models with mixture<br />
distributions.<br />
H. Decoding<br />
PocketSphinx, CMU‘s fastest speech recognition system is<br />
used to for decoding. It‘s a library written in pure C which is<br />
optimal for development of C applications as well as for<br />
development of language bindings. At real time speed it‘s the<br />
most accurate engine, and therefore it is a good choice for live<br />
applications. Also it includes support for embedded devices with<br />
fixed-point arithmetic. This is built on top of Sphinx3[1]. The<br />
results are tabulated in the following table.<br />
Type of<br />
Data<br />
Trained<br />
Corpus<br />
Test<br />
corpus<br />
Trained<br />
Corpus<br />
Test<br />
Corpus<br />
TABLE V<br />
Results – Error Rate<br />
Hours of No. of Sentence Word<br />
Training Segmen Error Error<br />
ts Rate Rate<br />
0.17 (10 167 81.4% 89.9%<br />
min)<br />
(136/167) (283/316)<br />
0.17 (10 133 97.7% 100.4%<br />
min)<br />
(130/133) (252/251)<br />
0.35 (21 334 1.8% 0.9%<br />
min)<br />
(6/334) (6/632)<br />
0.35 (21 7 57.1(4/7) 46.1%(11<br />
min)<br />
/26)<br />
I. Results<br />
Word error rate (WER) is calculated as<br />
S D I<br />
WER <br />
N<br />
where<br />
S is the number of substitutions,<br />
D is the number of the deletions,<br />
I is the number of the insertions,<br />
N is the number of words in the reference.<br />
Word accuracy (WAcc) is calculated as<br />
N S D I<br />
WAcc 1<br />
WER<br />
N<br />
TABLE VII<br />
Results – Word Accuracy<br />
Type of Hours of No. of Word<br />
Data Training Segments Accuracy Rate<br />
Trained<br />
Corpus<br />
0.17 (10 min) 167 10.1%<br />
Test<br />
corpus<br />
0.17 (10 min) 133 -0.4%<br />
Trained 0.35 (21 min) 334 99.1%<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 69<br />
ISSN 2250-3153<br />
Corpus<br />
Test<br />
Corpus<br />
0.35 (21 min) 7 53.9%<br />
V. CONCLUSION<br />
37 phonemes are identified in Tamil Language. Of which 12<br />
are vowels and 25 consonants. Acoustic model training for semi<br />
continuous models was performed using SphinxTrain. Results of<br />
the Decoding carried out by PocketSphinx shows that the<br />
accuracy was higher for trained corpus in compare to test corpus.<br />
Though only little amount of Training was performed it is<br />
observed that accuracy improved tremendously with increased<br />
training.<br />
REFERENCES<br />
[1] Carnegie Mellon University, (2010). Pocketsphinx. [<strong>Online</strong>] Available<br />
from: http://cmusphinx.sourceforge.net/wiki/versions [Accessed 16 January<br />
2011].<br />
[2] Hejtmánek, J. A. P., T., (2008). Automatic speech recognition using<br />
context-dependent syllables. 9th International PhD Workshop on Systems<br />
and Control: Young Generation Viewpoint. Izola, Slovenia.<br />
[3] Ganesh, K. M., Subramanian, S.(2002). Interactive Speech Translation in<br />
Tamil. College of<br />
Technology, Peelamedu.<br />
[4] Ganesan, M. (n.d). Tamil Corpus Generation and Text Analysis. Annamalai<br />
University<br />
[5] IPA, (2005). ―The International Phonetic Association (revised to 2005) IPA<br />
Chart.‖ [<strong>Online</strong>]. Available:<br />
http://www.langsci.ucl.ac.uk/ipa/IPA_chart_(C)2005.pdf<br />
[6] Singh, R. (2000). SphinxTrain Documentation [<strong>Online</strong>]. Available at<br />
[Accessed 02<br />
January 2011].<br />
[7] Schiffman, Harold F.; Arokianathan, S. (1986). "Diglossic variation in<br />
Tamil film and fiction". In Krishnamurti, Bhadriraju; Masica, Colin P..<br />
South Asian languages: structure, convergence, and diglossia. New Delhi:<br />
Motilal Banarsidass. pp. 371–382. ISBN 8120800338. at p. 371<br />
[8] Schiffman, Harold F.; Arokianathan, S. (1999). "A reference grammar of<br />
spoken Tamil‖ [<strong>Online</strong>]. Available<br />
:http://books.google.com/books?id=Oqe-<br />
QsaZnnQC&lpg=PP1&pg=PP1#v=onepage&q&f=false<br />
[9] Thangarajan, R., Nagarajan,A.M., Selvam, M., (2008). Word and triphone<br />
based approaches in<br />
continuous speech recognition for Tamil language. WSEAS Transactions<br />
on signal processing, 4, 76-85.<br />
[10] Thilak, R. A., Madharaci, R. (2004). Speech Recognizer for Tamil<br />
Language. Tamil Internet<br />
2004,Singapore.<br />
[11] Lee, K., (1990). Context-Dependent Phonetic Hidden Markov Models for<br />
Speaker-Independent Continuous Speech Recognition., Carnegie Mellon<br />
University.<br />
AUTHORS<br />
Hanitha Gnanathesigar, BSc (Hons) Software Engineering,<br />
Informatics Institute of Technology (IIT), Sri Lanka,<br />
ghanitha@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 70<br />
ISSN 2250-3153<br />
Complex Dynamics in a Mathematical Model of Tumor<br />
Growth with Time Delays in the Cell Proliferation<br />
M. Saleem and Tanuja Agrawal<br />
Department of Applied Mathematics, Z. H. College of Engineering & Technology,<br />
A.M.U, Aligarh (UP) 202002, India<br />
Abstract- In this paper, a simple prey-predator type model for<br />
the growth of tumor with discrete time delay in the immune<br />
system is considered. It is assumed that the resting and hunting<br />
cells make the immune system. The present model allows delay<br />
effects in the growth process of the hunting cells. Qualitative and<br />
numerical analyses for the stability of equilibriums of the model<br />
are presented. Length of the time delay that preserves stability is<br />
given. It is found that small delays guarantee stability at the<br />
equilibrium level (stable focus) but the delays greater than a<br />
critical value may produce periodic solutions through Hopf<br />
bifurcation and larger delays may even lead to chaotic attractors.<br />
Implications of these results are discussed.<br />
Index Terms- tumor growth, prey-predator model, immune<br />
system, time delay.<br />
I<br />
I. INTRODUCTION<br />
t is well known that the cancer is one of the greatest killers in<br />
the world and the control of tumor growth requires great<br />
attention. The development of a cancerous tumor is complex and<br />
involves interaction of many cell types. Main components of<br />
these cells are tumor cells (or abnormal cells also known as bad<br />
cells) and immune and healthy tissue cells (or normal cells also<br />
known as good cells).<br />
A tumor is a dynamic nonlinear system in which bad cells<br />
grow, spread and eventually overwhelm good cells in the body.<br />
The form of the dynamic nonlinear system modeling the cancer<br />
and the class of the equations which describe such a system are<br />
related to the scaling problem. Indeed, there are three natural<br />
scales which are connected to different stages of the disease and<br />
have to be identified. The first is the sub-cellular (or molecular)<br />
scale, where one focuses on studying the alterations in the<br />
genetic expressions of the genes contained in the nucleus of a<br />
cell. As a result of this some special signals which are received<br />
by the receptors on the cell surface are transmitted to the cell<br />
nucleus. The second is the cellular scale, which is an<br />
intermediate level between the molecular scale and the<br />
macroscopic scale to be described in the following. The third is<br />
the macroscopic scale, where one deals with heterogeneous<br />
tissues. In the heterogeneous tissues, some of the layers (e.g. the<br />
external proliferating layer, the intermediate layer and the inner<br />
zone with necrotic cells) constituting the tumor may occur as<br />
islands. This leads to a tumor comprising of multiple regions of<br />
necrosis engulfed by tumor cells in a quiescent or proliferative<br />
state [1]. In case of macroscopic scale, the main focus is on the<br />
interaction between the tumor and normal cells (e.g., immune<br />
cells and blood vessels) in each of the three layers. For more<br />
details about description of the scaling problem and the passage<br />
from one scale to another, one may refer to Bellomo et al. [1, 2].<br />
A great research effort is being devoted to understand the<br />
interaction between the tumor cells and the immune system.<br />
Mathematical models using ordinary, partial, and delay<br />
differential equations [3] play an important role in understanding<br />
the dynamics and tracking the tumor and immune system<br />
populations over time.<br />
Many authors have used mathematical models to describe the<br />
interaction among the various components of tumor<br />
microenvironment, (see de Boer et al. [4], Goldstein et al. [5], de<br />
Pillis et al. [6] and Kronic et al. [7]). These papers mainly deal<br />
with immune response to tumor growth. In the last few years a<br />
great deal of human and economical resources is devoted to<br />
cancer research with a view to develop different control<br />
strategies and drug therapies with main emphasis on<br />
experimental aspects and immunology (see Aroesty et al. [8],<br />
Eisen [9], Knolle [10], Murray [11], Adam [12], Adam and<br />
Panetta [13], Owen and Sherrat [14], de Pillis et al. [15], Dingli<br />
et al. [16] and Menchen et al. [17]). There are many existing<br />
reviews of mathematical models of tumor growth and tumor<br />
immune system interactions such as Bellomo and Preziosi [18],<br />
Araujo and McElwain [19], Nagy [20], Byrne et al. [21],<br />
Castiglione and Piccoli [22], Martins et al. [23], Roose et al. [24],<br />
Chaplain [25] and Bellomo et al. [26]. Some of these reviews<br />
follow a historical approach (Araujo and McElwain [19]) while<br />
others focus on multi-scale modeling or on particular aspects of<br />
tumor evolution Bellomo and Preziosi [18], Martins et al. [23]<br />
and Bellomo et al. [26]). Recently, Bellomo et al. [27] study the<br />
competition between tumor and immune cells modeled by a<br />
nonlinear dynamical system which identifies the evolution of the<br />
number of cells belonging to different interacting populations<br />
such as tumor and immune cells at different scales namely<br />
molecular, cellular and macroscopic. Bellomo and Delitala) [28]<br />
have applied the methods of the classical mathematical kinetic<br />
theory for active particles to study the immune competition with<br />
special attention to cancer phenomena. They mainly focus on<br />
modeling aspects of the early stage of cancer onset and<br />
competition with the immune system.<br />
Several authors have used the concept of prey-predator type<br />
interactions in tumor studies where in general the immune cells<br />
play the role of predator and the tumor cells that of prey (see<br />
Kuznetsov et al. [29], Kirschner and Panetta [30], Sarkar and<br />
Banerjee [31], and El-Gohary [32]). These are mainly ordinary<br />
differential equation models which certainly provide a simpler<br />
framework within which to explore the interactions among tumor<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 71<br />
ISSN 2250-3153<br />
cells and the different types of immune and healthy tissue cells.<br />
Kuznetsov et al. [29] study nonlinear dynamics of immunogenic<br />
tumors with emphasis on parameter estimation and global<br />
bifurcation analysis. Immunotherapy of tumor-immune<br />
interaction has been studied by Kirschner and Panetta [30]. They<br />
indicated that the dynamics between tumor cells, immune cells,<br />
and IL-2 can explain both short-term oscillations in tumor size as<br />
well as long-term tumor relapse. Sarkar and Banerjee [31]<br />
discuss self-remission and tumor stability by taking stochastic<br />
approach.<br />
The delay differential equations have long been used in<br />
modeling cancer phenomena [33, 34, 35, 36, 37, 38, 39]. Byrne<br />
[40] considers the effect of time delay on the dynamics of<br />
avascular tumor growth by incorporating a time-delayed factor<br />
into the net proliferation rate of the cells. Buric et al. [41]<br />
consider the effects of time delay on the two-dimensional system<br />
which represents the basic model of the immune response. They<br />
study variations of the stability of the fixed points due to time<br />
delay and the possibility for the occurrence of the chaotic<br />
solutions. Recently Fory‘s and Kolev [42] propose and study the<br />
role of time delay in solid avascular tumor growth. They study a<br />
delay model in terms of a reaction-diffusion equation and mass<br />
conservation law. Two main processes are taken into account i.e.<br />
proliferation and apoptosis. Galach [43] studies a simplified<br />
version of the Kuznetsov-Taylor model where immune reactions<br />
are described by a bilinear term with time delay. Yafia [44]<br />
analyzes an interaction between the proliferating and quiescent<br />
cells tumor with a single delay. He shows the occurrence of Hopf<br />
bifurcation as the delay crosses some critical value.<br />
Recently, El-Gohary [32] studied a cancer selfremission<br />
and tumor system and provided optimal control<br />
strategies that made its unstable steady states asymptotically<br />
stable. In the present paper, we introducing a model with<br />
constant time delay T in the growth rate of the hunting cells of<br />
the immune system. This model while on one hand incorporates<br />
certain thresholds which may be helpful to control the tumor cell<br />
growth; on the other hand it hints at the complex dynamics that a<br />
tumor may have. It may be mentioned here that by representing<br />
tumor growth with ordinary differential equations we indeed<br />
operate in the present study at the super-macroscopic scale while<br />
the link with the lower cellular scale is represented by the delay.<br />
Of course, we do not consider heterogeneity, mutations and link<br />
with the lower molecular scale in the present paper (for details<br />
one may see [27, 28, 45, 46]).<br />
II. THE MODEL AND EQUILIBRIUM SOLUTIONS<br />
In this paper, we shall study the dynamical behaviors of a<br />
simple prey-predator type model for the growth of tumor with<br />
discrete time delay in the immune system. We are assuming<br />
that there is a constant time delay since the time resting cells<br />
give signal to hunting cells for activation and the mature<br />
hunting cells are ready to kill the tumor cells. More<br />
specifically, we incorporate the growth term in equation (2.1b)<br />
by . The model developed consists of<br />
the following three equations:<br />
(2.1)<br />
In (2.1), different variables and parameters have the following<br />
interpretations:<br />
, , : Densities of tumor cells, hunting predator cells and<br />
resting cells at time<br />
: Growth rate of tumor cells<br />
: Rate of killing of tumor cells by hunting cells<br />
: Specific loss rates of the tumor cells<br />
:Conversion rate of the resting cells to hunting predator cells<br />
: Specific loss rates of the hunting predator cells<br />
: Rate of killing of hunting predator cells by tumor cells<br />
: Growth rate of resting cells<br />
:Conversion rate of the resting cells to hunting predator cells<br />
: Specific loss rates of the resting cells<br />
: Rate of killing of resting cells by tumor cells<br />
Equating the right hand side of (2.1) to zero the following<br />
equilibrium points can be obtained.<br />
1. The first equilibrium state is given by<br />
2. The second equilibrium state is given by<br />
, always exist<br />
We can easily observe that this equilibrium state is positive if<br />
and therefore it will be biologically feasible if<br />
this condition is satisfied.<br />
3. The first equilibrium state is given by<br />
where<br />
,<br />
and<br />
where<br />
Let<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 72<br />
ISSN 2250-3153<br />
If<br />
Under the biologically feasible conditions as<br />
and (2.2)<br />
III. LINEAR STABILITY ANALYSIS<br />
3.1 Stability with delay (i.e. )<br />
Assuming small deviations around the equilibrium<br />
such that , the linearized system<br />
of the model (2.1) becomes<br />
(3.1)<br />
In the case of a positive delay , the characteristic<br />
equation for this system can be written as<br />
where<br />
such that<br />
and<br />
(3.2)<br />
Now substituting (where is positive) in equation (3.2)<br />
and separating the real and imaginary parts, we obtain the<br />
following system of transcendental equations<br />
(3.3)<br />
(3.4)<br />
Squaring and adding (3.3) and (3.4), we get<br />
which can be simplified to<br />
where<br />
Equation (3.5) can be written as a cubic<br />
with .<br />
(3.5)<br />
(3.6)<br />
For parameter values such that is positive, the simplest<br />
assumption that (3.6) will have a unique positive root is<br />
. Since is positive, it requires that<br />
for to be negative. Hence, it can be said that<br />
there is a unique positive root say of (3.6). Denoting<br />
, it follows that the characteristic equation (3.2) has a<br />
pair of purely imaginary roots of the form . Eliminating<br />
from (3.3) and (3.4), we get<br />
Then corresponding to is given by<br />
Since is stable for , it implies from Freedman and<br />
Rao[47] that remains stable for .<br />
3.2 Estimation of the length of delay to preserve stability<br />
(3.7)<br />
Let us consider the system (2.1). Taking the Laplace transform<br />
of this system, we get<br />
,<br />
where<br />
.<br />
Following lines of Erbe et al. [48] and using the Nyquist criterion<br />
(Freedman and Rao[47]), it can be shown that the sufficient<br />
conditions for the local asymptotic stability of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 73<br />
ISSN 2250-3153<br />
are given by<br />
(3.8)<br />
(3.9)<br />
where<br />
and is the smallest positive root of (3.8).<br />
Inequality (3.8) and the equation (3.9) can alternatively be<br />
written as<br />
(3.10)<br />
(3.11)<br />
Now if equations (3.10) and (3.11) are satisfied simultaneously,<br />
they are sufficient conditions to guarantee stability. These are<br />
now used to get an estimate to the length of the time delay. The<br />
aim is to find an upper bound to , independent of , from<br />
(3.11) and then to estimate so that (3.10) holds true for all<br />
values of such that and hence, in particular, at<br />
.<br />
Equation (3.11) is rewritten as<br />
Maximizing the right hand side of (3.12)<br />
Subject to<br />
we obtain<br />
Hence if<br />
then clearly from (3.13) we have .<br />
From (3.10) we obtain<br />
(3.12)<br />
(3.13)<br />
. (3.14)<br />
Since is locally asymptotically stable for<br />
the inequality (3.14) will continue to hold for sufficiently<br />
small . Using (3.12), (3.14) can be rearranged as<br />
(3.15)<br />
Using the bounds<br />
and<br />
we obtain from (3.14)<br />
where<br />
Hence, if<br />
then for the Nyquist criterion holds true and<br />
estimates the maximum length of the delay preserving the<br />
stability.<br />
IV. NUMERICAL SIMULATION<br />
The purpose of this section is to illustrate dynamics of the<br />
model (2.1) numerically with variation in the delayed responses<br />
of the immune system. For this purpose we consider the<br />
following set of parameters<br />
which satisfies the biologically feasible conditions. For this set,<br />
the positive equilibrium of the model (2.1) is<br />
. It can be seen that for these<br />
parameter values the coefficients of the cubic (3.6) are such that<br />
and . It guarantees that the cubic (3.6) has a<br />
unique positive root. It turns out from (3.7) that and<br />
the stability result of section 2 yields that the positive equilibrium<br />
of model (2.1) is stable for such that . For<br />
, Figure 1 illustrates the approach of the trajectory of<br />
the model (2.1) to the equilibrium .<br />
resting predator cells<br />
0.8<br />
0.6<br />
0.4<br />
0.2<br />
0<br />
4<br />
3<br />
2<br />
hunting predator cells<br />
1<br />
0<br />
0.4<br />
0.6<br />
0.8<br />
1<br />
tumor cells<br />
Figure 1: Three-dimensional phase portrait depicting stable<br />
dynamics of the model (2.1) for . The trajectory spirals<br />
and approaches to starting from the initial<br />
point .<br />
Indeed the existence of as unique root of (3.5) implies<br />
that there exists a pair of pure imaginary eigen values that<br />
satisfies the characteristic equation (3.2) corresponding to the<br />
delay value . It thus follows that as increases from zero and<br />
,<br />
.<br />
1.2<br />
1.4<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 74<br />
ISSN 2250-3153<br />
crosses a Hopf bifurcation occurs meaning thereby an<br />
initiation of periodic solution(s). One such periodic solution<br />
(limit cycle) of the model (2.1) is shown to exist for in<br />
Figure 2.<br />
resting predator cells<br />
0.8<br />
0.6<br />
0.4<br />
0.2<br />
0<br />
4<br />
3<br />
2<br />
hunting predator cells<br />
1<br />
0<br />
0.4<br />
0.6<br />
0.8<br />
1<br />
tumor cells<br />
Figure 2: Limit cycle solution of the model (2.1) for<br />
starting from the initial point .<br />
It has been well known from ecological model results<br />
(McDonald [50], Cushing [51], May [52]), especially for models<br />
with prey-predator type interactions, that while small delays help<br />
stability large delays in the growth response of the species may<br />
cause instability. In order to check if such possibility of<br />
instability of equilibrium occurs for this model also, we<br />
integrated model (2.1) numerically for large values of delay . It<br />
has been quite interesting to note that for large values of delay ,<br />
model (2.1) showed irregular pattern in time series for each cell<br />
population. The fact that these irregular patterns are indeed<br />
chaotic in nature giving rise to chaotic attractors is confirmed by<br />
the sensitivity of the solutions to initial conditions. We present<br />
here only two illustrations of chaotic attractors for and<br />
in Figures 3 and 4 respectively.<br />
populations<br />
8<br />
7<br />
6<br />
5<br />
4<br />
3<br />
2<br />
1<br />
0<br />
( a )<br />
-1<br />
0 100 200 300 400 500<br />
time<br />
600 700 800 900 1000<br />
1.2<br />
tumor cells<br />
hunting predator cells<br />
resting predator cells<br />
1.4<br />
resting predator cells<br />
hunting predator cells<br />
resting predator cells<br />
-0.5<br />
8<br />
tumor cells<br />
1<br />
0.5<br />
0<br />
6<br />
4<br />
hunting predator cells<br />
2<br />
1<br />
2<br />
0<br />
0<br />
( b )<br />
( c )<br />
0.5<br />
tumor cells<br />
0<br />
0 100 200 300 400 500 600 700 800 900 1000<br />
10<br />
5<br />
0<br />
0 100 200 300 400 500 600 700 800 900 1000<br />
1<br />
0<br />
-1<br />
0 100 200 300 400 500<br />
time<br />
600 700 800 900 1000<br />
Figure 3: (a) Time series solution of the model (2.1) for<br />
(b) Corresponding chaotic attractor in the phase space (c)<br />
Sensitivity of solution to initial conditions:<br />
for both types of curves but for solid curve (i.e. on the<br />
attractor) and for dashed curve.<br />
populations<br />
8<br />
7<br />
6<br />
5<br />
4<br />
3<br />
2<br />
1<br />
0<br />
( a )<br />
-1<br />
0 100 200 300 400 500<br />
time<br />
600 700 800 900 1000<br />
1<br />
tumor cells<br />
hunting predator cells<br />
resting predator cells<br />
1.5<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 75<br />
ISSN 2250-3153<br />
resting predator cells<br />
tumor cells<br />
resting predator cells<br />
hunting predator cells<br />
1<br />
0.8<br />
0.6<br />
0.4<br />
0.2<br />
0<br />
-0.2<br />
10<br />
5<br />
hunting predator cells<br />
0<br />
-5<br />
0<br />
( b )<br />
0.5<br />
tumor cells<br />
( c )<br />
1.5<br />
1<br />
0.5<br />
0<br />
0 100 200 300 400 500 600 700 800 900 1000<br />
5<br />
0<br />
0 100 200 300 400 500 600 700 800 900 1000<br />
1<br />
0.5<br />
0<br />
0 100 200 300 400 500<br />
time<br />
600 700 800 900 1000<br />
Figure 4: (a) Time series solution of the model (2.1) for<br />
(b) Corresponding chaotic attractor in the phase space (c)<br />
Sensitivity of solution to initial conditions:<br />
for both types of curves but for solid curve and<br />
for dashed curve.<br />
V. CONCLUSION<br />
The response of the tumor diseases to treatment depends<br />
upon many factors including the severity of the tumor, the<br />
application of the treatment and most importantly the patient‘s<br />
immune response. Tumor cells are characterized by a vast<br />
number of genetic and epigenetic events leading to the<br />
appearance of specific antigens called neo antigens triggering<br />
antitumor activity by the immune system (Gohary [53],<br />
d‘Onofrio [54]). Though this paper does not deal directly with<br />
any external treatment of the tumor but of course it focuses on<br />
the indirect treatment aspects of the disease by looking into the<br />
role of the immune system if it does not get triggered<br />
immediately but shows delayed responses. With this in mind, we<br />
modify the model of El-Gohary [32] to incorporate time delayed<br />
responses of the immune system through the growth mechanism<br />
of the hunting cells and some other terms. It is assumed that<br />
hunting cells do not respond to killing of tumor cells as soon as<br />
they get signal from resting cells but they get activated after a<br />
constant time delay . As has been mentioned in the<br />
introduction, the model of this paper represents a link between<br />
the super-macro scale (in terms of ordinary differential<br />
equations) and the lower cellular scale (in terms of delay).<br />
The dynamics and the stability results of the model show three<br />
main patterns of solutions: (i) stable equilibrium (ii) limit cycle<br />
1<br />
1.5<br />
solution (iii) chaotic attractor. More specifically, it is found that<br />
when hunting cells are either all time-alert ( or alert<br />
enough ( all three cell populations approach to<br />
equilibrium values and the tumor can be said to be nonmalignant.<br />
For averagely-alert hunting cells (i.e. when or slightly<br />
greater than ), all the three cell populations may coexist in a<br />
limit cycle or periodic solution. In this case, the tumor can be<br />
termed as mildly malignant. The existence of periodic solutions<br />
is relevant in cancer models. It implies that the tumor levels may<br />
oscillate around a fixed point even in the absence of any<br />
treatment. Such a phenomenon, known as Jeff‘s phenomenon or<br />
self-regression of tumor [49], has been observed clinically. When<br />
the hunting cells play too lethargic in their response to killing of<br />
tumor cells (i.e. when is large enough), all the three cell<br />
populations may grow in an irregular fashion with time leading<br />
to chaotic attractors. This is indeed the case when the tumor can<br />
be said to be malignant and it is the case where a serious<br />
treatment strategy is required because of continuously changing<br />
density of tumor cells all the time.<br />
It is well known from ecological-model results that large<br />
delays cause instability of equilibriums. Thus one can say that<br />
the results of the present model are on the known lines but we<br />
feel that instability in the form of chaotic attractors in cancer<br />
modeling is quite an interesting observation of this study linking<br />
super macro scale to lower cellular scale. The allowable time<br />
delay for activation of the immune system and the estimation of<br />
the length of delay to preserve stability may be the two important<br />
parameters that may help decide the mode of action for<br />
controlling the disease.<br />
ACKNOWLEDGMENT<br />
The author MS acknowledges the financial support of<br />
the UGC, New Delhi for this work under the Project No. 37-<br />
483/2009(SR).<br />
REFERENCES<br />
[1] N. Bellomo, N. Li, P. K. Maini, On the foundations of cancer modelling:<br />
Selected topics, speculations, and perspectives, Math. Models Methods<br />
Appl. Sci. 18 (2008) 593–646.<br />
[2] N. Bellomo, A. Bellouquid, J. Nieto, J. Soler, Multiscale biological tissue<br />
models and fluxlimited chemotaxis from binary mixtures of multicellular<br />
growing systems, Math. Models Methods Appl. Sci. 20 (2010) 1179–1207.<br />
[3] F. Rihan, Delay differential models in dynamic diseases, The Proceedings<br />
of the International Conference on Bioinformatics and Computational<br />
Biology - Hawaii, USA (2) (2010) 73–79.<br />
[4] R. de Boer, P. Hoogeweg, H. Dullens, R. de Weger, and W. Den Otter,<br />
Macrophage T lymphocyte interactions in the anti-tumor immune response:<br />
a mathematical model. J. Immunol., 134, no. 4,1985, 2748–2758.<br />
[5] B. Goldstein, J. Faeder, and W. Hlavacek, Mathematical and computational<br />
models of immune receptor signaling. Nat. Rev. Immunol., 4, no. 6, 2004,<br />
445–456.<br />
[6] L. de Pillis, A. Radunskaya, and C. Wiseman, A validated mathematical<br />
model of cell-mediated immune response to tumor growth. Cancer Res.,<br />
65, no. 17, 2005, 7950–7958.<br />
[7] N. Kronik, Y. Kogan, V. Vainstein, and Z. Agur, Improving alloreactive<br />
CTL immunotherapy for malignant gliomas using a simulation model of<br />
their interactive dynamics. Cancer Immunol. Immunother., 57, 2008, 425-<br />
439.<br />
[8] J. Aroesty, T. Lincoln, N. Shapiro, and G. Boccia, Tumor growth and<br />
chemotherapy: Mathematical methods,computer simulations, and<br />
experimental foundations,‖ Mathematical Biosciences, Vol. 17, 1973, pp.<br />
243-300.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 76<br />
ISSN 2250-3153<br />
[9] M. Eisen, Mathematical models in cell biology and cancer chemotherapy,<br />
Springer-Verlag. Berlin, 1979.<br />
[10] H. Knolle, Cell kinetic modelling and the chemotherapy of cancer,<br />
Springer-Verlag, Berlin, 1988.<br />
[11] J. M. Murray, Optimal control for a cancer chemotherapy problem with<br />
general growth and loss functions, Mathematical Biosciences. An<br />
International Journal, 98, no. 2, 1990, 273-287.<br />
[12] J. A. Adam, The dynamics of growth-factor-modified immune response to<br />
cancer growth: One-dimensional models, Mathematical and Computer<br />
Modelling, 17, no. 3, 1993, 83-106.<br />
[13] J. A. Adam, and J. Panetta, A simple mathematical model and ;alternative<br />
paradigm for certain chemotherapeutic regimens, Mathematical and<br />
Computer Modelling, 22, no. 8, 1995, 4940.<br />
[14] M. Owen, and J. Sherratt, Modelling the macrophage invasion of tumours:<br />
Effects on growth and composition, IMA Journal of Mathematics Applied<br />
in Medicine and Biology, 15, 1998, 165-185.<br />
[15] L. G. De Pillis, and A.E. Radunskaya, A mathematical tumor model with<br />
immune resistance and drug therapy: an optimal control approach, Journal<br />
of Theoretical Medicine, Vol. 3, 2001, pp. 79-100.<br />
[16] D. Dingli, M. Cascino, K. Josic, S. Russell, and Z. Bajzer, Mathematical<br />
modeling of cancer radiovirotherapy. Math Biosci., 199, 2006, 55-78.<br />
[17] S. A. Menchón, R. A. Ramos, and C. A. Condat, Modeling subspecies and<br />
the tumor-immune system interaction: steps toward understanding therapy.<br />
Phys A Stat Mech Appl., 386, no.2, 2007, 713–9.<br />
[18] N. Bellomo, and L. Preziosi, Modelling and mathematical problems related<br />
to tumor evolution and its interactions with the immune system. Math.<br />
Comput. Model., 32, 2000, 413–452.<br />
[19] R. Araujo, and D. McElwain, A history of the study of solid tumor growth:<br />
the contribution of mathematical modeling. Bull. Math. Biol., 66, 2004,<br />
1039–1091.<br />
[20] J. Nagy, The ecology and evolutionary biology of cancer: a review of<br />
mathematical models of necrosis and tumor cells diversity. Math. Biosci.<br />
Eng., 2, no. 2, 2005, 381–418.<br />
[21] H. Byrne, T. Alarcon, M. Owen, S. Webb, and P. Maini, Modeling aspects<br />
of cancer dynamics: a review. Philos. Trans. R. Soc. A, 364, 2006, 1563–<br />
1578.<br />
[22] [22] F. Castiglione, and B. Piccoli, Cancer immunotherapy, mathematical<br />
modeling and optimal control. Journal of Theoretical Biology, Vol. 247,<br />
2007, pp. 723-732.<br />
[23] M. Martins, S. C. Jr. Ferreira, and M. Vilela, Multiscale models for the<br />
growth of avascular tumors. Phys. Life Rev., 4, 2007, 128–156.<br />
[24] T. Roose, S. Chapman, and P. Maini, Mathematical models of avascular<br />
tumor growth. SIAM Rev., 49, no.2,2007, 179–208.<br />
[25] M. Chaplain, Modelling aspects of cancer growth: insight from<br />
mathematical and numerical analysis and computational simulation. In<br />
Lecture notes in mathematics: Vol. 1940. Multiscale problems in the life<br />
sciences (pp. 147–200). Berlin: Springer, 2008.<br />
[26] N. Bellomo, N. Li, and P. Maini, On the foundations of cancer modeling:<br />
selected topics, speculations, and perspectives. Math. Mod. Methods Appl.<br />
Sci., 18, no. 4, 2008, 593–646.<br />
[27] N. Bellomo, , A. Bellouquid, J. Nieto, and J. Soler, Multiscale biological<br />
tissue models and unlimited chemotaxis from binary mixtures of<br />
multicellular growing systems. Math. Models Methods Appl. Sci., 20 ,<br />
2010, 1179-1207.<br />
[28] N. Bellomo and N. Delitala, From the mathematical kinetic, and stochastic<br />
game theory to modelling mutations, onset, progression and immune<br />
competition of cancer cells, Phys Life Rev. 5, 6, 2008, 183–206.<br />
[29] V. Kuznetsov, I. Makalkin, M. Taylor, and A. Perelson, Nonlinear<br />
dynamics of immunogenic tumors: parameter estimation and global<br />
bifurcation analysis, Bulletin of Mathematical Biology, Vol. 56, no. 2,<br />
1994, pp. 295- 321.<br />
[30] D. Kirschner, and J.C. Panetta, Modeling immunotherapy of the tumorimmune<br />
interaction, Journal of Mathematical Biology, 37, no. 3, 1998, 235-<br />
52.<br />
[31] R. Sarkar, and S. Banerjee, Cancer and self remission and tumor stability, a<br />
stochastic approach. Math Biosci., 169, 2005, 65-81.<br />
[32] A. El-Gohary, Chaos and optimal control of cancer self-remission and<br />
tumor system steady states. Chaos, Solitons & Fractals, 37, no. 5,2008,<br />
1305-16.<br />
[33] M. Bodnar, U. Forys, J. Poleszczuk, Analysis of biochemical reactions<br />
models with delays, J. Math. Anal. Appl. 376 (1), 2011, 74–83.<br />
[34] U. Forys, Multi-dimensional lotka-volterra systems for carcinogenesis<br />
mutations, Math. Methods Appl. Sci. 32 (17), 2009, 2287–2308.<br />
[35] U. Forys, M. Bodnar, J. Poleszczuk, Negativity of delayed induced<br />
oscillations in a simple linear dde, Appl. Math. Letters 24 (6), 2011, 982–<br />
986.<br />
[36] J. Miekisz, J. Poleszczuk, M. Bodnar, U. Forys, Stochastic models of gene<br />
expression with delayed degradation, Bull. Math. Biol. 73 (9), 2011, 2231–<br />
2247.<br />
[37] M. Piotrowska, U. Forys, Analysis of the hopf bifurcation for the family of<br />
angiogenesis models, J. Math. Anal. Appl. 382 (1), 2011, 180–203.<br />
[38] M. Piotrowska, U. Forys, The nature of hopf bifurcation for the gompertz<br />
model with delays, Math. Comput. Model. 54, 2011, 9–10.<br />
[39] J. Poleszczuk, M. Bodnar, U. Forys, New approach to modeling of<br />
antiangiogenic treatment on the basis of Hahnfeldt et al. model, Math.<br />
Biosc. Eng. 8 (2), 2011, 591–603.<br />
[40] H.M. Byrne, The effect of time delay on the dynamics of avascular tumor<br />
growth, Math. Biosci., 144(2), pp. 83–117, 1997.<br />
[41] N. Buric, M. Mudrinic, N. Vasovic, Time delay in a basic model of the<br />
immune response, Chaos, Solitons and Fractals 12 (2001) 483-489<br />
[42] U. Fory´s and M. Kolev, ―Time delays in proliferation and apoptosis for<br />
solid avascular tumor,‖Prep. institute of applied mathematics and<br />
mechanics, rw02-10 (110), Warsaw University, 2002.<br />
[43] M. Gałach, Dynamics of the tumor-immune system competition—the effect<br />
of time delay, International Journal of Applied Mathematics and Computer<br />
Science 13 (2003), no. 3, 395–406.<br />
[44] R. Yafia, Dynamics Analysis and Limit Cycle in a Delayed Model for<br />
Tumor Growth with Quiescence, Nonlinear Analysis: Modelling and<br />
Control, 2006, Vol. 11, No. 1, 95–110<br />
[45] J. Paulsonn, Models of stochastic gene expression, Physics of Life Reviews<br />
2, 2005, 157–175.<br />
[46] E. Gabetta, E. Ragazzini, About the gene families size distribution in a<br />
recent model of genome evolution, Math. Models Methods Appl. Sci. 10,<br />
2010, 1005 – 1020.<br />
[47] H. I. Freedman and V. S. H. Rao, The trade-off between mutual<br />
interference and time lags in predator-prey systems, Bulletin of<br />
Mathematical Biology 45, no. 6, 1983, 991–1004.<br />
[48] L. H. Erbe, H. I. Freedman, and V. Sree Hari Rao, ―Three-species foodchain<br />
models with mutual interference and time delays,‖ Mathematical<br />
Biosciences, vol. 80, no. 1, 1986, pp. 57–80.<br />
[49] R. Thomlinson, ―Measurement and management of carcinoma of the<br />
breast,‖ Clin. Radiol., 33, 1982, 481–492.<br />
[50] N. MacDonald, Time lags in biological models, Lecture Notes in<br />
Biomathematics 27, Springer Verlag, Berlin 1978.<br />
[51] J. M. Cushing, Integrodifferential equations and delay models in population<br />
dynamics, Lecture Notes in Biomathematics 20, Springer Verlag,<br />
Heidelberg 1979.<br />
[52] R.M. May, Stability and complexity in model ecosystems, Princeton<br />
University Press, Princeton, N.J. 1973.<br />
[53] El-Gohary A. Optimal control of the genital herpes epidemic. Chaos,<br />
Solitons & fractals 2001;12:1817–22.<br />
[54] d‘Onofrio A. Tumor evasion from immune control: strategies of a MISS to<br />
become a MASS. Chaos, Solitons & Fractals 2007;31:261–8.<br />
AUTHORS<br />
First Author – M. Saleem, PhD and Email:<br />
saleemmd60@gmail.com<br />
Second Author – Tanuja Agrawal, MPhil and email:<br />
tanu.18aug@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 77<br />
ISSN 2250-3153<br />
Fuzzy Spanning Tree Flow-Equivalent Algorithm<br />
Dr. G.Nirmala, K.Uma<br />
Associate Professor in Mathematics, K.N.G.A. College (Women), Thanjavur, India<br />
Associate Professor in Mathematics, A.V.V.M. Sri Pushpam College, Poondi, Thanjavur, India<br />
Abstract- By introducing, the new concept fuzzy edge cut-set,<br />
multiple sources and sinks of fuzzy graphs and with arc and<br />
vertex capacities of fuzzy graphs , simple variations of the<br />
maximal flow problem is introduced. A maximum flow matrix is<br />
constructed by a spanning tree using vertex condensation<br />
process. Also, in this paper a fuzzy spanning tree with<br />
maximum flow is constructed, which is equivalent to an<br />
undirected graph by algorithmic representation. In general, the<br />
flow equivalent fuzzy tree is not unique.<br />
Index Terms- Fuzzy Edge cut-sets- arc and vertex capacity-<br />
Fuzzy equivalent-flow.<br />
T<br />
I. INTRODUCTION<br />
he purpose of a network is to implement a flow of water, oil,<br />
electricity, traffic, or whatever the network is designed to<br />
carry. Mathematically, a flow in a network N is a function that<br />
assigns to each edge (i, j) of N a nonnegative number fij that does<br />
not exceed arc capacities qij. Intuitively, fij represents the amount<br />
of flow passing through the edge (i, j) when the flow is f.<br />
Informally, we refer to fij as the flow through edge (i ,j) . We also<br />
require that for each node other than the source and sink, the sum<br />
of the fkj on edges leaving node k. This means that flow cannot<br />
accumulate, be created, dissipate, or be lost any node other than<br />
the source or the sink. This is called conservation of flow. A<br />
consequence of this requirement is that the sum of the flows<br />
entering the sink. This sum is called the value of the flow.<br />
In some cases, for example in the case where the graph<br />
represents a telephone network with vertices corresponding to<br />
stations and the arcs corresponding to the telephone cables, what<br />
may be required is the maximum rate of communication between<br />
any two stations s and t, assuming that only a single pair of<br />
stations can communicate with each other at any one time. In this<br />
example the capacity of a cable is the number of independent<br />
calls that can be routed through it. A similar situation exists in<br />
the case where the graph represents a road network and where,<br />
say, a system of one-way streets is proposed. What is then<br />
required is to determine how then one-way streets affects the<br />
maximum rate of traffic flow between any two areas, when those<br />
areas are considered in isolation. This problem could be solved<br />
by simply considering the (s to t) maximum flow problem for<br />
every pair of vertices (s,t).<br />
II. DEFINITIONS<br />
Definition 2.1. A fuzzy graph with V as the underlying set is a<br />
pair G: (A, Γ) where A: V [0,1] is a fuzzy subset, Γ :<br />
VxV [0,1] is a fuzzy relation on the fuzzy subset A, such<br />
that Γ(u,v) ≤ A(u) ∩ A(v) for all u,v є V.<br />
Definition 2.2. A flow of a fuzzy graph f is an assignment of an<br />
integer value f (e) to each edge e that satisfies the following<br />
properties:<br />
Capacity Rule: For each edge e, 0 ≤ f (e) ≤ q(e)<br />
Conservation Rule: For each vertex v ≠ s,t<br />
∑ f(e) = ∑ f(e)<br />
e є Γ + (v) e є Γ - (v)<br />
Where, Γ - (v) and Γ +(v) are the incoming and outgoing arcs of<br />
v, respectively. The value of a flow f, denoted |f|, is the total flow<br />
from the source, which is the same as the total flow into the sink.<br />
Definition 2.3. A flow of a fuzzy graph N is said to be<br />
maximum if its value is the largest of all flows for N.<br />
--2--<br />
Definition 2.4. If the vertices of a undirected fuzzy graph G=(A,<br />
Γ) are partitioned into two sets A0 and Ã0 (where A0 C A and<br />
Ã0 is the complement of A0 in A), then the set of links of fuzzy<br />
graph G whose terminal vertices lie one in A0 and the other in<br />
Ã0, is called a edge cut-set of fuzzy graph G. The set of links in<br />
the cut-set can be represented by the vertex set doublet (A0 ,Ã0).<br />
Definition 2.5. Consider a fuzzy graph G = (A, Γ) , with s and t<br />
being of G chosen at random. Let us say that (A0 ,Ã0) is the<br />
minimum cut-set corresponding to this maximum flow and<br />
consider two vertices xi and xj which are both in A0(or both in<br />
Ã0).If we now wish to find fij, the maximum flow from xi to xj,<br />
then all vertices of Ã0 ( or A0 if xi and xj єÃ0) may be<br />
―condensed ― into a single vertex xc, say, as far as this flow<br />
calculation is concerned. The condensation is such that links<br />
(xa,xb), xaє A0 and xb є Ã0 are replaced by links (xa,xc), and<br />
any parallel links between the same pair of vertices (which may<br />
result) are replaced by a single link of capacity equal to the sum<br />
of the capacities of the parallel links. Figures 2.1(a), 2.1(b) and<br />
2.1(c) illustrate the Fuzzy Vertex Condensation process.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 78<br />
ISSN 2250-3153<br />
Minimum (s to t) cut-set<br />
Link capacity<br />
Fig 2.1(a)<br />
Fig.2.1(b): Fuzzy vertex condensation for xi to xj flow calculation<br />
Fig. 2.1(c): Condensed Fuzzy graph<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 79<br />
ISSN 2250-3153<br />
III. FUZZY GRAPHS WITH MULTIPLE SOURCES AND<br />
SINKS<br />
Consider a fuzzy graph with Ns sink vertices and assume that<br />
flow can go from any sources to any sink. The problem of<br />
finding the maximum<br />
total flow from all the<br />
sources to all the sinks can be converted to the simple (s to t)<br />
maximum flow problem by adding a new artificial source vertex<br />
s and a new artificial sink vertex t with added arcs leading from s<br />
to each of the real source vertices and from every real sink to t.<br />
Fig. 3.1<br />
The above figure shows how multiple sources and sinks can be reduced to a single source and a single sink.<br />
3.1 Fuzzy Graphs With Arc and Vertex Capacities<br />
For a fuzzy graph G let the arcs have capacities qij, and in<br />
addition let the vertices have capacities wj, say(j=1,2,3….n) so<br />
that the total flow entering vertes xj must have a value less than<br />
wj.<br />
(ie) ∑ ξij ≤ wj for all xj<br />
Let the maximum flow between vertices s and t for such a fuzzy<br />
graph be required. Let us define a fuzzy graph G0 so that every<br />
vertex xj of fuzzy graph G corresponds to two vertices xj + and xj<br />
– in the fuzzy graph G0 , in such a way so that for every arc<br />
(xi,xj) of G incident at xj corresponds an arc (xi - ,xj + ) of G0<br />
incident at xj +, and for every arc (xi,xj) of G emanating from xj<br />
corresponds an arc (xi - ,xj + ) of G0 emanating from xj - . moreover<br />
, we introduce an arc between xj + and xj - of capacity wj , (ie)<br />
equal to the capacity of vertex xj.<br />
EXAMPLE- 3.1<br />
Fig 3. 2: Fuzzy graph with both vertex and arc capacities<br />
Fig. 3.3: Equivalent fuzzy graph with arc capacities only.<br />
Since, the total flow entering a vertex xi + must, by necessity,<br />
travel along the arc (xi + ,xj - ) whose capacity is wj, the maximum<br />
flow in the fuzzy graph G with vertex capacities , is equal to the<br />
maximum flow in the graph G0 which has only arc capacities.<br />
Remark: 3.1<br />
If the minimum edge cut-set of G0 does not contain arcs of the<br />
form (xi + ,xj - ), then the vertex capacities in G are inactive and<br />
superfluous;<br />
If on the other hand the minimum edge cut-set of G0 contains<br />
arcs of the form (xi + ,xj - ), then the corresponding vertices of G are<br />
saturated by the maximum flow solution<br />
3.2. Fuzzy Spanning Tree Algorithm<br />
The algorithm that is given in this section generates a tree T*<br />
which is flow-equivalent to the undirected fuzzy graph G. The<br />
maximum flow fij between two vertices xi and xj of the fuzzy<br />
graph G can then be found from this tree as:<br />
fij = min [q̕ik1, q̕k1k2, q̕k2k3,……………… q̕kpj]--------------- (3.1)<br />
where (x̕i, x̕k1 , x̕k2, ……………, x̕j) is the unique path along links<br />
of T* which leads from x̕I to x̕j. Every vertex x̕k of T*<br />
corresponds to a vertex xk of G and q̕kl is the capacity of link (x̕k<br />
, x̕l) of T*. Since the algorithm generated T* gradually and since<br />
at any one of the (n-1) stages of the algorithm the ―vertices ― of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 80<br />
ISSN 2250-3153<br />
T* may in fact be sets composed of vertices of G, we will, in<br />
order to avoid confusion , refer to the vertices of G as G –vertices<br />
and to the vertices of T* as T*-vertices.<br />
Step 1: Set a set δ1 = A, N= 1. At any stage, T* is the graph<br />
defined by N T*-vertices δ1, δ2,……….., δN each one of which<br />
corresponds to a set of G- vertices. T* is initialized to be the<br />
single vertex δ1 .<br />
Step 2: Find a set δ* є { δ1, δ2,……… δN} which contains more<br />
than one G-vertex in it. If none exist go to step 6, otherwise go to<br />
step 3.<br />
Step 3: If δ* were to be removed from T*, the fuzzy tree<br />
would in general be reduced to a number of fuzzy sub-trees<br />
(connected components).Condense the T*-vertices in each subtree<br />
into single vertices to form the condensed fuzzy graph. Take<br />
any two vertices xi and xj є δ* and calculate the minimum<br />
cut-set (A0 ,Ã0) of G separating xi from xj by doing an ( xi to xj)<br />
maximum flow calculation.<br />
Step 4: Remove the T*-vertex δ* together with its incident links<br />
from T*, and replace it by two T*-vertices composed of the Gvertex<br />
sets δ*∩A0 and δ*∩ Ã0 , and a link of capacity v(A0,Ã0)<br />
between them. Also, for all T*-vertices δi which were incident on<br />
before the replacement, add the link (δi , δ*∩ A0 ) to T* if<br />
δi ⊂ A0; or add the link (δi , δ*∩ Ã0 ) to T* if δi ⊂ Ã0. The<br />
capacities of the links being taken as ci o (link of capacity)<br />
regardless of which one is added.<br />
Step 5: Set N=N+1. The vertices of T* are now the sets of Gvertices<br />
δ1, δ2,……, δ*∩ A0, δ*∩ Ã0, … δN where δ* has been<br />
replaced by the two T*-vertices δ*∩ A0 and δ*∩ Ã0 as explained<br />
earlier. Go to step 2.<br />
Step 6: Stop. T* is the required flow-equivalent tree of G and its<br />
T*-vertices are now single G-vertices. The link capacities of T*<br />
corresponds to the values of the (n-1) independent cut-sets of G.<br />
equations (3.1) can then be used to calculate the fij ( for any xi, xj<br />
є A), directly from T*.<br />
EXAMPLE: 3.2<br />
Consider an undirected fuzzy graph G shown in figure 3.2 where the link capacities are shown next to the links. It is required to find<br />
the maximum flow between every pair of vertices of G.<br />
From the above algorithm we get.<br />
Step 1: δ1= {x1, x2, x3, x4, x5, x6 } ; N=1<br />
Step 2: δ* = δ1<br />
Fig. 3.2: Fuzzy graph.<br />
Step 3: The fuzzy graph cannot be condensed. Take xi= x1 and xj = x2 arbitrarily. From an (x1 to x2) maximum flow calculation we<br />
find the minimum cut-set to be (A0 ,Ã0) where A0={ x1, x5, x6, } and Ã0 ={ x2, x3, x4}, the value of the cut-set being 0.52.<br />
Step 4: The fuzzy tree T* and its link capacities are now shown in figure 3.2(a)<br />
Step 5: N=2 (i.e. T* now has 2 vertices δ1 and δ2 as shown in figure 3.2(a)).<br />
Similarly, proceeding to step 2 and continuing the process till δ* = δ3 we get the following figure:-<br />
{X1,X5,X6} {X2,X3,X4}<br />
Fig. 3.2(a): T* after the first stage<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 81<br />
ISSN 2250-3153<br />
Fig.3.2 (b and d): The condensed fuzzy graph after the 2 nd (b) and 3 rd stages (d)<br />
Fig .3.2(c): T* after the 2 nd stage<br />
Fig .3.2(e) : T* after the 3 rd stage<br />
Fig .3.2(f and h): The condensed fuzzy graph after the 4 th (f) and 5 th (h) stages<br />
Fig. 3.2(g): T* after the 4 th stage<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 82<br />
ISSN 2250-3153<br />
Fig. 3.2(i): Final flow – equivalent fuzzy tree T*<br />
Continuing in the same way and taking δ* = δ1 next, the development of the flow-equivalent fuzzy tree is illustrated above. Also, the<br />
maximum flow matrix [fij] of the original fuzzy graph can be calculated as follows:<br />
X1 X2 X3 X4 X5 X6<br />
X1 - 0.52 0.52 0.31 0.37 0.45<br />
X2 0.52 - 0.59 0.31 0.37 0.45<br />
X3 0.52 0.59 - 0.31 0.37 0.45<br />
X4 0.31 0.31 0.31 - 0.31 0.31<br />
X5 0.37 0.37 0.37 0.31 - 0.37<br />
X6 0.45 0.45 0.45 0.31 0.37 -<br />
Maximum Flow Matrix<br />
The five fuzzy cut-sets (in general n-1) of fuzzy graph G corresponding to the links of the fuzzy tree T* are shown in dotted figure 3.3<br />
.<br />
Fig.3.3: Cut-sets forming fuzzy tree T*<br />
In general, the flow-equivalent fuzzy tree T* is not unique. One such fuzzy tree is shown in following Figure 3.4.<br />
Fig. 3.4: Another flow-equivalent fuzzy tree<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 83<br />
ISSN 2250-3153<br />
IV. CONCLUSION<br />
Using fuzzy graphs with multiple sources and sinks, and with<br />
arc and vertex capacities we can construct a fuzzy spanning tree<br />
with maximum flow using condensation process which is flow<br />
equivalent to an undirected graph by algorithmic representation.<br />
The paper concludes that the flow equivalent fuzzy tree is not<br />
unique.<br />
REFERENCES<br />
[1] L.S. Bershtein, Т.А. Dziouba (2000). Allocation of maximal bipartite part<br />
from fuzzy graph. In Proceedings of European Symposium on Intelligent<br />
Techniques ESIT‟2000, pages 45-47,full version on CD, Aachen, Germany,<br />
2000.<br />
[2] N. Christofides (1975). Graph theory. An algorithmic approach. London,<br />
Academic press.<br />
[3] G. Frank, I. Frish (1978). Networks, connection and flows. Moscow,<br />
translation from English.<br />
[4] H.J.Zimmermann (1991).Fuzzy Set Theory and Its Applications (2 nd<br />
edition). Boston/Dordrecht/London,Kluwer Academic Publishers.<br />
[5] Berge C., 1989, Hypergraphs, Amsterdam, North-Holland.<br />
[6] Bershtein L.S.,Dziouba T.A.,1998,Construction of the optimal bipartite part<br />
in the fuzzy graph,Proceedings of IT&SE.98,Yalta, Ukraine.<br />
[7] Dubois, D., Prade H., 1980, Fuzzy Sets and Systems: Theory and<br />
Applications, Academic Press, London.<br />
[8] Kaufmann, Arnold, 1977, Introduction a la theorie des sous-ensemles flous,<br />
Masson, Paris, France.<br />
[9] Volkmann L., 1991, Graphen und Digraphen: eine Einfuehrung in die<br />
Graphentheorie, Wien; New York: Springer.<br />
[10] [Zadeh, Lotfi, 1975, Fuzzy sets and their application to cognitive and<br />
decision, Academic Press, New York, USA.<br />
AUTHORS<br />
First Author – Dr. G.Nirmala, Associate Professor in<br />
Mathematics, K.N.G.A. College(Women), Thanjavur<br />
Second Author – K.Uma, Assistant Professor in<br />
Mathematics,A.V.V.M. Sri Pushpam College, Poondi,<br />
Thanjavur, India Email: umak1976@yahoo.in<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 84<br />
ISSN 2250-3153<br />
A Model Approach to Off-line English Character<br />
Recognition<br />
Binod Kumar Prasad*, Goutam Sanyal**<br />
* Department of Electronics and Communication Engineering,<br />
Bengal College of Engineering andTechnology, Durgapur, INDIA<br />
(binod.krpr@rediffmail.com)<br />
** Department of Computer Science and Engineering, National Institute of Technology, Durgapur, INDIA<br />
(nitgsanyal@gmail.com)<br />
Abstract- Recognition rate of handwritten character is still<br />
limited due to presence of large variation of shape, scale and<br />
format in hand written characters. A sophisticated hand written<br />
character recognition system demands a better feature extraction<br />
technique that would take care of such variation of hand writing.<br />
In this paper, we propose a recognition model based on Hidden<br />
Markov Models (HMMs) supported by novel feature extraction<br />
technique. Ultimately post-processing is done to enhance the<br />
recognition rate further.<br />
A data-base of 13000 samples is collected from 100 writers<br />
written five times for each character. 2600 samples have been<br />
used to train HMM and the rest are used to test recognition<br />
model. Using our proposed recognition system we have achieved<br />
a good average recognition rate of about 93.24 percent.<br />
Index Terms- Hidden Markov Model, Sobel masks, gradient<br />
features, curvature features and projected histogram.<br />
T<br />
I. INTRODUCTION<br />
he off-line handwriting recognition (OHR) continues to be<br />
an active area for research towards exploring the newer<br />
techniques that would improve recognition accuracy because<br />
several application including mail sorting, bank processing,<br />
document reading and postal address recognition require offline<br />
handwriting recognition systems. Character recognition is<br />
nothing but Machine simulation of human reading [1], [2]. It is<br />
also known as Optical Character Recognition. It contributes<br />
immensely to the advancement of an automation process and can<br />
improve the interface between man and machine in numerous<br />
applications. Several research works have been focussing on new<br />
techniques and methods that would reduce the processing time<br />
while providing higher recognition accuracy. The methods of<br />
Character recognition have grown up sequentially [3], [4]. The<br />
recognition of isolated handwritten character was first<br />
investigated [5], but later whole words [6] were addressed. Most<br />
of the systems reported in literature until today consider<br />
constrained recognition problems based on vocabularies from<br />
specific domain e.g., the recognition of handwritten check<br />
amounts [7] or postal address [8]. Free handwritten recognition,<br />
without domain specific constraints and large vocabularies was<br />
addressed only recently in a few papers [9], [10]. The recognition<br />
rate of such system is still low and there is a need of<br />
improvement [11].It is now a well established fact that the<br />
direction of character strokes contain vast important information<br />
for character recognition .If we can precisely describe that<br />
strokes in certain directions occur at certain positions in the<br />
character image, the character will be easily categorized. Many<br />
statistical features used in character recognition are designed<br />
according to this idea.[12]Previous researchers [13][14]<br />
demonstrated that among direction features the gradient features<br />
[15] outperform various other directional features.<br />
That‘s why we have given due stress on Gradient features by<br />
finding it both globally and locally for a character image.<br />
The tool to train the system with the obtained feature vectors is<br />
taken to be HMM because OHR systems based on HMM have<br />
been shown to outperform segmentation based approaches [16]-<br />
[19]. With the usage of HMM models for the pattern recognition<br />
or character recognition, a HMM model keeps information for a<br />
character when the model is trained properly and the trained<br />
model can be used to recognize an unknown character. The<br />
advantage with HMM based systems is that they are<br />
segmentation free that is no pre segmentation of word/line<br />
images into small units such as sub-words or characters is<br />
required [20]. However there are well-known limitations with<br />
HMM based approaches. These limitations are due to two<br />
reasons-(a) the assumptions of conditional independence of the<br />
observations given the state sequence and (b) the restriction on<br />
feature extraction imposed by frame based observations [21].<br />
The rest of the paper has been arranged as follows-<br />
Section 2 shows the proposed model, section 3 details out preprocessings,<br />
section 4 deals with feature extraction methods;<br />
section 5 describes the classifier whereas in section 6, postprocessings<br />
are described. Section 7 is about the experiments and<br />
results. Conclusions have been drawn in section 8 and in section<br />
9, we have discussed our future works followed by section 10<br />
which contains a single set of collected samples.<br />
II. PROPOSED MODEL<br />
Features are extracted in both global and local<br />
processing.HMM model for each character has been trained by<br />
the sequence of the symbols of the features extracted from<br />
collected samples. To test a handwritten character image, we<br />
extract the similar features using same procedure as earlier and<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 85<br />
ISSN 2250-3153<br />
the corresponding sequence (observation) is processed with each<br />
HMM model P(O/λ), probability of the observation sequence (O)<br />
by the models (λ) is compared and the highest probability<br />
concludes the highest matching of the features with the<br />
corresponding model<br />
Figure 1: System Overview<br />
III. PRE-PROCESSING<br />
Any image processing application suffers from noise like<br />
isolated pixels. This noise gives rise to ambiguous features which<br />
results in poor recognition rate or accuracy. Therefore a<br />
preprocessing mechanism has been executed before we could<br />
start with feature extraction methods. Here a sequence of<br />
operations is carried out in succession as shown in flow diagram<br />
.We have used median filter for its better performance to get rid<br />
of unwanted marks or isolated pixels. Thinning is performed to<br />
get the skeleton of character image so that strokes could be<br />
conspicuous.<br />
Figure 2: Block Diagram for Pre-processing<br />
IV. FEATURE EXTRACTION METHODS<br />
Feature extraction is an important part of any type of pattern<br />
recognition. A better feature extraction method may yield better<br />
recognition rate by a given classifier. Therefore, much attention<br />
is paid to extract the suitable features from the preprocessed<br />
images. Our feature extraction process consists of<br />
4.1 GLOBAL FEATURE EXTRACTION METHOD<br />
Global feature of an image sample describe its overall structure.<br />
We extract global features as described below:<br />
Gradient Features<br />
To compute the density of line segments in the quantized<br />
direction we use only two masks - Horizontal sobel mask and<br />
Vertical sobel mask. Magnitude and phase of the gradient<br />
obtained by Sobel masks are calculated as below<br />
Figure 3: Gradient Feature Extraction using Sobel Masks<br />
Phase is quantized in eight directions as shown in Fig. 6.For each<br />
quantized phase value, corresponding magnitudes are added to<br />
get the total strength in that direction. To get the feature within<br />
finite number of symbols (here eleven symbols are used),<br />
magnitudes are normalized and quantized. Finally, we consider<br />
four global gradient (G) features combining following pairs-(0°,<br />
±180°), (45°,−135°), (90°,−90°) and (135°,−45°).<br />
4.2 LOCAL FEATURE EXTRACTION METHODS<br />
To extract the local information contained in the preprocessed<br />
character image, we divide the image by nine equal blocks and<br />
then, from each block four gradient features (as discussed earlier)<br />
are extracted. Thus, the local feature (L) contains 36<br />
observations.<br />
Therefore, our final observation sequence contains 50<br />
observations obtained by global and local feature extraction<br />
methods, as shown below<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 86<br />
ISSN 2250-3153<br />
O = [G(4) L(36)] (3)<br />
V. HIDDEN MARKOV MODEL<br />
Hidden Markov Model (HMM) is a finite state machine<br />
in which a sequence of observations (O) is produced by this<br />
model but the corresponding sequence of states remain hidden<br />
within this model[16]. This HMM model can be defined as<br />
λ = (π, A, B) (4)<br />
where π is initial state probability vector, A is final state<br />
transition probability matrix and B is final observation<br />
probability matrix. The HMM model was initially used for<br />
speech recognition purpose, but later it has been proved that the<br />
HMM model can be efficiently utilized for other recognition<br />
process like character recognition, pattern recognition etc. In this<br />
paper we use a closed left to right chain HMM model for<br />
handwritten English characters recognition. A sketch of 5 states<br />
HMM model is shown in<br />
Figure 4: Left to Right Chain HMM Model with 5 States<br />
5.1 TRAINING OF HMM MODEL<br />
For the HMM model shown in Fig.4, π is taken as<br />
[1 0 0 0 0 ] (5)<br />
Initial value of A and B are taken as below:<br />
We have used Baum-Welch algorithm to train the HMM using<br />
observation sequence obtained from the feature vectors. At the<br />
end of training process we obtain the final value of A and B<br />
which is used for recognition purpose.<br />
5.2. RECOGNITION BY HMMM MODEL<br />
Consider an observation vector (O) of length L as below<br />
O = [O1 O2 O3 ·· · OL] (6)<br />
We use Viterbi decoding algorithm to decode the sequence of<br />
states of the HMM model λ for the sequence of observation O<br />
and it returns P (O/λ), the probability of generating the given<br />
sequence O by the HMM model λ.<br />
VI. POST-PROCESSING<br />
A post-processing block is included at the final stage of<br />
recognition process in order to provide special care to the highly<br />
confused group of characters due to their high structural<br />
correlation factor (similarity). Few examples of such groups are<br />
mentioned below-<br />
(1) O and Q,<br />
(2) M and N,<br />
(3) V and Y,<br />
(4) C and O,<br />
(5) B, K,R and P etc.<br />
For each group, one or more new features are extracted that<br />
can discriminate these characters with good accuracy. For<br />
example, O and Q can be easily differentiated using signature<br />
features, as shown in Fig.5-7.<br />
Figure 5: Samples of Character Image for Post-processing<br />
(a) Character O and (b) Character Q<br />
Figure 6: Signature and Derivative of Signature Plot for<br />
Character O Shown in Fig.5 (a).<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 87<br />
ISSN 2250-3153<br />
Figure 7: Signature and Derivative of Signature Plot for<br />
Character Q Shown in Fig.5 (b).<br />
These show that the differentiation of signature plot of Q<br />
contains very large spike that can be utilized to distinguish this<br />
(Q) from the character O using a threshold criteria. Note that, this<br />
signature feature is not used to train the HMM models of all<br />
characters. The effect of this post-processing block is presented<br />
in the next section providing some experimental studies.<br />
VII. EXPERIMENTS AND RESULTS<br />
A total of 13000 samples are collected from 100 persons. Each<br />
writer wrote 5 set of A-Z characters. Each character image is<br />
converted to a fixed size of 150×150 pixels .We have applied our<br />
feature extraction method on these samples and then these<br />
feature values are quantized and encoded to the eleven symbols<br />
in order to create sequences of observation symbols. First 100<br />
samples of each character are used to train the corresponding<br />
character HMM. Rest 400 samples are used to test our HMM<br />
classifier. For our experiment we have started with only 5 state<br />
model but we observed that as the no. of states of HMM model is<br />
increased, the corresponding recognition rate is also improved.<br />
Finally, with 36 states HMM model we have got our expected<br />
result as shown in table. Table I shows the effectiveness of our<br />
proposed model.<br />
In table 1 we have shown final recognition rate of our<br />
character recognition system using post-processing and it is<br />
compared with result obtained without post processing technique.<br />
This produces an average recognition rate of 93.24%.<br />
TABLE 1: Recognition Rate With or Without Post-<br />
Processing (PP) Using Proposed HMM Model<br />
Char Recognition<br />
-acter Rate (%)<br />
With Wi<br />
out pp th pp<br />
A 89.50 89<br />
.50<br />
B 91.00 93<br />
.25<br />
C 93.75 94<br />
.25<br />
D 93.25 93<br />
.25<br />
E 93.75 93<br />
.75<br />
F 94.00 94<br />
.00<br />
G 92.50 92<br />
.50<br />
H 93.75 93<br />
.75<br />
I 94.25 94<br />
.25<br />
J 93.50 93<br />
.50<br />
K 92.50 93<br />
.75<br />
L 93.75 93<br />
.75<br />
M 92.25 93<br />
.50<br />
VIII. CONCLUSION<br />
In this paper, an approach has been made to increase the rate<br />
of recognition of handwritten character by finding both local and<br />
global features. In the post-processing section, a trial has been<br />
done to put a line of demarcation between similar looking<br />
characters.<br />
All these specialties of this paper has made us obtain an<br />
average accuracy of 93.24%. For the letters ‗A‘ and ‗W‘,the<br />
recognition rate is found to be very low, because of a lot of<br />
variations in writing style of these letters as shown in fig.<br />
(c) (d)<br />
Char Recognition<br />
-acter Rate (%)<br />
With Wi<br />
out pp th pp<br />
N 93.75 94<br />
.25<br />
O 91.50 94<br />
.25<br />
P 91.25 92<br />
.75<br />
Q 92.25 94<br />
.00<br />
R 90.75 93<br />
.25<br />
S 90.50 91<br />
.50<br />
T 93.25 93<br />
.25<br />
U 93.50 93<br />
.50<br />
V 91.75 93<br />
.75<br />
W 89.25 89<br />
.25<br />
X 93.25 93<br />
.25<br />
Y 91.25 93<br />
.75<br />
Z 94.50 94<br />
.50<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 88<br />
ISSN 2250-3153<br />
Fig. 8 Two completely different formats for handwritten<br />
character A (a) A1 (b) A2 and for character W (c) W1 (d)<br />
W2<br />
IX. CONCLUSION<br />
HMM is a flexible tool by its inherent nature which is capable<br />
of absorbing a little bit of variations in character images. It is<br />
obvious from the samples shown above that their gradient<br />
features should differ considerably. So, our future works will be<br />
concentrated on improvement of recognition rate of such letters.<br />
X. DATA-SET<br />
ACKNOWLEDGMENT<br />
Our thanks to the authority of Bengal College of Engineering<br />
and Technology, Durgapur (W.B.) to provide us with WI-FI<br />
connection and other facilities to carry out research works.<br />
REFERENCES<br />
[1] U. Bhattacharya, and B. B. Chaudhury, ―Handwritten numeral databases of<br />
Indian scripts and multistage recognition of mixed numerals‖, IEEE Trans.<br />
Pattern analysis and machine intelligence, vol. 31, No. 3, pp. 444-457,<br />
2009.<br />
[2] U. Pal, T. Wakabayashi and F. Kimura, ―Handwritten numeral recognition<br />
of six popular scripts‖, Ninth International Conference on Document<br />
Analysis and Recognition, ICDAR07, Vol.2, pp.749-753, 2007.<br />
[3] V. K. Govindan and A. P. Shivaprasad,―Character Recognition A review‖,<br />
Pattern recognition, vol.23, no.7, pp.671-683, 1990<br />
[4] J. Pradeep, E. Srinivasan and S. Himavathi, ―Diagonal Based Feature<br />
Extraction for Handwritten Alphabets Recognition System Using Neural<br />
Network‖, International Journal of Computer Science and Information<br />
Technology (IJCSIT),, vol. 3, no. 1, pp. 27-38, Feb 2011.<br />
[5] C. Suen, C. Nadal, R. Legault, T. Mai, and L. Lam, ―Computer recognition<br />
of unconstrained handwritten numerals‖, Proc. IEEE , 80(7):1162-80.<br />
[6] J. C. Simon , ―Off-line cursive word recognition‖, Proc. IEEE , 80(7):1150-<br />
61.<br />
[7] S. Impedovo, P. Wang and H. Bunke,editors, Automatic bank check<br />
processing, Singapore: World scientific; 1997.<br />
[8] S. Srihari,―Handwritten address interpretation: a task of many pattern<br />
recognition problems‖, International Journal of Pattern Recognition and<br />
Artificial Intelligence, 2000; 14:663-74<br />
[9] G. Kim, V. Govindaraju, and S. Srihari, ―Architecture for handwritten text<br />
recognition systems‖,International Journal on document Analysis and<br />
Recognition (IJDAR), vol. 2, pp. 37-44, 1999.<br />
[10] U. V. Murti, and H. Bunke, ― Using a statistical language model to improve<br />
the performance of an HMM-basis cursive handwriting recognition<br />
system‖, International Journal of Pattern Recognition and Artificial<br />
Intelligence, 2001;15:65-90.<br />
[11] S. Gunter, and H. Bunke, ―Off-line cursive handwriting recognition using<br />
multiple classifier systemson the influence of vocabulary, ensemble, and<br />
training set size‖, Optics and Lasers in Engineering, vol. 43, pp. 437-<br />
454,2005.<br />
[12] Hailong Liu and Xiaoqing Ding ―Handwritten Character recognition Using<br />
Gradient feature and Quadratic Classifier with Multiple Discrimination<br />
Schemes,Proceedings of the 2005Eight International Conference on<br />
Document Analysis and Recognition(ICDAR‘2005)<br />
[13] H.Fujisawa,C.L.Liu ,‖Directional Pattern Matching for Character<br />
Recognition‖,Proc.7 th ICDAR,Edinburgh,Scotland,2003,pp794-798<br />
[14] K.Ding,Z.B.Liu,L.W.Jin ,X.H.Zhu,‖A comparative study of Gabor Feature<br />
And Gradient Feature For Handwritten Chinese Character<br />
Recognition‖,ICWAPR,Beijing ,China,2007,pp.1182-1186<br />
[15] C.L.Liu ,K.Nakashima,H.Sako,H.Fujisawa,‖Handwritten Digit Recognition<br />
:Investigation of Normalisation and Feature Extraction Techniques‖,Pattern<br />
Recognition ,2004,37(2),PP.265-279<br />
[16] L. R. Rabiner, ―A tutorial on Hidden Markov Models and selected<br />
applications in speech recognition‖, Proceedings of The IEEE, vol. 77, no.<br />
2, pp. 257-286, Feb. 1998.<br />
[17] C. Mokbel, H. Abi Akl, and H. Greige, ―Automatic speech recognition of<br />
Arabic digits over Telephone network―, Proc.Research Trends in Science<br />
and Technology, 2002.<br />
[18] R. El-Hajj, L. Likforman-Sulem, and C. Mokbel, ―Arabic Hand- writing<br />
Recognition Using Baseline Dependent Features and Hidden Markov<br />
Modeling, Proc. Eighth Intl Conf. Document Analysis and Recognition, pp.<br />
893-897, 2005.<br />
[19] H. El Abed and V. Margner, ―ICDAR 2009 - Arabic handwriting<br />
recognition competition‖, Inter. Journal on Document Analysis and<br />
Recognition, vol. 1433-2833, 2010.<br />
[20] P. Natarajan, S. Saleem, R. Prasad, E. MacRostie, and K.<br />
Subramanian,―Multilingual Off-line Handwriting Recognition Using<br />
Hidden Markov Models: A script independent Approach‖, Springer Book<br />
Chapter on Arabic and Chinese Handwriting Recognition, ISSN:0302-9743,<br />
VOL. 4768, pp. 235-250, March 2008.<br />
[21] Zhang Hong lin, ―Visiual C++Digital image pattern recognition technology<br />
and engineering practice,‖Beijing: Posts & Telecom Press, 2008,pp. 52-58.<br />
[22] R. C. Gonzalez and P. Wintz, ―DIGITAL IMAGE PROCESSING,‖ 2 nd<br />
Edition, ADDISON WESLEY, Reading Mass, 198.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 89<br />
ISSN 2250-3153<br />
Fuzzy Sub - Trigroup – Trilevel Properties<br />
1 G.Nirmala, 2 S.Suganthi<br />
1 Associate prof.of Mathematics, PG and Research Department of mathematics, K.N.G.A.College(Women),Autonomous,Thanjavur.<br />
2 Research Scholar, Manonmaniam sundaranar University,Thirunelveli.<br />
Abstract- In this paper, some characteristic description and a<br />
kind of representation of the fuzzy sub-trigroup with respect to<br />
operation addition are Introduced.Fuzzy sub-trigroup,union of<br />
fuzzy trigroups trilevel subset of a fuzzy sub-trigroup are<br />
defined. Properties of fuzzy sub-trigroup are proved with<br />
examples. some results of trilevel subset of fuzzy sub-trigroups<br />
are also proved.<br />
T<br />
Index Terms- Trilevel subset, Trigroup, Fuzzy sub-trigroup<br />
I. INTRODUCTION<br />
he concepts of fuzzy sets was introduced by Zadeh.Since the<br />
paper fuzzy set theory has been considerably developed by<br />
zadeh himself and some researchers.The original concept of<br />
fuzzy sets was introduced as an extension of cribs (usual) sets, by<br />
enlarging the truth value set of ―grade of members‖from the two<br />
value set {0,1} to unit interval {0,1} of real numbers. The study<br />
of fuzzy group was started by Rosenfeld.<br />
It was extended by Roventa who have introduced the fuzzy<br />
groups operating on fuzzy sets.W.B.Vasantha kandasamy<br />
introduced fuzzy sub-bigroup with respect to ‗+‘ and ‗.‘and<br />
illustrate it with example. W.B.Vasantha kandasamy was the first<br />
one to introduce the notion of bigroups in the year 1994.Several<br />
mathematicians have followed them in investigating the fuzzy<br />
group theory. We now recall the previous and preliminary<br />
definitions, and results that are required in our discussion.<br />
1. Preliminaries:<br />
Definition: 1.1<br />
Let X be a nonempty set.A fuzzy set µ of the set X is a function<br />
µ : X → [0,1].<br />
Definition: 1.2<br />
The most commonly used range of membership functions is the<br />
unit interval [0,1].In this case,each membership function maps<br />
elements of a given universal set x,which is always a crisp<br />
set,into real numbers in [0,1]<br />
Two distinct notations are most commonly employed in the<br />
literature to denote membership functions.<br />
The membership functions of a fuzzy set A is denoted by A<br />
Ã:x → [0,1].<br />
Definition: 1.3<br />
Let A and B be two fuzzy sets for all [0,1]<br />
Min of AB=Aα(۸)Bα<br />
= [a1 (α) ,a2 (α) ]۸[b1 (α) , b2 (α) ]<br />
= [a1 (α) ۸b1 (α) ,a2 (α) ۸b2 (α) ]<br />
Max of AB= Aα(۷)Bα<br />
= [a1 (α) ,a2 (α) ] ۷[b1 (α) ,b2 (α) ]<br />
= [a1 (α)<br />
۷ b1 (α) ,a2 (α) ۷b2 (α) ]<br />
Definition: 1.4<br />
Let G be a group.A fuzzy subset µ of a group G is called a fuzzy<br />
subgroup of the G if i. µ(xy) ≥ min{ µ(x) , µ(y)}<br />
for every x,y G<br />
ii. µ(x -1 ) = µ(x) for every x G<br />
Definition: 1.5<br />
Let µ be a fuzzy subset of G.For t [0,1] the set µt = { x G/<br />
µ(x) ≥ t} is called a level subset of the fuzzy subset µ.<br />
Definition: 1.6<br />
Let µ1 be a fuzzy subset of a set X1 and µ2 be a fuzzy subset of a<br />
set X2, then the fuzzy union of the fuzzy sets µ1 and µ2 is defined<br />
as a function.<br />
µ1µ2: X1X2 → [0,1] given by<br />
max(µ1(x), µ2(x)) if x X1∩ X2<br />
(µ1µ2)(x) = µ1(x) if xX1 and xX2<br />
µ2(x) if xX2 and xX1<br />
Definition: 1.7<br />
Let µ1 be a fuzzy subset of a set X1 and µ2 be a fuzzy subset of a<br />
set X2, µ3 be a fuzzy subset of a set X3then the fuzzy union of<br />
the fuzzy sets µ1 and µ2, µ3 is defined as a function.<br />
µ1µ2µ3: X1X2X3 → [0,1] given by<br />
max(µ1(x),µ2(x), µ3(x))<br />
if x X1∩ X2∩ X3<br />
(µ1µ2 µ3)(x) = µ1(x) if xX1 x X2, X3<br />
µ2(x) if xX2 x X1, X3<br />
µ3(x) if xX3 x X1, X2<br />
II. RESULTS<br />
Let G = (G1G2G3,+) be a trigroup.Then µ : G → [0,1] is<br />
said to be a fuzzy sub-trigroup of the trigroup G if there<br />
exists three fuzzy subsets µ1 of G1 and µ2 of G2, µ3 of G3<br />
such that<br />
(i) (µ1,+) is a fuzzy subgroup of (G1,+)<br />
(ii) (µ2,+) is a fuzzy subgroup of (G2,+)<br />
(iii) (µ3,+) is a fuzzy subgroup of (G3,+)<br />
µ = (µ1µ2 µ3).<br />
Let (G = G1G2G3,+) be a trigroup and<br />
µ = (µ1µ2 µ3) be a fuzzy sub-trigroup of the trigroup G.The<br />
tri level subset of the fuzzy sub-trigroup µ of the trigroup G<br />
is defined as (Gµ ) t = (G1µt) t (G2µt) t (G3µt) t<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 90<br />
ISSN 2250-3153<br />
for every t [0,min{µ1(e1), µ2(e2) , µ3(e3)}] where e1, e2 , e3 are<br />
denotes the identity element of the group (G1 , +) ,(G2 ,+) ,(G3,+)<br />
respectively.<br />
A fuzzy subset µ of a group G is said to be a union of three<br />
fuzzy sub-groups of the group G if there exists three fuzzy<br />
subgroups µ1,µ2 and µ3 of µ (µ1=µ , µ2=µ and µ3=µ) such<br />
that<br />
µ = (µ1µ2 µ3).Here by the term fuzzy subgroup λ of μ we<br />
mean that λ is a fuzzy subgroup of the group G and λ μ (where<br />
μ is also a fuzzy subgroup of G).<br />
The condition<br />
t [0,min{µ1(e1), µ2(e2) , µ3(e3)}] is essential for the trilevel<br />
subset to be a sub-trigroup for if<br />
t [0,min{µ1(e1), µ2(e2) , µ3(e3)}] then the trilevel subset<br />
need not in general be a sub-trigroup of the trigroup G.<br />
2. Properties of fuzzy sub –trigroup.<br />
Example: 2.1<br />
Let x1 = {1,2,3,4,5} and<br />
X2 ={2,4,6,8,10},X3 = {1,3,5,7,9} be three sets<br />
Define µ1: x1 → [0,1] by<br />
1 if x = 1,2<br />
µ1(x) = 0.6 if x =3<br />
0.2 if x = 4,5<br />
Define µ2: x2 → [0,1] by<br />
1 if x = 2,4<br />
µ2(x) = 0.6 if x =6<br />
0.2 if x = 8,10<br />
And Define µ3: x3 → [0,1] by<br />
Hence<br />
1 if x = 1<br />
µ3(x) = 0.6 if x =3,5<br />
0.2 if x = 7,9<br />
1 if x = 1,2,4<br />
(µ1µ2µ3)(x) = 0.6 if x =3,5,6<br />
0.2 if x = 7,8,9,10<br />
Example: 2.2<br />
Consider the trigroup<br />
G = {±i, ±0, ±1,±2,±3,±4,………..}<br />
Under the operation ‗+‘ where<br />
G1 = {0, ±1,±2,±3,………………}<br />
G2 = {±i,0},G3 = {0, ±2}.<br />
Define µ: G → [0,1] by<br />
1/3 if x = i,-i<br />
µ (x) = 1 if x {0,±2,±4,….}<br />
1/2 if x {±1,±2,±3,………}<br />
We can find<br />
Define µ1: G1 → [0,1] by<br />
µ1(x) =<br />
1 if x {0, ±2,±4,…….}<br />
1/2 if x {±1,±3,±5,………}<br />
Define µ2: G2 → [0,1] by<br />
µ2(x) =<br />
1/3 if x = ±i<br />
1 if x = 0<br />
Define µ3: G3 → [0,1] by<br />
µ3(x) =<br />
1 if x =0<br />
1/2 if x = ±2<br />
Hence there exists two fuzzy subgroups µ1of G1, µ2 of G2 and µ3<br />
of G3 such that µ = (µ1µ2µ3).<br />
Theorem: 2.1<br />
Every t-level subset of a fuzzy sub-trigroup µ of a trigroup G<br />
need not in general be a sub-trigroup of the trigroup G<br />
Proof:-<br />
We can prove this theorem by an example<br />
Take G = {-2,-1,0,1,2} to a bigroup under the operation ‗+‘<br />
Where G1 = {-2,0,2}, G2 = {-1,0,1}, G3 = {0} are groups w.r.to<br />
‗+‘ .<br />
Define µ: G→ [0,1] by<br />
1 if x = -2,2<br />
µ (x) = 1/2 if x = -1,1<br />
1/4 if x = 0<br />
Then clearly (µ,+) is a fuzzy sub-trigroup of the trigroup (G,+).<br />
Now consider the level subset Gµ 1/2 of the fuzzy sub-trigroup µ.<br />
Gµ 1/2 = {-2,-1,1,2} is not a sub – trigroup of the trigroup<br />
(G,+).<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 91<br />
ISSN 2250-3153<br />
Hence the t level subset<br />
Gµ t (of t =1/2) of the fuzzy sub – trigroup µ is not a sub –<br />
trigroup (G,+).<br />
Theorem: 2.2<br />
Every trilevel subset of a fuzzy sub – trigroup µ of a trigroup G<br />
with respect to the usual addition is a sub-trigroup of trigroup G.<br />
Proof :-<br />
Let µ = (µ1µ2µ3) be the fuzzy subgroup of a trigroup<br />
(G = G1G2G3,+).<br />
Consider the trilevel subset Gµ t of the fuzzy sub – trigroup µ for<br />
every<br />
t [0,min{µ1(e1), µ2(e2) , µ3(e3)}]<br />
Where e1, e2 and e3 denote the identity elements of the<br />
groups G1,G2 and G3 respectively.<br />
Then Gµ t = G3µ3 t G2µ2 t G1µ1 t<br />
Where G1µ1 t , G2µ2 t , and G3µ3 t are subgroups of G1,G2 and G3<br />
respectively.<br />
Since G1µ1 t is a t-level subset of the group G1, G2µ2 t is a t-level<br />
subset of the group G2 and G3µ3 t is a t-level subset of the group<br />
G3.<br />
Hence the sub-trigroup Gµ t is a sub-trigroup of the trigroup G.<br />
Example: 2;3<br />
G = {0, ±1, ±i} is a trigroup with repect to the addition.<br />
Clearly G1= {0},G2 ={0, ±1},<br />
G3 = {0, ±i} are groups with respect to addition.<br />
Define µ: G → [0,1] by<br />
1 if x = 0<br />
µ (x) = 0.5 if x =±1<br />
0.3 if x =±i<br />
Therefore µ is a fuzzy sub – trigroup of the trigroup G as there<br />
exists three fuzzy subgroups µ1: G1 → [0,1] , µ2: G2 → [0,1] and<br />
µ3:G3 → [0,1] such that µ = µ1Uµ2Uµ3<br />
Where<br />
µ1(x) = 1 if x = 0<br />
0.8 if x = 0<br />
REFERENCES<br />
[1] S. AbouZaid, On fuzzy subnearrings and ideals, Fuzzy Sets and Sys. 44<br />
(1991), 139146.<br />
[2] Yuan Bo and Wu Wangming, Fuzzy ideals on a distributive lattice, Fuzzy<br />
Sets and Sys. 35 (1990), 231240.<br />
[3] P. S. Das, Fuzzy groups and level subgroups, J. Math. Anal. and Appl. 84<br />
(1981), 264269.<br />
[4] V. N. Dixit, R. Kumar and N. Ajal, On fuzzy rings, Fuzzy Sets and Sys. 49<br />
(1992), 205213.<br />
[5] N. Kuroki, Fuzzy biideals in semigroups, Comment.Math. Univ. St. Pauli.<br />
28 (1979), 1721.<br />
[6] N. Kuroki, On fuzzy ideals and fuzzy biideals in semigroups, Fuzzy Sets<br />
and Sys. 5 (1981), 203215.<br />
µ2(x) = 0.5 if x =±1<br />
0.9 if x = 0<br />
µ3(x) = 0.3 if x =±i<br />
Now we calculate the trilevel subset Gµ t for t = 0.5<br />
Gµ t = G3µ3 t G2µ2 t G1µ1 t<br />
={xG1/µ1(x) ≥t}{xG2/µ2(x) ≥t}<br />
{ xG3/ µ3(x) ≥ t}<br />
Gµ t = {0}{0,±1}{0}<br />
= {0, ±1}<br />
G t = {0, ±1} is a sub-trigroup of the trigroup G.<br />
Theorem: 2.3<br />
Let µ = µ1Uµ2Uµ3 be a fuzzy sub – trigroup of the trigroup<br />
G.Where µ1,µ2 and µ3 are fuzzy sub groups of the group G.The<br />
trilevel subset Gµ t of µ for<br />
t[0,minµ1(e1),µ2(e2), µ3(e3)}] can be represented as the union of<br />
three subgroups of the group G.<br />
That is Gµ t = G3µ3 t G2µ2 t G1µ1 t .<br />
Proof:-<br />
Let µ be a fuzzy sub – trigroup of the group G with<br />
respect to addition and<br />
t [0,min{µ1(e1), µ2(e2) , µ3(e3)}]<br />
there exists fuzzy subgroups µ1,µ2 and µ3 of the group G such<br />
that µ = µ1µ2µ3.<br />
Let Gµ t be the level subset of µ,<br />
Then we have<br />
xGµ t µ(x) ≥ t<br />
max{ µ1(x),µ2(x), µ3(x)} ≥ t<br />
µ1 ≥ t or µ2(x) ≥ t or µ3(x) ≥ t<br />
xG1µ1 t or xG2µ2 t or xG3µ3 t<br />
xG1µ1 t G2µ2 t G3µ3 t<br />
Hence Gµ t = G1µ1 t G2µ2 t G3µ3 t<br />
III. CONCLUSION<br />
In this paper with the basic concepts of group theory,we define<br />
related concepts of fuzzy sub-trigroup and further we proved<br />
properties of fuzzy sub-trigroup.<br />
[7] G.Nirmala,S.Suganthi, fuzzy algebra –presended the paper in national<br />
conference on Recent advances in pure and applied mathematics –Govt.Arts<br />
college for women (Aut),Pudukkottai.<br />
[8] G.Nirmala,S.Suganthi published the paper-Lagrange‘s theorem in fuzzy<br />
approach-The pmu journal of Humanities and Sciences-july-december<br />
2011.<br />
[9] W. B. Vasantha Kandasamy, Smaramdache fuzzy Algebra<br />
American Research Press Rehoboth 2003.<br />
10.Zimmermann H., Fuzzy Set Theory and its Applications (2001),<br />
ISBN 978 – 0 – 7923- 7435 – 0<br />
AUTHORS<br />
First Author – G.Nirmala, Associate prof. of Mathematics, PG<br />
and Research Department of mathematics,<br />
K.N.G.A.College (Women), Autonomous,Thanjavur, India<br />
Tamilnadu,India.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 92<br />
ISSN 2250-3153<br />
Email id - nirmalamanokar11@yahoo.com<br />
Second Author – S.Suganthi, Research Scholar, Manonmaniam<br />
sundaranar University,Thirunelveli,Tamilnadu,,India.<br />
Email id : mathisuganthi@gmail.com<br />
*Correspondence Author – S.Suganthi,<br />
Email id : mathisuganthi@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 93<br />
ISSN 2250-3153<br />
Adjustment problems of Educable Mentally Retarded<br />
Abstract- The study examined the adjustment problems of<br />
educable mentally retarded students of Ranchi (India). The total<br />
sample in the study consisted of 200 subjects – out of which 100<br />
served as experimental group (mentally retarded) and 100 as<br />
normal control. The subjects in the experimental group were<br />
selected from the schools of mentally retarded and normal<br />
control subjects were selected from different high schools of<br />
Ranchi. They were matched with the experimental group with<br />
respect to various socio-demographic variables, like age,<br />
economic status, religion and domicile. The Purposive sampling<br />
technique was adopted. For assessing the intelligence and<br />
adjustment problems of the subjects, Sandford Binet intelligence<br />
scale and Bell adjustment inventory were administer. Result<br />
showed that:<br />
(i) Mentally retarded subjects had greater adjustment problems<br />
than the normal control group.<br />
(ii) Mentally retarded group showed highest score in social area<br />
and lowest score in health area in comparison to other areas of<br />
adjustment.<br />
Index Terms- Educable Mentally retarded, Adjustment,<br />
Control group, Experimental group<br />
M<br />
I. INTRODUCTION<br />
ental retardation is a complex clinical condition with a<br />
heterogeneous etiology in which people have below<br />
intelligence that limits their ability to function normally. This<br />
type of people may have problems with communication, taking<br />
care of themselves, daily living social skills, community<br />
interactions, directing themselves, health, safety and work.<br />
Mental retardation has posed a great problem throughout the<br />
world due to its highly complex social, medical, psychological<br />
and educational components, apart from various unanticipated<br />
problems.<br />
The American Psychiatric Association in DSM-IV-TR<br />
defined mental retardation as ‗significantly sub average general<br />
intellectual functioning…. that is accompanied by significant<br />
limitation in adaptive functioning.‘ The term adaptive<br />
functioning refers to the person‘s ability to cope with life‘s<br />
demand and live independently, according to the standards of his<br />
or her age groups, communities, social clam and culture.<br />
Mental retardation varies in severity. The DSM-IV-TR<br />
classified four different degrees of mental retardation: mild,<br />
moderate, severe and profound. These categories are based on<br />
the person‘s level of functioning and IQ Scores. Children with<br />
mild mental retardation are classified as the educable mentally<br />
retarded, and compose approximately 85% of the mentally<br />
retarded. Initial diagnosis of mental retardation occurs very<br />
frequently at ages 5 to 6. During early childhood, individuals<br />
Dr. Bharati ROY<br />
Email: bharatiroy.roy15@gmail.com<br />
with a mild degree of intellectual impairment, often appear to be<br />
normal. Their sub average intellectual functioning becomes<br />
apparent only when difficulties with school works lead to a<br />
diagnostic evaluation. When adequate facilities are available for<br />
their education, children in this group can usually master<br />
essential school skills and achieve a satisfactory level of socially<br />
adaptive behavior. (Carson, Butcher, Mineka and Hooley, 2008)<br />
Educable retarded children are basically very similar to other<br />
children generally they do not have physical characteristics<br />
which set them apart from other children. They are capable of<br />
engaging in the same physical activities that other children enjoy.<br />
They do not exhibit behavior patterns which deviate noticeably<br />
from their peers. Educationally they learn in much the same way<br />
that other children do. They begin school at the same age other<br />
children do and are able to profit from education as it is<br />
presented in the public schools. The social and emotional<br />
adjustment of mildly retarded children is often approximately are<br />
that of adolescents, although they tend to lack normal<br />
adolescent‘s imagination, inventiveness, curiosity and judgment.<br />
Ordinarily they do not show sign of brain pathologies or other<br />
physical anomalies, but still they require some measure of<br />
supervision because of their limited abilities to foresee the<br />
consequences of their actions. With early diagnosis, parental<br />
assistance, and special educational programs, the great majorities<br />
of mildly retarded individuals can adjust socially, master simple<br />
academic and occupational skills and become self supporting<br />
citizens.<br />
There are few differences which are common to all educable<br />
retarded children. These are:<br />
(1) Intellectually they function at a slower rate of learning<br />
than most children in school. Their score on individual<br />
intelligence tests will usually fall between 50 and 80 I.Q.<br />
(2) Academically they are marked below their chronological<br />
grade level.<br />
The inability of the educable mentally retarded to compete<br />
academically may adversely affect his personal and social<br />
adjustment in the school setting. It may lead to profound feelings<br />
of inferiority and may sharply reduce his ability to realistically<br />
assess his abilities and limitations.<br />
Mild mentally retarded have IQs over 50, are relatively normal in<br />
appearance and come mostly from lower social economic<br />
classes. According to Frank, Hewett, Steven and Forness ‗mild<br />
mental retardation most likely results from the complex interplay<br />
of familial, environmental and social factors in which heredity<br />
tends to set limits on intellectual potential or capacity, whereas<br />
experience determines to what extent such potential will be<br />
fulfilled. With regard to etiology, there are probably four<br />
overlapping types of causes associated with mild retardation.<br />
The first type is familial, which includes the small percentage<br />
of each ethnic group or minority group that falls at the lower end<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 94<br />
ISSN 2250-3153<br />
of the polygenetic distribution of intelligence for their respective<br />
groups. The second type of cause is neurological. It is possible in<br />
some cases to pinpoint that a specific pathologic condition may<br />
have caused some damage to the child‘s central nervous system,<br />
resulting in a mild level of retardation. Lead poisoning, either<br />
through prolonged exposure to industrial lead dust or ingestion of<br />
chipped lead paint, may be one such cause (Moore and Moore,<br />
1977) the third type of cause is nutritional. There is increasing<br />
documentation that chronic malnutrition, either in the mother or<br />
subsequently in the developing child, may be one of the more<br />
significant factors in eventual mental performance (Perkins 1977,<br />
Winnick 1976). The fourth cause is environmental. Socioeconomic<br />
factors or poverty is an important factor of mild<br />
retardation. In general, mild mental retardation is somewhat more<br />
prevalent in families with low incomes than in families with high<br />
incomes. This risk factor is related to parental intelligence and<br />
the amount of intellectual stimulation the child receives. A<br />
related risk factor may be maternal age. A number of studies<br />
pointed out that most of these children come from poverty<br />
stricken, unstable and often disputed family back grounds<br />
characterized by a lack of intellectual stimulation, an inferior<br />
quality of interaction with others, and general environmental<br />
deprivation (Cullinan, 1985)<br />
II. OBJECTIVE<br />
The objective of present study is to examine the adjustment<br />
problems of educable mentally retarded.<br />
III. HYPOTHESIS<br />
It is hypothesized that educable mentally retarded would show<br />
more adjustment problems in different areas that normal.<br />
IV. METHOD<br />
4.1 Participants<br />
The study comprised of 100 educable mentally retarded<br />
children (87 were male and 13 were female) and 100 normal<br />
controls, (50 male and 50 female) their chronological age ranged<br />
from 15 to 18 years. Subjects of retarded group were selected<br />
from the schools for mentally retarded and the sample of normal<br />
control subjects were selected from different high schools of<br />
Ranchi purposive sampling technique was employed for the<br />
selection of sample.<br />
4.2 Tools<br />
The following tools were used in the present study:<br />
4.2.1 Stanford – Binet Intelligence Scale – LM Form: An<br />
Indian adaptation of Stanford Binet Intelligence Scale revised<br />
LM Form by Kulshrestha (1971) was used for measuring<br />
intelligence of both mentally retarded and normal individuals.<br />
The reliability of this scale ranges from 0.95 to 0.98 for age 14 to<br />
18 years. The validity co-efficient ranges between 0.40 to 0.75.<br />
4.2.2 Mohsin – Shamshad Adaptation of Bell Adjustment<br />
Inventory (1987): The inventory consists of 135 items<br />
measuring adjustment in four different areas: home, health, social<br />
and emotional separately as well as it yields a composite score<br />
for overall adjustment.<br />
4.3 Procedure<br />
All subjects who were selected for the present study were<br />
interviewed and then assessed for IQ with the help of Stanford –<br />
Benet intelligence scale. Thereafter, Bell‘s adjustment inventory<br />
was individually administered on each mentally retarded and<br />
average intelligent student. After getting back the completed<br />
questionnaire the responses were scored as per the predetermined<br />
standard scoring procedure.<br />
4.4. Statistical Analysis<br />
Statistical analysis was done with the help of Statistical<br />
Package for Social Science (SPSS). The percentages, means,<br />
standard deviations and t tests were used to find if there were<br />
significant differences between the groups.<br />
V. RESULT AND DISCUSSION<br />
Analysis or Social-demographic data presented in table-1,<br />
indicated that, in educable mentally retarded group maximum<br />
number of sample (50%) was in the age group of 17 years.<br />
Majority (87%) of retardeds were male, from Muslim community<br />
(89.5%) rural area (75%) and 70% were from lower socioeconomic<br />
back ground.<br />
Result given in table II and figure-1 clearly showed that<br />
maladjustment scores of educable retarded groups are higher<br />
(Mean-78.82) in comparison to maladjustment scores of normal<br />
group (mean 40.46). Mean maladjustment scores of mentally<br />
retarded groups are higher in all the areas of adjustment i.e.<br />
home, health, social and emotional. The total maladjustment<br />
score of educable mentally retarded group is almost double to the<br />
score of normal control group.<br />
It was observed that the mean score of mentally retarded<br />
group was particularly higher in the social area (mean- 19.82)<br />
which was higher than the scores on other areas of adjustment.<br />
This probably indicates that the subject has difficulties in their<br />
social life. Because of their poor mental ability, the retarded find<br />
it difficult to adjust to the demands of the society and get a high<br />
maladjustment score in the social area. A considerable amount of<br />
research has been done on the social adjustment of mentally<br />
retarded (Meyers et al, 1979, Sukla, 1982, Kumar Singh and<br />
Akhtar 2009). It was found that social mal adjustment among<br />
mentally retarded have been manifested by difficulty in<br />
establishing close intimate relationship, loneliness, lack of<br />
friends, frustration and dissatisfaction with existing relationships.<br />
The feeling of loneliness decreases their active involvement in<br />
social relations.<br />
Mentally retarded children also exhibit severe adjustment<br />
problems in the emotional area, indicating presence of<br />
depression, nervousness, and anxiety. They suffer from<br />
emotional disturbance and try to cope in every aspect of life in a<br />
maladaptive and immature manner. The retarded must face the<br />
reality of his retardedness for the history of failure on intellectual<br />
tasks and they suffer from the feeling of inferiority,<br />
worthlessness, anger, helplessness, non-assertiveness and<br />
inadequate self confidence.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 95<br />
ISSN 2250-3153<br />
Mean scores of mentally retarded is quite high in the home<br />
adjustment area. The family life to which the retarded must<br />
adjust is complicated by parental guilt. Some parents of retarded<br />
children show evidence of strong guilt feeling for having brought<br />
into the world a child with limited abilities. One prevalent form<br />
of expression of his guilt is parental over protection. Such pattern<br />
of parental behavior encourages a dependent style of interaction<br />
in child. Other parents express guilt by denying the child‘s<br />
disabilities, the different reaction of the parents namely<br />
overprotection and denial, may creat adjustment problems for<br />
retarded children.<br />
Mentally retarded group gets lowest score in the health area in<br />
comparison to other areas of adjustment although this score was<br />
much higher than normal control group. Normal group shows<br />
poorer adjustment in emotional area in comparison to other<br />
dimensions of adjustment. It is quite natural because adolescent<br />
Table – I: Socio-demographic characteristics of the sample.<br />
Characteristics Number of Cases<br />
period is characterized as a period of stress and strain. During<br />
this period adolescents face with rapid physiological changes.<br />
Erickson (1950) has described adolescence as ‗period of identity<br />
crisis‘. Normal group belongs to this period & if they have<br />
shown adjustment problems in the emotional area, the findings<br />
are in the expected direction.<br />
Result given in table III reveal that the males of mentally<br />
retarded group showed significantly higher score in comparison<br />
with female group on social adjustment dimension.<br />
The male group of normal control significantly scored higher<br />
in comparison with female group on social, emotional and home<br />
dimensions. They did not differ in health dimension score. The<br />
table showed that there is no considerable difference between the<br />
male and female retarded group on home, health and emotional<br />
dimensions of adjustment.<br />
Age distribution in years Educable retarded Normal control<br />
N % N %<br />
13 years 10 10 15 15<br />
16 years 30 30 20 20<br />
17 years 50 50 25 25<br />
18 years 10 10 40 40<br />
Male 87 87 50 50<br />
Gender<br />
Religion<br />
Domicile<br />
Socio-economic Status<br />
Female 13 13 50 50<br />
Hindu 6 6 25 25<br />
Muslim 89 89 25 25<br />
Christian 5 5 25 25<br />
Sikh 0 0 25 25<br />
Urban 25 25 50 50<br />
Rural 75 75 50 50<br />
High 30 30 50 50<br />
Low 70 70 50 50<br />
Table – II: Comparison of Educably mentally retardeds and normal controls in terms of Mean adjustment scores.<br />
Dimension Groups Mean SD SEM MD t<br />
Home<br />
Health<br />
Social<br />
Emotional<br />
Total<br />
Retarded 16.30<br />
Normal 8.35<br />
Retarded 12.42<br />
Normal 8.65<br />
Retarded 19.82<br />
Normal 8.36<br />
Retarded 16.00<br />
Normal 10.25<br />
Retarded<br />
Normal<br />
78.82<br />
40.46<br />
2.6<br />
3.48<br />
3.44<br />
3.36<br />
3.24<br />
3.40<br />
4.15<br />
3.10<br />
9.25<br />
3.20<br />
.26<br />
.348<br />
.344<br />
.336<br />
.324<br />
.340<br />
.415<br />
.310<br />
.925<br />
.320<br />
7.95 18.92**<br />
3.77 8.19**<br />
11.46 24.91**<br />
5.75 11.5**<br />
38.36 39.54**<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 96<br />
ISSN 2250-3153<br />
** Significant at 0.01 level.<br />
Dimension<br />
Home<br />
Health<br />
Social<br />
Emotional<br />
Figure – I: Mean maladjustment scores of educably mentally retarded and non-retarded sample.<br />
Mean<br />
S D<br />
Mean<br />
S D<br />
Mean<br />
S D<br />
Mean<br />
S D<br />
Table – III: Gender difference in adjustment.<br />
Group<br />
Mentally Retarded Normal<br />
Male Female t Male Female t<br />
16.18<br />
7.92<br />
27.98<br />
8.88<br />
19.25<br />
16.12<br />
1.12<br />
18.05<br />
9.15<br />
18.15<br />
.05<br />
0.6<br />
0.01<br />
8.62<br />
3.37<br />
7.15<br />
4.15<br />
8.98<br />
7.25<br />
3.75<br />
8.10<br />
3.69<br />
7.02<br />
8.16 7.18 3.45 3.12<br />
19.02<br />
8.66<br />
20.15<br />
8.75<br />
.92<br />
18.64<br />
8.25<br />
16.25<br />
7.18<br />
2.74<br />
1.66<br />
4.35<br />
2.19<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 97<br />
ISSN 2250-3153<br />
VI. CONCLUSION<br />
(i) Educable mentally retarded group had greater adjustment<br />
problems than the normal control group.<br />
(ii) E.M.R. group showed highest maladaptive score in social<br />
area and lowest score in the health area in comparison to other<br />
areas of adjustment.<br />
(iii) No significant difference was found between the male and<br />
female retarded group on home, health and emotional area of<br />
adjustment.<br />
REFERENCES<br />
[1] Carson, R.C., Butcher, J.N., Mineka & Hooley, J.M. (2008): Abnormal<br />
Psychology 12th Ed. Pearson Education Inc. and Dorling kindersey<br />
Publishing.Inc.<br />
[2] Cullinan, D & Esplin, M.H. (1985).Adjustment problems of mildly<br />
handicapped and non-handicapped students.Revedial and Special<br />
education.6.No. 2-5-11.<br />
[3] Erickson, E.H. (1950). Growth and crises of the healthy personality.<br />
Symposium on the Healthy Personality. Josiah Macy, Jr.Found, New York.<br />
[4] Kulshrestha, S.K. (1971).Stanford Binet intelligence Scale. Hindi<br />
Adaptation.Manas Sewa Sausthan, 10, Louther Road, Allahabad.<br />
[5] Kumar, I., Singh.A.R. & Akthar.S. (2009).Social development of children<br />
with mental retardation. Industrial Psychiatry Journal.18 (1):56 – 59.<br />
[6] Mohsin, S.S & Shamshad, H. (1987).Manual for Mohsin-Shamshad, Hindi<br />
Adaptation of Bell Adjustment Inventory. Psycho-Scientific works.<br />
Publication Division, Mahendru, Patna, 1970.<br />
[7] Moore, B. C., & Moore, S. M. (1977).Mental retardation; Causes and<br />
Prevention. Columbus, Ohio: Charles E.merrill Publishing Co.<br />
[8] Perkins, S.N. (1977).Malnutrition and mental development. Exceptional<br />
Children.43, 214-220.<br />
[9] Sukla, T.R., Khoche, V. (1982).A study of adjustment problems of mentally<br />
retarded children. Indian Journal of mental retardation.7 (1):4 – 13.<br />
[10] Winnick, M, (1976).Malnutrition and brain development.Newyork: Oxford<br />
University, Press.<br />
AUTHORS<br />
Correspondence Author – Dr. Bharati ROY, Professor of<br />
Psychology,<br />
Ranchi University, Ranchi – 834 006, India.<br />
E-mail: bharatiroy.roy15@gmail.com<br />
Telephone #: 0651-2563686<br />
Mobile #: 09430789030<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 98<br />
ISSN 2250-3153<br />
Design of Efficient XTEA Using Verilog<br />
Shweta Gaba, Iti Aggarwal, Dr. Sujata Pandey<br />
Electronics and Communication Engineering, Amity School of Engineering and Technology,<br />
Amity University, India<br />
Abstract- In this age of viruses and hackers of electronic<br />
eavesdropping and electronic fraud, security is paramount. A<br />
cryptographic system ( or a cipher system) is a method of hiding<br />
data so that only certain people can view it. A cryptographic<br />
system typically consists of algorithms, keys, and key<br />
management facilities. There are several algorithms to choose<br />
from that vary in the security they provide, their size, the time it<br />
takes to encrypt or decrypt a block of data. In this paper, we<br />
analyze and evaluate the development of a cheap and relatively<br />
fast hardware implementation of the extended tiny encryption<br />
algorithm (XTEA). Originally the research was split into separate<br />
encipher/decipher units, but these have now been combined into<br />
a single unit. The design will start by using finite state machine<br />
(FSMs) and will use Verilog hardware description language to<br />
describe the design. Minimizing the chip area and security<br />
transmission of data will be our main goal. The targeted<br />
hardware systems are the reconfigurable Spartan III and Xilinx<br />
Virtex IV modern field programmable gate arrays (FPGAs).<br />
Index Terms- Encipher, Decipher, Finite State Machines,<br />
cryptographic system.<br />
T<br />
I. INTRODUCTION<br />
he security of symmetric cryptosystem [9] is a function of<br />
two parameters: the strength of the algorithm and the length<br />
of the key. The algorithm must be so secure that there is no better<br />
way to break it than with a brute-force attack. The security of the<br />
algorithm must be resided in the key and delta value we choose.<br />
So therefore, there is balance between choosing long key, delta<br />
and the time required to complete the enciphering operation.<br />
Many encryption algorithms [8] are available in the market and<br />
the selection of a specific one is dependent on the relatively tight<br />
constraints. The selected algorithm should be small, relatively<br />
secure, with a proven history of overcoming possible well known<br />
attacks on it. The Tiny Encryption Algorithm (TEA) (Wheeler<br />
and Needham 1994), [6] and hence its successor the Extended-<br />
TEAs (XTEAs) (Needham and Wheeler 1997; Russell 2004;<br />
Kelsey et al. 1997; Moon et al. 2002) [7] are among the best<br />
choices available for security purpose. The name of block cipher<br />
came from the fact that block cipher encrypts plaintext as blocks<br />
[8]. These blocks differ in size between block cipher algorithms,<br />
for example, in Data Encryption Standard DES the plaintext is<br />
divided into blocks of length 64, but it is 32 in International Data<br />
Encryption Algorithm (IDEA) [11], if the length of block cipher<br />
equal one them, it will become stream cipher.<br />
This paper uses the Verilog description language to implement<br />
the core function of XTEA and integrate them into a FPGA [10]<br />
chip. XTEA consist of two parts namely encipher and decipher<br />
units but we are developing in a single module. The unit accepts<br />
data in data_in1 and data_in2, a key in key, a delta in delta and<br />
the mode in block (‗00‘ for encipher, ‗11‘ for decipher). The<br />
all_done wire is raised when the results of the operation are<br />
ready to be read from out_1 and out_2. It needs to be reset before<br />
each use. The paper is arranged as follows:<br />
1) Abstract<br />
2) Introduction<br />
3) Verilog designing of XTEA<br />
4) Results of simulation and synthesis<br />
5) Conclusions<br />
II. IDENTIFY, RESEARCH AND COLLECT IDEA<br />
After attending the conference on VLSI MEMS and NEMS<br />
held in Amity University we got an idea to do some research<br />
work on XTEA. We have studied some research papers and<br />
Google it thoroughly. Till now a key of different 128 bit is<br />
required for both encipher and decipher but we have design it in<br />
such a way that we require same key for both encipher an<br />
decipher module.<br />
III. EXPERIMENTAL DETAILS<br />
XTEA [1] is a symmetric block cipher designed to correct<br />
weakness in TEA [6]. Like TEA, XTEA is a 64-bit block Feistel<br />
network with a 128-bit key and a suggested 64 rounds. Several<br />
differences from TEA are apparent, including a somewhat more<br />
complex key-schedule and a rearrangement of the shifts, XORs<br />
and additions (Hong et al. 2003; Ko et al.2004). Fig.1 shows the<br />
block diagram of an XTEA.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 99<br />
ISSN 2250-3153<br />
Fig.1 Block Diagram of XTEA<br />
In this proposed XTEA we are using different value of<br />
DELTA and KEY to increase the security. By doing this only the<br />
sender and receiver knows the value of both delta and key. And<br />
we also use 32 cycles for encrypting and decrypting the data in<br />
Feistel function to increase the security. Fig.2 shows the block<br />
diagram of a single XTEA round.<br />
Fig.2 A single XTEA round with its normal computational constructs.<br />
The crossed square for the sum, crossed circle for an XOR, >> for a<br />
right shift,
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
100<br />
ISSN 2250-3153<br />
data. So, we use Mealy Machine because mealy Machines use<br />
less number of states than Moore machine. In this state diagram,<br />
after resetting all the data at S0 state decides whether data has to<br />
be encrypted or decrypted. This is done by Block: If ―Block=00‖<br />
data goes for encryption i.e. state S1 and If ―Block=11‖ data goes<br />
for decryption i.e. State S9. After engaging the Encrypt signal,<br />
the system will enter the state s1, and will finish the encryption<br />
after busy signal goes low (x>32) and we get data at state S7.<br />
In the same manner, data which will be decrypted goes for<br />
decryption i.e. state S9.After engaging the Decrypt signal ,the<br />
system will enter the state S9,and will finish the decryption after<br />
busy signal goes low(x>32) and will get the decrypted data at S7.<br />
It must be noted that the encrypted data must be sent as input for<br />
decryption to get the same input data (as in encryption process)<br />
as output.<br />
Fig.4 Flow diagram for data decryption using Fiestel function<br />
IV. STATE DIAGRAM OF XTEA<br />
The state diagram of XTEA shows that how our XTEA works<br />
and tells about the actual flow of data during encryption and<br />
decryption and shown below in Fig.5:<br />
Fig.5 State diagram of XTEA<br />
While coding for XTEA, we want our algorithm which utilize<br />
minimum chip area and provide more security transmission of<br />
V. RESULTS AND DISCUSSIONS<br />
The proposed XTEA has been simulated on the ModelSim SE<br />
10.0a and has been synthesized on the Xilinx ISE 10.1. The<br />
figure 1 shows the generalized block diagram of XTEA with the<br />
maximum frequency of 129.099 MHz in case of Virtex4 and<br />
71.114MHz in case of Spartan3.<br />
In Fig.6, we show the waveforms of testing the encryption<br />
process. The reset signal was activated at first to insure that all<br />
the registers are cleared before starting any operation, note that<br />
the asynchronous reset is active high once. After that low the<br />
reset and select the block to set the module. Now, the module is<br />
ready to either encrypt or decrypt. One can distinguish<br />
between these two by the control signal i.e. block provided as an<br />
input to the system. After engaging the Encrypt signal, the<br />
system will enter the state s1, and will finish the encryption after<br />
busy signal goes Low (x>32). You can notice that the output is<br />
available at that time when x is equal to 32 which can easily<br />
shown in Fig.7.<br />
Fig.6 Testing the Encryption Process (shows the starting Portion of the<br />
waveform).<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
101<br />
ISSN 2250-3153<br />
FIG.7 Testing the Encryption Process (shows the Output after x is equal to 32)<br />
In Figure 8, we depict the waveforms of decryption state<br />
transition testing. The encryption and the Decryption processes<br />
are quite the same in architecture, but the decryption operates in<br />
a reverse manner on the data, and uses a subtract or rather than<br />
an adder. This test shows the transition of the state from the S0 to<br />
S9, because block is selected for decryption and here the input<br />
given is same as of output of encryption module, and will finish<br />
the decryption after busy signal goes high. You can notice that<br />
the output is available at that time when x is equal to 32 which<br />
can easily shown in figure 9.<br />
Fig. 8 Testing the Decryption Process (shows the starting Portion of the<br />
waveform).<br />
FIG.9 Testing the Decryption Process (shows the Output after x is equal to 32).<br />
VI. RTL SCHEMATIC<br />
The top module of the XTEA is shown below which we will get<br />
after synthesize our main module on Xilinx ISE 10.1.<br />
Fig.10 INTERNAL STRUCTURE OF XTEA WITH TWO<br />
BLOCKS - ENCIPHER AND DECIPHER<br />
VII. SYNTHESIS RESULT<br />
The synthesis result contains a table which shows the<br />
comparison between the old research and the proposed XTEA.<br />
While doing comparison we will find that our research shows<br />
great significance as our all the parameters are consuming less<br />
area and consumes less power to operate.<br />
TABLE.1Comparison between old research and proposed XTEA<br />
Parameters Virtex4SX25<br />
FF668<br />
Virtex4SX25<br />
FF668 [3]<br />
Spartan3s200tq<br />
144-4<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
102<br />
ISSN 2250-3153<br />
LUTs<br />
Clock<br />
1252 4,608 1182<br />
Period(ns) 7.746 6.403<br />
14.062<br />
Slice flip<br />
flops<br />
Maximum<br />
frequency<br />
244 1,081<br />
259<br />
129.099MHz 156.177MHz 71.114MHz<br />
VIII. CONCLUSIONS<br />
This uses Verilog description language to get the modules of<br />
XTEA. After studying the comparative analysis with [3] we<br />
conclude that there is a difference in between the number of<br />
slices, LUTs, GCLKs and the maximum frequency. While<br />
synthesizing our optimization goal is speed. The results are quiet<br />
stable and reliable and has great flexibility with high integration.<br />
REFERENCES<br />
[1] Extended TEA Algorithm proposed by Tom St Denis, April 20 th 1999.<br />
[2] Julio C. Hernandez, Pedro Isasi ―New results on the Genetic Cryptanalysis<br />
of TEA Reduced Round versions of XTEA‖ 2000 IEEE.<br />
[3] Steven M. Aumack, Michael D. Koontz Jr. ―Hardware Implementation of<br />
XTEA‖.<br />
[4] Derek Williams CPSC 6128- Network Security Columbus State University<br />
―The Tiny Encryption Algorithm (TEA)‖ April 26, 2008.<br />
[5] Gaidaa Saeed Mahdi, ―A Modification of TEA Block Cipher Algorithm for<br />
Data Security (MTEA)‖, Eng. & Tech., Journal, vol.29, No.5, 2011.<br />
[6] Wheeler, David J. and Needham, Roger M. TEA, ―a Tiny Encryption<br />
Algorithm‖ Computer Laboratory, Cambridge University, England.<br />
November, 1994.<br />
[7] Wheeler, David J. and Needham, Roger M. TEA Extensions. Computer<br />
Laboratory, Cambridge University, England. October, 1997.<br />
[8] Scheier, Bruce.‖ A Self-Study Course in Block-Cipher Cryptanalysis‖,<br />
Crypto logia, Vol.24 (1).January 2000.<br />
[9] Feistel, Horst.‖ Cryptography and Computer Privacy‖, Scientific American.<br />
Vol. 228(5). May 1973.<br />
[10] Ke Wang,‖ An Encrypt and Decrypt Algorithm Implementation on<br />
FPGAs‖, Semantics, Knowledge and Grid, 2009. SKG 2009. Fifth<br />
International Conference, Page(s): 298 – 301. B. Smith, ―An approach to<br />
graphs of linear forms (Unpublished work style),‖ unpublished.<br />
[11] Biham, Eli and Shamir, Adi,‖ Differential Cryptanalysis of the Data<br />
Encryption Standard‖, Springer Verlag, 1993. ISBN 0-387-97930-1, ISBN<br />
3-540-97930-1.<br />
AUTHORS<br />
First Author – Shweta Gaba, Pursuing M.Tech in VLSI, Amity<br />
School of Engineering and Technology, Amity University and email<br />
– gabashweta18@yahoo.co.in.<br />
Second Author – Iti Aggarwal, Pursuing M.Tech in VLSI,<br />
Amity School of Engineering and Technology, Amity University<br />
and e-mail – agarwal.iti7@gmail.com<br />
Third Author – Dr. Sujata Pandey, HOI of Electronics and<br />
Communication Dept. Amity School of Engineering and<br />
Technology, Amity University and e-mail – spandey@amity.edu.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 103<br />
ISSN 2250-3153<br />
Performance analysis & Optimization of WDM-EPON<br />
for Metropolitan Area Networking<br />
Tripuresh Joshi, Arvind Kumar Jaiswal, Mukesh Kumar<br />
Department of Electronics and Communication Engineering<br />
Sam Higginbottom Institute of Agriculture, Technology and Science, Allahabad, Uttar Pradesh, India -211007<br />
Abstract- In this paper, we introduce Bidirectional WDM-<br />
EPON for metropolitan area network for simultaneous transfer of<br />
Data and Video for replacing copper pair cable, with high data<br />
rate communication between CO (Central Office) and Subscriber<br />
End/ ONU (Optical Network Unit). We analyses the network<br />
with different data rate to minimize the problem of high<br />
attenuation, power loss, and improve the efficiency.<br />
Index Terms- Digital video, passiveoptical network (PON),<br />
video overlay, wavelength-division multiplexing (WDM).<br />
I<br />
I. INTRODUCTION<br />
n the era of high data rate communication there are various<br />
ways to communicate either Using the traditional<br />
communication system by coaxial cable, twisted pair cable or<br />
wirelessly. In early 70‘s a new communication technique was<br />
evolved incorporating optical fiber cable communication. Fibers<br />
are Silica glass fiber cables used to transmit data in optical<br />
domain with high speed and enormous bandwidth. There are<br />
several ways to transmit data using fiber cables which may be<br />
divided on the basis of ways of transmission of fiber<br />
communication system;direct communication optical fiber<br />
system and shared communication optical fiber system.<br />
The simplest optical distribution network is called direct fiber.<br />
In this architecture, each fiber leaving the central office goes to<br />
one customer, but technique is very expensive when we are<br />
talking in terms of several customers. So the shared fiber<br />
techniques have been evolved where in the fiber leaving the<br />
central office is shared by many customers. It is not until such a<br />
fiber gets relatively close to the customers that it is split into<br />
individual customer-specific fibers. There are two competing<br />
optical distribution network architectures which achieve this<br />
split; active optical networks (AONs) and passive optical<br />
networks (PONs).<br />
Passive optical networks (PONs) have been considered<br />
attractive due to their longevity, low operational costs, and huge<br />
bandwidth and are widely deployed in the first/last mile of<br />
today‘s operational access networks. PONs come in a number of<br />
flavours. The so-called asynchronous transfer mode (ATM) PON<br />
(APON) and broadband PON (BPON) are ATM-based systems.<br />
Gigabit PON (GPON), the successor of BPON, is able to support<br />
traffic other than ATM (e.g., telephony and Ethernet) in its native<br />
format by using time-division multiplexing (TDM) partitions and<br />
generic framing procedure (GFP) which are similar formats.<br />
Recently, Ethernet PONs (EPONs), standardized by the IEEE<br />
802.3ah Ethernet in the First Mile (EFM) Task Force, have been<br />
attracting and considerable attention from both industry and<br />
academia has been given. EPONs aim at converging the low-cost<br />
equipment and simplicity of Ether-net and the low-cost fiber<br />
infrastructure of PONs. EPONs are evolved to be a promising<br />
solution to provide sufficient bandwidth for emerging services<br />
such as video conferencing, distributed gaming, IP telephony,<br />
and video on demand.<br />
Current EPONs are single-channel systems; that is, the fiber<br />
infrastructure carries a single downstream wavelength channel<br />
and a single upstream wavelength channel, which are typically<br />
separated by means of coarse wavelength-division multiplexing<br />
(CWDM). In the upstream direction (from sub-scriber to<br />
network), the wavelength channel bandwidth is shared by the<br />
EPON nodes by means of TDM. In doing so, only one common<br />
type of single-channel transceiver is used network-wide,<br />
resulting in simplified network operation and maintenance. At<br />
present, single-channel TDM EPONs appear to be an attractive<br />
solution to provide more bandwidth in a cost-effective manner.<br />
Given the steadily increasing number of users and band-widthhungry<br />
applications, current single-channel TDM EPONs are<br />
likely to be upgraded in order to satisfy the growing traffic<br />
demands in the future. Clearly, one approach is to increase the<br />
line rate of TDM EPONs. Note, however, that such an approach<br />
implies that all EPON nodes need to be upgraded by replacing<br />
the installed transceivers with higher-speed transceivers,<br />
resulting in a rather costly upgrade. Alter-natively, singlechannel<br />
TDM EPONs may be upgraded by deploying multiple<br />
wavelength channels in the installed fiber infrastructure in the<br />
upstream and/or downstream directions, resulting in WDM<br />
EPONs. As opposed to the higher-speed TDM approach, WDM<br />
EPONs provide a cautious upgrade path in that wavelength<br />
channels can be added one at a time, each possibly operating at a<br />
different line rate. More important, only EPON nodes with<br />
higher traffic demands may be WDM upgraded by deploying<br />
multiple fixed-tuned and/or tuneable transceivers, while EPON<br />
nodes with lower traffic demands remain unaffected. Thus, using<br />
WDM enables network operators to upgrade single-channel<br />
TDM EPONs in a pay-as-you-grow manner where only a subset<br />
of EPON nodes may be upgraded gradually.<br />
In this paper ourfocus is on how to communicate up to the<br />
nearest part of subscriber‘s home or work place, in a<br />
Metropolitan Area Network (MAN). Sharing of one fiber in<br />
optical communication system can be done by using WDM-<br />
PONs (Wavelength Division Multiplexing Passive Optical<br />
Networks).<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 104<br />
ISSN 2250-3153<br />
II. WDM EPON ARCHITECTURE<br />
2.1 Proposed Bidirectional WDM PON<br />
Diverse services like Video-on-demand and multimedia<br />
broadcasting using minimum number of wavelengths have been<br />
incorporated in WDM PON increasing its utility to offer<br />
broadcasting services.The system proposed is developed and<br />
simulated for full duplex VoIP, data and digital broadcast Video<br />
signals over single mode fiber based on WDM PON as shown in<br />
figure 2.1.<br />
Figure 2.1: Proposed Bidirectional WDM PON Network. STB: Set Top Box<br />
2.2Down Streaming of Data, VoIP and Video Signals<br />
2.2.1 Operation at Central Office (CO)<br />
For the downstream data transmission, four Continuous Wave<br />
(CW) lasers operating in the range of 1550 ~ 1553 nm at the<br />
central office (CO) are being used. The output power of<br />
threelasers(1550, 1551 and 1552 nm) was set to be 0 dBm and<br />
laser at 1553 nm was set to be 1 dBm. Three laser sources<br />
operating at 1550, 1551 & 1552 nm have been modulated at<br />
10gbps, 5 gbps& 9gbps for data and laser source at 1553 nm is<br />
modulated at 10gbps for video signal. These are MZ Modulated<br />
in NRZ Format and then were multiplexed by using a 4X1 WDM<br />
Multiplexer. The modulated WDM channels passed through the<br />
1.3/1.5 µm WDM couplers, which were used for the separation<br />
of upstream and downstream channels. For the digital broadcast<br />
video signal, a CW laser operating at 1553 nm (output power:<br />
1dBm) have been used. This signal consisted of digital HD video<br />
channels from a bit sequence generator (operating in the range of<br />
10 GHz). The root-mean-square (rms) optical modulation index<br />
(OMI) per channel was set to be 2.6%. The video signal was<br />
multiplexed with the 3 downstream data channels at the WGR<br />
and amplified by using an erbium-doped fiber amplifier (EDFA)<br />
(output power: 17 dBm). These multiplexed channels were<br />
transmitted to the remote node (RN) through 30 km of singlemode<br />
fiber (SMF).<br />
2.2.2 Operation at Remote Node (RN)<br />
At the RN, the downstream channels were separated into<br />
baseband data and video signal using a 1:4 WDM DEMUX. The<br />
video signal operating at 1553 nm was then split by using a 1X3<br />
splitter and sent to three 2:1 WDM MUX input ports, so that it<br />
could be broadcasted to the 4 ONUs via 5 km of SMF. The<br />
baseband signals, delivered by three WDM channels operating in<br />
the range of 1550~1552 nm, were de-multiplexed by the WDM<br />
DEMUX and sent to each corresponding ONU. In order to<br />
minimise the work load of the central office we shifted the<br />
distribution system to the remote node for simplification of<br />
simulated optical network.<br />
2.2.3 Operation at Optical Network Unit (ONU)<br />
At the ONU, the video and baseband signals were directed to<br />
1:2 WDM DEMUX and sent to corresponding p-i-n photo-diode<br />
(PIN-PD) receiver by the 1.3/1.5- µm WDM couplers. We used<br />
dedicated receiver to detect both the video and baseband signals<br />
when the data rate of the downstream data was 10Gb/s.<br />
The output signal of the receiver was split, and sent to an error<br />
detector and a TV for the BER and video quality measurements,<br />
respectively. When the downstream data rate was 10 Gb/s, we<br />
separated the baseband and video signals using an additional<br />
1550~1552/1553- nm WDM DEMUX and sent to two<br />
independent receivers.<br />
2.3 Up Streaming of Data, Voice and Video Signals<br />
For the upstream channels, a directly modulated LED<br />
operating at 1300~1302 nm at each ONU to transmit 2.5-Gb/s<br />
data has been used. The output power and 3-dB bandwidth of the<br />
LED were about 3 dBm, respectively. In this simulation, we<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 105<br />
ISSN 2250-3153<br />
operated the upstream channels only at 2.5 Gb/s due to the<br />
limited power budget. However, if necessary, it could be possible<br />
to increase the upstream data rate up to about 7.5 Gbps by using<br />
the high-power LEDs capable of operating at high speed. The<br />
upstream data were first coupled into the same fiber used for the<br />
downstream channels by using 1.3/1.5 µm WDM couplers, and<br />
then sent to the corresponding ports of the WDM MUX at the<br />
RN. Thus, the upstream channels were automatically spectrumsliced<br />
and multiplexed by the WDM MUX at the RN. After<br />
transmission over 5 km of SMF, the multiplexed upstream<br />
channels were de-multiplexed by the WDM DEMUX at the CO.<br />
The de-multiplexed upstream channel was then detected by using<br />
the PIN photo-diode receiver via a 1.3/1.5 µm WDM coupler. In<br />
this network, identical transmitters were used at the entire ONUs<br />
since we used LEDs for the upstream transmission.<br />
III. RESULT AND DISCUSSION<br />
For this channel, the fiber length is set to be between 10 Km<br />
to 50 Km from CO to RN and 5Km will be added from RN to<br />
ONU. Value of Q-factors and signal power is taken and<br />
compared within the range of fiber length as shown in figure 3.1<br />
and figure 3.2 respectively. The value of the Q-factor are<br />
decreasing when the length of the fiber is increasing same as the<br />
transmission signal power, it be will decrease as the length is<br />
increasing. The variation of OSNR with distance coverage as<br />
shown in figure 3.3 indicates that when the fiber reach 30 Km the<br />
quality of transmission is still good and gets deteriorated as the<br />
length is increased beyond 30 Km, but when it reaches40 Km to<br />
50 Km, the performance of transmission is getting worst. It is<br />
further observed that when the length reaches 40 Km to 50 Km,<br />
its performance is worst and therefore an amplifier needs to be<br />
incorporated. The value of parameters e.g. Q-factor, signal<br />
power, noise power and OSNR for the specified length(0+5,<br />
10+5, 20+5, 30+5, 40+5 and 50+5 Km), at different data rates<br />
are shown in Table No. 3.1, Table No. 3.2, Table No. 3.3 &<br />
Table No. 3.4.<br />
Table 3.1: System Measurement at 10 Gb/s at 1550 nm for Data.<br />
Length<br />
(Km)<br />
Q-Factor Signal<br />
Power<br />
(dBm)<br />
Noise<br />
Power<br />
(dBm)<br />
OSNR<br />
(dB)<br />
0+5 4.21518 10.2810 -51.2647 51.5457<br />
10+5 4.10117 8.19247 -49.2647 51.4572<br />
20+5 4.33012 6.18614 -47.2647 51.4509<br />
30+5 4.37036 4.16775 -45.2647 51.4325<br />
40+5 4.38897 2.1423 -43.2647 51.4070<br />
50+5 4.45080 0.13474 -41.2647 51.3995<br />
Table 3.2: System Measurement at 5 Gb/s at 1551 nm for Data.<br />
Length<br />
(Km)<br />
Q-Factor Signal<br />
Power<br />
(dBm)<br />
Noise<br />
Power<br />
(dBm)<br />
OSNR<br />
(dB)<br />
0+5 5.54020 8.50604 -50.9485 49.4546<br />
10+5 4.76874 6.37868 -48.9485 49.3272<br />
20+5 5.1722 4.36422 -46.9485 49.3128<br />
30+5 5.35873 2.34143 -44.9485 49.2900<br />
40+5 5.51902 0.321221 -42.9485 49.2698<br />
50+5 5.59244 -1.71130 -40.9485 49.2372<br />
Table 3.3: System Measurement at 9 Gb/s at 1552 nm for Data.<br />
Length<br />
(Km)<br />
Q-Factor Signal<br />
Power<br />
(dBm)<br />
Noise<br />
Power<br />
(dBm)<br />
OSNR<br />
(dB)<br />
0+5 4.40331 7.76382 -50.7254 48.4892<br />
10+5 4.14752 5.57348 -48.7254 48.2989<br />
20+5 4.30115 3.54628 -46.7254 48.2717<br />
30+5 4.13236 1.51757 -44.7254 48.2429<br />
40+5 4.07893 -0.527713 -42.7254 48.1977<br />
50+5 3.99816 -2.548160 -40.7254 48.1772<br />
Table 3.4: System Measurement at 10 Gb/s at 1553 nm for Video.<br />
Length<br />
(Km)<br />
Q-Factor Signal<br />
Power<br />
(dBm)<br />
Noise<br />
Power<br />
(dBm)<br />
OSNR<br />
(dB)<br />
0+5 5.61559 6.91018 -55.2344 52.1446<br />
10+5 5.56571 4.58242 -53.2344 51.8168<br />
20+5 5.33704 1.92976 -51.2344 51.1642<br />
30+5 4.96501 -0.934781 -49.2344 50.2996<br />
40+5 5.03402 -3.74776 -47.2344 49.4866<br />
50+5 5.78113 -6.14907 -45.2324 49.0853<br />
Figure3.1: GraphQ-Factor (dB) with Distance Variation<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 106<br />
ISSN 2250-3153<br />
Figure 3.2: Graph Noise Power (dBm) with Distance Variation<br />
Figure 3.3: Graph OSNR (dB) with Distance Variation<br />
IV. CONCLUSION<br />
We have proposed and demonstrated a bidirectional PON for<br />
the simultaneous transmission of 4 WDM signals and HD digital<br />
broadcast video channels, up to35 km. This network could be<br />
implemented cost-effectively using a single strand of SM fiber<br />
for bidirectional transmission, LEDs for upstream WDM<br />
channels and one receiver for the detection of basebandsignals at<br />
2.5 Gb/s. In addition, the capacity of the proposed network could<br />
be upgraded easily by incorporating an additional WDM coupler<br />
and a receiver at the ONU.<br />
REFERENCES<br />
[1] D. K. Jung, H. Kim, K. H. Han, and Y. C. Chung, ―Spectrum-sliced<br />
bidirectional passive optical network for simultaneous transmission of<br />
WDM and digital broadcast video signals,‖ Electron. Lett., vol. 37, no. 5,<br />
pp. 308–309, 2001.<br />
[2] P. P. Iannone, K. C. Reichmann, and N. J. Frigo, ―High-speed point-topoint<br />
and multiple broadcast services delivered over a WDM passive optical<br />
network,‖ IEEE Photon. Technol. Lett., vol. 10, pp. 1328–1330, Sept. 1998.<br />
[3] M. Akbulut, C. H. Chen, M. C. Hargis, A. M. Weiner, M. R. Melloch, and<br />
J. M. Woodall, ―Digital communications above 1 Gb/s using 890-nm surface-emitting<br />
light-emitting diodes,‖ IEEE Photon. Technol. Lett., vol. 13,<br />
pp. 85–87, Jan. 2001.<br />
[4] U. Hilbk, T. Hermes, J. Saniter, and F.-J. Westphal, ―High capacity WDM<br />
overlay on a passive optical network,‖ Electron. Lett., vol. 32, no. 23, pp.<br />
2162–2163, 1996.<br />
[5] D. K. Jung, S. K. Shin, and Y. C. Chung, ―Wavelength-tracking technique<br />
for spectrum-sliced WDM passive optical network,‖ IEEE Photon. Technol.<br />
Lett., vol. 12, pp. 338–340, Mar. 2000.<br />
AUTHORS<br />
First Author – Tripuresh Joshi;PG-Student;SHIATS-DU,<br />
Allahabad, Uttar Pradesh, India-211007 email address –<br />
coolcog@gmail.com.<br />
Second Author – Arvind Kumar Jaiswal;Professor;SHIATS-<br />
DU, Allahabad, Uttar Pradesh, India-211007 email address –<br />
arvindkjaiswal@yahoo.co.in.<br />
Third Author – Mukesh Kumar;Assistant Professor;SHIATS-<br />
DU, Allahabad, Uttar Pradesh, India-211007 email address –<br />
mukesh044@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 107<br />
ISSN 2250-3153<br />
Next Generation of Internet Protocol for TCP/IP<br />
Protocol Suite<br />
Abstract- The Internet has instantly evolved into a vast global<br />
network in the growing techonology.TCP/IP protocol is the basic<br />
requirement for the recent time Internet .In TCP/IP proposed a<br />
security enhancement. This enhancement adds three modules.<br />
These are Security Policy, security control and data link layer.<br />
Security policy belongs to application layer, Security control is<br />
management located in the transport layer and Data security<br />
layer located between transport layer and IP layer. Security<br />
policy interacts with the system administrator for defining<br />
policies and roles of security to be applied in the data<br />
communications. Security control module provides the means to<br />
apply security policy module and established security channels.<br />
It usage four way handshaking and public key cryptography<br />
(PKC) to create virtual secure connection and secret key<br />
cryptography (SKC). Data security layer proposed Thin security<br />
over IP protocol. Thin security protocol encrypt and encapsulated<br />
the coming transport layer packet into TSP packets. Internet<br />
usage continues to increase exponentially. So network security<br />
becomes a growing problem. Even though IPv6 comes with build<br />
mechanism IPSec for security, it lacks security in application<br />
layer of TCP/IP protocol suite.IPv6 solves most of the security<br />
breaches for IPv4 with the use of IPSec but IPSec does not have<br />
any security provision in application layer and for security<br />
purpose there is a need for security mechanism. Here in TCP/IP<br />
architecture includes a layer called Security Layer, which<br />
guarantees security to provide Application layer using a protocol<br />
Application Layer Security Protocol.<br />
Index Terms- Internet, TCP/IP, Security policy, Security<br />
control, Data Security Layer<br />
T<br />
I. INTRODUCTION<br />
he emergence of IPv6 enables new generation of application<br />
and services. Security is traditionally connected to<br />
exigencies of defining sensitive data from illegal access. But in<br />
the moment network security is approached from a different<br />
perception. With the growing use of the internet infrastructure for<br />
commercial applications, the demand for quality of service is one<br />
of the Emerging paradigms in internet and seems to be corner<br />
stone for more and more network services. An increasing number<br />
of applications need multifaceted, consistent controls for<br />
guaranteeing Quality of service. Internet is based on TCP/IP<br />
protocol suite. IP was not planned with security in mind. TCP/IP<br />
suite is used for communication. It enabled million of computers<br />
to communicate globally.IPv6 is not designed to provide<br />
Miss. Soni Samprati<br />
Department of Computer Science of Engineering<br />
MIT Pune‘s, Maharashtra Academy of Engineering, Alandi(D).<br />
Pune University, India<br />
sonisamprati16@yahoo.com<br />
backward compatibility with IPv4, most IPv6 mission critical<br />
applications must be able to continuously interoperate with<br />
legacy IPv4 nodes. The most common transition mechanism now<br />
a days in Dual stack. A node with a dual stack allows coexistence<br />
and interoperability of IPv4 and IPv6 nodes using IPv4<br />
and IPv6 packets. The gateway which is located at the boundary<br />
of IPv4 and IPv6 address real translates IPv4 header into IPv6<br />
header or vice versa. To ensure end to end security between the<br />
end nodes, the deployment of IPSec since IPSec has been widely<br />
used in IP networks. AH header is inserted into the IP packet<br />
immediately after the outer IP header. Then, AH authentication<br />
the entire packet including the preceding IP header. The<br />
underlying of IPSec mechanism which preserve of translation<br />
gateway for most applications in the practices. When the<br />
translation gateway modifies the IP header from one address<br />
realm to another, IPSec evaluating this as violation of integrity<br />
and discards the packet. Therefore header from one address<br />
realm to another, IPSec evaluating this as violation of integrity<br />
and discard the packet. Here for TCP/IP suite security<br />
enhancement will be used. This enhancement adds three modules<br />
i.e. Security policy, security control and data security layer. The<br />
security policy belongs to application layer, and the security<br />
control and management located in the transport layer, the data<br />
security layer is located between the transport layer and IP layer.<br />
Security policy interacts with system administrator to define the<br />
policies and roles of security to be applied in data<br />
communication. Security control module provides the means to<br />
apply the security policy defined in security policy module and<br />
established a secure channel. It uses four way handshaking and<br />
public key cryptography (PKC) to create virtual secure<br />
connection and security entity (SE). SE holds the secret key<br />
cryptography (SKC) addresses of two host that share this SKC<br />
and other vital information necessary to carry out a secure data<br />
communication. For data security, proposed a thin security<br />
protocol (TSP) over IP protocol. TSP protocol encrypts and<br />
encapsulated the coming transport layer packet into TSP packets.<br />
The Tsp packet header consists only of two fields each of them is<br />
one byte. The first field identifies the TSP packets such as public<br />
key request, public key acknowledgement, secret key and secret<br />
key, and secret key acknowledgment. The second field carries<br />
information about the transport layer protocol.TSP designed and<br />
implementation, to concern minimize the overhead added to IP<br />
including traffic volume and transmission delay.<br />
IPv6 is current version, and most widely used internet<br />
protocol. IP enables data to be sent from one workstation to<br />
another in a network and is known as a connectionless protocol<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 108<br />
ISSN 2250-3153<br />
since there is no continuous connection between the two<br />
communicating devices. Therefore when a message is sent by<br />
means of IP it is broken up into packets, which may travel<br />
through a number of different routes to their final destination,<br />
and on arrival at their destination they are reassembled in their<br />
original form. Each device in a network has an IP address, which<br />
is used by the IP protocol to ensure that the packets of<br />
information to reach their correct destination. It holds great<br />
guarantee to become the backbone of the prospect of the internet<br />
and an important improvement over IPv4 in terms of scalability,<br />
security, mobility and convergence.<br />
Existing or Related Work<br />
The existing network layer protocol in the TCP/IP protocol<br />
suite is as present IPv4. IPv4/IPv6 translation gateway breaks<br />
IPSec. IPSec supports transport mode in providing end to end<br />
security between nodes. However, applying IPSec across<br />
translation gateway for this purpose violates TCP/UDP intrinsic<br />
functionalities. The co-existence of translation gateway and<br />
IPSec ESP is not feasible due to the IP header translation which<br />
cause the TCP/UDP checksum invalid.TCP/UDP checksum has a<br />
dependency on IP source and destination addresses through the<br />
inclusion of TCP/UDP pseudo-header in the calculation. Like<br />
normal Network Address Translation (NAT), while the<br />
translation gateway translates the IP address, it should also recompute<br />
the checksum. Since IPSec ESP encrypt and<br />
authenticates ESP header and TCP/UDP header, any attempt to<br />
modify to checksum causes the integrity check to fail.<br />
Alternately, if translation gateway dose not update the checksum,<br />
TCP/UDP verification will fail. NAT-Traversal (NAT-T) is<br />
designed to solve the problems inherent in using IPSec and<br />
translation gateway. The following section extensively describes<br />
the operation of NAT. With NAT-T, the UDP-ESP encapsulation<br />
is deployed to support the IPSec packets from both end nodes to<br />
traverse the translation gateway and to avoid any problems with<br />
the IPSec aware gateway. Let‘s imagine multiple connections are<br />
mapped to one allocated address. Since IPSec ESP does not use<br />
port information, the translation gateway can only utilize the<br />
protocol field in IP header to distinguish the packets. When the<br />
first IPSec connection in the table so that all IPSec ESP packets<br />
will be routed to the first connection. However, when there is the<br />
new IPSec connection, the translation gateway replaces the entry<br />
in the table and thus breaking the first IPSec connection. UDP-<br />
ESP encapsulation gives the translation gateway an UDP header<br />
containing UDP port that can be used for multiplexing IPSec data<br />
streams.<br />
Even though IPv4 is well designed, its security breaches make<br />
it inappropriate for the fast emerging Internet. To overcome these<br />
drawbacks, IPv6 also known as IPing was planned which became<br />
a standard in the recent past.<br />
IPv6 Security Issues<br />
From a security point of view, the new IPv6 protocol stack<br />
represents a considerable advance in reliable to the old IPv4<br />
stack. However, despite its innumerable virtues, IPv6 still<br />
continues to be by far vulnerable. IPv6 where security continues<br />
to be an important issues:<br />
Dual stack related issues: Presently, the internet<br />
continues to be mostly IPv4 based. However, it is<br />
reasonable to expect that this scenario will change soon<br />
as more and more networks are migrated to be new<br />
protocol stack. Unfortunately, migrating millions of<br />
networks is going to take quite some time. In the mean<br />
time, some form of 6 to 4 dual-stack will supply the<br />
desired functionality without any doubt; IPv4-IPv6 dual<br />
stacks increase the potential for security vulnerabilities-<br />
as a consequence of having two infrastructures with<br />
specific security problems. However, most of the issues<br />
are not direct result of specific IPv6 design flaws but<br />
mostly a result of inappropriate configuration.<br />
Header manipulation issues: The use of extension and<br />
IPSec can deter some common sources of attack based<br />
on header manipulation. However the fact that EH must<br />
be proposed by all stacks can be source of trouble- a<br />
long chain of EH or some considerably large size could<br />
be used to overwhelm certain node an attack. Its uses<br />
source of security problems such as address spoofing- in<br />
this case if the spoofed address is used to masquerade an<br />
external packet as one that was originated from the<br />
inside network.<br />
Flooding issues: Scanning for valid host address and<br />
services is considerably more difficult in IPv6networks<br />
that it is in IPv4 networks. However, the larger<br />
addressing space does not mean that IPv6 is totally<br />
invulnerable to this type of attack. Nor the lack of<br />
broadcast address makes IPv6 more secure. New<br />
features such as multicast address continue to be source<br />
of problem.<br />
Mobility: Mobility is a totally new feature of IPv6 that<br />
was not available in this predecessor. Mobility is a very<br />
complex function that raises a considerable amount of<br />
concern when considering security. Mobility uses two<br />
types of addresses, the real address and the mobility<br />
address. The first is a typical IPv6 address contained in<br />
an extension header. The second is a temporary address<br />
contained in the IP header. Because of the<br />
characteristics of this networks, the temporary<br />
component of a mobile node address could be exposed<br />
to spoofing attacks on the home agent. Mobility requires<br />
special security measures and networks administrators<br />
must be fully aware.[1]<br />
II. TCP/IP ARCHITECTURE<br />
The TCP/IP protocol suite referred to as the Internet protocol<br />
suite, is the set of communication protocol that implements the<br />
protocol stack on which the internet and most commercial<br />
networks run. It is made up of two most important protocols in<br />
suite: the Transmission Control Protocol (TCP) and the Internet<br />
protocol (IP). Internet protocol is the foundation of the TCP/IP<br />
protocol suite, science it is the mechanism responsible for<br />
delivering datagram‘s. The TCP/IP protocol suite is like OSI<br />
Reference model which is defined as a set of layers. Upper layers<br />
are logically to the users and deal with more abstract data,<br />
relying on lower protocols to translate data into forms that are<br />
transmitted physically over the network.TCP/IP suite which is<br />
the De facto standard for internet manages security with many<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 109<br />
ISSN 2250-3153<br />
other issues in the application layer making its a very thick one.<br />
Hence more, this means that the security problem needs to be<br />
solved by application developer whose consternation mainly on<br />
the main task of their application.<br />
Figure 1: TCP/IP architecture<br />
2.3.1. Security policy module:<br />
Security policy module lies on the application layer with<br />
respect to TCP/IP protocol suite and interacts with user to define<br />
the proper security requirements. This security policy are stored<br />
and used by security control and management module to define<br />
the actions that should be accomplished for each communication<br />
session.<br />
2.3.2. Security control and management module:<br />
Security control and management module gets security<br />
requirements from its upper layer, which is security policy<br />
module. Based on the requirements, this module acts on each<br />
communication session .Security control and management<br />
module is responsible on providing the means required by data<br />
security layer. It creates a security entity(SE) for each<br />
communication session. SE contains an address of the sender, an<br />
address of the receiver, symmetric encrypt key, encryption<br />
algorithm, compressing algorithm, compressing enable and SE<br />
lifetime for which this SE will stay alive in security cache. Fig.2<br />
[2] shows a four- way handshaking approach to establish a secure<br />
connection and exchange symmetric encryption keys between the<br />
sender and receiver.<br />
Figure 2: Exchanging symmetric encryption key using four-way<br />
handshaking<br />
2.3.3. Data security layer:<br />
Data security layer uses symmetric data encryption algorithm.<br />
The symmetric key used in this layer is provided by security<br />
control module. For each communication session there is security<br />
entity (SA). Hence more data security layer may uses data<br />
compressing algorithm to reduce the size of the encrypted data.<br />
We used data compressing because some encrypted algorithm<br />
output size is larger than input data the overhead added by<br />
compressing is accepted by security policy define by the system<br />
administrator. In fact the size is larger the input size in this case<br />
of the input size is small.<br />
2.3.4. Thin security protocol:<br />
Thin security protocols (TSP) intend to provide data security<br />
for all packets coming from transport layer. It encrypts transport<br />
layer packets using symmetric encrypt algorithm as shown in<br />
figure 1. The TSP header is only two bytes. The first one holds<br />
protocol vital information and the other preserve transport layer<br />
protocol type such as TCP or UDP.TSP two bytes header are<br />
specified in detail in figure 3.<br />
Figure 3: TSP Protocol Header<br />
The first byte contain TSP type field, which is 5-bits long; it<br />
holds the type of TSP packet that is transmitted. TSP types are<br />
public key request, public key acknowledgment (ACK), secret<br />
key, secret key ACK, end connection, and end connection ACK<br />
packet. The rest of the first byte is used as indication flags, the<br />
first one which is denoted as ―Include Trans. Layer‖ specifies<br />
wither this TSP packet has encrypted transport layer header or it<br />
is outside the encryption boundaries. The second bit denoted<br />
―Compress Packet‖ indicates if this packet is compressed.<br />
Compressing packet data is done after encrypting it. So it works<br />
as an indicator to allow the post-decryption handler to<br />
decompress the received data. The last bit is reserved for future<br />
utilization. The second byte, which indicates the upper layer<br />
protocol, is an identical field to the one in the original IP header.<br />
The upper layer protocol field is filled with 255 to indicate that<br />
TSP protocol is used [3].<br />
III. CRYPTOGRAPHIC ALGORITHM<br />
Cryptography algorithms provide high security to information<br />
on controlled networks. These algorithms are required to provide<br />
data security and users authenticity. Numerous encryption<br />
algorithms are extensively available and can be categorized into<br />
symmetric and asymmetric key. Some of the common algorithms<br />
are RE 2, DES, 3DES, RC6, Blow fish, Elgamal and AES.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 110<br />
ISSN 2250-3153<br />
Among these algorithms Blowfish and Elgamal are taken for the<br />
analysis that can be used for the proposed architecture.<br />
TABLE 1: Differentiate between these algorithms<br />
Attribu<br />
tes<br />
Blowfish Elgamal RC6 DES<br />
Block<br />
size<br />
64 bit NA NA 64 bit<br />
Keys Variable( One Symmet Constant<br />
32-448 Secret ric (56 bits)<br />
bits) key<br />
Speed Fast Slower Slower Slower<br />
than Blow than than<br />
fish Elgamal Blow<br />
fish<br />
Memor Large Comparati Less Less<br />
y space memory vely less<br />
than<br />
space<br />
Blow<br />
fish<br />
Perfor Very Good Good Good<br />
mance Good<br />
A. Blowfish:<br />
Blowfish is a variable length key, 64-bit block cipher. The<br />
algorithm consists of two parts: A key– expansion part and a data<br />
encryption part. Key expansion part converts a key of at most<br />
448 bits into several sub key arrays totally 4168 bytes. Blowfish<br />
uses a large number of sub keys. These keys must be<br />
precomputed before any data encryption or decryption. The key<br />
array also called p-array consists of 18 32 bit sub keys:<br />
p1,p2,….,p18. There are four 32 bit s-boxes with 256 entries<br />
each. S1, 0, S1, 1… S1, 255; S2, 0, S2, 1... S2, 255; S3, 0, S3,<br />
1....., S3, 255; S4, 0, S4, 1… S4, 255;<br />
Data encryption occurs via a 16 round Feistel network<br />
[reference]. Each round consists of a key dependent permutation,<br />
a key and a data dependent substitution. All operations are EX-<br />
Ors and additions on 32 bit words.<br />
Algorithm .1 (Encryption)<br />
1. The input is a 64 bit data element, i.e. X.<br />
2. Divide X into two 32 bit halves: XL,XR.<br />
3. then 16 rounds Feistel network: for i=1 to 16:<br />
4. XL=XL XOR Pi: for prevent the potential attack<br />
5. XR=F(XL) XOR XR<br />
6. After that swap XL and XR<br />
7. swap XL and XR again to under the last swap<br />
After 1s6 round.<br />
8. then XR=XR XOR P17 and XL=XL XOR P18<br />
9. Recombine XL and XR to get cipher text.<br />
TABLE 2: Dataset From Simulation<br />
Round No. of Files Original ALSP<br />
Architecture Architecture<br />
1 1 300ms 420ms<br />
2 3 800ms 925ms<br />
3 5 1750ms 2500ms<br />
4 8 820ms 900ms<br />
5 10 2200ms 2300ms<br />
Decryption for Blowfish is relatively straightforward. Ironically,<br />
decryption works in the same algorithmic direction as encryption<br />
beginning with the cipher text as input. However as expected, the<br />
sub keys are used in reverse order[ 3].<br />
IV. PERFORMANCE EVALUATION<br />
Performance is the vital part of the TCP/IP Protocol suite.<br />
Several performance metrics are used to evaluate the<br />
performance of the encryption algorithms such as Encryption<br />
time, Decryption time, CPU process time, and CPU clock cycles<br />
and Battery. To demonstrate the performance for the proposed<br />
architecture, a series of simulation runs are performed on a<br />
variety of set of data.<br />
Fig 4: Performance Evaluation<br />
From the previous one, it shows that the proposed architecture<br />
has poor performance when compared to the existing TCP/IP<br />
architecture. It also shows that the execution time of encryption<br />
algorithm is very high which a major reason for the lack of<br />
performance is[3].<br />
Blow Fish Algorithm is fast, free alternative to existing<br />
encryption algorithm. It is slowly gaining acceptance as a strong<br />
encryption algorithm and also Unpatented, license free and<br />
available for all users. It uses sub keys that are a One-way hash<br />
function. In Blow fish, no linear structure therefore, it reduces<br />
the complexity of exhaustive search. And also it is easy to<br />
understand therefore here Blow fish algorithm would be used.<br />
Here, We can modified to reduce the execution time Only that<br />
case performance of proposed system can be increased.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 111<br />
ISSN 2250-3153<br />
V. CONCLUSION<br />
In this paper outlined several security problems of IPv6.It also<br />
outlined new ideas to design efficient security mechanism for the<br />
TCP/IP protocol suite. With some changes in the existing model,<br />
high level of security can be obtained. In this new structure of<br />
TCP/IP we added three modules. These modules are: Security<br />
policy, Security Control and Data security layer. It uses four way<br />
handshaking and Public key cryptography (PKC) to create virtual<br />
secure connection and security entity (SE). SE holds the secret<br />
key cryptography (SKC), and address of two hosts that share this<br />
SKC.TSP protocol minimizes the overhead added to IP including<br />
traffic volume and transmission delay. In term of data size, TSP<br />
adds only two bytes as TSP header. Hence more, TSP compress<br />
the encrypted data before sending it. It provides tight security<br />
with the minor overhead of the exiting model based on this<br />
Application Layer Security Protocol (ALSP) architecture.<br />
ACKNOWLEDGMENT<br />
My heartfelt thanks to my guide, Prof. R. M. Goudar, Asst<br />
Professor, College of Maharashtra Academy of Engineering,<br />
Pune, who offered her whole hearted guidance and invaluable<br />
suggestions throughout the preparation of this paper. Above all I<br />
must and do thank God Almighty from the depth of my heart for<br />
the being with me at each and every stage assuring hope,<br />
confidence and courage to get the task accomplished in time.<br />
REFERENCES<br />
[1] Samuel Sotillo, IPv6 Security Issues, East Carolina University.<br />
[2] Mohammad Al-jarrah, Abdel-Karim R.Tamimi, Computer Engineering<br />
Department, Hijjah, Faculty for Eng. Techonology, Yarmouk University,<br />
Irbid 21163-Jordan.<br />
[3] M.Anand Kumar, Security Model for TCP/IP Protocol Security, Karpagam<br />
University.<br />
[4] Yongguang Zhang, A Multilayer IP Security Protocol for TCP Performance<br />
Enhancement in Wireless Networks, Member, IEEE.<br />
AUTHORS<br />
Soni Samprati, M.E (1 st year), Maharshtra Academy of<br />
Engineering, Pune<br />
sonisamprati16@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 112<br />
ISSN 2250-3153<br />
Evaluation of Anticarcinogenic and Antimutagenic<br />
Effects of Triphala Extract<br />
R.C.Agrawal, Rajani<br />
Research Department, Priyamvada Birla Cancer Research Institute, Satna, Madhya Pradesh, India<br />
Abstract- The results of the present investigation showed that<br />
topical single application of DMBA. followed by 1 % croton oil<br />
produced skin papillomas. The incidence of tumours reached<br />
100% and the value of cumulative number of papillomas in these<br />
animals were recorded 40 and the average number of papillomas<br />
per mouse (tumour yield) was found 6.6. The mice which<br />
received Triphala extract additionally showed a significant<br />
decrease in the number and incidence of tumour as compared<br />
with DMBA + croton oil group. When triphala extract was<br />
topically applied at the dose of 40 mg /kg body weight for 16<br />
weeks to the skin of animals the tumor incidence was found 60%<br />
and the value of cumulative number of papillomas in these<br />
animals were recorded 6 and the average number of papillomas<br />
per mouse in this group was found 1.5. The differences in the<br />
values of results of the experiment was statistically analyzed and<br />
found significant in comparison to the control group at (p< 0.05).<br />
In another study the effect of triphala extract on B16F10<br />
melanoma tumour bearing mice was also evaluated. The<br />
inhibition rate was 69 % in triphala extract groups group as<br />
compared to control group. The life span was also increased by<br />
52 % as compared to control group. The tumour volume of<br />
triphala treated mice was significantly reduced as compared to<br />
control. The result was found significant in comparison to the<br />
control group (p< 0.05).<br />
In antimutagenicity studies, single application of triphala<br />
extract at the dose of 40, 80 and 120 mg/kg body weight, 24<br />
hours prior the intraperitonial administration of<br />
Cyclophosphamide (at the dose of 50 mg/kg) have significantly<br />
prevented the micronucleus formations and chromosomal<br />
aberrations in dose dependent manner in bone marrow cells of<br />
mice as compared to Cyclophosphamide group. It may be<br />
concluded that triphala extract exert anticarcinogenic and<br />
antimutagenic effect in the present set of experiments.<br />
T<br />
I. INTRODUCTION<br />
riphala is a combination of the dried fruits of Terminalia<br />
chebula, Terminalia belerica, and Emblica officinalis in<br />
equal proportions. It is therefore making it useful as an internal<br />
cleansing, detoxifying formula ( Jagetia et al,2002 ). This<br />
compound and its individual ingredients are highly valued in<br />
Ayurveda, and being compared to a "good manager of the<br />
house," aiding digestion, nutrient absorption and body<br />
metabolism. In a study it has been reported that Triphala<br />
possessed the ability to induce cytotoxicity in tumor cells but<br />
spared the normal cells (Sandhya et al, 2005 and 2006). Another<br />
report found that "Triphala" showed a significant cytotoxic effect<br />
on cancer cell-lines. It has been concluded that the action was<br />
due to gallic acid-a major polyphenol found in "Triphala". (Kaur<br />
et al ,2005) It was also effective in reducing tumor incidences<br />
and increasing the antioxidant status of animals. It was observed<br />
that Triphala was more effective in reducing tumor incidences as<br />
compared to its individual constituents (Deep et al,2005 ).<br />
Antioxidant studies conducted revealed that all three constituents<br />
of triphala are active and they exhibit slightly different activities<br />
under different conditions and the mixture, triphala, is expected<br />
to be more efficient due to the combined activity of the<br />
individual components (Naik et al, 2005). Similar results were<br />
also reported that ―Triphala, an ayurvedic rasayana drug, protects<br />
mice against radiation-induced lethality by free-radical<br />
scavenging.‖(Jagetia et al, 2002) Triphala, may be potent and<br />
novel therapeutic agents for scavenging of Nitrous Oxide ( NO)<br />
and thereby inhibited the pathological conditions caused by<br />
excessive generation of NO and its oxidation product, per<br />
oxynitrite. Since there is a paucity of information regarding<br />
anticarcinogenicity and antimutagenicity of triphala extract, we<br />
have therefore undertaken to study these parameter in the<br />
experimental animals.<br />
II. MATERIALS AND METHODS<br />
Animals: Random bred male Swiss Albino and C57 Bl hybrid<br />
mice of (6-8 weeks old) of 15-20 gms body weight were obtained<br />
from the animal colony of our research centre. They were kept<br />
on controlled temperature (22 0 C) and 12 : 12 hours light and<br />
dark cycle and were given synthetic pellet diet and water ad<br />
libitum. The experiment was approved by the institutional animal<br />
ethic committee before conduction of the experiments.<br />
Chemicals: Cyclophosphamide was purchased from Sigma<br />
chemical Co., U.S.A. and other chemical were reagents grade<br />
and were procured locally for the study.<br />
III. PREPARATION OF TRIPHALA EXTRACT.<br />
Triphala was purchased from Dabur chemical co. The 50 gm<br />
powder was mixed in 50 % methanol and kept in separating<br />
funnel for 6 hours. The supernatant was collected and this<br />
process was repeated until clear solution of supernatant was<br />
obtained. All supernatant was pooled together and dried to the<br />
powder at 40 0 C water bath. The final powder was soluble in<br />
water therefore it was dissolved in double distilled water before<br />
the each treatment at required concentrations.<br />
(A) Experimental design<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 113<br />
ISSN 2250-3153<br />
Skin Bioassay Protocol<br />
Procedure<br />
Experiments were performed as per the method reported by<br />
Berenblum (1975) and Sukumaran and Kuttan R. (1991). A<br />
group of 6 mice (Shaved on dorsal skin two days earlier) single<br />
application of 104 μg of DMBA in acetone (100 μl), was began 1<br />
week after initiation Triphala extract (100 μl) were applied 1 hr.<br />
before each croton oil treatment. The extract was applied to the<br />
shaved area using the micropiptette. The experiment was<br />
continued for 16 weeks. Skin tumour formation was recorded<br />
weekly and the tumours greater than 1 mm in diameter were<br />
included in counting of total number of papillomas / mouse,<br />
tumour incidence and tumour yield was recorded if they<br />
persisted for two weeks or more.<br />
Group 1 (Untreated control) No treatment was given. .<br />
Group 2 (Vehicle control) 100 μl acetone 2 times /week up to<br />
16 weeks<br />
Group 3(DMBA alone) 104 μg DMBA was dissolved in 100 μl<br />
acetone and single application was given.<br />
Group 4 (Croton oil alone) 1 % Croton oil was applied on skin<br />
2 times a week up to 16 weeks.<br />
Group 5 (DMBA + Croton Oil) The animals were treated with<br />
a single dose of DMBA (104 μg/100 μl of acetone) over the<br />
shaven area of the skin of the mice. One week later, croton oil<br />
(1% in 100 μl of acetone) was applied as a promoter 3 times per<br />
week until the end of the experiment (i.e. 16 weeks).<br />
Group 6 (DMBA + Triphala extract. + Croton Oil) The<br />
animals were treated with Triphala extract (40 mg /kg) topically<br />
one week after DMBA (104 μg/100 μl of acetone) application,<br />
followed by the application of croton oil (1% in 100 μl of<br />
acetone thrice a week) until the end of the experiment (i.e. 16<br />
weeks).<br />
Group 7 (Triphala extract alone): - The animals were treated<br />
Triphala extract (40 mg /kg) without DMBA and Croton oil was<br />
given 3 times a week up to 16 weeks.<br />
Each group‘s consists of 6 animals for skin model assay and<br />
the animals of all groups were kept under observation for gross<br />
and microscopic changes in skin.<br />
(B) Melanoma model<br />
Melanoma cell line was obtained from National Cell Science<br />
Research Centre, Pune and 5 lacks cells / animal were injected.<br />
After implantation of the melanoma cell line, animal were kept<br />
under observation and experiment was started after 10 days when<br />
the tumours were seen. The treatment was given orally for 30<br />
days and tumour volume and survival time of each animal was<br />
recorded. The following groups were maintained.<br />
Control Group: This group consisted of four mice. The<br />
melanoma cell line (B6F10) were injected subcutaneously (S.C.)<br />
in all four mice.<br />
Test Group: This group was divided into two sub groups.<br />
Each group consisted of four animals. The melanoma cell line<br />
was injected by S.C. route. The tumour bearing mice were orally<br />
given dose of 40 mg/ Kg body weight in 50 % methonolic extract<br />
of Triphala. as standardized by us in earlier experiments<br />
(Agrawal et al, 2009).<br />
Antimutagenic study: The cytogenetic damage in the bone<br />
marrow cells were studied by chromosomal aberrations and<br />
micronuclei induction.<br />
(i) Chromosomal aberrations analysis: For the<br />
chromosomal aberrations assay, the Triphala<br />
extract at different dose levels i.e. 40 ,80 and 120<br />
mg/kg body weight in the volume of 0.2 ml was<br />
injected 24 hours before the treatment of<br />
cyclophosphamide. The positive control group<br />
received single i.p. injection of 50 mg/kg<br />
cyclophosphamide in 0.9% saline. Colchicine (4<br />
mg/kg b.wt ) was administered intraperitoneally 2<br />
hours before the harvest of the cells. Animals were<br />
sacrificed by cervical dislocation and bone marrow<br />
cells were harvested. The slides were prepared<br />
essentially as per modified method of Preston et al<br />
(1987) for chromosomal aberrations and method of<br />
Schmid (1975) and standardized by us (Agrawal et<br />
al ,1998, 1999) for micronucleus evaluations. The<br />
femur was excised and the bone marrow was<br />
extracted in 0.56 % KCl. The harvested cells were<br />
incubated at 37 0 C for 20 minutes and then<br />
centrifuged for 10 minutes at 1000 rpm. Cells were<br />
fixed in Carney‘s fixative (Methanol: Acetic acid,<br />
3:1) and burst opened on a clean slide to release the<br />
chromosomes. The slides were stained with 5 %<br />
Giemsa solution for 15 minutes and then put in<br />
xylene and mounted with DPX. A total of 100 well<br />
spread metaphase plates were scored for<br />
chromosomal aberrations at a magnification of<br />
1000 X (100 x 10 X) for each group. Different<br />
types of chromosomal aberrations such as<br />
chromatid breaks, gaps, pulverization, polyploidy,<br />
centromeric association etc. were scored and<br />
expressed as % chromosomal aberrations.<br />
(ii) Micronuceus assay: The femur of mice was<br />
dissected out and the bone marrow was flushed out<br />
in HBBS solution as described by us earlier (<br />
Agrawal et al,1998) . The smear was made in<br />
precleaned slides, air dried and fixed in absolute<br />
methanol. The slides were stained with<br />
Maygrunwald and Giemsa stain. About 2000 cells<br />
were counted and number of micronucleated<br />
polychromatid and Normochromatid erythrocytes<br />
cells were scored. PCE/NCE ratio was also<br />
calculated. The data are presented in MNPCE+SE.<br />
The statistical significance was evaluated using<br />
Student's `t' test.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 114<br />
ISSN 2250-3153<br />
IV. RESULTS<br />
The results of the present investigation have been summarized<br />
in Tables 1 and 2. Topical single application of DMBA at the<br />
dose of 104 mg/kg b. wt. followed by 1 % croton oil produced<br />
skin papillomas. The incidence of tumours reached 100% and<br />
the value of cumulative number of papillomas in these animals<br />
were recorded 40 and the average number of papillomas per<br />
mouse (tumour yield) was found 6.6.<br />
The mice which received Triphala extract showed a<br />
significant decrease in the number and incidence of tumour as<br />
compared with that of the DMBA + croton oil group. When<br />
triphala extract was topically applied at the dose of 40 mg /kg b.<br />
wt. for 16 weeks to the skin of animals the tumor incidence was<br />
found 60% and the value of cumulative number of papillomas in<br />
these animals were recorded 6 and the average number of<br />
papillomas per mouse in this group was found 1.5 . The<br />
differences in the values of the results of experimental groups<br />
were statistically analyzed and found to be significant in<br />
comparison to the control group at (p< 0.05).<br />
Histopathology of skin tumour<br />
The animals which received the treatment of DMBA + Croton<br />
oil for 16 weeks showed the infiltration nests of neoplastic<br />
squamous epithelium . The tumour cells exhibited a high nuclear<br />
cytoplasmic ratio. Moderate cytoplasm and dense clumped<br />
chromatin were also seen. Adjacent epithelium showed marked<br />
hyperkeratosis. This is suggestive of kerating squamous cell<br />
carcinoma grade II. When the triphala extract was applied along<br />
with the DMBA and Croton oil malignant tumours were not seen<br />
as compared to DMBA + Croton oil group. In the case of this<br />
group only four mice had tumours and the histopathology report<br />
suggest in these animals were having papillomatous hyperplasia,<br />
papilloma, extracellular keratin and epithelial hyperplasia with<br />
mild displasia was reported and the remaining animals showed<br />
the normal skin.<br />
The study showed the effect of triphala extract on B16F10<br />
melanoma tumour bearing mice. The preventive effect of triphala<br />
extract was calculated using the parameter of inhibition rate (IR),<br />
Increase in the life span (ILS), and Volume of tumour . The<br />
inhibition rate was 69 % in triphala extract treated group as<br />
compared to control group. The life span was also increased in<br />
52 % as compared to control group. The volume of triphala<br />
treated mice was significantly reduced as compared to control.<br />
The differences in the values of the results of experimental<br />
groups were statistically analyzed and found significant in<br />
comparison to the control groups (p< 0.05).<br />
In cytogenetic studies, single application of triphala extract<br />
at the dose of 40, 80 and 120 mg/kg dry weight, 24 hours prior<br />
the i.p. administration of Cyclophosphamide (at the dose of 50<br />
mg/kg) have significantly prevented the micronucleus formations<br />
in dose dependent manner in bone marrow cells of mice as<br />
compared to Cyclophosphamide group (Table 4). The dose<br />
dependent protection was also observed in chromosomal<br />
aberrations assay in bone marrow cells of mice in triphala<br />
extract treated mice as compared to known mutagen,<br />
Cyclophosphamide treated groups (Table 5)<br />
V. DISCUSSION<br />
The present study demonstrated that when triphala extract was<br />
given one hour before the each application of croton oil, the<br />
incidence and the number of skin papillomas was significantly<br />
decreased. The reduction in tumour count may be due to effect in<br />
the promotional phase of tumourgenesis which prevent the<br />
reduction of free radicals (Huachen and Krystyn, 1991). Triphala<br />
becomes one of the highly potential herbal medicines in cancer<br />
treatment and prevention because all three compositions of<br />
Triphala have been found to possess notable anticancer<br />
properties (Sandhya et al., 2006a).Although very little is known<br />
about the mechanism by which these plants act against cancer<br />
cells. The mechanism of in vitro cytotoxicity and tumor growth<br />
reduction in vivo induced by Triphala seems to involve apoptosis<br />
induction. In addition, the components of Triphala may exert<br />
synergistic cytotoxic action on tumor reduction. Gallic acid is<br />
one of the major components of Triphala and capable of<br />
inhibiting cancer cell proliferation suggesting the key factor<br />
responsible for antimutagenic and cytotoxic effects of Triphala<br />
(Kaur et al., 2005). Polyphenols such as tannins and gallic acid, a<br />
component unit of hydrolysable tannins, are well known inducers<br />
of apoptosis in tumor cells (Inoue et al., 2000). Topical<br />
application of TPA (active constituent of croton oil) has been<br />
reported to increase production of free radicals (Huachen, and<br />
Krystyna, 1991). This is perhaps due to the free radical oxidative<br />
stress that has been implicated in the pathogenesis of a wide<br />
variety of clinical disorders (Das, 2002). Many antioxidants and<br />
anticarcinogenic compounds appear to have major effect on the<br />
detoxification of the carcinogens by the induction of Phase II<br />
detoxification enzymes since these enzymes divert carcinogens<br />
to react with critical cellular macromolecules (Prochaska et al.,<br />
1992). The anticarcinogenic effect of triphala extract suggests its<br />
role in chemoprevention of skin cancer. These results are<br />
important because this drug is used globally as a bowl cleaning<br />
agent. It may also be an important drug for chemotherapeutic<br />
treatment of cancer.<br />
REFERENCES<br />
[1] Agrawal, R.C. and Kumar, S. Prevention of cyclophosphamide induced<br />
Micronucleus formation in mouse bone marrow by Indole-3-carbinol, Food<br />
and Chemical Toxicol, 36, 1998, 975-977.<br />
[2] Agrawal, R.C. and Kumar, S. ―Prevention of chromosomal aberrations in<br />
mouse bone marrow by Indole-3-carbinol‖, Toxicology Letters, 106,<br />
1999, 137-141.<br />
[3] Agrawal, R.C.; Jain,R.; Raja,W and Oves,M. (2009) Anticarcinogenic<br />
effects of Solanum lycopersicum fruit extract on Swiss albino and C57 BL<br />
mice. Asian Pacific journal of Cancer prevention,Vol 10, 379-382<br />
[4] Berenbrum,I. (1975) Sequential aspects of chemical carcinogenesis in skin<br />
Cancer: A comprehensive treatise, Plenum press,New York,1,323-324<br />
[5] Das UN. (2002) A radical approach to cancer. Med. Sci. Monit. 8: 79-92.<br />
[6] Deep G, Dhiman M, Rao A R, Kale R K, Chemopreventive Potential of<br />
Triphala ( a composite Indian drug) in benzo (a) pyrene induced<br />
forestomach tumorgenesis in murine tumor model system J. exp. Clin.<br />
cancer Res 2005 Dec, 24 (4): 555-63<br />
[7] Huachen W and Krystyna F. (1991) In vivo formation of oxidized DNA<br />
base in tumor promoter-treated mouse skin. Cancer Res.,51: 4443.<br />
[8] Inoue, M., Sakaguchi, N., Isuzugawa, K., Tani, H. And Ogihara, Y. 2000.<br />
Role of reactive oxygen species in gallic acid-induced apoptosis. Biological<br />
& Pharmaceutical Bulletin, 23, 1153-1157<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 115<br />
ISSN 2250-3153<br />
[9] Jagetia GC, Baliga MS, Malagi KJ, Klamath M. The evaluation of the<br />
radioprotective effect of Triphala (an ayurvedic rejuvenating drug) in the<br />
mice exposed to gamma-radiation. Phytomedicine. 2002; 9:99-106.<br />
[10] Kaur S, Michael H, Arora S, Harkonen PL, Kumar S. 2005 The in vitro<br />
cytotoxic and apoptotic activity ofTriphala-an Indian herbal drug. Journal of<br />
Ethnopharmacology, 97, 15-20.<br />
[11] Naik GH, Priyadarsini KI, Bhagirathi RG, et al. In vitro antioxidant studies<br />
and free radical reactions of triphala, an ayurvedic formulation and its<br />
constituents. Phytother Res. 2005; 19:582-586.<br />
[12] Naik, H. Priyadarsini K. I., and Hari Mohan. Free radical scavenging<br />
reactions and phytochemical analysis of triphala, an ayurvedic formulation<br />
RESEARC COMMUNICATIONS CURRENT SCIENCE, VOL. 90, NO.<br />
8, 25 APRIL 2006<br />
[13] Prochaska HJ, Santamaria AB and Talalay P. (1992) Rapid detection of<br />
inducers of enzymes that protect against carcinogens. Proc. Natl. Acad. Sci.<br />
USA 89: 2394-2398.<br />
[14] Preston ,J, R., Brian J. Dean, Sheila Galloway, Henry Holden, Alfred F.<br />
MeFee, and Michael Shelby, ―Mammalian in vivo cytogenetic assays,<br />
Analysis of chromosomal aberrations in mouse bone marrow cells‖,<br />
Mutation Research, 189, 1987, 157-165.<br />
[15] Sandhya T.; Lathika K.M.; Pandey B.N; Mishra K.P; potential of ayurvedic<br />
formulation, Triphala, as novel anticancer drug cancer letters 2006<br />
vol.231,n02 , p.p. 206-214<br />
[16] Schmid,W., ―The micronucleus test‖, Mutation Research,1975,31, 9-15.<br />
First Author –R.C.Agrawal, Research Department, Priyamvada<br />
Birla Cancer Research Institute, Email:<br />
rcagrawal60@yahoo.com, Phone: 91-9826949427<br />
Table 1: Cumulative no, of Papilloma on Triphala extract treated Swiss mice.<br />
GROUPS DOSE TIME OF 1 st<br />
CUMULATIVE MEAN NO.<br />
APPEARANCE OF NO. OF<br />
OF<br />
PAPILLOMA PAPILLOMA PAPILLOMA<br />
DMBA* + 104 µg/ animal On 29<br />
Croton Oil** + 1 %<br />
th day 40 6.6<br />
DMBA* alone 104 µg/ animal - 0 -<br />
Croton oil** 1 % - 0 -<br />
DMBA* + 104 µg/ animal On 69th day 6 1.5<br />
Croton Oil** + + 1 % + 40<br />
Triphala<br />
***extract<br />
mg/kg b wt<br />
Triphala<br />
***alone<br />
40 mg/kg b wt - 0 -<br />
* Single application of DMBA was given at the dose of 104 µg/animal<br />
(4 mg/kg b.wt.)<br />
**1 % croton oil was given one hour before each application of Triphala extract.<br />
*** Triphala extract at the dose of 40 mg/kg body weight was given one hour before the each application of croton oil.<br />
Table2: Tumour incidence in mice treated with Triphala extract<br />
GROUPS NO.OF WEEKS<br />
4 th WEEK 8 TH WEEK 12 TH WEEK 16 TH WEEK<br />
DMBA* + Croton 1/6<br />
3/6<br />
5/6<br />
6/6<br />
Oil**<br />
(16 %) (50%)<br />
(83%)<br />
(100%)<br />
DMBA alone* 0/6 0/6 0/6 0/6<br />
Croton oil** 0/6 0/6 0/6 0/6<br />
DMBA* + Croton 0/6<br />
1/6<br />
3/6<br />
4/6<br />
Oil** +Triphala<br />
extract ***<br />
(0 %) (16 %)<br />
(50%)<br />
(60%)<br />
Triphala extract *** 0/6 0/6 0/6 0/6<br />
* Single application of DMBA was given at the dose of 104 µg/animal<br />
(4 mg/kg b.wt.)<br />
**1 % croton oil was given one hour before each application of Triphala extract.<br />
*** Triphala extract at the dose of 40 mg/kg body weight was given one hour before the each application of croton oil.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 116<br />
ISSN 2250-3153<br />
Table 3: Malenoma Skin bio Assay (Triphala extract treatment)<br />
GROUP DOSE<br />
( mg/kg b wt)<br />
TUMOUR<br />
VOLUME<br />
(in mm)<br />
MEAN<br />
SURVIVAL<br />
(in days)<br />
ILS( %) IR (%)<br />
Untreated<br />
Group<br />
- 1638 ± 345.5 17.5 - -<br />
Triphala ext 40 505± 17* 26.6 52 69.2<br />
* denotes stastical significance at p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 117<br />
ISSN 2250-3153<br />
2.<br />
Triphala Ext. + CP (<br />
40 mg/kg + 50 )<br />
3. Triphala Ext. +<br />
CP(80 mg/kg +<br />
50)<br />
4. Triphala Ext. +<br />
CP(120 mg/kg +<br />
50)<br />
5. Triphala Alone (40<br />
mg/kg)<br />
22.40 ± 6.70* 4 5 3 3 8<br />
17.74 ± 3.80* 3 4 2 2 7<br />
13.07 ± 3.80* 2 3 1 1 6<br />
9.08 ± 0.80 *<br />
2 2 Nil Nil 5<br />
* denotes statistical significance in `t' test as compared to<br />
cyclophosphamide treated group at P < 0.05<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 118<br />
ISSN 2250-3153<br />
Object Detection in Remote Sensing Images: A Review<br />
Abstract- In this paper, we address the problem of presegmentation<br />
for object detection and statistics in remote sensing<br />
image processing. It plays an important role in reducing<br />
computational burden and increasing efficiency for further image<br />
processing and analysis. We follow the paradigm of object<br />
detection by Active Contour Method, then imposes structural<br />
constraints for the detection of the entire object. We have<br />
analyzed the performance of the proposed scheme<br />
comprehensively and specifically using some measured data, and<br />
carried out comparisons of the existing algorithms. The results<br />
show that the proposed scheme could improve the application<br />
ability in target detection.<br />
Keywords- Remote Sensing Images, Active Contour Method,<br />
Hough Transform<br />
A<br />
I. INTRODUCTION<br />
s the advance of remote sensing technology, the very high<br />
quantity remote sensing images become widely available.<br />
With the increasing volume of image data, it is desirable to<br />
develop the technique for remote sensing image analysis and<br />
understanding. However, the overwhelming amount of image<br />
data impose heavy computation constrain. Also, many<br />
applications, such as target or object detection, are only focusing<br />
on some salient regions in the image [1]. It is desired to extract<br />
regions of interest before further processing and analyzing.<br />
Salient region extraction is an important method to detect the<br />
region of interest. It is operated to select a subset of the available<br />
sensory information before further processing and sample the<br />
most relevant features, most likely to reduce the complexity of<br />
scene analysis [2].. Due to such superiority, salient region<br />
extraction has been adopted in widely applications, such as<br />
image compression [3], distinctive objects detection [4], image<br />
segmentation [5] etc.<br />
Most information of an image is concentrated in edges.<br />
Variations of light can influence the appearance of a region<br />
markedly, but not its edges. Remote sensing images are<br />
frequently influenced by several changes, such as camera<br />
viewpoints, distance and illuminance, so different targets<br />
automatic recognition methods in remote sensing images by<br />
using edges or gradient have attracted many researchers in recent<br />
years. Edges are detected to enhance the linear features.<br />
However, in these algorithms, edge detectors are often used to<br />
find region boundaries or edge details in an image and they only<br />
utilize the gradient magnitude but neglect the area, threshold,<br />
radius etc. In this paper, an object recognition method with the<br />
object statics is proposed. This method realizes the object<br />
detection combining the texture and geometry characteristics.<br />
Er. Tanvi Madaan, Er. Himanshu Sharma<br />
M.M. University, Mullana, Ambala, India<br />
II. PROPOSED METHOD<br />
Here the aim is to analyze the image in order to find out the<br />
objects. Due to noise or shadow, objects cannot be recognize<br />
properly. So some steps can be followed to remove these factors<br />
and after that find the objects and calculate their statistics.<br />
Following are the steps to be followed:<br />
a) Process the image to remove noise and shadow present<br />
in the image. A segmentation algorithm often needs a<br />
preprocessing step like noise smoothing to reduce the<br />
effect of undesired perturbations (artifacts) which might<br />
cause over- and under-segmentation.<br />
b) The purpose of image segmentation is to decompose an<br />
image domain into a number of disjoint regions so that<br />
the features within each region have visual similarity,<br />
strong statistical correlation and reasonably good<br />
homogeneity. The preprocessed image works as the<br />
input to segmentation algorithm.<br />
c) After segmentation either follow binary conversion of<br />
image using thresholding or grey scale conversion:-The<br />
goal of thresholding is to create a binary representation<br />
of the image & to discard irrelevant data and keep only<br />
the important segments of data which lie above<br />
threshold curve. It segments the digital image based on<br />
certain characteristics of pixels (for example intensity<br />
value).Grey scale dumps all the color information and<br />
leaves with very little information to work with. NTSC<br />
standard is used for the conversion to grey scale There<br />
exist several methods for segmenting gray-level images.<br />
Gray-level thresholding is one of the oldest techniques<br />
for image segmentation.<br />
d) Contour extraction, depending on the image quality &<br />
structure has two possibilities. The first one is<br />
performing image segmentation based on color &<br />
texture. If color based segmentation is not possible due<br />
to unknown information about objects, then the second<br />
way to compute the contour is direct edge detection<br />
since one need contours with a thickness of one pixel.<br />
Finally, calculate the threshold, region, boundary and<br />
the area of extracted objects using Hough<br />
transformation.<br />
III. ACTIVE CONTOUR METHOD<br />
Besides challenges due to imaging noise and partial volume<br />
effects, the similarity in intensity and texture between<br />
neighboring structures complicates the task of identifying distinct<br />
boundaries between the structures. So the active contour method<br />
was introduced which developed the concept of shape contours<br />
.When evolving shape contours, the interaction consists of<br />
modeling the ―forces‖ of attraction, repulsion, and competition<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 119<br />
ISSN 2250-3153<br />
by taking into account the relationship between object contours<br />
and their shape estimates.<br />
An active contour is an ordered collection of ‗n‘ points in the<br />
image plane:<br />
v {<br />
v ,......... ... v<br />
v<br />
i<br />
}<br />
( x , y ) , i ( 1 ,...., n)<br />
i i i i i --- (1)<br />
The points in the contour iteratively approach the boundary of an<br />
object through the solution of an energy minimization problem.<br />
For each point in the neighborhood of ‗Vi‘, an energy term is<br />
computed:<br />
E E<br />
( v ) E<br />
i<br />
Where<br />
( v )<br />
int i ext i<br />
E<br />
( ) v<br />
int i<br />
n<br />
is an energy function dependent on the shape<br />
Eext<br />
( vi<br />
)<br />
of the contour and is an energy function dependent on<br />
the image properties, such as the gradient, near point<br />
v . , <br />
i<br />
and are constants providing the relative weighting of the<br />
E , EintandE<br />
energy terms. i<br />
ext are matrices. The value at the<br />
center of each matrix corresponds to the contour energy at<br />
point i v . Other values in the matrices correspond (spatially) to<br />
the energy at each point in the neighborhood of i v .<br />
Each point, i v '<br />
v<br />
is moved to the point i , corresponding to the<br />
location of the minimum value in i E<br />
. Corresponding to the<br />
location of the minimum value in i E<br />
. This process is illustrated<br />
in Figure 1. If the energy functions are chosen correctly, the<br />
contour, v , should approach, and stop at, the object boundary.<br />
Figure 1: Procedure for feature extraction<br />
3.1 Internal Energy<br />
The internal energy function is intended to enforce a shape on<br />
the deformable contour and to maintain a constant distance<br />
between the points in the contour. Additional terms can be added<br />
to influence the motion of the contour.<br />
The internal energy function used herein is defined as follows:<br />
E<br />
( v ) cE ( v ) bE<br />
Where<br />
( v )<br />
int i con i bal i<br />
Econ(<br />
vi<br />
)<br />
of the contour and<br />
---(2)<br />
is the continuity energy that enforces the shape<br />
Ebal(<br />
vi<br />
)<br />
is a balloon force that causes the<br />
contour to grow (balloon) or shrink. ‗c‘ and ‗b‘ provide the<br />
relative weighting of the energy terms.<br />
Figure 2: Extraction of object using Active Contour Method<br />
3.2 External Energy<br />
The external energy function attracts the deformable contour<br />
to interesting features, such as object boundaries, in an image.<br />
Any energy expression that accomplishes this attraction can be<br />
considered for use.<br />
Image gradient and intensity are obvious (and easy)<br />
characteristics to look at (another could be object size or shape).<br />
Therefore, the following external energy function is investigated:<br />
Eext<br />
( vi<br />
) mEmag<br />
( vi<br />
) gEgrd<br />
( vi<br />
)<br />
Where<br />
Emag<br />
( vi<br />
)<br />
high or low intensity regions and<br />
--(3)<br />
is an expression that attracts the contour to<br />
Egrd<br />
( vi<br />
)<br />
is an energy term that<br />
moves the contour towards edges. Again, the constants, m,g are<br />
provided to adjust the relative weights of the terms.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 120<br />
ISSN 2250-3153<br />
IV. HOUGH TRANSFORMATION<br />
The Hough transform is a technique which can be used to<br />
isolate features of a particular shape within an image. Because it<br />
requires that the desired features be specified in some parametric<br />
form, the classical Hough transform is most commonly used for<br />
the detection of regular curves such as lines, circles, ellipses, etc.<br />
A generalized Hough transform can be employed in applications<br />
where a simple analytic description of a feature is not possible.<br />
Due to the computational complexity of the generalized Hough<br />
algorithm, we restrict the main focus of this discussion to the<br />
classical Hough transform. Despite its domain restrictions, the<br />
classical Hough transform (hereafter referred to without the<br />
classical prefix) retains many applications, as most manufactured<br />
parts (and many anatomical parts investigated in medical<br />
imagery) contain feature boundaries which can be described by<br />
regular curves. The main advantage of the Hough transform<br />
technique is that it is tolerant of gaps in feature boundary<br />
descriptions and is relatively unaffected by image noise.<br />
The Hough transform algorithm uses an array, called an<br />
accumulator, to detect the existence of a line y = mx + b. The<br />
dimension of the accumulator is equal to the number of unknown<br />
parameters of the Hough transform problem. For example, the<br />
linear Hough transform problem has two unknown parameters: m<br />
and b. The two dimensions of the accumulator array would<br />
correspond to quantized values for m and b. For each pixel and<br />
its neighborhood, the Hough transform algorithm determines if<br />
there is enough evidence of an edge at that pixel. If so, it will<br />
calculate the parameters of that line, and then look for the<br />
accumulator's bin that the parameters fall into, and increase the<br />
value of that bin. By finding the bins with the highest values,<br />
typically by looking for local maxima in the accumulator space,<br />
the most likely lines can be extracted, and their (approximate)<br />
geometric definitions read off. The simplest way of finding these<br />
peaks is by applying some form of threshold, but different<br />
techniques may yield better results in different circumstances -<br />
determining which lines are found as well as how many. Since<br />
the lines returned do not contain any length information, it is<br />
often next necessary to find which parts of the image match up<br />
with which lines. Moreover, due to imperfection errors in the<br />
edge detection step, there will usually be errors in the<br />
accumulator space, which may make it non-trivial to find the<br />
appropriate peaks, and thus the appropriate lines.<br />
V. CONCLUSION<br />
With the aim of designing a highly practical process of target<br />
detection in remote sensing images, this research has proposed an<br />
improved scheme consisting of algorithms for object detection.<br />
At the systematic level, an integrative frame sequentially<br />
combining the algorithm based on feature extraction and the<br />
knowledge of object has been presented. At the algorithmic level,<br />
first, the discriminative features have been extracted. Second, a<br />
HOUGH TRANSFORM algorithm has been presented.<br />
According to the comparisons of the existing algorithms and<br />
abundant experimental results, the proposed scheme is found to<br />
improve the application ability in object detection.<br />
REFERENCES<br />
[1] X. Gang, ―Extracting salient object from remote sensing image based on<br />
guidance of visual attention pb -,‖ Proceedings of SPIE – The International<br />
Society for Optical Engineering, vol. 6790, 2007.<br />
[2] M. Jager, ―Saliency and salient region detection in sar polarimetry,‖<br />
IGARSS 2005: IEEE International Geoscience and Remote Sensing<br />
Symposium, Vols 1-8, Proceedings, pp. 2791–2794, 2005.<br />
[3] C. Christopoulos, ―Efficient region of interest coding techniques in the<br />
upcoming jpeg2000 still image coding standard,‖ 2000 INTERNATIONAL<br />
CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, pp.<br />
41–44, 2000.<br />
[4] B. C. Ko, ―Object-of-interest image segmentation based on human attention<br />
and semantic region clustering,‖ JOURNAL OF THE OPTICAL SOCIETY<br />
OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, vol. 23, no. 10,<br />
pp. 2462–2470, 2006.<br />
[5] U. Rutishauser, ―Is bottom-up attention useful for object recognition? Pb -,‖<br />
Proceedings of the IEEE Computer Society Conference on Computer Vision<br />
and Pattern Recognition, vol. 2, pp. II37–II44, 2004.<br />
[6] R. Achantay, ―Frequency-tuned salient region detection pb -,‖ 2009 IEEE<br />
Computer Society Conference on Computer Vision and Pattern Recognition<br />
Workshops, CVPR Workshops 2009, pp. 1597–1604, 2009.<br />
[7] Qihao Weng, Ph.D.,‖ Remote Sensing and GIS Integration, Theories,<br />
Methods, and Applications‖ McGraw-Hil-2010<br />
[8] Xu Yuanjing,Wang Qiaojue,Shen Huanfeng,Li Pingxiang,Zhang<br />
Hongyan,A Remote Sensing Image Restoration Method Estimation and<br />
Regularization Model,[J]. Journal of Geomatics,2010(6).<br />
[9] Y. N. Xu, Y. Zhao, L. P. Liu, and X. D. Sun, ―Parameter identification of<br />
point spread function in noisy and blur images,‖ vol. 17, No. 11, pp. 2849-<br />
2856, Nov 2009.<br />
[10] P. L. Rosin, ―A simple method for detecting salient regions,‖ PATTERN<br />
RECOGNITION, vol. 42, no. 11, pp. 2363–2371, 2009.<br />
AUTHORS<br />
First Autho – Er. Tanvi Madaan, M.Tech Scholar, M.M.<br />
University, Mullana,Ambala, Email: ertanvimadaan@gmail.com<br />
Second Author– Er. Himanshu Sharma, Department of<br />
Electronics and Communication Engineering, M.M. University,<br />
Mullana, Ambala, Email: himanshu.zte@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 121<br />
ISSN 2250-3153<br />
Genetic Variability Studies for Qualitative and<br />
Quantitative traits in Popular Rice (Oryza sativa L.)<br />
Hybrids of India<br />
V. Ravindra Babu 1 *, K. Shreya 2 , Kuldeep Singh Dangi 2 , G. Usharani 2 , P. Nagesh 3<br />
1 Crop Improvement Division, Directorate of Rice Research, Rajendranagar, Hyderabad, India.<br />
2 Department of Genetics and Plant Breeding, College of Agriculture, ANGRAU, Rajendranagar, Hyderabad, India.<br />
3 Research Associate, Grain Legume, Groundnut Breeding, ICRISAT, Patancheru, Hyderabad, India.<br />
Abstract- The present investigation is carried out to study the<br />
genetic parameters for yield, yield attributing, quality and<br />
nutritional characters in twenty one rice hybrids. Analysis of<br />
variance revealed significant differences for all the traits under<br />
study. The characters viz., number of filled grains per panicle,<br />
number of chaffy grains per panicle and iron content exhibited<br />
high Genotypic Coefficient of Variation (GCV) and Phenotypic<br />
Coefficient of Variation (PCV). Small differences between GCV<br />
and PCV were recorded for all the characters studied which<br />
indicated less influence of environment on these characters. The<br />
characters viz., number of filled grains per panicle and water<br />
uptake exhibited high heritability coupled with high genetic<br />
advance indicating that simple selection could be effective for<br />
improving these characters.<br />
Index Terms- Genetic advance, Genetic variability,<br />
Heritability and Rice<br />
R<br />
I. INTRODUCTION<br />
ice is one of the most important cereal crops of the world<br />
meeting the dietary requirements of the people living in the<br />
tropics and sub-tropics. Quantum jump in yield improvement has<br />
been achieved in rice with the development of high yielding<br />
heterotic hybrids under commercial cultivation. However, being<br />
the staple food of the population in India, improving its<br />
productivity has become a crucial importance (Subbaiah et al.,<br />
2011). Knowledge on the nature and magnitude of genetic<br />
variation governing the inheritance of quantitative characters like<br />
yield and its components is essential for effecting genetic<br />
improvement. A critical analysis of genetic variability is a prerequisite<br />
for initiating any crop improvement programme and for<br />
adopting of appropriate selection techniques.<br />
A paradigm shift in the rice (Oryza sativa L.) breeding<br />
strategies from quantity centered approach to quality oriented<br />
effort was inevitable, since India has not only become self<br />
sufficient in food grain production but also is the second largest<br />
exporter of quality rice in the world (Sreedhar et al.,2005).<br />
Improvement in grain quality that does not lower yield is the<br />
need of hour at present context in order to benefit all rice growers<br />
and consumers. Like grain yield, quality is not easily amenable to<br />
selection due to its complex nature. Lack of clear cut perception<br />
regarding the component traits of good quality rice is one of the<br />
important reasons for the tardy progress in breeding for quality<br />
rice varieties. With the increase in yield, there is also a need to<br />
look into the quality aspects to have a better consumer<br />
acceptance, which determines the profit margin of rice growers<br />
which in turn dictates the export quality and foreign exchange in<br />
India. Genetic enhancement is one of the important tools to<br />
improve the productivity. Hybrid technology has been widely<br />
acclaimed and accepted. High magnitude of variability in a<br />
population provides the opportunity for selection to evolve a<br />
variety having desirable characters.<br />
Grain quality characteristics are very important in rice<br />
breeding as it is predominantly consumed as a whole grain. The<br />
milling percentage, grain appearance, cooking quality and<br />
nutritional components constitute the quality traits. Nutritional<br />
components include proteins and micronutrients like Iron and<br />
Zinc. The average percentage of protein in rice grains is 8 per<br />
cent (The amino acid profile shows that it is rich in Glutamic<br />
acid and Aspartic acid, highest quality cereal protein being rich<br />
in lysine (3.8 %), the first limiting amino acid); Fe is 1.2 mg/100<br />
g and Zn is 0.5 mg/100 g. Malnutrition is a large and growing<br />
problem in the developing world mostly in South and S.E. Asia<br />
and Sub Sahara Africa (Reddy et al., 2005). Over 3 billion<br />
people suffer micro nutrient malnutrition (Welch and Graham,<br />
2002). Iron deficiency may affect 3 billion people worldwide<br />
(Long et al., 2004). It is estimated that 49 per cent of the world‘s<br />
population is at risk for low zinc intake (Cichy et al., 2005). In<br />
order to enhance the micronutrient concentration in the grain<br />
suitable breeding programmes should be followed. Keeping in<br />
view the above perspectives, the present investigation is carried<br />
out with the following objective of estimating the genetic<br />
variability in rice hybrids for yield, yield attributing characters,<br />
quality and nutritional traits.<br />
II. MATERIALS AND METHODS<br />
The present experiment is carried out at Directorate of Rice<br />
Research Farm, ICRISAT, Patancheru, Hyderabad, Andhra<br />
Pradesh, India, situated at 17.5°N latitude, 78.27°E longitude and<br />
altitude of 545 m above mean sea level. The materials comprised<br />
of twenty one rice hybrids (Table 1) obtained from Department<br />
of Plant Breeding, Crop Improvement Section, Directorate of<br />
Rice Research, Rajendranagar, Hyderabad. The experimental<br />
material was planted in a Randomized Block Design with three<br />
replications in three blocks. Each block consisted of twenty one<br />
genotypes randomized and replicated within each block. Twenty<br />
seven days old seedlings were transplanted 20cm apart between<br />
rows and 15cm within the row. All necessary precautions were<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 122<br />
ISSN 2250-3153<br />
taken to maintain uniform plant population in each treatment per<br />
replication. All the recommended package of practices was<br />
followed along with necessary prophylactic plant protection<br />
measures to raise a good crop. Five representative plants for each<br />
hybrid in each replication were randomly selected to record<br />
observations on the quantitative characters under study. Days to<br />
50% flowering were computed on plot basis. Data was recorded<br />
on physico-chemical quality characters from the bulk samples.<br />
The milling characteristics were computed following the method<br />
given by Ghosh et al., (1971). Iron and zinc content of seed<br />
samples was estimated by Atomic Absorption Spectrophotometer<br />
as suggested by Lindsay and Novell (1978). The treatment means<br />
for all the characters viz., days to 50 percent flowering, plant<br />
height (cm), number of productive tillers per plant, panicle length<br />
(cm), number of filled grains per panicle, number of chaffy grain<br />
per panicle, 1000 grain weight (g), single plant yield (g), grain<br />
moisture percentage, head rice recovery (%), kernel length (mm),<br />
kernel breadth (mm), L/B ratio, volume expansion ratio, water<br />
uptake (ml), alkali spreading value, gel consistency (mm),<br />
protein content (%), Iron content (mg/100g) and Zinc content<br />
(mg/100g), except for the milling percentage were subjected to<br />
analysis of variance technique on the basis of model proposed by<br />
Panse and Sukhatme (1961). The genotypic and phenotypic<br />
variances were calculated as per the formulae proposed by<br />
Burton (1952). The genotypic (GCV) and phenotypic (PCV)<br />
coefficient of variation was calculated by the formulae given by<br />
Burton (1952). Heritability in broad sense [h 2 (bs)] was calculated<br />
by the formula given by Lush (1940) as suggested by Johnson et<br />
al. (1955). From the heritability estimates, the genetic advance<br />
(GA) was estimated by the following formula given by Johnson<br />
et al. (1955).<br />
III. RESULTS AND DISCUSSION<br />
a) Variability parameters<br />
Greater variability in the initial breeding material ensures better<br />
chances of producing desired forms of a crop plant. Thus, the<br />
primary objective of germplasm conservation is to collect and<br />
preserve the genetic variability in indigenous collection of crop<br />
species to make it available to present and future generations.<br />
The analysis of variance indicated the existence of significant<br />
differences among all the hybrids for all the traits studied. The<br />
results of analysis of variance are presented in Table 2. The<br />
characters studied in the present investigation exhibited low,<br />
moderate and high PCV and GCV values. Among the yield<br />
characters, highest PCV and GCV values were recorded for<br />
number of chaffy grains per panicle, followed by number of<br />
filled grains per panicle and the lowest PCV and GCV values<br />
were recorded for grain yield per plant. Among the grain quality<br />
characters highest PCV and GCV values were recorded for iron<br />
content and lowest PCV and GCV was recorded for kernel<br />
breadth. High phenotypic variations were composed of high<br />
genotypic variations and less of environmental variations, which<br />
indicated the presence of high genetic variability for different<br />
traits and less influence of environment. Therefore, selection on<br />
the basis of phenotype alone can be effective for the<br />
improvement of these traits. Similar results were observed by<br />
Kumar et al. (1994), Chaudhary and Singh (1994), Pathak and<br />
Sharma (1996), Sarvanan and Senthil (1997), Rather et al.<br />
(1998), Satya et al (1999), Shivani and Reddy (2000),<br />
Iftekharudduala et al. (2001) and Sao (2002). Coefficients of<br />
variation studies indicated that the estimates of PCV were<br />
slightly higher than the corresponding GCV estimates for all the<br />
traits studied indicating that the characters were less influenced<br />
by the environment. Therefore, selection on the basis of<br />
phenotype alone can be effective for the improvement of these<br />
traits.<br />
b) Heritability<br />
The estimates of heritability act as predictive instrument in<br />
expressing the reliability of phenotypic value. Therefore, high<br />
heritability helps in effective selection for a particular character.<br />
Heritability is classified as low (below30%), medium (30-60%)<br />
and high (above 60%). The characters studied in the present<br />
investigation expressed low to high heritability estimates ranging<br />
from 25.5 to 98.4 percent. Among the yield characters, highest<br />
heritability was recorded by days to 50 percent flowering<br />
followed by number of chaffy grains per panicle, number of<br />
filled grains per panicle, whereas, in grain quality characters<br />
alkali spreading value recorded highest heritability and head rice<br />
recovery percentage recorded lowest heritability value. High<br />
heritability values indicate that the characters under study are<br />
less influenced by environment in their expression. The plant<br />
breeder, therefore, may make his selection safely on the basis of<br />
phenotypic expression of these characters in the individual plant<br />
by adopting simple selection methods. High heritability indicates<br />
the scope of genetic improvement of these characters through<br />
selection. Similar results have been reported by Panwar et al.<br />
(1997), Sarawgi et al., (2000), Gannamani (2001) and Sao<br />
(2002).<br />
c) Genetic advance<br />
The genetic advance is a useful indicator of the progress that can<br />
be expected as result of exercising selection on the pertinent<br />
population. Heritability in conjunction with genetic advance<br />
would give a more reliable index of selection value (Johnson et<br />
al. 1955). Genetic advance was highest for number of filled<br />
grains per panicle followed by days to 50 percent flowering and<br />
lowest for grain yield per plant among yield characters. In case of<br />
grain quality characters, water uptake recorded highest genetic<br />
advance followed by gel consistency and the lowest for kernel<br />
breadth. The genetic advance as per cent of mean was highest in<br />
case of number of chaffy grains per panicle, while lowest<br />
recorded by grain yield per plant among yield characters,<br />
whereas, in grain quality characters, iron content recorded the<br />
highest genetic advance as per cent mean, while the lowest was<br />
recorded by head rice recovery percentage. The information on<br />
genetic variation, heritability and genetic advance helps to<br />
predict the genetic gain that could be obtained in later<br />
generations, if selection is made for improving the particular trait<br />
under study. Similar findings were also reported by Regina et al.<br />
(1994), Vanniarajan et al. (1996), Shivani and Reddy (2000),<br />
Iftekharuddaula et al. (2001), Gannamani (2001) and Sao (2002).<br />
In general, the characters that show high heritability with high<br />
genetic advance are controlled by additive gene action (Panse<br />
and Sukhatme, 1957) and can be improved through simple or<br />
progeny selection methods. Selection for the traits having high<br />
heritability coupled with high genetic advance is likely to<br />
accumulate more additive genes leading to further improvement<br />
of their performance. In the present study, high heritability along<br />
with high genetic advance was noticed for the traits, number of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 123<br />
ISSN 2250-3153<br />
filled grains per panicle and water uptake. Other characters<br />
showed high heritability along with moderate or low genetic<br />
advance which can be improved by intermating superior<br />
Table 1. Details of twenty one popular rice hybrids of India<br />
genotypes of segregating population developed from<br />
combination breeding (Samadia, 2005).<br />
S.No. Name of the hybrid Nominating Agency<br />
1 DRRH – 2 Directorate of Rice Research, Hyderabad<br />
2 PA 6129 Bayer Bio-Science<br />
3 Sahyadri – 2 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />
4 Sahyadri –4 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />
5 Pusa RH -10 Indian Agricultural Research Institute, New Delhi<br />
6 Indirasona Indira Gandhi Krishi Vishwa Vidyalaya, Raipur<br />
7 GK 5003 Ganga Kaveri Seeds<br />
8 PSD-3 G. B. Pant University of Agriculture and Technology, Pantnagar<br />
9 Sahyadri – 3 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />
10 PA 6201 Bayer Bio-Science<br />
11 HSD-1(HKRH-1) Chaudhary Charan Singh Haryana Agricultural University, Karnal<br />
12 PA 6444 Bayer Bio-science<br />
13 Suruchi (MPH 5401) Mahyco seeds, Hyderabad<br />
14 JKRH- 2000 JK Agri. Genetics<br />
15 US - 312 US Agri Seeds<br />
16 CORH- 3 Tamil Nadu Agricultural University, Coimbatore<br />
17 KRH-2 University of Agricultural Sciences, Mandya<br />
18 Sahyadri -1 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />
19 PHB – 71 Pioneer Overseas Corporation<br />
20 CRHR - 5 Central Rice Research Institute, Cuttack<br />
21 CRHR - 7 Central Rice Research Institute, Cuttack<br />
Table 2: ANOVA for yield and quality characters in rice hybrids<br />
S. No. Character<br />
Mean sum of squares<br />
Replications Treatments Error<br />
(d.f. = 2) (d.f. = 20) (d.f. = 40)<br />
1 Days to 50 per cent flowering 3.09 253.45** 3.16<br />
2 Plant height (cm) 2.11 224.14** 30.56<br />
3 Panicle length (cm) 1.89 4.66** 0.61<br />
4 No. of productive tillers/plant 0.56 4.46** 1.46<br />
5 No. of filled grains/panicle 1.11 2146.95** 37.46<br />
6 No. chaffy grain/panicle 0.02 235.49** 3.85<br />
7 Grain yield/plant (g) 0.43 2.07* 1.02<br />
8 1000-grain weight (g) 0.13 15.24** 0.31<br />
9 Grain moisture (%) 0.01 1.25** 0.01<br />
10 Milling percentage (%) 0.01 3.01 26.25<br />
11 Head rice recovery (%) 13.21 43.62* 20.38<br />
12 Kernel Length (mm) 0.002 1.17** 0.014<br />
13 Kernel breath (mm) 0.002 0.016** 0.001<br />
14 L/B ratio 0.01 0.42** 0.006<br />
15 Volume expansion ratio 0.01 0.81** 0.01<br />
16 Water uptake (ml) 0.02 1506.78** 26.25<br />
17 Alkali spreading value 0.02 2.98** 0.016<br />
18 Amylose content (%) 0.1 8.20** 0.20<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 124<br />
ISSN 2250-3153<br />
19 Gel consistency (mm) 0.57 271.64** 4.17<br />
20 Protein content (%) 0.01 2.52** 1.05<br />
21 Iron (mg/100g) 0.42 16.02** 3.83<br />
22 Zinc (mg/100g) 0.017 0.57** 0.027<br />
* Significant at 5 per cent level<br />
** Significant at 1 per cent level<br />
Table 3: Estimates of variability, heritability, genetic advance and genetic advance as per cent of mean in rice hybrids<br />
S. No. Character<br />
Phenotypic<br />
variance<br />
Genotypic<br />
variance<br />
PCV<br />
(%)<br />
GCV<br />
(%)<br />
Heritability<br />
(h 2 ) (%)<br />
GA<br />
(5%)<br />
GA as per cent<br />
mean (5%)<br />
1. Days to 50 per cent flowering 86.59 83.43 9.62 9.44 96.3 18.47 19.10<br />
2. Plant height (cm) 95.09 64.53 10.02 8.26 67.9 13.63 14.01<br />
3. Panicle length (cm) 1.96 1.35 5.37 4.45 68.9 1.99 7.61<br />
4. No. of productive tillers/plant 2.46 1.00 16.91 10.77 40.6 1.31 14.14<br />
5. No. of filled grains/panicle 740.63 703.16 23.87 23.26 94.9 53.23 46.68<br />
6. No. chaffy grain/panicle 81.07 77.21 44.67 43.60 95.2 17.67 87.66<br />
7. Grain yield/plant (g) 1.37 0.35 5.10 2.58 25.5 0.62 2.68<br />
8. 1000-grain weight (g) 5.29 4.98 9.54 9.25 94.1 4.46 18.49<br />
9. Grain moisture (%) 0.42 0.41 5.59 5.52 97.5 1.31 11.23<br />
10. Milling percentage (%) 18.51 -7.74 5.98 3.87 -41.9 -3.71 -5.16<br />
11. Head rice recovery (%) 28.13 7.75 8.02 4.21 27.5 3.01 4.55<br />
12. Kernel Length (mm) 0.40 0.39 9.80 9.63 96.5 1.26 19.48<br />
13. Kernel breath (mm) 0.01 0.01 3.72 3.34 80.6 0.13 6.18<br />
14. L/B ratio 0.14 0.14 12.16 11.92 96.0 0.75 24.05<br />
15. Volume expansion ratio 0.28 0.27 11.41 11.19 96.2 1.04 22.61<br />
16. Water uptake (ml) 519.76 493.51 7.37 7.18 94.9 44.59 14.41<br />
17. Alkali spreading value 1.01 0.99 17.65 17.51 98.4 2.03 35.77<br />
18. Amylose content (%) 2.87 2.67 7.65 7.38 93.0 3.24 14.65<br />
19. Gel consistency (mm) 93.33 89.16 17.44 17.05 95.5 19.01 34.33<br />
20. Protein content (%) 1.55 0.49 15.63 8.80 31.7 0.81 10.21<br />
21. Iron (mg/100g) 7.89 4.06 41.10 29.49 51.5 2.98 43.59<br />
22. Zinc (mg/100g) 0.19 0.16 11.74 10.88 85.8 0.77 20.75<br />
REFERENCES<br />
[1] Burton, G.W. and Devane, E.H., ―Estimating heritability in tall fescue<br />
(Festuca arundinaceae) from replicated clonal material,‖ Agronomy<br />
Journal, 1952, 45: 478-481.<br />
[2] Chaudhary, P. K. and R. P. Singh., ―Genetic variability, correlation and path<br />
analysis of yield components of rice,‖ Madras Agricultural Journal, 1994,<br />
81(9):468-470.<br />
[3] Cichy, K.A., Forster, S., Kenneth, L., Grafton and Hosfield, G.L.,<br />
―Inheritance of seed zinc accumulation in Navy bean,‖ Crop Science, 2005,<br />
45: 864-870.<br />
[4] Gannamani, N., Study of heterosis and combining ability by utilizing<br />
cytoplasmic genetic male sterility and fertility restoration system in rice<br />
(Oryza sativa L.), 2001, M. Sc. (Ag.) Thesis, GAU, Raipur.<br />
[5] Ghosh, A. K., Nanda, B. B., Swami, S. G and Nayak, B. B., ―Influence of<br />
nitrogen on the physico-chemical characteristics of rice grain,‖ Oryza,<br />
1971, 891: 87-97.<br />
[6] Iftekharuddaula, K. M. M. S. Hassan, M. J. Islam, M. A. Badshah, M R<br />
Islam, and K. Akhter., ―Genetic evaluation and selection criteria of hybrids<br />
rice in irrigated ecosystem of Bangladesh,‖ Pakistan Journal of Biological<br />
Sciences, 2001, 4(7): 790-792.<br />
[7] Johnson, H.W., Robinson H.F and Comstock, R.E. Estimation of genetic<br />
and environmental variability in soybean. Agronomy Journal, 1955, 47:<br />
314-318.<br />
[8] Kumar., Krishnapal, R., Mandal, S. K., Ramashankar Prasad S. C., and Rai<br />
R., ―Genetic study of major characters in upland rice,‖ Environment and<br />
Ecology, 1994, 12(2): 363-365.<br />
[9] Lindsay, W.L and Norvell, W.A., ―Development of a DTPA soil test for<br />
zinc, manganese and copper,‖ Soil Science Society of American Journal.,<br />
1978, 42: 421-428.<br />
[10] Long, Jennifer, K., Marianne, Baniger and Osmith, M., ―Diallel analysis of<br />
iron and zinc density in Southern African adapted maize inbreds,‖ Crop<br />
Science, 2004, 44: 201-2026.<br />
[11] Lush, J.L., ―Intra-sire correlation and regression of offspring in rams as a<br />
method of estimating heritability of characters,‖ Proceedings of American<br />
Society of Animal Product, 1940, 33: 292-301.<br />
[12] Panse, V.G and Sukhatme, P.V., ―Genetics and quantitative characters in<br />
relation to plant breeding,‖ Indian Journal of Genetics, 1957, 17: 312-328.<br />
[13] Panse, V.G and Sukhatme, P.V., ―Statistical methods for agricultural<br />
workers,‖ 2nd Edition ICAR, New Delhi, 1961, pp: 361.<br />
[14] Panwar, Ashvani, R. P. S. R. K. Sharma, K. P. S. Arya, and A. Panwar.,<br />
―Genetic variability and inter-relationship in rice (Oryza sativa L.),‖<br />
Advances in Plant Sciences, 1997, 10(1): 29-32.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 125<br />
ISSN 2250-3153<br />
[15] Pathak, P. K. and K. K. Sharma., ―Variability and correlation among<br />
physical quality characters of Joha rice of Assam,‖ Journal of Agricultural<br />
Science Society North-East India, 1996, 9(1):18- 22.<br />
[16] Rather, A. G., G. N. Mir and F. A. Sheikh., ―Genetic parameters for some<br />
quantitative traits in rice,‖ Advances in Plant Sciences, 1998, 19(2):163-<br />
166.<br />
[17] Reddy, Belum, V. S., Ramesh, S and Longvah, T., ―Prospects of breeding<br />
for micronutrients and carotene dense sorghums,‖ ISMN, 2005, 46: 10-10.<br />
[18] Regina, A, N. R. Bai, R. Devika, and C. A. Joseph., ―Genetic variability and<br />
correlation in short duration rice cultivars,‖ Journal of Tropical Agriculture,<br />
1994, 32(2): 118-120.<br />
[19] Samadia, D. K., ―Genetic variability studies in Lasora (Cordia myxa<br />
Roxb.),‖ Indian Journal of Plant Genetic Resources, 2005, 18(3): 236-240.<br />
[20] Sao, A., ―Studies on combining ability and heterosis in F1 rice hybrids using<br />
cytoplasmic male sterile lines,‖ 2002, M. Sc. (Ag.) Thesis, IGAU, Raipur.<br />
[21] Sarawgi, A. K., N. K. Rastogi, and D. K. Soni., ―Studies on some quality<br />
parameters of indigenous rice in Madhya Pradesh,‖ Annuals of Agricultural<br />
Research, 2000, 21(2): 258-261.<br />
[22] Sarvanan, R. and N. Senthil., ―Genotypic and phenotypic variability,<br />
heritability and genetic advance in some important traits in rice, Madras<br />
Agricultural Journal, 1997, 84(5):276- 277.<br />
[23] Satya, A., G. Kandasamy, and J. Ramalingam., ―Heterosis in hybrid rice,‖<br />
Crop Research, 1999, 18(2) 243-246.<br />
[24] Shivani, D. and N. Sree Rama Reddy., ―Variability, heritability and genetic<br />
advance for morphological and physiological traits in certain rice hybrids,‖<br />
Oryza, 2000, 37(3):231-233.<br />
[25] Sreedhar, S., Vanisree, S., Kulakarni, N and Ganesh, M., ―Gene effects for<br />
certain physical quality traits and grain yield in rice,‖ Madras Agricultural<br />
Journal, 2005, 92(4-6):183-187.<br />
[26] Subbaiah, P. V., Sekhar, M. R., Reddy, K. H. P and Reddy, N.P.E.,<br />
―Variability and genetic parameters for grain yield and its components and<br />
kernel quality attributes in CMS based rice hybrids (Oryza sativa L.),‖<br />
International Journal of Applied Biology and Pharmaceutical Technology,<br />
2011, 2(3): 603-609.<br />
[27] Vanniarajan, C., P. Rangasamy, J. Ramalingam, N. Nadarajan, and<br />
Arumugampillai., ―Studies on genetic variability in hybrid rice derivatives‖<br />
Crop Research, 1996, 12(1):24-27.<br />
[28] Welch, Ross, M and Robin, D. Graham., ―Breeding crops for enhanced<br />
micronutrient content,‖ Plant and Soil, 2002, 245:205-21.<br />
AUTHORS<br />
First Author – V. Ravindra Babu, Principal Scientist, Plant<br />
Breeding, Crop Improvement Section, Directorate of Rice<br />
Research, Rajendranagar, Hyderabad, -500 030, Andhra Pradesh,<br />
India.<br />
Email id : rbvemuri1955@gmail.com<br />
Second Author – K. Shreya, M. Sc.(Ag.), Department of<br />
Genetics and Plant Breeding, College of Agriculture,<br />
Rajendranagar, Hyderabad -500 030, Andhra Pradesh, India.<br />
Email id : shreya834@gmail.com<br />
Third Author – Dr. Kuldeep Singh, Associate Professor,<br />
Department of Genetics and Plant Breeding, College of<br />
Agriculture,Rajendranagar,Hyderabad-500030, Andhra Pradesh,<br />
India.<br />
Email id : dangiks404@rediffmail.com<br />
Fourth Author – G.Usharani, Ph.D Scholar, Department of<br />
Genetics and Plant Breeding, College of Agriculture,<br />
Rajendranagar, Hyderabad -500 030, Andhra Pradesh, India.<br />
Email id : ushagenetics@gmail.com<br />
Fifth Author – Dr. P. Nagesh, Ph.D Research Associate, Grain<br />
Legume, Groundnut Breeding,ICRISAT, Patancheru, Hyderabad,<br />
AndhraPradesh,India.<br />
Email id : nageshpatne@gmail.com<br />
*Correspondence Author – Dr. V. Ravindra Babu Email:<br />
rbvemuri1955@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 126<br />
ISSN 2250-3153<br />
Thyristor Based Speed Control Techniques of DC Motor:<br />
A Comparative Analysis<br />
Rohit Gupta, Ruchika Lamba, Subhransu Padhee<br />
Department of Electrical and Instrumentation Engineering,<br />
Thapar University, Patiala, India<br />
rohit.udai@yahoo.in, ruchika.mehta@thapar.edu, subhransu_padhee@yahoo.com<br />
Abstract- The versatile control characteristics of DC motor<br />
have contributed in the extensive use of DC motor in the<br />
industry. With the increasing use of power semi conductor units,<br />
the speed control of DC motor is increasingly getting<br />
sophisticated and precise. Speed of the DC motor is controlled by<br />
controlling the armature voltage. Armature voltage is controlled<br />
using different single phase AC/DC converter. Half converter,<br />
semi converter, full converter and dual converter are some of the<br />
thyristor based circuits which are used for speed control of DC<br />
motor. This paper studies different speed control techniques of<br />
DC motor and makes a comparative study of different converter<br />
based speed controller techniques.<br />
Index Terms- AC/DC converter, DC motor, speed control.<br />
DC<br />
I. INTRODUCTION<br />
motors are widely used in industry because<br />
of its low cost, less complex control structure<br />
and wide range of speed and torque. There are many<br />
methods of speed control of DC drives namely field<br />
control, armature voltage control and armature<br />
resistance control methods [2]. DC motors provide<br />
high starting torque which is required for traction<br />
applications. In DC motor control over a large speed<br />
range, both below and above the rated speed can be<br />
achieved quite easily. DC motors have inherent<br />
disadvantages that it needs regular maintenance and it<br />
is bulky in size. DC motors are tailor made, so it is<br />
very difficult to replace them. In general, armature<br />
voltage control method is widely used to control the<br />
DC drives. In this method, a controlled rectifier, or<br />
chopper is used but due involvement of power<br />
electronics elements, nonlinear torque speed<br />
characteristics are observed which are undesirable for<br />
control performance [1].<br />
Nowadays state of art speed control techniques of<br />
DC motor are available. Thyristor based DC drives<br />
with analog and digital feedback control schemes are<br />
used. Phase locked loop control technique is also used<br />
for precise speed control and zero speed regulation. In<br />
past, many researchers presented various new<br />
converter topologies of DC motor control for different<br />
applications of industry [5,6,8,9], but at the basic level<br />
in all of them thyristor based AC-DC converter are<br />
used. MATLAB with its toolboxes like Simulink and<br />
SimPowerSystem are used for simulation [3,7].<br />
This paper provides a comparative study of<br />
different thyristor based speed control techniques.<br />
II. MATHEMATICAL MODELLING OF DC MOTOR<br />
The dynamic and steady-state model of separately<br />
excited DC motor is needed to analyse the torque<br />
speed characteristics. The schematic representation of<br />
the model of a separately excited DC motor is shown<br />
below in figure 1 in which ea is the terminal voltage<br />
applied to the motor, Ra and La are the resistance, and<br />
inductance of the armature circuit respectively, Rf and<br />
Lf are the resistance, and inductance of the field<br />
circuit respectively, eb is generated back emf and Tm is<br />
the electromagnetic torque developed by the motor.<br />
The related DC Motor parameters are mentioned in<br />
appendix A.<br />
Figure 1: Equivalent circuit of separately excited DC motor<br />
The torque is produced as a result of interaction of field flux with<br />
current in armature conductors and is given by Eq. (1)<br />
T K i<br />
(1)<br />
m t a<br />
Here is a constant depending on motor windings and<br />
geometry and is the flux per pole due to the field winding.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 127<br />
ISSN 2250-3153<br />
The direction of the torque produced depends on the direction of<br />
armature current. When armature rotates, the flux linking the<br />
armature winding will vary with time and therefore according to<br />
Faraday‘s law, an emf will be induced across the winding. This<br />
generated emf, known as the back emf, depends on speed of<br />
rotation as well as on the flux produced by the field and given by<br />
Eq. (2)<br />
e K<br />
(2)<br />
b t<br />
By applying KVL at input side of in figure 1,<br />
dia<br />
ea iaRa La eb<br />
(3)<br />
dt<br />
In steady state condition, Ea IaRa Eb<br />
(4)<br />
In terms of torque and speed, the steady state equation will be<br />
given by Eq. (5)<br />
Tm<br />
Ea Ra Kt<br />
Kt<br />
(5)<br />
Ea So, <br />
K <br />
Tm<br />
K <br />
Ra<br />
(6)<br />
t t<br />
2<br />
Thus from the above equation it is clear that speed can be<br />
controlled by varying there parameters, namely , , and .<br />
The three methods of speed control are as following:<br />
i. Armature voltage controlled ( ).<br />
ii. Armature resistance controlled ( ).<br />
iii. Flux controlled ( ).<br />
Speed control using armature resistance by adding external<br />
resistor is not used very widely because of the large energy<br />
losses due to the Rext. Armature voltage control is normally used<br />
for speed up to rated speed (base speed). Flux control is used for<br />
speed beyond rated speed but at the same time the maximum<br />
torque capability of the motor is reduced since for a given<br />
maximum armature current, the flux is less than the rated value<br />
and so as the maximum torque produced is less than the<br />
maximum rated torque [4]. Here the main attention is given to<br />
the armature voltage control method. In the armature voltage<br />
control method, the voltage applied across the armature ea is<br />
varied keeping field voltage constant. As equation (6) indicates,<br />
the torque-speed characteristic is represented by a straight line<br />
with a negative slope when the applied armature voltage is ideal,<br />
that ideal torque speed characteristic is illustrated in figure 2<br />
[10].<br />
Figure 2: Torque speed characteristics of the separately excited<br />
DC motor at different armature voltages<br />
III. THYRISTOR BASED TECHNIQUES OF DC MOTOR SPEED<br />
CONTROL<br />
A separately excited DC motor fed through single phase half<br />
wave converter is shown in figure 3. Single phase half wave<br />
converter feeding a DC motor offers only one quadrant drive.<br />
Such type of drives are used up to about 0.5 kW DC motor.<br />
Figure 3: Single phase half wave converter drive<br />
For single phase half wave converter, average output voltage<br />
of converter can be calculated as, given as Eq. (7)<br />
Vm<br />
V0 1 cos<br />
, for 0 <br />
(7)<br />
2<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 128<br />
ISSN 2250-3153<br />
A half wave converter in the field circuit will increase the<br />
magnetic losses of the motor due to high ripple content on the<br />
field excitation current, so an ideal DC source is preferred over<br />
half wave converter for field circuit. A separately excited DC<br />
motor fed through single phase semiconverter is shown in figure<br />
4. This converter also offer only one quadrant drive and is used<br />
up to 15 kW DC drives.<br />
Figure 4: Single phase semi converter drive<br />
With a single phase semiconverter in the armature circuit,<br />
equation (8) gives the average armature voltage as,<br />
Vm<br />
V0Vt1 cos<br />
, for 0 (8)<br />
<br />
The armature voltage is varied by single phase full wave<br />
converter as shown in figure 5. It is a two quadrant drive, and is<br />
limited to applications upto 15kW. The armature converter gives<br />
+Vo or –Vo and allows operation in the first and fourth quadrant.<br />
The converter in the field circuit could be semi, full or even dual<br />
converter. The reversal of the armature or field voltage allows<br />
operation in the second and third quadrant.<br />
Figure 5: Single phase full converter drive<br />
The average armature voltage in armature circuit for single phase<br />
full converter drive is given by Eq. (9)<br />
2Vm<br />
V0Vt 1 cos<br />
, for 0 (9)<br />
<br />
To realize single phase dual converter, two single phase full<br />
converters are connected as shown in figure 6.<br />
Figure 6: Single phase dual converter drive<br />
In fig. 6, there are two single phase full wave converters either<br />
converter 1 operates to supply a positive armature voltage Vo, or<br />
converter 2 operates to supply negative armature voltage –Vo.<br />
Converter 1 provides operation in first and fourth quardants, and<br />
converter 2 provides operation in second and third quardants.It is<br />
four quardant drive and provides four modes of operation:<br />
forward powering, forward braking (regenration), reverse<br />
powering, and reverse breaking (regeneration). The field<br />
converter could be a full wave converter, a semiconverter, or a<br />
dual converter.<br />
If converter 1 operates at a firing angle of α1 then equation (10)<br />
gives the armature voltage as,<br />
Vm<br />
V V 1 cos<br />
, for 0 (10)<br />
<br />
0 t<br />
1<br />
<br />
And similarly, if converter 2 operates at a firing angle of α2 then<br />
equation (11) gives the armature voltage as, [11].<br />
Vm<br />
V V 1 cos<br />
(11)<br />
<br />
0 t<br />
2<br />
<br />
IV. SIMULATION<br />
To investigate the effect of armature voltage on the<br />
torque speed curve six different firing angles are used<br />
with the voltage applied to the field circuit kept<br />
constant 300V. A constant 240 V, 50 Hz AC supply is<br />
applied to the input of single phase half wave<br />
converter. The average value of converter output is<br />
controlled by changing the firing angle .<br />
A cosine firing angle scheme is used to change the<br />
firing angle. The firing angles used to get different<br />
output voltages for armature are 0°, 18°, 36°, 54°, 72°<br />
and 89°.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 129<br />
ISSN 2250-3153<br />
The simulink model used to get torque speed<br />
characteristic for a single phase half wave converter is<br />
shown in figure7.<br />
Figure 7: Simulink realization of armature voltage speed control<br />
method using a single phase half wave converter drive<br />
The torque speed curves for a single phase half<br />
wave converter drive are shown in figure 8.<br />
Figure 8: Torque-speed characteristics for a single phase half<br />
wave converter drive<br />
It is clear that torque speed contains both linear and non linear<br />
regions. The linear region of operation for 0° firing angle<br />
approximately starts at 100 N.m load torque, but for 18° firing<br />
angle linear region starts at 105N.m load torque, while for 36°<br />
firing angle linear region starts at approximately at 110 N.m and<br />
so on. The discontinuous armature current results in a highly<br />
non-linear torque speed characteristic. Figure 9 and 10 shows the<br />
armature voltage and current obtained at 50 N.m (in the nonlinear<br />
region) and 135 N.m (in linear region) with firing angle<br />
89°. These figures clearly show the discontinuous and continuous<br />
operation of single phase half wave converter drive in non linear<br />
and linear regions, respectively.<br />
Figure 9: Armature current and voltage at 50N.m with firing<br />
angle 89° for single phase half wave converter drive<br />
Figure 10: Armature current and voltage at 135N.m with firing<br />
angle 89° for single phase half wave converter drive<br />
To investigate the effect of armature voltage on the torque speed<br />
characteristic, six different firing angles are applied to the firing<br />
angle generator while the voltage applied to the field circuit is<br />
kept constant 300V. A constant 240V, 50Hz AC is applied to the<br />
input of single phase semi converter. The average value of the<br />
converter output is controlled by the firing angle (α). The firing<br />
angles used to get different output voltages for armature are 0°,<br />
18°, 36°, 54°, 72° and 89°. The simulink model used to get<br />
torque speed characteristic for a single phase half wave converter<br />
is shown in figure11.<br />
Fig<br />
ure 11: Simulink realization of armature voltage speed<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 130<br />
ISSN 2250-3153<br />
control method using a single phase semiconverter<br />
drive<br />
Figure 12: Torque-speed characteristics for a single phase<br />
semiconverter drive<br />
The fig 12, showing the torque speed<br />
cherecteristics, the non linear and linear operating<br />
regions are clearly visible for different firing angles.<br />
The linear operating range for single phase semi<br />
converter drive decrease as firing angle increases. For<br />
firing angle 0°, it is 60 to 180 N.m, for 18° it is 65 to<br />
180 N.m, for 36° it is 80 to 180 N.m and for 89° it is<br />
100 to 180 N.m. The non linearity in the speed torque<br />
characteristic is due to the discontinuity in armature<br />
current. Figure 13 and 14 shows the armature voltage<br />
and current obtained at 50 N.m (in the non-linear<br />
region) and 135 N.m (in linear region) with firing<br />
angle 0°. These figures show the discontinuous and<br />
continuous operation of single phase semiconverter<br />
drive in non linear and linear regions, respectively.<br />
Figure 13: Armature current and voltage at 50N.m with firing<br />
angle 0° for single phase semiconverter drive<br />
Figure 14: Armature current and voltage at 135N.m with firing<br />
angle 0° for single phase semiconverter drive<br />
The simulink model used to get torque speed characteristic for a<br />
single phase full converter drive is shown in figure15. The effect<br />
of armature voltages on the torque speed characteristic is<br />
observed for six different firing angles, as the voltage applied to<br />
the field circuit is kept constant at 300V, and a constant 240V, 50<br />
Hz AC is applied to input of single phase full converter. The<br />
average value of applied armature voltage is varied by varying<br />
the firing angle of full converter.<br />
Figure 15: Simulink realization of armature voltage speed control<br />
method using a single phase full converter drive<br />
Figure 16 shows the torque speed characteristics of single phase<br />
full converter drive with firing angles 0°, 18°, 36°, 54°, 72°, and<br />
89°.<br />
Figure 16: Torque-speed characteristics for a single phase full<br />
converter drive<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 131<br />
ISSN 2250-3153<br />
Linear and non linear regions for single phase full<br />
converter drive are clearly visible in the above shown<br />
torque speed curve. Non linearity is because of the<br />
discontinuity in the armature current, and also it is<br />
observed that the range of non linearity increases as<br />
firing angle is increased. For firing angle 0°, non<br />
linearity range of load torque 0 to 85 N.m, for 18° it is<br />
0 to 100 N.m, for 36°, it is 0 to 110 N.m,, for 54° it is<br />
0 to 54 N.m and for 89° it is 0 to 120 N.m. The<br />
armature voltage and current waveforms for single<br />
phase full converter drives are shown in figure 17 and<br />
18. These were obtained at 50 N.m (in the non-linear<br />
region) and 135 N.m (in linear region) with firing<br />
angle 89°. These figures show the discontinuous and<br />
continuous operation of single phase full converter<br />
drive in non linear and linear regions, respectively.<br />
Figure 17: Armature current and voltage at 50N.m with firing<br />
angle 89° for single phase full converter drive<br />
Figure 18: Armature current and voltage at 135N.m with firing<br />
angle 89° for single phase full converter drive<br />
It is clearly seen that for all firing angle, the linear region of<br />
operation extends when single phase semi converter is used. The<br />
linear operating ranges of load torque for different converter<br />
drives with respect to firing angles are tabulated in table 1.<br />
Table I: Linear operating range of Load torque for different<br />
converter drives and firing angles<br />
Drive type<br />
Firing angle<br />
Half wave<br />
Drive<br />
Load Torque(N.m)<br />
Semiconverter<br />
Drive<br />
Full wave<br />
converter<br />
Drive<br />
0 100 to 180 60 to 180 85 to 180<br />
18 105 to 180 65 to 180 100 to 180<br />
36 110 to 180 80 to 180 110 to 180<br />
54 115 to 180 100 to 180 115 to 180<br />
72 120 to 180 80 to 180 120 to 180<br />
89 130 to 180 100 to 180 120 to 180<br />
V. CONCLUSION<br />
This paper presents speed control of separately<br />
excited DC motor using different single phase AC/DC<br />
converter. Speed torque curves for three types of<br />
single phase AC/DC converter (Half wave converter,<br />
Semiconverter ans full converetr) are obtained for a<br />
wide-range of loading conditions. From the above<br />
results, it can be concluded that the reason of non<br />
linearity in speed torque curve is discontinuity in<br />
armature current which is highly non-desirable for<br />
industrial applications. To remove the discontinuity in<br />
armature current an inductor should be used in series<br />
to make the armature current continuous. It is also<br />
observed that the range of non linearity is small in<br />
semiconverter as compared to half wave and full<br />
converter drives, so semi converter drives can be<br />
preferred for the wide range of load torque.<br />
APPENDIX A<br />
The parameters of separately excited DC motor<br />
Rated Power (P) 5 Hp<br />
Rated Armature Voltage 240 V<br />
Armature Resistance R a 2.518 Ω<br />
Armature Inductance L a 0.028 H<br />
Field Resistance f R 281.3 Ω<br />
Field Inductance f<br />
L 156 H<br />
Rated Speed 1750 RPM<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 132<br />
ISSN 2250-3153<br />
Rated Field Voltage 300 V<br />
REFERENCES<br />
[1] D. A. staton, M. I. McGilp and T. J. E. Miller, ―DC machine teaching<br />
experiment,‖ in proceedings of the European Power Electronics Association<br />
EPE, Brighton, pp. 35 – 40, 1993<br />
[2] S. J. Chapman, Electric Machinery Fundamentals, New York:<br />
WCB/McGraw-Hill,1998.<br />
[3] W. M. Daniels and A. R. Shaffer, ―Re-inventing the electrical machines<br />
curriculum,‖ IEEE Transactions on Education, vol. 41, pp. 92-100, May<br />
1998.<br />
[4] N. Mohan, Electric Drives: An integrative approach, University of<br />
Minnesota <strong>Print</strong>ing services, 2000.<br />
[5] M. Nedeljkovic and Z. Stojiljkovic, ―Fast current control for thyristor<br />
rectifiers,‖ IEE Proceedings- Electr. Power Appl., Vol. 150, No. 6, pp. 636-<br />
638, Nov. 2003.<br />
[6] Alfio Consoli, Mario Cacciato, Antonio Testa and Francesco Gennaro,<br />
―Single Chip Integration for Motor Drive Converters With Power Factor<br />
Capability,‖ IEEE Transactions on Power Electronics, Vol. 19, No. 6, pp.<br />
1372-1379, Nov. 2004.<br />
[7] S. Li and R. Challo, ―Restructuring an electric machinery course with an<br />
integrative approach and computer-assisted teaching methodology,‖ IEEE<br />
Transactions on Education., vol. 49,pp. 16-28, Feb.2006.<br />
[8] Manoj Daigavane, Hiralal Suryawanshi and Jawed Khan, ―A Novel Three<br />
Phase Series-Parallel Resonant Converter Fed DC-Drive System,‖ Journal<br />
of Power Electronics, Vol. 7, No. 3, pp. 222-232, July 2007.<br />
[9] Wai Phyo Anug, ―Analysis on Modeling and Simulink of DC Motor and its<br />
Driving System Used for Wheeled Mobile Robot,‖ World Academy of<br />
Science, Engineering and Technology 32, pp. 299-306, 2007.<br />
[10] A. Gelen and S. Ayasun, ―Effects of PWM chopper drive on the torquespeed<br />
characteristic of DC motor‖ 43rd International Universities Power<br />
Engineering Conference, 2008.<br />
[11] P. S. Bhimbhra, Power Electronic, Khanna publishers, 2010.<br />
AUTHORS<br />
First Author – Rohit Gupta, M.E.(Instrumentation & control),<br />
Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID: rohit.udai@yahoo.co.in<br />
Second Author – Ruchika Lamba, M.E.(Instrumentation<br />
Engineering), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID: ruchika.mehta@thapar.edu<br />
Third Author – Subhransu Padhee, M.E.(Instrumentation &<br />
control), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID:- subhransu_padhee@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 133<br />
ISSN 2250-3153<br />
Automatic Face Detection Using Color Based<br />
Segmentation<br />
Yogesh Tayal, Ruchika Lamba, Subhransu Padhee<br />
Department of Electrical and Instrumentation Engineering<br />
Thapar University, Patiala-147004, Punjab, India<br />
yogesh.tayal87@gmail.com, ruchika.mehta@thapar.edu, subhransu_padhee@yahoo.com<br />
Abstract- Because of the increasing instances of identity theft<br />
and terrorism incidences in past few years, biometrics based<br />
security system has been an area of quality research. Modern day<br />
biometrics is a cutting edge technology which enables the<br />
automated system to distinguish between a genuine person and<br />
an imposter. Automated face recognition is one of the areas of<br />
biometrics which is widely used because of the uniqueness of<br />
one human face to other human face. Automated face recognition<br />
has basically two parts one is face detection and other one is<br />
recognition of detected faces. To detect a face from an online<br />
surveillance system or an offline image, the main component that<br />
should be detected is the skin areas. This paper proposes a skin<br />
based segmentation algorithm for face detection in color images<br />
with detection of multiple faces and skin regions. Skin color has<br />
proven to be a useful and robust cue for face detection,<br />
localization and tracking.<br />
Index Terms- Color space model, Face Detection, HSV<br />
Component, Morphology operation, Skin detection<br />
D<br />
I. INTRODUCTION<br />
ifferent aspects of human physiology are used to<br />
authenticate a person‘s identity. The science of ascertaining<br />
the identity with respect to different characteristics trait of human<br />
being is called biometrics. The characteristics trait can be broadly<br />
classified in to two categories i.e. physiological and behavioral.<br />
Measurement of physical features for personal identification is an<br />
age old practice which dates back to the Egyptians era. But it was<br />
not until 19 th century that the study of biometrics was extensively<br />
used for personal identification and security related issues. With<br />
the advancement in technology, biometric authentication has<br />
been widely used for access management, law enforcement,<br />
security system. A person can be identified on the basis of<br />
different physiological and behavioral traits like fingerprints,<br />
faces, iris, hand geometry, gait, ear pattern, voice recognition,<br />
keystroke pattern and thermal signature.<br />
This paper presents an improved color based segmentation<br />
technique to segment the skin regions in a group picture and use<br />
of skin based segmentation in face detection. Skin based<br />
segmentation has several advantages over other face detection<br />
techniques like this method is almost invariant against the<br />
changes of size of face, orientation of face. The primary aim of<br />
skin based segmentation is to detect the pixels representing the<br />
skin regions and non skin regions. After detection of pixels<br />
which represents the skin region, the next task is to classify the<br />
pixels which represent the faces and non faces.<br />
II. FACE DETECTION SYSTEM<br />
Face detection is an interdisciplinary field which integrates<br />
different techniques such as (i) image processing, (ii) pattern<br />
recognition, (iii) computer vision, (iv) computer graphics, (v)<br />
physiology, and (vi) evaluation approaches. In general, the<br />
computerized face recognition/face detection includes four steps.<br />
(i) Face image is acquired, enhanced and segmented. (ii) face<br />
boundary and facial features are detected. (iii) the extracted facial<br />
features are matched against the features stored in the database.<br />
(iv) the classification of the face image into one or more persons<br />
is achieved.<br />
Figure 1 shows the basic block diagram of face recognition<br />
system. The first step of face recognition is to acquire an image<br />
either online or offline. After acquisition of image, preprocessing<br />
operation is carried out. The unique features of the image are<br />
extracted with the help of different image processing algorithm.<br />
After the features are extracted, it is matched with the feature<br />
database and the final result is obtained.<br />
Stored template<br />
Input Image<br />
Pre-processing<br />
Feature<br />
Extraction<br />
Template<br />
Generator<br />
Post-processing<br />
Match<br />
?<br />
Output Image<br />
Figure 1: Block diagram of face detection/face recognition<br />
system<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 134<br />
ISSN 2250-3153<br />
There are different approaches for face detection system.<br />
Mainly these are divided in to four parts i.e. (i) knowledge based<br />
(ii) feature based (iii) image or appearance based (iv) template<br />
based which is shown in figure 2.<br />
Knowledge Based<br />
Multi-resolution<br />
rule based<br />
method<br />
Feature Based<br />
Mixture of<br />
Gaussian<br />
Face Detection<br />
SGLD<br />
Shape<br />
Template<br />
Template<br />
Matching<br />
ASM<br />
Eigen-face<br />
Based<br />
Figure 2: Types of face detection system<br />
III. RELATED WORK<br />
Appearance<br />
Based method<br />
SVM<br />
Based<br />
HMM<br />
Based<br />
Sung and Poggio [1] proposed and successfully implemented<br />
Gaussian clusters to model the distribution of facial and non face<br />
patterns. Rowley et.al [2] used artificial neural network for face<br />
detection. Yang et.al [3] classified face detection methods in four<br />
categories. (i) Knowledge based (ii) feature invariant (iii)<br />
template matching (iv) appearance based. Lu et.al [5] used<br />
parallel neural network for face recognition. Zhao et.al [6]<br />
proposed Linear Discriminant Analysis (LDA) for face<br />
recognition.<br />
Face Databases<br />
There are different standard face databases available in internet.<br />
This section shows some of the standard face databases.<br />
Yale Database [7]: It consists of a set of standard 165 black and<br />
white images of 15 different people (11 Images per Person) taken<br />
from Yale university standard database for use in facial<br />
algorithm. All the images are properly aligned and taken in same<br />
and good lighting and background conditions. Resolution of each<br />
image is taken as 320x243 pixels. Figure 3 shows some of the<br />
faces of Yale database.<br />
Figure 3: Faces of Yale Database<br />
Extended Yale Database [8]: It contains 16128 images of 28<br />
human subjects under 9 poses and 64 illumination conditions.<br />
FERET Database, USA [9]: The database contains 1564 sets of<br />
images for a total of 14,126 images that includes 1199<br />
individuals. All the images are of size 290x240. This database<br />
was cropped automatically and segregated into sets of 250<br />
female and 250 male faces. Figure 4 shows some of the images<br />
of the FERET database.<br />
Figure 4: Faces of FERET database<br />
IV. SKIN BASED SEGMENTATION AND FACE<br />
DETECTION<br />
Color model is to specify the colors in some standard. Some of<br />
the color models used is RGB color model for color monitors,<br />
CMY and CMYK model for color printing.<br />
HSV color model is the cylindrical representation of RGB color<br />
model. HSV stands for hue, saturation and value. In each<br />
cylinder, the angle around the central vertical axis corresponds to<br />
"hue" or it form the basic pure color of the image, the distance<br />
from the axis corresponds to "saturation" or when white color<br />
and black color is mixed with pure color it forms the two<br />
different form "tint" and "shade" respectively, and the distance<br />
along the axis corresponds to "lightness", "value" or "brightness"<br />
or it provides an achromatic notion of the intensity of the color or<br />
brightness of the color.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 135<br />
ISSN 2250-3153<br />
Figure 5: HSV color space<br />
In situations where color description plays an integral role, the<br />
HSV color model is often preferred over the RGB model. The<br />
HSV model describes colors similarly to how the human eye<br />
tends to perceive color. RGB defines color in terms of a<br />
combination of primary colors, where as, HSV describes color<br />
using more familiar comparisons such as color, vibrancy and<br />
brightness. The color camera, on the robot, uses the RGB model<br />
to determine color. Once the camera has read these values, they<br />
are converted to HSV values. The HSV values are then used in<br />
the code to determine the location of a specific object/color for<br />
which the robot is searching. The pixels are individually<br />
checked to determine if they match a predetermined color<br />
threshold.<br />
(a)<br />
(b)<br />
Hue Component<br />
(c)<br />
Figure 6 (a) (b) (c): RGB image, HSV image and H component<br />
of image<br />
HSV color space can be defined as<br />
1<br />
2 R G R B<br />
1<br />
<br />
<br />
<br />
H cos <br />
2<br />
R G R B G B<br />
<br />
<br />
(1)<br />
R G B<br />
min , ,<br />
S 13 R G B<br />
1<br />
V R G B<br />
3<br />
(2)<br />
(3)<br />
V. THE PROPOSED ALGORITHM<br />
Color is a prominent feature of human faces. Using skin color<br />
as a primitive feature for detecting face regions has several<br />
advantages. In particular, processing color is much faster than<br />
processing other facial features.<br />
Furthermore, color information is invariant to face orientations.<br />
However, even under a fixed ambient lighting, people have<br />
different skin color appearance. In order to effectively exploit<br />
skin color for face detection, a feature space has to be found, in<br />
which human skin colors cluster tightly together and reside<br />
remotely to background colors.<br />
Skin and Non- skin regions for different color spaces<br />
The first step of face detection is to segment the color image<br />
into skin and non skin region. Different color space has different<br />
ranges of pixels which represents skin region and non skin<br />
region.<br />
Skin region in B color space lies in the following range<br />
0.79G 67 B 0.78G 42<br />
Non skin region in B color space lies in the following range<br />
0.836G 14 B 0.836G 44<br />
Non skin region in H color space lies in the following range<br />
19 H 240<br />
Skin region in Cb color space lies in the following range<br />
102 Cb 128<br />
From the above ranges the skin and non skin segmentation is<br />
performed. So now the output image only shows the skin regions<br />
and non skin regions are blackened. After segmentation,<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 136<br />
ISSN 2250-3153<br />
morphological operators are implemented with a structuring<br />
element. After application of morphological operators, the<br />
standard deviation of the area is calculated and rectangles are<br />
drawn in the skin regions. If any unwanted rectangles are created,<br />
it is then removed. The complete flow chart of face detection is<br />
shown in figure 7.<br />
Start<br />
Read RGB image<br />
Convert RGB Image<br />
into HSV component<br />
Find the "Hue"<br />
component<br />
Calculate histogram<br />
of "Hue" component<br />
Set the threshold<br />
values from the<br />
histogram<br />
Threshold<br />
Check<br />
Yes<br />
Skin region<br />
Convert resultant<br />
image into binary<br />
image<br />
Apply morphological<br />
processing with<br />
structuring element<br />
Calculate centroid of<br />
binary image<br />
Calculate standard<br />
deviation<br />
Check<br />
Standard<br />
Deviation<br />
Yes<br />
Retain that faces<br />
Draw the rectangle<br />
on retain faces<br />
End<br />
No<br />
No Non-skin region<br />
Reject that portion<br />
Figure 7: Flow chart of Face Detection<br />
VI. CONCLUSION<br />
The automatic face detection algorithm is applied on a<br />
wide variety of images taken under different lighting conditions<br />
and with different backgrounds. The images also have areas<br />
containing skin from other parts of the body such as hands, necks<br />
and areas with color very similar to that of skin. These areas get<br />
classified as skin.<br />
For a 380×270 size of image, the total time taken by the<br />
algorithm was 2.30 seconds. The histogram is formed using a<br />
training set of over 4,90,000 pixels drawn from various sources<br />
on the internet. The training set contained skin pixels of people<br />
belonging to different races.<br />
The various stages in the algorithm are<br />
explained using the boy image (Fig. 10). First of all<br />
the algorithm classifies skin pixels and non-skin<br />
pixels using H components of the HSV color space.<br />
Figure 10(c) classifies between the skin pixels and<br />
non skin pixels. Fig. 10(d) shows the image after<br />
applying morphological operators. The remaining part<br />
of the algorithm uses the skin detected image and the<br />
hue image, finds the skin regions and checks the<br />
percentage of skin in that region. For regions<br />
classified as faces, it uses the height and width of the<br />
region to draw a rectangular box with the region‘s<br />
centroid as its centre. The final result of the algorithm<br />
is shown in Fig. 10(e). It is to be noted that the face<br />
has been correctly located and almost at the right<br />
scale.<br />
(8.1)<br />
(8.2)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 137<br />
ISSN 2250-3153<br />
(8.3)<br />
(8.4)<br />
(8.5)<br />
(8.6)<br />
(8.7)<br />
(8.8)<br />
Figure 8: Result of face detection algorithm in different image<br />
(a)<br />
(b)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 138<br />
ISSN 2250-3153<br />
(c)<br />
(d)<br />
Figure 9 (a) (b) (c) (d): RGB image, Skin detected image<br />
Figure 9(a) shows the RGB image and figure 9(b) shows the<br />
skin region using color based segmentation. Figure 9(c) shows<br />
the RGB image and figure 9 (d) shows the skin region using<br />
color based segmentation.<br />
(a) (b)<br />
(c) (d)<br />
(e)<br />
Figure 10 (a) (b) (c) (d) (e): A test image with boy sitting, H<br />
Component image, Skin detected image, image after<br />
morphology, result of the proposed algorithm<br />
(a) (b) (c)<br />
(d) (e) (f)<br />
Figure 11 (a) (b) (c) (d) (e) (f): Different training faces for skin<br />
color of same size<br />
To evaluate the performance of the proposed algorithm,<br />
following parameters are taken in to consideration. The<br />
parameters under consideration are number of faces, detected<br />
faces, number of repeat faces, false positive, and time to execute<br />
the algorithm and accuracy of face detection.<br />
Table 1: Performance evaluation of proposed algorithm<br />
Figure 8.1<br />
Figure 8.2<br />
Number of faces 14<br />
Detected faces 14<br />
Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
0<br />
Time to execute 1.684<br />
sec.<br />
Accuracy 100%<br />
Number of faces 8<br />
Detected faces 8<br />
Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
2<br />
Time to execute 1.760<br />
sec.<br />
Accuracy 75%<br />
Number of faces 7<br />
Detected faces 7<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 139<br />
ISSN 2250-3153<br />
Example 8.3 Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
2<br />
Time to execute 1.559<br />
sec.<br />
Accuracy 71.5%<br />
Number of faces 3<br />
Detected faces 3<br />
Example 8.4 Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
0<br />
Time to execute 1.560<br />
sec.<br />
Accuracy 100%<br />
Number of faces 10<br />
Detected faces 9<br />
Example 8.5 Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
3<br />
Time to execute 1.671<br />
sec.<br />
Accuracy 70%<br />
Number of faces 6<br />
Detected faces 6<br />
Example 8.6 Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
5<br />
Time to execute 2.526<br />
sec.<br />
Accuracy 60%<br />
Number of faces 4<br />
Detected faces 4<br />
Example 8.7 Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
7<br />
Time to execute 1.868<br />
sec.<br />
Accuracy 42%<br />
Number of faces 34<br />
Detected faces 32<br />
Example 8.8 Number of repeat<br />
faces<br />
0<br />
False positive<br />
(Wrong detections)<br />
10<br />
Time to execute 2.518<br />
sec.<br />
Accuracy 70.5%<br />
Table 1 shows the performance evaluation of the proposed<br />
algorithm and the overall accuracy of the algorithm is found out<br />
to be 73.68%<br />
VII. CONCLUSION<br />
In this research paper, the authors propose color<br />
segmentation based automatic face detection algorithm. Though<br />
there are some cases of false positives, the overall performance<br />
of the proposed algorithm is quite satisfactory. The training<br />
images on which the algorithm is tested are natural images taken<br />
under uncontrolled conditions. The efficiency of the face<br />
detection was found to be 73.68%.<br />
REFERENCES<br />
[1] K K Sung, and T Poggio, ―Example-based learning for view-based human<br />
face detection,‖ IEEE Transactions on Pattern Analysis and Machine<br />
Intelligence, vol. 20, no. 1, pp. 39–51, Jan. 1998<br />
[2] H Rowley, S Baluja, and T Kanade, ―Neural network-based face detection,‖<br />
IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20,<br />
no. 1, pp. 23–38, Jan. 1998.<br />
[3] M H Yang, D J Kriegman, , and N Ahuja, ―Detecting faces in images: a<br />
survey,‖ IEEE Transactions on Pattern Analysis and Machine Intelligence,<br />
vol. 24, no. 1, pp. 34–58, Jan. 2002<br />
[4] W Zhao, R Chellappa, P J Phillips, A Rosenfeld, ―Face recognition: A<br />
literature survey,‖ ACM computing surveys, vol. 35, no. 4, pp. 399 – 458,<br />
Dec 2003<br />
[5] J Lu, X. Yuan, and T. Yahagi, ―A method of face recognition based on<br />
fuzzy c-means clustering and associated sub-NNs,‖ IEEE Transactions on<br />
Neural Networks, vol. 18, no. 1, pp. 150–160, Jan. 2007.<br />
[6] H Zhao and P C Yuen, ―Incremental linear discriminant analysis for face<br />
recognition,‖ IEEE Transactions on System Man and Cybernetics B, vol.<br />
38, no. 1, pp. 210–221, Feb. 2008.<br />
[7] http://face-rec.org/databases<br />
[8] http://vision.ucsd.edu/~leekc/ExtYaleDatabase/<br />
[9] http://face.nist.gov/colorferet<br />
AUTHORS<br />
First Author – Yogesh Tayal, M.E. (Instrumentation &<br />
Control), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID- yogesh.tayal87@gmail.com<br />
Second Author – Ruchika Lamba, M.E. (Instrumentation &<br />
Control), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID- Ruchika.mehta@thapar.edu<br />
Third Author – Subhransu Padhee, M.E. (Instrumentation &<br />
Control), Thapar University, Patiala Punjab, India-147004<br />
E-mail ID- subhransu_padhee@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 140<br />
ISSN 2250-3153<br />
DESIGN AND EVALUATION OF CHITOSAN<br />
CONTAINING MUCOADHESIVE BUCCAL PATCH<br />
OF FLUXOTINE HCL<br />
NARESH KSHIRASAGAR*, NARESH THAMADA, V.N.BALAJI KUMAR NAIK, M.SUSHMA GOPAL<br />
SREE DATTHA INSTITUTE OF PHARMACY, SHERIGUDA, IBRAHMIPATNUM, HYDERABAD<br />
Abstract- The main objective of present study was to design<br />
and evaluate the Muco adhesive buccal patch. The buccal region<br />
is an attractive route of administration for systemic drug delivery.<br />
To provide prolonged desire state concentration of Fluxotine<br />
Hydrochloride with minimal fluctuation and improved<br />
bioavailability, a mucoadhesive buccal patch is designed in the<br />
present study that Fluxotine hydrochloride is an antidepressant<br />
with selective serotonin reuptake inhibitor, its oral bioavailability<br />
is 80% because of first pass metabolism.<br />
In this study Mucoadhesive buccal patches were prepared<br />
with chitosan dissolved in glacial acetic acid and glycerol as<br />
plasticizer. Mucoadhessive patch containing 20mg of Fluxotine<br />
Hcl were evaluated with respect to their invitro drug permeation<br />
through goat buccal mucosa in 3 hr by using Franz diffusion cell,<br />
weight variation, uniformity of film, Area of the film,<br />
determination of % yield of buccal patch, percentage moisture<br />
loss, Mucoadhesive strength, folding endurance, drug content<br />
uniformity, swelling behaviour and surface pH were obtained.<br />
The physicochemical interaction between drug and polymer were<br />
investigated by FTIR spectroscopy revealed that there is no<br />
interaction.<br />
Then the formula could be promising for the fabrication of<br />
buccal patches.<br />
Index Terms- Fluxotine Hcl, buccal patches, invitro release,<br />
evaluation<br />
R<br />
I. INTRODUCTION<br />
ecent years have seen an increasing interest in the<br />
development of novel mucoadhesive buccal dosage forms.<br />
These are useful for the systemic delivery of drug as well as for<br />
local targeting of drug to a particular region of the body. Buccal<br />
delivery for the transmucosal absorption of the drug into the<br />
systemic circulation offers number of advantages for those drugs<br />
that suffer from first pass metabolism in the liver, poor oral<br />
bioavailability. Conceivably buccal delivery systems provide<br />
easy administration, thereby increasing patient<br />
compliance.[1],[2]. FLUXOTINE HCL is an SSRI (selective<br />
serotonin reuptake inhibitor) used mainly as an antidepressant to<br />
treat major depression, bipolar disorder, obsessive compulsive<br />
disorder, bulimia nervosa, panic disorder and premenstrual<br />
dysphoric disorder. Fluxotine hydrochloride was selected as the<br />
model drug for the investigation because it has got certain<br />
characteristics that a drug should possess to get absorbed through<br />
buccal route viz., biphasic solubility and low molecular weight<br />
(309.33 g/mol). Moreover it undergoes first-pass metabolism, so<br />
its bioavailability may be improved when delivered through<br />
buccal route.[3]<br />
The main aim was to prepare mucoadhesive buccal patches by<br />
using different concentration of mucoadhesive polymer to drug<br />
ratio in order to obtain desired concentration of the drug when<br />
compared to conventional dosage forms. As the bioavailability of<br />
conventional dosage form is less than 80%<br />
II. MATERIALS AND METHODS<br />
Materials<br />
FLUXOTINE HCL was obtained as a gift sample from<br />
NATCO PHARMA LTD. Hyderabad. Chitosan was provided<br />
from Hi Media Laboratories Pvt. Ltd Mumbai.PVP K-30,<br />
glycerol, glacial acetic acid were obtained from S.D. Fine<br />
Chemicals, India. All other reagent and chemicals were of<br />
analytical grade.<br />
Methods<br />
SOLVENT CASTING METHOD: Preparation of<br />
mucoadhesive buccal patches:<br />
1%,2%(m/V) of chitosan was dissolved in 10 mL 1.5% (V/V)<br />
acetic acid under occasional stirring for 12 hr. The resulting<br />
viscous chitosan solution was filtered through nylon gauze to<br />
remove debris and suspended particles. To improve patch<br />
performance and release characteristics, a water-soluble<br />
hydrophilic additive, PVP K-30, was added in different<br />
concentrations. The drug and PVP K-30 were added into the<br />
chitosan solution under constant stirring. PEG 6000 was added<br />
into the solution as plasticizer under constant stirring. This<br />
viscous solution was left overnight at room temperature to ensure<br />
a clear, bubble-free solution. The solution was poured into a<br />
glass Petri dish (16 cm diameter) and allowed to dry at ambient<br />
temperature till a flexible film was formed. Dried films were<br />
carefully removed, checked for any imperfections or air bubbles<br />
and cut into patches of 16 mm in diameter, containing 20 mg of<br />
drug per patch.[4],[5]. The patches were packed in aluminum foil<br />
and stored in an airtight glass container to maintain the integrity<br />
and elasticity of the patches. TABLE 1 contains the<br />
compositions of different formulations.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 141<br />
ISSN 2250-3153<br />
TISSUE ISOLATION:<br />
Buccal tissue was taken from goat at a slaughter-house. It was<br />
collected within 10 minutes after slaughter of the goat and tissue<br />
was kept in Krebs buffer solution. It was transported<br />
immediately to the laboratory and was mounted within 2 hours of<br />
isolation of buccal tissue. The tissue was rinsed thoroughly using<br />
phosphate buffer saline to remove any adherent material. The<br />
buccal membrane from the tissue was isolated using surgical<br />
procedure. Buccal membrane was isolated and buccal epithelium<br />
was carefully separated from the underlying connective tissue.<br />
Sufficient care was taken to prevent any damage to the buccal<br />
epithelium.[6]<br />
TABLE 1: Composition of chitosan buccal patches of fluxotine<br />
hydrochloride<br />
COMPONENTS F1 F2 F3<br />
Drug content uniformity:<br />
The F4 amount of drug contained in the patch was determined by<br />
dissolving the patch by homogenization in 100 ml of an isotonic<br />
FLUXOTINE(mg) 20 20 20<br />
phosphate buffer (pH 6.8) for 8 h under occasional shaking. The<br />
5 20 ml solution was taken and diluted with isotonic phosphate<br />
buffer pH 6.8 up to 20 ml, and the resulting solution was filtered<br />
CHITOSAN 0.1 0.1 0.2 through 0.2 a 0.45 μm Whatman filter paper. The drug content was<br />
then determined after proper dilution by UV spectrophotometer<br />
PEG200(ml) 1 1 (Shimadzu-1700 -<br />
Japan) at λmax of 226 nm. The experiments<br />
were carried out in triplicate<br />
Content uniformity:<br />
The drug loaded patch was allowed to dissolved in<br />
100mLmphosphate buffer, pH 6.8 The amount of fluxotine in<br />
the patch was measured spectrophotometrically at λmax of 226<br />
nm (n = 3).<br />
Surface pH. – Buccal patches were left to swell for 2 h on the<br />
surface of an agar plate,prepared by dissolving 2% (m/V) agar in<br />
warmed isotonic phosphate buffer of pH 6.75under stirring and<br />
then pouring the solution into a Petridish till gelling at room<br />
temperature. The surface pH was measured by means of a pH<br />
paper placed on the surface of the swollen patch. The mean of<br />
three readings was recorded.<br />
Folding endurance test. –The folding endurance of the patches<br />
was determined by repeatedly folding one patch at the same<br />
place till it broke or folded up to 300 times, which is considered<br />
satisfactory to reveal good film properties.<br />
The number of times the film could be folded at the same place<br />
without breaking gave the value of the folding endurance.<br />
Radial swelling:<br />
Radial swelling was determined by diameter method. After<br />
determination of the original patch diameter, the patch was<br />
allowed to swell on the surface of an agar plate kept in an<br />
incubator maintained at 37 o C. Measurement of the diameter of<br />
the swollen patch was done at one hour intervals for 6 h. Radial<br />
swelling was calculated from the following equation:<br />
SD (%) = [(Dt – Do) / Do] x 100<br />
Where SD (%) is the percent swelling, Dt is the diameter of the<br />
swollen patch after time t, and Do is the original diameter of the<br />
patch at time zero.<br />
PEG6000(ml) - 1 - 1<br />
In vitro Swelling Studies of Buccoadhesive patch: The degree<br />
PVP (gm) 0.01 0.01 0.01<br />
of swelling of bioadhesive polymer is important factor affecting<br />
0.01<br />
adhesion. Upon application of the bioadhesive material to a<br />
VANILLIN(gm) 0.02 0.02 0.02<br />
tissue a process of swelling may occur. The swelling rate of<br />
buccoadhesive 0.02 patch was evaluated by placing the film in<br />
phosphate buffer solution pH 6.8 at 37±0.5 oC. Buccal patch<br />
DISTILLED<br />
5 5 5 was 5 weighed (W1), placed in a 2% (w/v) agar gel plate and<br />
WATER(ml)<br />
incubated at 37 ±10C. At regular one-hour time intervals (upto 3<br />
h), the patch was removed from the petridish and excess surface<br />
EVALUATION OF PATCHES:<br />
Mass uniformity and patch thickness. – Assessment of mass and<br />
thickness was done on ten patches. The mean and standard<br />
deviation were calculated.<br />
water was removed carefully using the filter paper. The swollen<br />
patch was then reweighed (W2) again and the swelling index was<br />
calculated.[11]<br />
Swelling index = W2- W1 / W1.<br />
Bioadhesion force:<br />
The tensile strength required to detach the bioadhesion patch<br />
from the mucosal surface was applied as a measure of the<br />
bioadhesion performance. The apparatus was locally assembled<br />
and mainly composed of two‐arm balance. The left arm of the<br />
balance was replaced by a small platinum lamina vertically<br />
suspended through a wire. At the same side, a movable platform<br />
was maintained in the bottom in order to fix the mucosal<br />
membrane. For determination of bioadhesion force, the<br />
mucoadhesive patch was fixed to the platinum lamina using<br />
cyanoacylate adhesive. A piece of rabbit intestinal mucosa was<br />
also glued to the platform. The patch surface was moistened with<br />
10 μL of phosphate buffer and left for 20 s for initial hydration.<br />
On the right pan, a constant weight of 5 g was added at 2 min<br />
interval, until the hydrated patch was brought into contact with<br />
the mucosal surface. The total weight required for complete<br />
detachment of the patch was recorded and the bioadhesion force<br />
was calculated per unit area of the patch as follows:<br />
F = (Ww x g) / A<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 142<br />
ISSN 2250-3153<br />
where F is the bioadhesion force (kg m‐1 S‐2), Ww is the mass<br />
applied (g), g is the acceleration due to gravity (cm s‐2), A is the<br />
surface of the patch (cm2). The bioadhesion force data reported<br />
represent the mean of three determinations.[7],[8]<br />
In vitro drug release study:<br />
For in vitro release study, goat buccal mucosa membrane was<br />
used as a barrier membrane with Phosphate buffer (pH 7.4) as a<br />
medium. The patches were evaluated for drug release using franz<br />
diffusion cells. Buccal mucosa membrane was mounted between<br />
the donor and receptors compartments. The patch was placed on<br />
the mucosal membrane. The diffusion cell was placed in a<br />
simulated saliva maintained at 37±2°C.The receptor<br />
compartment was filled with 50 mL phosphate buffer (pH 7.4)<br />
and hydrodynamics was maintained by stirring with a magnetic<br />
bead at 300 rpm. Five mL sample was withdrawn and replaced<br />
with 5 mL fresh medium to maintain the sink condition. The<br />
samples were analyzed in U.V. spectrophotometer at 226<br />
nm.[9].[10]<br />
Fig.1: in vitro Buccal Permeations studies:<br />
COMPOSITION OF SIMULATED SALIVA: 2.38 g<br />
Na2HPO4, 0.19 g KH2PO4 and 8.00 g NaCl per liter of distilled<br />
water adjusted with phosphoric acid to pH 6.75[12]<br />
DRUG RELEASE PROFILE:<br />
FIG: 1 In vitro drug release profiles of different formulations<br />
through buccal membrane<br />
TABLE NO: 2 Characterstics of mucoadhesive buccal patch<br />
of fluxotine hcl:<br />
FTIR STUDIES:<br />
Spectrum of chitosan<br />
Spectrum of F3<br />
FIG: 2 FTIR spectra of chitosan<br />
FIG: 3 FTIR spectra of optimizes formulation<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 143<br />
ISSN 2250-3153<br />
Spectrum of fluxotine hydrochloride<br />
FIG: 4 FTIR spectra of drug( fluxotine HCL)<br />
Spectrum of PEG 6000<br />
FIG: 5 FTIR spectra of PEG 6000<br />
III. RESULTS AND DISCUSSION<br />
The results of Physical Characteristics of patches containing<br />
individual concentration of polymer are shown in Table 2. The<br />
patches were 10 mm in diameter, and 1.01±0.01 to 1.07±0.02<br />
mm in thickness. The weight ranged from 117±0.15 to 123±0.22<br />
mg.<br />
Considering the fact that acidic or alkaline pH may cause<br />
irritation to the buccal mucosa. The surface pH of the buccal<br />
films was determined to optimize both drug permeation and<br />
muco adhesion. Attempts were made to keep the surface pH as<br />
close as to salivary pH. The pH values of all the formulations<br />
were within the range of salivary pH. No significant difference<br />
was observed in surface pH for different formulations. The<br />
surface pH of all formulations was nearer to neutral (≈7) and<br />
hence no mucosal irritation was expected. The folding endurance<br />
was measured manually, by folding the film repeatedly at a point<br />
till they were broken. The breaking time was considered as the<br />
end point. The recorded folding endurance of the patch was ><br />
300 times. The patch exhibited good physical and mechanical<br />
properties. Assessment of the swelling behavior was done by<br />
measuring radial swelling. F3 patches showed high radial<br />
swelling, followed by f4 and then f2 ; All the formulations<br />
showed good mucoadhesive strength. Among the formulations<br />
F3 showed maximum mucoadhesive strength while formulation<br />
F1 showed less mucoadhesive strength. Maximum bioadhesion<br />
was recorded for f3 (65.60 x 102 kg m‐1s‐2), followed by the f4<br />
(58.46 x 102 kg m‐1s‐2), then f‐2 (50.7 x 102 kgm‐1s‐2).<br />
Drug content in all formulations was found to be uniform<br />
ranging from 95.2% to 97.9%. This indicates that the drug was<br />
dispersed uniformly throughout the patches. The in vitro drug<br />
release a study was performed using cellophane membrane.<br />
The release profile of mucoadhesive buccal patches is shown in<br />
Fig.1. The extent of fluxotine release within 1h from f‐1, f‐2 and<br />
f‐3 and f-4 patches was 85.65%, 88.45% , 98.45% and 92.33%<br />
respectively. FTIR studies were performed and has been showed<br />
and clearly shows that there is no interactions between drug and<br />
selected polymers. Chitosan patches containing 10 mg fluxotine<br />
were subjected to 2‐ months storage at 37± 0.5o C and 75± 0.5<br />
RH and found that they exhibit excellent drug content over the<br />
storage period. The folding endurance test revealed good<br />
flexibility and elastic properties. The formulation F4 did not<br />
control the release and it releases the fluxotine as immediate<br />
release formulation, but F3 offers promising drug release pattern<br />
and good swelling index.<br />
IV. CONCLUSION<br />
It may be concluded that adhesion of buccal drug delivery<br />
device to mucosal membrane leads to an increased drug<br />
concentration gradient at the absorption site and therefore<br />
improved bioavailability of systemically delivered drug.<br />
Mucoadhesive patches<br />
are a promising drug delivery system for fluxotine in<br />
maintaining drug level in blood. The mucoadhesive polymer<br />
chitosan showed good mucoadhesive and swelling<br />
characteristics.<br />
From the present investigation, one can conclude that the<br />
optimized Buccoadhesive patches of Fluxotine hydrochloride<br />
with the combination of chitosan PEG 200, PEG 6000 and PVP<br />
K-30 can meet the ideal requirements for buccal devices, which<br />
can be a good way to bypass the extensive hepatic first pass<br />
metabolism<br />
REFERENCES<br />
[1] Giuseppina C., Libero G. and Ada Maria, Bioavailability in vivo of<br />
naltrexone following transbuccal administration by an<br />
electronically‐controlled intraoral device: A trial on pigs, J.controlled<br />
Release, 2010, 145: 214‐220.<br />
[2] Swami P.V., Amit Kumar and Shirsand S.B., Design and Evaluation of<br />
Buccal patches of Granisetron Hydrochloride, Indian J.Pharm Educ. Res,<br />
2010, 44(1) :95‐101.<br />
[3] Suraj k.Benerjee, Ankith Pavan.J.S, fluoxetine medline plus drug<br />
information<br />
http://www.nlm.nih.gov/medlineplus/druginfo/meds/a689006.html.<br />
[4] Ana Figueiras, Juliane H., and Andreas B.S., In‐vitro evaluation of natural<br />
and methylated cyclodextrin as Buccal permeation enhancing system for<br />
omeprazole delivery, Eur. J. Pharmaceutics and Biopharm, 2009, 71 :<br />
339‐345.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 144<br />
ISSN 2250-3153<br />
[5] Khairnar A., Parridhi J. and Dheeraj B., Development of Mucoadhesive<br />
Buccal patch containing Aceclofenac : In vitro evaluations, International J.<br />
Pharm. Tech Research, 2009, 1(4): 978‐981<br />
[6] Navneeth varma, a.k.ghosh, P. chhottapadey.., PREPARATION AND<br />
INVITRO ASSESSMENT OF MUCOADHESIVE BUCCAL PATCHES<br />
CONTAINING CARVEDILOL. International Journal of Pharmacy and<br />
Pharmaceutical Sciences, Vol 3, Issue 3, 2011.<br />
[7] Satishbabu BK, Srinivasan BP. Preparation and evaluation of bucoadhesive<br />
films of atenolol. Indian J Pharm Sci 2008, 70, 175.<br />
[8] Semalty M, Semalty A, Kumar G. Formulation and characterization of<br />
mucoadhesive buccal films of glipizide. Indian J Pharm Sci 2008 70, 43.<br />
[9] Henrihsen I., Green L.K. Bioadhesion of hydrated chitosan : an in vitro and<br />
in vivo study. Int. J. of Pharmaceutics 1996, 145:231‐240.<br />
[10] Chandra Shekhar, Kishan V. and Yamsani M.R., Development of<br />
Mucoadhesive patches for Buccal administration of Prochlorperazine:<br />
Evaluation of In‐vitro release and Mechanical Properties, International J. of<br />
Pharm. Sci. and Nanotech, 2008, 1 (1) : 64‐70.<br />
[11] Bhanja Satyabrata, P Ellaiah, Rohit Choudhury, KVR Murthy, Panigrahi<br />
Bibhutibhusan, Martha Sujit Kumar, Design and evaluation of methotrexate<br />
buccal mucoadhesive patches Int J Pharm Biomed Sci 2010, 1(2), 31-36<br />
ISSN No: 0976-5263.<br />
[12] Kok Khiang Peh, Choy Fun Wong, Polymeric Films As Vehicle For<br />
Buccal Delivery: Swelling, Mechanical, and Bioadhesive Properties. J<br />
Pharm Pharmaceut Sci (www.ualberta.ca/~csps) 2 (2):53-61, 1999.<br />
AUTHORS<br />
First Author – Naresh kshirasagar, M.PHARMACY.M.B.A,<br />
Sree Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />
Email: arenmpharm2009@gmail.com.<br />
Second Author – NARESH THAMMADA.M. PHARMACY<br />
Sree Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />
E-MAIL: nareshthammada@gmail.com<br />
Third Author – Balaji naik Kumar.V.N., M.Pharmacy , Sree<br />
Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />
Fourth author: Sushma Gopal. M.Pharmacy.<br />
Sree Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 145<br />
ISSN 2250-3153<br />
CHILD WELFARE PROGRAMME IN COLONIAL<br />
MYSORE<br />
Abstract- Princely state has adapted some scientific measures<br />
to provide female medical aid and for improving the health of<br />
babies most effectively serving individual children in order to<br />
raise the level of community health. The high rate of infant<br />
mortality exists in the state due to the shortage of child welfare<br />
activities and other medical facilities.<br />
T<br />
I. INTRODUCTION<br />
he princely state of Mysore was one among six hundred and<br />
forty eight native states which were indirectly controlled by<br />
the British Paramount power in India.<br />
The research article focuses on the welfare measures in Infant<br />
Health in Princely State of Mysore from 1881 to 1947. This is<br />
the period of conservation, preservation and creativeness with<br />
thrust on Public welfare. The Mysore rulers were farsighted,<br />
responsible and intellectual; their liberal and able administration<br />
brought tremendous welfare which consequently made Mysore a<br />
successful State in imperial India.<br />
“Bestow blessings on those little, innocent lives bloomed<br />
on earth, who have brought the message of joy from heavenly<br />
garden”. Rabindranath Tagore.<br />
National policy for the welfare of children, the nation’s<br />
children are a supremely important asset, their nurture and<br />
solicitude are our responsibility. Every nation, developed or<br />
developing links its future with the status of the child.<br />
Childhood holds the potential and also sets the limit to the<br />
future development of the society and the children are the<br />
greatest gift to the humanity.<br />
The high rate of infant mortality due to the shortage of<br />
maternity and child welfare centre and other medical facilities<br />
besides deeply sunk in poverty it was impossible to take adequate<br />
care and protection of the children by means of feeding, nursing<br />
and medical assistance, the bad housing conditions in sanitary<br />
environments also contribute to increase in the death rate. There<br />
was high mortality among infants under one year of age in<br />
improving the health of Babies, to provide female medical aid in<br />
the state has received the attention of the government at the<br />
commencement of the 20 th century.<br />
Philanthropy, Former Dewan, M. Kantharaj urs, donated Rs.<br />
1, 20,000\ to establish a Trust in the name of his mother<br />
Gunamba. The Gunamba Maternity and child welfare trust,<br />
which was established on 21st may 1924, The Trust started<br />
working in the building of Ayurvedic hospital under the officers<br />
of Dr. A. Hardi Bank and Mathura boi. A committee was also<br />
formed by His. Highness, and according to their<br />
Dr. THRIVENI<br />
MAHARAJAS COLLEGE<br />
UNIVERSITY OF MYSORE, MYSORE<br />
Email: thriveniurs@gmail.com<br />
recommendations Medical investigation of natal treatment was<br />
started by Doctors. House to house survey was conducted and<br />
two centers were opened at Mysore. Nutritious food and milk<br />
were provided freely, made arrangements to give medical<br />
education through magic lantern slides and lectures. The trust<br />
was consisting the staff of 3 trained midwives, 2 nurses and 2<br />
assistant dais with medical kit and other equipment of weighing<br />
mission bathing tub, milk bowls, and medicine kit. Expenditure<br />
of the trust was 1,500/ month. 2<br />
Gunamba Maternity and child welfare center operating<br />
through trained intelligence and scientific methods, most<br />
effectively serving individual children in raising the level of<br />
community health appreciated by Dr. Fredrick Robinson, the<br />
well-known American Educationist, President of the collage of<br />
the city of New York in visitors Book. Mr. Allen Lane, the<br />
famous London Publisher wrote, I can only say that I honestly<br />
congratulate all concerned in this magnificent work. 3 A voluntary<br />
organization Red Cross Society joined their support in 1925,<br />
under the guidance of Sir Charles Todhunter, private secretary to<br />
the Maharaja was specially note worthy in combating the<br />
ignorance which is responsible for so much suffering and in<br />
establishing the maternity homes and child welfare centers and it<br />
organized Baby week in Jan 1925 for 5 days and then extended<br />
its activities to all over the state. 4<br />
The civic and social progress association was established in<br />
the year 1930, it started maintains a Milk center at Ganigarpet in<br />
Bangalore city to which the municipality contributed a sum of<br />
Rs. 30 per mensem. A crèche opened by the maternity and child<br />
welfare association near the Binny Mills, and 4 child welfare<br />
centers were started working in Kolar Gold Field area. 5<br />
Milk Centers: These centers were established under supervision<br />
of medical officer of Health department in 1930. The essential<br />
provision for center was a well-equipped lady health visitor, who<br />
was assisted by a trained Dai. The center consisted of a small<br />
dispensary, lady health visitor, mid wife, and a trained Dai in<br />
close proximity to the welfare center with a large compound as<br />
play ground for the children. A lady health visitor and midwife<br />
2 Maramath Dpt file no B-13 of 1915, p. 162. Divisional Archives<br />
Mysore.<br />
3 Mysore Information Bulletin, Mythic Society, vol-IV, Bangalore.<br />
4 Shamrao M. Modern Mysore. P-421 & 422.<br />
5 Mysore Administration Report 1930, P. 6.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 146<br />
ISSN 2250-3153<br />
annually attended to about 200 to 240 births, 200 infants and<br />
about 600 to 700 pre school children. A midwife should have to<br />
attend to 100 births. A lady superintendent was supposed to spare<br />
some time to assist the lady health visitor in her work. 6<br />
A visiting lady medical officer attends the centers once or twice<br />
in a week. She was a specialist in diseases of women and<br />
children besides taking care of antenatal and baby clinics. One<br />
or two trained dais and mid wives were attached to the center to<br />
render assistance. Specialist Doctors also attend the center once<br />
or twice a fortnight to provide medical and hygienic advice to the<br />
mothers and were persuaded to bring their children to the centers<br />
for periodical check up. Leaflets in different languages<br />
distributed to give instructions regarding maternity and child<br />
welfare work, milk was supplied free of cost to children. 7<br />
Maternity and child welfare work advanced in the year 1930,<br />
Annual baby shows were held and about 7-8000 babies came<br />
under expert scrutiny of doctors. A baby and Health week<br />
celebrations were held in 49 places. 8 A Successful Health and<br />
Baby week was organized in the year 1932 Mysore, which<br />
secured a certificate of Merit from the ―All Empire Baby week<br />
committee London‖. Mysore state got 2 nd best in the world. Two<br />
more maternity and child welfare centers, a toddler‘s center in<br />
Gajasala and a Crèche in the Krishna Rajendra Mills were<br />
opened. The civic and social progress Association at Mysore and<br />
Bangalore was established to maintain child-welfare and milk<br />
centers. 9<br />
The Gunamba maternity and child welfare trust maintaining 5<br />
milk centers and one crèche. 32.332 babies availed the<br />
humanitarian service of the trust. Baby clinics were running by<br />
the Wesleyan mission in Shimoga, in Bangalore by the Mahila<br />
Seva Samaja and a child welfare center by social welfare<br />
committee in the Military area at Hebbal. 10<br />
At Dasara session of the representative assembly held in 1934,<br />
the Dewan specially called attention to the great need for<br />
extending medical aid to women and children. He pointed out<br />
that the deaths from plague; Cholera and smallpox put together<br />
were less than 1/3 of the deaths of women in child – birth and of<br />
children in the first two years of their life. The Government<br />
extended the employment of midwives and also made special<br />
arrangements for appointment of lady doctors to extend their<br />
activities by visiting places within reach from their head quarters.<br />
All empire competition and Baby week shows begun and held,<br />
Mysore was ranked in the 2 nd , 1 st and 3 rd places respectively in<br />
the year 1932, 1933 and 1934.<br />
The Vani Vilas shield for the Best Baby week campaign in<br />
1935 was awarded to Mandya branch of the Red Cross society,<br />
35 maternities and child welfare organizations existed in the year<br />
1935. 11 Baby and health week celebration were held throughout<br />
the state the Mysore state secured the 3 rd place in imperial Baby<br />
week challenge shield competition and the 2 nd place in the Vani<br />
Vilas shield for the best Baby week campaign in 1934 was<br />
6 Mysore Administration Report MAR 1930 p. 60<br />
7 Ibid<br />
8 Ibid<br />
9 Mysore Administration Report, 1932<br />
10 Mysore Administration Report, 1933, P- 138<br />
11 Mysore Administration Report, 1935<br />
awarded to French Rocks. There were 17 maternity & child<br />
welfare organizations working in the state. 10 in Bangalore<br />
district, 5 in the Mysore district and one among these in the<br />
Shimoga district and one in the Tumkur district The Gunamba<br />
Maternity and Child Welfare Trust maintained 6 centers, two<br />
nursery schools & a crèche at the Sri Krishnarajendra Mills.<br />
In order to organize maternity and child welfare work under the<br />
department of Health, Dr. Mrs. Erika Deussen Rosenthal, M.D.<br />
was appointed towards the close of the year as organizer of<br />
Maternity & child welfare work in the state. 12<br />
The Indian Red Cross Society of Mysore Branch Started 26<br />
new branches in the state making a total of 43 branches of<br />
maternity and child welfare centers. A Doctor from Mysore state<br />
represented the 16 th International Red Cross conference held in<br />
London. A medical officer from the Gunamba maternity and<br />
child welfare trust Mysore was the recipient of the Carlo<br />
Forlanini Institute scholarship of Rome for a course of study in<br />
the treatment and care of Tuberculosis. 13<br />
Anti natal Clinics: In 1938 there were 43 anti-natal clinics were<br />
working, of which 20 were in rural areas. The Government<br />
appointed a whole time officer to organize & co-ordinate the<br />
maternally & child welfare Movement. 14<br />
School Clinics: Medical Department made certain important<br />
suggestions such as the establishments of school clinic for the<br />
follow-up causes, provisions of midday meals or other nutritious<br />
feeds to the children. Provisions of better hygienic requirements<br />
& better seating arrangements in schools, introduction of<br />
systematic physical education, introduction of shorter periods,<br />
arrangements of periodical talks with the parents for<br />
improvements in the nutrition of care of the children, and supply<br />
of free cod-liver oil to deserving cases on the recommendation of<br />
the medical inspector of schools. 15<br />
Nursery Schools: Sir, Charles Todhunter who had established a<br />
child welfare centre, a nursery school and a solarium in each of<br />
the Mohallas of the city of Mysore. 16 Nursery schools were<br />
established in Mysore, Bangalore and Chikballapure in the year<br />
1938, and continued excellent work. The state had given high<br />
priority to improving child nutrition the children attending the<br />
solarium during the early morning hours were given graded sun<br />
bathes, milk, eggs, fruit Juice and cod-liver oil for their<br />
nourishment. They are weighed and examined every week for<br />
testing their progresses in health.50 maternity homes were in<br />
existence in various parts of the state. The organizing secretary<br />
did five propaganda tours and delivered 25 lectures in different<br />
parts of the state. 17<br />
Bureau of maternity and child welfare: With a view to<br />
organize a regular and efficient service of child welfare<br />
12 Mysore Administration Report , 1934, P-135<br />
13 Mysore Administration Report,1945, p. 69<br />
14 Mysore Information Bulletin. Vol-III, Mythic Society, Bangalore.<br />
15 Mysore Information Bulletin., 1939, vol-II, Bangalore.<br />
16 Ibid<br />
17 Mysore Administration Report, 1938, P- 151.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 147<br />
ISSN 2250-3153<br />
throughout the state, a bureau of maternity and child welfare was<br />
opened in the year 1945. With the object of inspecting the<br />
working of Crèches, Nursery schools and Milk centers. 18 In the<br />
year, 1946 (77) seventy-seven maternity homes were visited and<br />
their work were examined and the establishment of crèches was<br />
suggested. The established nursery schools were inspected and<br />
useful instructions were issued for the proper feeding of children<br />
and their periodical medical examination. Milk centers were<br />
started with free supply of milk to poor children in the sub-health<br />
units of ( plases called) Mandya, the Mahila Samajas of<br />
Chickballapur, Hassan and Shimoga. The scheme of 20<br />
stipendiary pupil midwives, on a scholarship of Rs.15 each per<br />
month, for undergoing training in midwifery was sanctioned. 19<br />
II. CONCLUSION<br />
The infant mortality rate was considerably reduced with the<br />
introduction of modern system of midwifery and rapid<br />
implementation of maternity and child welfare services. The<br />
child welfare centers had increased from 4 to 32 during 1881-<br />
1947 in Co-operation between Government, Local bodies &<br />
organization of Red Cross society. 20 54 hospitals among 419<br />
Medical institutions were considered as Women‘s and children‘s,<br />
and 25, 94,251 children were treated in the hospitals of the<br />
state. 21<br />
18 Mysore Administration Report 1944, p.147<br />
19 Mysore Administration Report, 1947 p. 143<br />
20 Mysore information Bulletin, May, 1940<br />
21 Mysore Administration Report, 1946, p. 147<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 148<br />
ISSN 2250-3153<br />
Live Migration of Virtual Machines in Cloud<br />
Abstract- Migration of a virtual machine is simply moving the<br />
VM running on a physical machine (source node) to another<br />
physical machine (target node). It is done as, while the VM is<br />
running on the source node, and without disrupting any active<br />
network connections, even after the VM is moved to the target<br />
node. It is considered ―live‖, since the original VM is running,<br />
while the migration is in progress. Huge benefit of doing the live<br />
migration is the very small (almost zero) downtime in the order<br />
of milliseconds.<br />
There exists a model in which the load is balanced among the<br />
servers according to their processor usage or their IO usage and<br />
keeping virtual machines zero downtime. To increase the<br />
throughput of the system, it is necessary that the virtual machines<br />
are load balanced statically, i.e. the load is distributed to each<br />
part of the system in proportion to their computing IO capacity.<br />
To migrate a virtual machine from one physical host to<br />
another, the control of virtual machines is converted to the<br />
management of services in Red Hat Cluster Suite. This creates a<br />
high availability and load balancing cluster services, to migrate a<br />
virtual machine from one physical host to another.<br />
Software services, file systems and network status can be<br />
monitored and controlled by the cluster suite, services and<br />
resources can be failed over to other network nodes in case of<br />
failure. The cluster suite forcibly terminates a cluster node's<br />
access to services or resources to ensure the node and data is in a<br />
known state. The node is terminated by removing power or<br />
access to the shared storage.<br />
W<br />
I. INTRODUCTION<br />
hat is virtual machine?<br />
One computer containing multiple operating systems<br />
loaded on a single PC, each of which functions as a separate OS<br />
on a separate physical machine. Virtualization [1] software does<br />
just that by creating and managing one or more virtual machines<br />
on a single, physical host PC. It can run its own operating<br />
systems and applications as if it were a physical computer. A<br />
virtual machine [2] behaves exactly like a physical computer and<br />
contains it own virtual (i.e. software-based) CPU, RAM hard<br />
disk and network interface card (NIC).<br />
Benefits of virtual machines<br />
1. Isolation: While virtual machines can share the physical<br />
resources of a single computer, they remain completely<br />
isolated from each other as if they were separate<br />
physical machines. If, for example, there are four virtual<br />
machines on a single physical server and one of the<br />
virtual machines crashes, the other three virtual<br />
machines remain available. Isolation is an important<br />
Ashima Agarwal, Shangruff Raina<br />
Department of Computer, MIT College of Engineering Pune, India<br />
reason why the availability and security of applications<br />
running in a virtual environment is far<br />
2. Encapsulation: A virtual machine is essentially a<br />
software container that bundles or ―encapsulates‖ a<br />
complete set of virtual hardware resources, as well as an<br />
operating system and all its applications, inside a<br />
software package. Encapsulation makes virtual<br />
machines incredibly portable and easy to manage.<br />
3. Hardware Independence: Virtual machines are<br />
completely independent from their underlying physical<br />
hardware. For example, you can configure a virtual<br />
machine with virtual components (eg, CPU, network<br />
card, SCSI controller) that are completely different from<br />
the physical components that are present on the<br />
underlying hardware. Virtual machines on the same<br />
physical server can even run different kinds of operating<br />
systems (Windows, Linux, etc).<br />
II. WHAT IS LIVE MIGRATION?<br />
Live migration [3] is the movement of a virtual machine from<br />
one physical host to another while continuously powered-up.<br />
When properly carried out, this process takes place without any<br />
noticeable effect from the point of view of the end user. Live<br />
migration allows an administrator to take a virtual machine<br />
offline for maintenance or upgrading without subjecting the<br />
system's users to downtime.<br />
When a VM is running a live service it is important that this<br />
transfer occurs in a manner that balances the requirements of<br />
minimizing both downtime and total migration time. The former<br />
is the period during which the service is unavailable due to there<br />
being no currently executing instance of the VM; this period will<br />
be directly visible to clients of the VM as service interruption.<br />
The latter is the duration between when migration is initiated and<br />
when the original VM may be finally discarded and hence, the<br />
source host may potentially be taken down for maintenance,<br />
upgrade or repair. It is easiest to consider the trade-offs between<br />
these requirements by generalizing memory transfer into three<br />
phases:<br />
Push phase: The source VM continues running while certain<br />
pages are pushed across the network to the new destination. To<br />
ensure consistency, pages modified during this process must be<br />
re-sent.<br />
Stop-and-copy phase: The source VM is stopped, pages are<br />
copied across to the destination VM, then the new VM is started.<br />
The time between stopping VM on source and resuming it on<br />
destination is called "down-time". Down-time of a VM during a<br />
live migration could be a few milliseconds to seconds according<br />
to the size of memory and applications running on the VM. There<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 149<br />
ISSN 2250-3153<br />
are some techniques to reduce live migration down-time such as<br />
using probability density function of memory change. [3]<br />
Pull phase: The new VM executes and, if it accesses a page<br />
that has not yet been copied, this page is faulted in (.pulled.)<br />
across the network from the source VM. VM migration is<br />
initiated by suspending the VM at the source. With the VM<br />
suspended, a minimal execution state of the VM (CPU, registers,<br />
and non-pageable memory) is transferred to the target. The VM<br />
is then resumed at the target, even though the entire memory<br />
state of the VM has not yet been transferred, and still resides at<br />
the source. At the target, when the VM tries to access pages that<br />
have not yet been transferred, it generates page-faults, which are<br />
trapped at the target and redirected towards the source over the<br />
network. Such faults are referred to as network faults. Source<br />
host responds to the network-fault by sending the faulted page.<br />
Since each page fault of the running VM is redirected towards<br />
the source, it can degrade the applications running inside the<br />
VM. However, when pure demand-paging accompanied with the<br />
techniques such as pre-paging can reduce this impact by a great<br />
extent. Live migration is widely used in virtualization ready data<br />
centers and enterprise IT departments. It separates software‘s<br />
from physical servers, and provides desirable abilities such as<br />
online server maintenance, dynamic load balancing, and etc.<br />
Live migration can be applied in both local area network<br />
(LAN) environment and wide area network (WAN) environment.<br />
Live migration in LAN environment is simpler, because live<br />
migration process avoids virtual storage migration by sharing a<br />
network storage. Furthermore, live migration in LAN skips the<br />
migration of network topology, and the migration process only<br />
needs to broadcast an unsolicited ARP reply from the migrated<br />
VM, in order to advertise the MAC relocation.<br />
III. SEAMLESS LIVE MIGRATION<br />
When down-time of a VM during a live migration is zero or a<br />
few millisecond which is not noticeable by end user, it is called a<br />
seamless live migration. Otherwise, the end user will feel a small<br />
or relatively long glitch in the service.<br />
What is the purpose of live migration?<br />
Migrating an entire OS and all of its applications as one unit<br />
allows us to avoid many of the difficulties faced by process-level<br />
migration approaches. With virtual machine migration, on the<br />
other hand, the original host may be decommissioned once<br />
migration has completed. This is particularly valuable when<br />
migration is occurring in order to allow maintenance of the<br />
original host.<br />
Secondly, migrating at the level of an entire virtual machine<br />
means that in-memory state can be transferred in a consistent and<br />
(as will be shown) efficient fashion. This applies to kernelinternal<br />
state (e.g. the TCP control block for a currently active<br />
connection) as well as application-level state, even when this is<br />
shared between multiple cooperating processes.<br />
Thirdly, live migration of virtual machines allows a separation<br />
of concerns between the users and operator of a data center or<br />
cluster. Users have `carte blanche' regarding the software and<br />
services they run within their virtual machine, and need not<br />
provide the operator with any OS-level access at all. Live OS<br />
migration is a extremely powerful tool for cluster administrators,<br />
allowing separation of hardware and software considerations, and<br />
consolidating clustered hardware into a single coherent<br />
management domain. If a physical machine needs to be removed<br />
from service an administrator may migrate OS instances<br />
including the applications that they are running to alternative<br />
machine(s), freeing the original machine for maintenance.<br />
How is live migration achieved?<br />
By using a pre-copy approach in which pages of memory are<br />
iteratively copied from the source machine to the destination<br />
host, all without ever stopping the execution of the virtual<br />
machine being migrated. Page level protection hardware is used<br />
to ensure a consistent snapshot is transferred, and a rate-adaptive<br />
algorithm is used to control the impact of migration traffic on<br />
running services. The final phase pauses the virtual machine,<br />
copies any remaining pages to the destination, and resumes<br />
execution there. We eschew a `pull' approach which faults in<br />
missing pages across the network since this adds a residual<br />
dependency of arbitrarily long duration, as well as providing in<br />
general rather poor performance.<br />
The logical steps that we execute when migrating an OS are<br />
summarized in Figure 3. We take a conservative approach to the<br />
management of migration with regard to safety and failure<br />
handling. Although the consequences of hardware failures can be<br />
severe, our basic principle is that safe migration should at no<br />
time leave a virtual OS more exposed to system failure than<br />
when it is running on the original single host. To achieve this, we<br />
view the migration process as a transactional interaction between<br />
the two hosts involved:<br />
Stage 0 Pre-Migration: We begin with an active VM on<br />
physical host A. To speed any future migration, a target host may<br />
be preselected where the resources required to receive migration<br />
will be guaranteed.<br />
Stage 1 Reservation: A request is issued to migrate an OS from<br />
host A to host B. We initially confirm that the necessary<br />
resources are available on B and reserve a VM container of that<br />
size. Failure to secure resources here means that the VM simply<br />
continues to run on A unaffected.<br />
Stage 2 Iterative Pre-Copy: During the first iteration, all pages<br />
are transferred from A to B. Subsequent iterations copy only<br />
those pages dirtied during the previous transfer phase.<br />
Stage 3 Stop-and-Copy: We suspend the running OS instance at<br />
A and redirect its network traffic A to B. As described earlier,<br />
CPU state and any remaining inconsistent memory pages are<br />
then transferred. At the end of this stage there is a consistent<br />
suspended copy of the VM at both A and B. The copy at A is still<br />
considered to be primary and is resumed in case of failure.<br />
Stage 4 Commitment Host B indicates to A that it has<br />
successfully received a consistent OS image. Host A<br />
acknowledges this message as commitment of the migration<br />
transaction: host A may now discard the original VM, and host B<br />
becomes the primary host.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 150<br />
ISSN 2250-3153<br />
Stage 5 Activation: The migrated VM on B is now activated.<br />
Post-migration code runs to reattach device drivers to the new<br />
machine and advertise moved IP addresses.<br />
Figure 3: Migration Timeline<br />
This approach to failure management ensures that at least one<br />
host has a consistent VM image at all times during migration. It<br />
depends on the assumption that the original host remains stable<br />
until the migration commits, and that the VM may be suspended<br />
and resumed on that host with no risk of failure. Based on these<br />
assumptions, a migration request essentially attempts to move the<br />
VM to a new host, and on any sort of failure execution is<br />
resumed locally, aborting the migration.<br />
To solve the problem of load balancing amongst the physical<br />
hosts in cloud by adaptive live migration of virtual machine,<br />
there exists a model in which the load is balanced among the<br />
servers according to their processor usage or their IO usage and<br />
keeping virtual machines zero downtime. To increase the<br />
throughput of the system, it is necessary that the virtual machines<br />
are load balanced statically, i.e. the load is distributed to each<br />
part of the system in proportion to their computing IO capacity.<br />
The System Architecture of such a model is given in next<br />
chapter.<br />
IV. SYSTEM ARCHITECTURE<br />
By the use of EUCALYPTUS [4] one or more VLAN can be<br />
created, each VLAN may be across many physical hosts and may<br />
include many virtual machines, so when a virtual machine is<br />
migrated from one physical host to another, an inclusion<br />
relationship can be kept between VLAN and virtual machine.<br />
Following diagram represents the system architecture of an<br />
adaptive intra-cloud load balancing model.<br />
Lblog: The program lblog is a small cronjob which runs<br />
regularly on each host to monitor predefined resources, such as<br />
CPU and IO load, and log their usage to the log directory on the<br />
shared storage.<br />
DLBA (Distributed load balancing algorithm): It runs on each<br />
physical host separately and dynamically migrates virtual<br />
machines of local host to other physical hosts according to<br />
resource uses.<br />
Dump: When virtual machines are migrated, their memory<br />
contents are dumped to the dump directory of shared storage.<br />
Conf: This directory contains the configuration files.<br />
Private: This directory contains the file system.<br />
Figure 4: System Architecture<br />
To migrate a virtual machine from one physical host to<br />
another, the control of virtual machines is converted to the<br />
management of services in Red Hat Cluster Suite[5]. This<br />
creates a high availability and load balancing cluster services, to<br />
migrate a virtual machine from one physical host to another. The<br />
cluster suite forcibly terminates a cluster node's access to<br />
services or resources to ensure the node and data is in a known<br />
state. The node is terminated by removing power or access to the<br />
shared storage. The detailed explanation of the working of Red<br />
Hat Cluster Suite is given in next chapter.<br />
V. RED HAT CLUSTER SUITE<br />
Introduction<br />
High-availability Service Management<br />
High-availability[7] service management provides the ability<br />
to create and manage high-availability cluster services in a Red<br />
Hat cluster. The key component for high-availability service<br />
management in a Red Hat cluster, rgmanager, implements cold<br />
failover for off-the-shelf applications. In a Red Hat cluster, an<br />
application is configured with other cluster resources to form a<br />
high-availability cluster service. A high-availability cluster<br />
service can fail over from one cluster node to another with no<br />
apparent interruption to cluster clients. Cluster-service failover<br />
can occur if a cluster node fails or if a cluster system<br />
administrator moves the service from one cluster node to another<br />
(for example, for a planned outage of a cluster node). A cluster<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 151<br />
ISSN 2250-3153<br />
service can run on only one cluster node at a time to maintain<br />
data integrity. Failover priority can be specified in a failover<br />
domain. Specifying failover priority consists of assigning a<br />
priority level to each node in failover domain. The priority level<br />
determines the failover order — determining which node that a<br />
cluster service should fail over to. If you do not specify failover<br />
priority, a cluster service can fail over to any node in its failover<br />
domain. Also, if a cluster service is restricted to run only on<br />
nodes of its associated failover domain. (When associated with<br />
an unrestricted failover domain, a cluster service can start on any<br />
cluster node in the event no member of the failover domain is<br />
available.)<br />
VDE (Virtual Distributed Ethernet)<br />
Introduction<br />
The acronym VDE [6] is self explaining: it is a Virtual<br />
network because it is built completely in software, it is<br />
Distributed as parts of the same network can run on different<br />
physical (real) computers and it is an Ethernet as the entire<br />
virtual software structure is able to forward, dispatch and route<br />
plain Ethernet packets. The main features of VDE are the<br />
following:<br />
VDE is Ethernet compliant.<br />
VDE is general; it is a virtual infrastructure that gives<br />
connectivity to several kinds of software components:<br />
emulators/virtual machines, real operating systems and<br />
other connectivity tools.<br />
VDE is distributed.<br />
VDE does not need specifically administration<br />
privileges to run.<br />
With VDE it is also possible to integrate real computers in the<br />
emulated network. When a real computer is connected to a VDE<br />
a virtual interface (based on tuntap) is visible from the operating<br />
system. This virtual interface appears exactly as it were a<br />
hardware interface and behaves as a physical ethernet interface.<br />
This operation however changes the network behavior of the host<br />
computer and thus need administrative privileges to be<br />
completed.<br />
Currently VDE supports User-Mode Linux virtual machines,<br />
qemu, Bochs and MPS.<br />
Network Connection for Zero-Downtime Migrated Virtual<br />
Machine<br />
EUCALYPTUS provides support for VLAN across multi<br />
physical hosts via VDE virtual switches. There is a VDE switch<br />
on each physical host. Ports of VDE switch are classified into<br />
two categories: tagged port and untagged port. Tagged ports<br />
transmit packages belonging to multi VLAN, for example the<br />
port 3 on Host0 and untagged ports transmit packages belonging<br />
to a VLAN, for example the port 1 and 2 on Host0. On single<br />
physical host there may be multi VLAN, and each VLAN binds<br />
to an untagged port of VDE switch on the host dynamically, or<br />
example VLAN0 and VLAN1 on Host0 respectively bind to<br />
untagged port 1 and 2,. Bridge device connects to untagged port<br />
of VDE switch via virtual network card tap. VDE switches on<br />
different physical hosts connect to each other via vde plug which<br />
is part of VDE switch software suite and implements package<br />
transmission, encryption and authentication functions.<br />
In figure 10 below, when vm2 belonging to VLAN1 migrates<br />
from Host0 to Host1, we need to delete virtual network device<br />
veth2.0 from bridge br1 on Host0. If there were no other network<br />
devices in bridge br1 except tap1 and veth2.0, we also would<br />
needed to unbind VLAN1 to untagged port 2, thus port 2 could<br />
be used by other VLAN in the future. On the target Host1,<br />
because VLAN1 has existed, before Red Hat Cluster Suite starts<br />
vm2, we only need create a pair of virtual network devices on<br />
Host1 for vm2: eth0 and veth2.0 (eth0 in virtual machine vm2<br />
and veth2.0 on the Host1), then add veth2.0 into the bridge br0.<br />
If there were not VLAN1 on<br />
Host1, we would need to find an untagged port in VDE switch<br />
and bind it to VLAN1, also create the corresponding bridge br0.<br />
Figure 8: Virtual Machine Migration<br />
Advantages of Live Migration<br />
1. Reduce IT costs and improve flexibility with server<br />
consolidation.<br />
2. Decrease downtime and improve reliability with<br />
business continuity and disaster recovery.<br />
3. Increase energy efficiency by running fewer servers and<br />
dynamically powering down unused servers with our<br />
green IT solutions<br />
4. Accessing more processing power (in the sense of load<br />
balancing),<br />
5. Exploitation of resource locality (for performance),<br />
resource sharing (meaning sharing of expensive or rare.<br />
6. Resources - such as telescopes or medical equipment –<br />
or large amounts o free memory by processes over a<br />
network), fault resilience.<br />
7. Simplified system administration and mobile computing<br />
(for instance as used by commuters from office to<br />
home).<br />
VI. CONCLUSION<br />
Thus, Live Migration is the movement of a virtual<br />
machine from one physical host to another while continuously<br />
powered-up. This helps in decreasing downtime and improves<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 152<br />
ISSN 2250-3153<br />
reliability with business continuity and disaster recovery. To<br />
migrate a virtual machine from one physical host to another, the<br />
control of virtual machines is configured to the management of<br />
services in Red Hat Cluster Suite. VDE (virtual distributed<br />
Ethernet) virtual switches are used which are connected between<br />
the physical machines. Using VDE, users can create VLAN for<br />
each virtual machine instance. Hence, the motive of zero<br />
downtime of virtual machines is achieved by live migration.<br />
REFERENCES<br />
[1] http://www.vmware.com/virtualization/virtual-machine.html<br />
[2] http://searchservervirtualization.techtarget.com/definition/virtual-machine<br />
[3] C Clark, KFraser, S Hand, J Hansen, and E Jul., ―Live migration of virtual<br />
machines‖, Proceedings of the 2nd ACM/USENIX Symposium on<br />
Networked Systems Design and Implementation (NSDI), pages: 273-286,<br />
2005<br />
[4] Daniel Nurmi, Rich Wolski, Chris Grzegorczyk., ―The EUCALYPTUS<br />
Open-source Cloud computing System‖, in Proceedings of Cloud<br />
Computing and Its Applications [online], Chicago, Illinois, October 2008<br />
[5] Yi Zhao, Wenlong Huang ― Adaptive Distributed Load Balancing<br />
Algorithm based on Live Migration of Virtual Machines in Cloud‖<br />
[6] Davoli,R., ―VDE: virtual distributed Ethernet‖, Test beds and Research<br />
Infrastructures for the Development of Networks and Communities, pages<br />
213-220, February 2005<br />
[7] http://www.centos.org/docs/5/html/5.1/Cluster_Suite_Overview/s1-servicemanagement-overview-CSO.html<br />
AUTHORS<br />
First Author – Ashima Agarwal, Third year, computer<br />
engineering, MIT College of Engineering, Pune, Email:<br />
ashimaagarwal30@gmail.com<br />
Second Author – Shangruff Raina, Third year,computer<br />
engineering, MIT College of Engineering, Pune, Email:<br />
shangruff@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 153<br />
ISSN 2250-3153<br />
Regulation and Accounting Treatment of Future and<br />
Option in Indian Derivative Market<br />
Matloob Ullah Khan, Dr. Ambrish Gupta and Dr. Sadaf Siraj<br />
Abstract- The main objectives of this paper are to study the<br />
Regulation of India Derivative market along with the accounting<br />
for Future and Option. In first objective we discuss about the<br />
Regulation of Indian Derivative Market as per Dr. L.C. Gupta<br />
committee report and in second objective we describe accounting<br />
adjustment procedure of Future and Option at the time of<br />
payment or receipt of mark-to-market margin, initial margin,<br />
open interest as on balance sheet date, final settlement or squareup,<br />
daily settlement, at the time of default, discloser requirement<br />
and method for determination of profit or loss in multiple option<br />
situations.<br />
Index Terms- Accounting for Future & Option and Regulation<br />
of Derivative Market<br />
T<br />
I. INTRODUCTION<br />
he trading in derivative market comes under provision<br />
contained in the SC(R)A (Security Contract Regulation Act).<br />
The Security Exchange Board of India (SEBI) created rules and<br />
regulation related to the trading in derivative market segment.<br />
According to the need of time, SEBI changed or revised the rules<br />
and regulation of financial market to keep the investor secure or<br />
try to put the investor on safer side of the investment by reducing<br />
the level of risk with the help of different polices of regulatory<br />
frame work of derivative market.<br />
Derivative market is basically a subset of capital market due<br />
to that reason controlling body of both the markets is same. To<br />
run this segment various expert group of people developed<br />
various derivative market products which run or executed under<br />
SEBI guideline, which are followed by every members who<br />
come under the agreement of derivative trade weather it is a<br />
client, banker, dealer, stock exchange, mutual funds companies<br />
and Foreign Institutional Investor (FII) etc.<br />
II. LITERATURE REVIEW<br />
The regulatory frame work of Indian derivative market is a<br />
critical or complicated part of overall capital market of India.<br />
Derivative market products itself contain the property of<br />
complicated structure in tem of working mechanism and<br />
valuation of price. This true fact will be clear when it discussed<br />
later on how the regulation, control, development and settlement<br />
of derivative market trading are take place by the suitable<br />
amendment to the bye-lows of stock exchange where derivative<br />
trading was permitted.<br />
[1] Sahoo (1997), analysis the securities market reform in a<br />
development countries and he found that the role of state<br />
involvement in the functioning of markets is a matter of<br />
significant debate, it is generally agreed that regulation has a<br />
very important and key role to ensure the efficient functioning of<br />
markets and avoidance of systematic failure. [2] Hathaway<br />
(1998), notice that the major contributory factors for<br />
accomplishment or breakdown of derivative market are market<br />
culture, the underlying market including its depth and liquidity<br />
and financial infrastructure including the regulatory framework.<br />
[3] International Organisation of securities commissions<br />
(IOSCO) 1996a, also observed that the successful regulatory<br />
system can balance the incentives of self-regulation while<br />
reducing the incentives and opportunity for behaviour, which<br />
threatens the success and integrity of market.<br />
[4] Dr. L.C Gupta committee (March 1998) developed<br />
appropriate regulatory framework for derivatives trading in India.<br />
[5] Prof. J.R Verma Committee ( June 1998) study the risk<br />
containment measure for derivatives trading in Indian derivative<br />
market which is not covered by Dr. L.C. Gupta committee before<br />
implementation of derivative trading in India. [6] SEBI Advisory<br />
committee ( September 2002) work on the development and<br />
regulation of derivative market in India after seeing powerful<br />
growth in this sector from 11 crores to 410 crores during the<br />
financial year 2000-01 to 2001-02, this committee cover some<br />
important issues such as: Physical settlement of stock option and<br />
stock future contract; Review of the eligibility criteria of stocks<br />
on which derivative products are permitted; Use of sub-brokers<br />
in the derivative market; and Norms for use of derivatives by<br />
mutual funds.[7]Shri K.R Ramamoorthy committee (February<br />
2003) was appointed by SEBI to look on the participation of<br />
security brokers in commodity future market and his committee<br />
was examine the various aspects related to participation of<br />
securities market brokers in commodity market and it give<br />
specific focus on following issues: Weather securities brokers<br />
could participated in commodities market; What would be the<br />
risk containment measure if the risk of one market does not spill<br />
over to other; and whether the existing infrastructure of stock<br />
exchange could be used for the commodities futures market.<br />
[8] The SEBI Group on Secondary Market Risk Management<br />
(March 2003) discussed the introduction of interest rate<br />
derivatives in India, this group basically covered the following<br />
important issues such as: The time table for introduction of<br />
exchange traded interest rate derivatives in India; The<br />
specification of the initial set of interest rate derivative contracts<br />
to be introduced; The road map for introduction of additional<br />
products; The risk containment systems for the initial set of<br />
derivatives; and The road map for research in fixed income<br />
analytics and the resulting refinement of product design and fine<br />
tuning of the margining system. The conclusion of these issues is<br />
put for public comments by this group and developed<br />
consultative document. [9] In 2006 RBI draft comprehensive<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 154<br />
ISSN 2250-3153<br />
guidelines on derivatives instrument under which it cover most<br />
of terms and policy of derivative markets.<br />
[10][11]The RBI-SEBI Standing Technical committee (2008 and<br />
2009) draft policy and trading guideline for exchange traded<br />
currency future and interest rate future under which it covers<br />
various aspects under headings Product Design, Risk<br />
Management Measures, Surveillance & Disclosures, Eligibility<br />
criteria for setting up a currency and interest rate futures<br />
segment, Eligibility criteria for members of the currency and<br />
interest rate future segments and finally Design Regulatory &<br />
Legal Aspects.<br />
III. RESEARCH METHODOLOGY<br />
Research methodology used in this paper is based on<br />
‗Qualitative Research‟. In which, we study various government<br />
policies and regulation of Indian derivative market related to<br />
accounting treatments of Future and Option. On the basis of our<br />
understanding we define different type of accounting treatments,<br />
which take place during the life of Future and Option contract.<br />
Explanation of accounting treatments are done in such a manner<br />
while keeping in mind that it will be useful to all main kind who<br />
are interested to know about accounting for F&O.<br />
IV. OBJECTIVES<br />
Regulation for derivative trading according to Dr. L.C<br />
Gupta committee;<br />
Accounting for Future; and<br />
Accounting for Option;<br />
V. REGULATION FOR DERIVATIVES TRADING IN<br />
INDIA<br />
SEBI create a 24 member committee under the supervision of<br />
Dr. L.C. Gupta. To developed a well organized regulatory<br />
framework for derivatives trading in India. SEBI accept the<br />
recommendation of this committee on 11 May 1998 and<br />
approved the phase introduction of derivatives trading in India<br />
beginning with stock index future. The requirements in the<br />
SC(R)A and the regulatory frame work developed there under<br />
preside over trading in securities. The modification of the<br />
SC(R)A to include derivatives within the frame work of that Act.<br />
Summary of derivative regulation are given blow on the basis of<br />
Dr. L.C Gupta committee recommendation.<br />
1. Any exchange in India, who are interested to start<br />
derivative trading so they have to fulfil the eligible<br />
criteria as per Dr. L.C. Gupta committee report and<br />
apply SEBI for the purpose of approval for derivative<br />
trading under section 4 of SC(R)A 1956.<br />
2. Derivative trading or clearing member should have a<br />
limit to maximum of 40% of total member council and<br />
the particular exchange should have separate governing<br />
council.<br />
3. The exchange should have to obtain prior approval of<br />
SEBI before starting of trading in any derivative<br />
contract or product and would have to regulate the sales<br />
practices of its members.<br />
4. The exchange has a limit up to 50 members.<br />
5. The member of an alive segment would not become the<br />
member of derivative segment automatically. Every<br />
existing segment member should take permeation of<br />
SEBI and also fulfil L.C Gupta committee criteria to<br />
start derivative trading.<br />
6. Clearing and any settlement of derivative contract or<br />
trade should be done through a SEBI approved clearing<br />
corporation or houses and every clearing corporation or<br />
houses should be came under the criteria of L. C. Gupta<br />
committee and also take approval for SEBI to start<br />
clearing and settlement process.<br />
7. Every brokers, dealers and clearing members of<br />
derivative market should take approval along with<br />
registration in SEBI to start new derivative product.<br />
8. least amount of net-worth of clearing member of<br />
derivative clearing corporation or houses shall be Rs. 3<br />
Cr. and net-worth should be computed on the basis of<br />
given function:<br />
Where<br />
Networth;<br />
Capital;<br />
Free Reserve; and<br />
Non-Allowable assets;<br />
Non-Allowable assets included the following items:<br />
I. Fixed assets;<br />
II. Intangible assets;<br />
III. Prepaid expenses;<br />
IV. Bad deliveries;<br />
V. Unlisted security;<br />
VI. Member‘s card;<br />
VII. Pledged security;<br />
VIII. Doubtful debts and advances; and<br />
IX. 30% marketable securities;<br />
…(1)<br />
9. The maximum contract value shall not be less than Rs 2<br />
lakh;<br />
10. Exchange should have submitted details of the futures<br />
contract they intend to introduce.<br />
11. The initial margins obligation and introduction limit<br />
should be correlated to capital adequacy and marginal<br />
demands related to the risk of loss on the position will<br />
be approved by SEBI time to time.<br />
12. L.C Gupta committee give more emphasis on ‗know<br />
your customer‘ rule and prerequisite that every client<br />
shall be registered with the derivatives broker.<br />
13. The member of derivative segment are also required to<br />
aware their client about the risk participation of<br />
derivative contract and risk awareness document are<br />
also attached with customer document, which generate<br />
alertness to customer or client about derivatives losses.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 155<br />
ISSN 2250-3153<br />
14. Every person of trading member should be qualified as<br />
per SEBI requirement and he or she also passed<br />
certification program approved by SEBI.<br />
VI. ACCOUNTING FOR FUTURES<br />
The Institute of chartered Accountant of India (ICAI) has issued<br />
guideline on accounting of Equity Index Future and Equity Stock<br />
Future. Accounting of future is based on regulation of exchange<br />
and typical trading mechanism of derivative contract. Before<br />
that, there were many issues relating to accrual of income,<br />
booking of losses, calculation of profit and disclosures. Now a<br />
day‘s most of the issues are solved or dealt with in guidance note<br />
issued by the institute. Equity derivative instrument are the type<br />
of instrument in which other parties are also involved in the<br />
trading process same as cash market or simple share market.<br />
These parties are brokers, trading members, clearing members,<br />
clearing corporations and client, so for that reasons proper<br />
accounting are also required to minimize the losses and to<br />
maintain proper working mechanism. Some of the technical<br />
terms are used in this section list are given blow:<br />
Clearing member;<br />
Clearing corporation and houses;<br />
Client;<br />
Contract month;<br />
Daily settlement price;<br />
Derivative exchange or segment;<br />
Final settlement;<br />
Long position;<br />
Open position;<br />
Settlement date;<br />
Short position; and<br />
Trading member;<br />
Most of the above term itself define its meaning but few terms<br />
are not understandable such as Long position, Open position and<br />
Short position, which may be define as follow:<br />
Long Position: Long position in an equity index future contract<br />
means outstanding purchase obligations in respect of the equity<br />
index futures contract at any point of time;<br />
Open position: Open position means the total number of equity<br />
index future contracts that have not yet been offset and closed by<br />
an opposite position; and<br />
Short Position: Short position in an equity index future contract<br />
means outstanding sell obligations in respect of the equity index<br />
futures contract at any point of time;<br />
Accounting for Equity Index Future and Equity Stock Future<br />
include the following treatments<br />
Figure 1.1<br />
Accounting for the Payment or Receipt of Mark-to-Market<br />
Margin: Payment mode or received on account Mark-to-Market<br />
margin by the client would be credited or debited to the bank<br />
account and the subsequent debit or credit for the same should be<br />
made to an appropriate account, state, ‗Mark-to-Market Margin<br />
in Equity Index Future account and Mark-to-Mark Margin in<br />
Equity Stock Future account as the case might be. The amount of<br />
Mark-to-Market Margin received into or paid from<br />
approximately deposit with the clearing or trading member<br />
should be debited or credited to the deposit for margin money<br />
account with the consequent credit or debit to the Mark-to-<br />
Market margin in Equity Future account or the Mark-to-Market<br />
margin in Equity Stock Future account as the case might be.<br />
Accounting for Initial margin: When Futures Contract is<br />
entered into for purchase or sale of Equity Index or Equity Stock<br />
Future, then no payment is required to be prepared except for the<br />
initial margin. Clearing Corporation or Houses determines this<br />
margin from time to time and it serve as security deposit for the<br />
exchange. The margin can be paid either in cash or in the form of<br />
collaterals like bank guarantees, securities and fixed deposits.<br />
Basically Initial margin paid in cash shall be debited to ‗Initial<br />
Margin Index or Stock Future account‘ and supplementary<br />
margin paid if any shall be accounted in the same manner. As the<br />
Balance Sheet date the balance in initial margin account shall be<br />
shown individually in respect of each progression under the head<br />
‗Current Assets‘. The acknowledgment or receipt of initial<br />
margin in the form of collaterals shall be recorded in<br />
memorandum records and no entry is required to be made in the<br />
financial book. If any collateral is returned back the<br />
memorandum records shall be updated in view of that.<br />
Accounting for Open Interests in Futures Contract as on the<br />
Balance Sheet Date: ‗Mark-to-Market margin in Equity Index<br />
Future account or the Mark-to-Market margin in Equity stock<br />
Future account‘ are the debit or credit balance, which represent<br />
the net amount paid to or received from the clearing or trading<br />
member on the basis of the movement of in the prices of Equity<br />
Index Futures or Equity Stock Futures till the balance sheet date<br />
in esteem of open future contract. In another case the given<br />
accounts have a debit balance as the balance sheet date and the<br />
same should be shown as current assets or on the other case if<br />
given accounts have a credit balance on the balance sheet date,<br />
the same should be shown as a current liability. You should keep<br />
in mind that ‗Prudence‘ as a consideration for the preparation of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 156<br />
ISSN 2250-3153<br />
financial statements, the provision for the anticipated loss in<br />
respect of open futures contract should be made. For this purpose<br />
the net amount paid or received on account of Mark-to-Market<br />
margin on open future contracts on the balance sheet date should<br />
be shown index wise or script wise. In this process the index<br />
wise or script wise balance is a debit balance representing the net<br />
amount paid and this condition should be made for the given<br />
amount. In another case where the index wise or script wise<br />
balance is a credit balance represent the net amount received and<br />
the same should be ignored keeping in view the consideration of<br />
‗Prudence‘. To smooth the progress of these computations, the<br />
Mark-to-Market margin accounts may be maintained index wise<br />
or script wise. The provision which should be discussed on above<br />
lines should be credited to an appropriate amount under the<br />
heading ‗Provision of loss on Equity Index Future Account‘ or<br />
‗Provision on loss on Equity Stock Future account‘ as the case<br />
might be. If in case of any opening balance in the ‗Provision for<br />
loss on Equity Stock or Equity Index Future Account‘, the same<br />
balance should be adjusted against the provision required in the<br />
current year and the profit and loss account should be debited or<br />
credited with the balance provision required to be made or excess<br />
provision written back. The ‗Provision for loss on Equity Index<br />
or Equity Stock Future Account‘ should be shown as a deduction<br />
from the balance of Mark-to-Market Margin of Equity Index or<br />
Equity Stock Future Account, if it disclosed as a current asset.<br />
On the other hand, if the above given treatment of margin<br />
accounts are disclosed as a current liability then the<br />
abovementioned provision accounts should be shown as a<br />
provision on the liabilities side of the balance sheet.<br />
Accounting at the time of Final Settlement or Squaring up of<br />
the contract: At the time of expiry of the contract or squaring up<br />
the contract, the profit or loss is computed and acknowledged in<br />
the profit or loss account. The profit or losses in such cases is the<br />
difference between final account price and contract price. The<br />
entries describing to profit and loss shall be approved by<br />
consequent debit to credit to the Mark-to-Market margin account<br />
and the balance in Market-to-Market account for a particular<br />
progression of contract this will be documented as income or<br />
expenses on final settlement. Basically if balance exists in the<br />
provision accounts, which may have been created at the yearend<br />
for predictable loss and if any losses arising on such settlement<br />
shell be first charged to such provision account and the balance if<br />
any should be charged to profit and loss account.<br />
Account at the time of daily settlement of the contract: This<br />
involves the accounting of payment or receipt of Mark-to-Mark<br />
margin money. Payment finished or received on account of daily<br />
arrangement by the client would be credited or debited to the<br />
bank and the subsequent debit or credit for the equivalent should<br />
be made to an account titled as ‗Mark-to-Market margin Equity<br />
Index or Stock Futures contract account‘. For a moment or<br />
sometime the client may deposit a approximate amount to the<br />
brokers or trading member in esteem of Mark-to-Market margin<br />
money as an alternative of receiving or paying mark-to-market<br />
margin money on every day basis. The amount should be paid is<br />
in the form of a deposit and it also debited to a suitable account,<br />
called: ‗Deposit for Mark-to-Market margin account‘. On that<br />
basis the amount of Mark-to-Market margin should be received<br />
or paid from such account and this account was credited or<br />
debited to Mark-to-Market margin of Equity Index or Stock<br />
Future account contract with a corresponding debit or credit to<br />
Deposit for Mark-to-Market margin account. At the financial<br />
year ending, any balance in the Deposit for Mark-to-Market<br />
margin account must be shown as deposit under the head<br />
‗Current Assets‘.<br />
Accounting at the time of default: When a client makes default<br />
in making payment in esteem of Mark-to-Market margin, then<br />
account should be closed out and the amount not paid by the<br />
client is adjusted against the initial margin already paid by the<br />
client. In the accounting book or ledger of the client, the amount<br />
of Mark-to-Market margin so adjusted should be debited to the<br />
Mark-to-Market margin of Equity Index or Stock Future account<br />
as the case may be , with a related credited to the initial margin<br />
of equity derivative instrument account. In case if amount paid<br />
on Mark-to-Market margin account will exceed to initial margin<br />
then this exceed amount is a liability and should be shown as<br />
such under the head ‗Current Liability and Provisions and it also<br />
coded same on the balance sheet date. The amount of profit or<br />
loss in the given contract should be calculated and predictable<br />
under profit and loss account by corresponding debit or credit to<br />
the Mark-to-Market margin of Equity Index or Stock Future<br />
account as the case may be.<br />
Disclosure requirement for Future Account: The amount of<br />
bank assurance and book value as also the market value of<br />
securities wedged should be disclosed in respect of contract<br />
having open positions at the year end. In this case initial margin<br />
money has been paid by way of bank assurance or wedged of<br />
securitises. The total number of valuable or non-valuable<br />
contracts entered and gross number of units of Equity Index or<br />
Stock future traded individually for purchase or sell of contract<br />
should be disclosed in esteem of each progression of Equity<br />
Index or Stock future contract. The numbers of Equity Index or<br />
Stock future contract have to maintain open position and number<br />
of unit of Equity Index or Stock future have to connect with<br />
those contracts which are traded. The daily arrangement or<br />
settlement price as of balance sheet date should be represented<br />
independently for long and short situation, in respect of each<br />
progression of Equity Derivative future market.<br />
VII. ACCOUNTING FOR OPTIONS<br />
The Institute of Chartered Accountants of India (ICAI) issued<br />
guidance note on accounting for Index Option or Stock Option<br />
for the view point of the parties who enter into such contract as<br />
buyers or holder and sellers or writer. Most of the technical terms<br />
used in this section are same as future accounting which are<br />
discussed above but the accounting process of option contract is<br />
little bit different from future contract due to its nature.<br />
Following are the guideline for accounting treatment in case of<br />
cash settled Index Option and Stock Option.<br />
Accounting for Equity Index Option and Equity Stock Option<br />
include the following treatments<br />
Figure 1.2<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 157<br />
ISSN 2250-3153<br />
Accounting for payment or receipt of the premium: If client or<br />
any investor entering into an option contract, the buyer of the<br />
option is essential to pay the premium amount to the option<br />
exchange for placing the option contract. In this process the<br />
premium should be debited to an suitable account of buyer or<br />
holder, say, Equity Stock or Index Option Premium Account, as<br />
the case may be. In the ledger of seller or writer, such premium<br />
amount should be credited to an appropriate account, say, Equity<br />
Index or Stock Option Premium Account as the case may be.<br />
Accounting for open interests in option contract as on the<br />
balance sheet date: In accounting process the ‗Equity Index<br />
Option Premium Account‘ and ‗Equity Stock Option premium<br />
Account‘ should be placed under the head ‗Current Assets‘ or<br />
‗Current Liability‘ as the case may be. In the book of the buyer<br />
or holder, the provision should be made for the amount by which<br />
the premium paid for the option exceed the premium customary<br />
on the balance sheet date since the buyer or holder can reduce his<br />
loss to the extent of the premium traditional in the market, by<br />
squaring up the transaction. The provision so created should be<br />
so credited to an appropriate account, we say, ‗Provision for loss<br />
on Equity Stock or Index Option Account‘ as the case may be.<br />
The provision made as above should be shown as deduction from<br />
the balance of the ‗Equity Index or Stock Option Account‘ which<br />
is shown in the book of buyer or holder under the head ‗Current<br />
Assets‘. The excess of premium customary in the market on the<br />
balance sheet date over the premium paid is not predictable and<br />
keeping in view that the deliberation of carefulness. In the<br />
accounting book of the seller or writer, the provision should be<br />
made for the amount by which premium customary or prevailing<br />
on the balance sheet date exceed the premium amount get from<br />
the option. According to that this provision should be credited to<br />
‗Provision for loss on Equity Index or Stock Option Account‘ as<br />
the case may be, with a consequent or equivalent debit to profit<br />
and loss account. Equity Index or Stock Premium Account‘ and<br />
‗Provision for loss on Equity Index or Stock Option Account‘<br />
should be or will be shown under ‗Current Liability and<br />
Provisions‘. If in case of multiple open options at the yearend, a<br />
index wise or script wise provision should be making an<br />
allowance for all the open options of any Strike Price and any<br />
expiry date under the script taking together. The amount of<br />
provision required in esteem of each script or index should be<br />
aggregated and a amalgamated ‗Provision for loss on Equity<br />
Stock or Index Option Account‘ should be credited by debiting<br />
the profit or loss account. In case of any opening balance in the<br />
‗Provision for loss on Equity Stock or Index Option Account‘,<br />
the same should be suitable against the provision required in the<br />
current year and the profit and loss account be debited or credited<br />
with the balance provision obligatory to be made or excess<br />
provision written back. If we consider the case of multiple open<br />
options at the year ended, the ‗Provision for loss on Equity Stock<br />
or Index Option Account as the case may be, should be shown as<br />
subtraction from the ‗Equity Stock or Index Option Premium<br />
Account‘ respectively, if these have a debit balance and are<br />
disclosed under the head ‗Current Assets‘ On the other hand if<br />
‗Equity Index or Stock Option Premium Account‘ have a credit<br />
balance and are disclosed under the book of account under the<br />
head ‗Current Liabilities‘, due to that reason particular provision<br />
account should be shown ‗Provision‘ under the head ‗Current<br />
Liabilities and Provisions‘<br />
Accounting at the time of final settlement: In this section we<br />
have study the accounting process of Equity Index Option or<br />
Equity Stock Option in the final settlement of cash-settled stock<br />
options contracts and delivery-settled stock options contracts for<br />
buyer or holder and seller or writer.<br />
In the process of cash settled stock option contract, two<br />
accounting books are deals:<br />
1. In the books of buyer and holder; and<br />
2. In the books of the seller and writer;<br />
In the books of buyer and holder on the implement of the Option,<br />
the buyer and holder will identify premium as an outflow and<br />
debit the profit and loss account by crediting the ‗Equity Index or<br />
Stock Option Premium Account‘. Apart from the higher<br />
arrangement in the above discussed segment, the buyer or holder<br />
will receive favourable difference, if any, between the final<br />
settlement price as on the exercise or expiry date and the strike<br />
price, which will be acknowledged as income.<br />
In the books of the seller or writer on the exercise of the option,<br />
the seller or writer will be acquainted with premium as an<br />
income and credit the profit and loss account by the debiting the<br />
‗Equity Index or Stock Option Premium Account‘ Apart from the<br />
higher arrangement in the above discussed segment, the seller or<br />
writer will pay the adverse difference, if any, between the final<br />
settlement price as on the exercise or expiry date and the strike<br />
price. Such kind of payment will be acknowledged as a loss.<br />
In the process of Delivery settled stock option contract, two<br />
accounting books are deals:<br />
If an option is not exercise and also expires, then accounting<br />
entries will be the same as those in case of cash settled options. If<br />
the option is exercised, securities will be transferred in<br />
deliberation for cash at the strike price. In such a case, the<br />
accounting treatment should be as suggested in the subsequent<br />
ways which are given blow:<br />
1. In case of buyer or holder; and<br />
2. In case of seller or holder;<br />
In case of buyer or holder for a call option, the buyer or holder<br />
will receive the security for which the call option was entered<br />
into. The buyer or holder should debit the appropriate security<br />
account and credit cash or bank. For a put option, the buyer or<br />
holder will deliver the security for which the put option was<br />
entered into. The buyer or holder should credit the appropriate<br />
security account and debit into cash or bank. In additional to this<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 158<br />
ISSN 2250-3153<br />
entry, the premium paid should be transferred to the profit and<br />
loss account, the accounting entries for which should be the<br />
equivalent as those in case of cash settled option.<br />
In case of seller or writer for a call option, the seller or writer<br />
will deliver the security for which the call option was entered<br />
into. The seller or writer should credit the relevant security<br />
account and debit cash or bank. For a put option, the seller or<br />
writer will obtain the security for which the put option was<br />
entered into. The seller or writer should debit the relative security<br />
account and credit cash or bank. In addition to this entry, the<br />
premium received should be transferred to the profit and loss<br />
account, the accounting entries for which should be the same as<br />
those in case of cash settled option.<br />
Accounting at the time of square up of an option contact: At<br />
the time when an option contract is square up by entering into a<br />
reverse contract, the difference between the premium paid and<br />
received, after adjusting the commission or brokerage charged,<br />
on the squared up contact should be transferred on the profit and<br />
loss account.<br />
Accounting method for determination of profit or loss in the<br />
multiple option situations: In the case of outstanding multiple<br />
options to work out profit or loss we used the same script or<br />
index with the same strike price and the same expiry date,<br />
weighted average method should be followed on squaring-up of<br />
transactions. Similarly for working out profit or loss in case of<br />
remaining left multiple equity stock option of the same script<br />
with the same strike price and the same expiry date, weighted<br />
average method should be used where such options are executed<br />
prior to the running out date.<br />
VIII. CONCLUSION<br />
This paper discusses the Regulation of Indian Derivative<br />
market as per Dr. L.C. Gupta committee and also cover<br />
accounting for Future and Option. On the basis of our analysis<br />
we found that accounting for future and option are complicated<br />
in nature due to its adjustment process for ‗Equity Index Future<br />
& Option‘ and ‗Equity Stock Future & Option‘ in various books<br />
of account during the life of derivative contract from one point to<br />
another point and it also requires more transparency and financial<br />
stability in derivative transaction.<br />
REFERENCES<br />
[1] Sahoo M.S. (November 1997), ―Securities market reform in a developing<br />
country‖, Chartered Secretary, Volume XXVII, Number: 11, Pp. 1261-<br />
1269.<br />
[2] Hathaway, Kate (October 1988), ―Regulatory parameters associated with<br />
successful derivatives‖, Chartered Secretary, Volume XXVII, Number: 10,<br />
Pp. 981-988.<br />
[3] IOSCO Report (June 1996(a)), ―Legal and regulatory framework for<br />
exchange traded derivatives‖, International Organisation of Securities<br />
Commission.<br />
[4] Gupta L.C. (March 19980, ―Suggestive bye-lows for regulation and control<br />
of trading and settlement of derivative contract‖, The SEBI Committee on<br />
derivatives trading in India.<br />
[5] Varma J.R (June 1998), ―Risk containment in the derivative market‖,<br />
Varma Committee Report form by SEBI.<br />
[6] SEBI Advisory Committee on Derivative (September 2002), ―Report on<br />
Development and Regulation of Derivative Market in India‖.<br />
[7] Ramamoorthy K.R. (February 2003), ―Report of the Participation of<br />
Security Brokers in Commodity Future market‖ Committee formed by SEBI.<br />
[8] SEBI Group on secondary market risk management (March 2003),<br />
―Exchange traded interest rate derivatives in India‖, Consultative<br />
Document.<br />
[9] Draft Comprehensive guideline on Derivative by RBI (2006).<br />
[10] Report of the RBI-SEBI Standing Technical Committee on Exchange traded<br />
currency future (2008).<br />
[11] Report of the RBI-SEBI Standing Technical Committee on Interest rate<br />
futures (June 2009).<br />
[12] National Stock Exchange of India limited (2001), ―Indian security market:<br />
A review‖, Volume IV, Pp. 270-221.<br />
[13] Report of derivative market review committee form by SEBI (December<br />
2008).<br />
[14] Sahoo M.S. (June 1999), ―Forward trading in securities in India.‖ Chartered<br />
Secretary. Volume XXIX, Number: 06, Pp. 624-629.<br />
[15] Sahoo M.S. (December 20000), ―Taxability of Income arising from<br />
derivative contracts‖, NSE News, Pp. 9-10.<br />
[16] Securities and Exchange Board of India Depositories Act, 1996. Guide line.<br />
[17] The security and exchange board of India Act, 1992. Guide line.<br />
[18] http://www.sebi.gov.in<br />
[19] http://www.nseindia.com<br />
[20] http://www.rediff/money/derivatives<br />
[21] http://www.derivativeindia.com<br />
[22] http://www.icai.org/publications.html<br />
AUTHORS<br />
First Author – Matloob Ullah Khan, Ph.D, Research Scholar,<br />
Department of Management, Jamia Hamdard, New Delhi, India.<br />
Email: matloobullah.khan@gmail.com;<br />
Second Author – Dr. Ambrish Gupta, Senior Professor, FORE<br />
School Of Management, New Delhi, India. Email:<br />
ambrish@fsm.com;<br />
Third Author – Dr. Sadaf Siraj, Assistant Professor, Department<br />
of Management, Jamia Hamdard, New Delhi, India. Email:<br />
sirajsadaf@gmail.com;<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 159<br />
ISSN 2250-3153<br />
P-FUZZY SUBALGEBRA AND ITS PROPERTIES<br />
Dr. G. NIRMALA 1 , S.PRIYADARSHINI 2<br />
1 Research Advisor, Manonmaniam Sundaranar University, Tirunelveli, India<br />
E mail:nirmalamanokar11@yahoo.com<br />
2 Research Scholar, Manonmaniam Sundaranar University, Tirunelveli, India<br />
E mail:priya002darshini@gmail.com<br />
Abstract- We give definition for fuzzy subalgebras for<br />
partially ordered algebra, Fuzzy subgroup and fuzzy coset. Then<br />
we study their connection of P – fuzzy subalgebras with fuzzy<br />
subgroup and fuzzy coset.<br />
Index Terms- P – fuzzy subalgebras, fuzzy subgroup and<br />
fuzzy coset.<br />
I<br />
I. INTRODUCTION<br />
n 1965, Lotfi. Zadeh introduced the notion of a fuzzy subset of<br />
a set as a method for representing uncertainty. A fuzzy set A is<br />
defined as a map from A to the real unit interval<br />
I = [0, 1]. The set of all fuzzy sets on A is usually denoted by I A .<br />
It is also known that under the natural ordering I A is a complete<br />
lattice. Early Greeks, such as Pythagoras and Euclid, relied on<br />
geometry to express all of their logical proofs. It was about<br />
250CE when the Greek Diophantus began using Greek letters as<br />
numbers and other mathematical symbols. Finally, algebra began<br />
to take on its modern symbolic look when viete used letter for<br />
variables around 1600. Then in 1637, Descartes wrote la<br />
geometrie. Before these mathematicians had thought of<br />
polynomials specially, so X3 actually represented a cube. His<br />
written algebra is the first to look almost exactly like ours.<br />
The definitions given to the concept of P – fuzzy subalgebra,<br />
fuzzy subgroup and fuzzy coset also involve different operations.<br />
Now we unify and generalize these definitions. The theorems<br />
proved also highly generalize the existing ones.<br />
II. PRELIMINARIES<br />
Definition 2.1 If (P,≤ ) is a partially ordered set and X is a<br />
nonempty set, then any mapping<br />
A : X→P is a partially ordered fuzzy set on X.<br />
Definition 2.2 A P – fuzzy set μ Є P A is called a P – fuzzy<br />
algebra or fuzzy subalgebra on the algebra A, if<br />
For any n – ary ( n≥1 ) operation f Є F<br />
μ(f(x1………..xn)) ≥ μ(x1)……………..μ(xn) for all<br />
x1………..xn Є A<br />
For any constant ( nullary operation) C<br />
μ(c) ≥ μ(x) for all x Є A.<br />
Definition 2.3 Let G be a group. A fuzzy subset μ of a group G is<br />
called a fuzzy subgroup of the group if<br />
μ (xy) ≥ min {μ(x) , μ(y)} for every x,y Є G and<br />
μ (x -1 ) = μ (x) for every x Є G.<br />
Definition 2.4 Let μ be a fuzzy subgroup of a group g. For any a<br />
Є G, a μ defined by<br />
(aμ)x = μ(a -1 x) for every x Є G is called the fuzzy coset of the<br />
group G determined by a and μ.<br />
Result: 2.5<br />
A fuzzy subset μ of a group g is a fuzzy subgroup G iff<br />
μ(xy -1 ) ≥ min { μ(x) , μ(y) } for every x,y Є G.<br />
III. RESULTS<br />
Theorem:3.1 P – fuzzy subalgebra is a fuzzy subgroup.<br />
Proof:<br />
Consider a P – fuzzy subalgebra on the algebra A then<br />
there eists a P –fuzzy set<br />
μ Є P A then for<br />
(i) n – ary operation<br />
μ(f(x1………..xn)) ≥ μ(x1)……………..μ(xn) for all<br />
x1………..xn Є A-(1)<br />
from (1) let x2 = y<br />
μ(f(xy)) ≥ μ(x)μ(y)-(2)<br />
since μ(xy) ≥ min {μ(x) , μ(y)}-(3)<br />
from (2) and (3)<br />
μ(x)μ(y) = μ(xy) ≥ min {μ(x) , μ(y)}-(4)<br />
Let μ: X→[0,1]<br />
Here μ is a function defined that X is a set which map it<br />
each and every element between 0 and 1.<br />
Also the set of all elements of X -1 maps the values<br />
between 0 and 1.<br />
Therefore μ: X -1 →[0,1].<br />
This implies μ(x -1 ) = μ(x)-(5)<br />
(ii) nullary operation ( for any constant)<br />
If there exist any constant μ(c) then<br />
μ(c) μ(x) = μ(c x) ≥ min {μ(c) , μ(x)}= μ(x)-(6)<br />
μ(c) ≥ μ(x), for all x Є A.<br />
Since all the element of μ(x) lies between 0 and 1. Also<br />
μ(c) is any constant and it is greater than or equal to 1. Using the<br />
results (4), (5) and (6), it is clear that P – fuzzy subalgebra is a<br />
subgroup.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 160<br />
ISSN 2250-3153<br />
Example:<br />
Let P = {1,-1, i,-i} be the P- fuzzy set in P- fuzzy<br />
algebra.<br />
Define<br />
μ: P→[0,1] by<br />
1 if x = 1<br />
μ(x) = 0.5 if x = -1<br />
0 if x = i, -i, 1/i, -1/i<br />
Clearly μ is a fuzzy subgroup of the P. Also P is a group under<br />
operation .<br />
Theorem:3.2 A P – fuzzy subalgebra of a group G is a fuzzy<br />
subgroup of the group G iff<br />
μ(xy -1 ) ≥ min { μ(x) , μ(y) } for every x,y Є G.<br />
Proof:<br />
Real part:<br />
Consider a P – fuzzy subalgebra of a group G is a fuzzy<br />
subgroup on the algebra A then we have to prove that<br />
μ(xy -1 ) ≥ min { μ(x) , μ(y) }<br />
proof:<br />
For P – Fuzzy subalgebra, there exist a P –fuzzy set μ Є P A , then<br />
(i) For n – ary operation<br />
μ(f(x1………..xn)) ≥ μ(x1)……………..μ(xn) for all<br />
x1………..xn Є A<br />
Let x1, x2 Є P where P Є G<br />
Consider x1 = x and x2 = y -1<br />
Since it is a fuzzy subgroup using theorem (1)<br />
Therefore μ(f(x1 x2)) = μ(f(x y -1 ))<br />
≥ μ(x) μ(y -1 )<br />
μ(x) μ(y -1 ) = μ(x y -1 )<br />
since fuzzy algebra satisfies fuzzy relation<br />
so μ(x y -1 ) ≥ μ(x) Λ μ(y -1 ) using equation (5)<br />
≥ μ(x) Λ μ(y)<br />
≥ min{μ(x), μ(y)}<br />
(ii) for nullary operation<br />
μ(c) ≥ μ(x) for all x Є A.<br />
using theorem (1), it is a subgroup<br />
therefore there exist an identity element,let it be μ(e)<br />
we know that μ(c) ≥ μ(x)<br />
μ(c) = μ(c) μ(e -1 ) ≥ μ(c) μ(e) using equation (5)<br />
≥ μ(c) Λ μ(e)<br />
≥ min{μ(c), μ(e)}= μ(e)-(7)<br />
C is any constant it may be greater than or equal to identity<br />
element.<br />
Also<br />
μ(x) = μ(x) μ(e -1 ) ≥ μ(x) μ(e) using equation (5)<br />
≥ μ(x) Λ μ(e)<br />
≥ min {μ(x), μ(e)}= μ(x)-(8)<br />
All the elements of x are less than or equal to identity element.<br />
Converse part:<br />
If μ (xy -1 ) ≥ min {μ(x) , μ(y) } for every x, y Є P and P Є G then<br />
a fuzzy partially ordered subset μ of a group is a fuzzy subgroup<br />
of the group G.<br />
Proof:<br />
μ (xy -1 ) ≥ min { μ(x) , μ(y -1 ) }<br />
≥ min { μ(x) , μ(y) } using (5)<br />
≥ μ(x) Λ μ(y)<br />
μ (xy -1 ) = μ(x y -1 ) using fuzzy algebra relation.<br />
μ(x y -1 ) = μ(x) μ(y -1 ) = μ(x) μ(y)<br />
≤ μ(f(x y)) ( n- ary operation)<br />
This implies μ(f(x y)) ≥ μ(x) μ(y)-(9)<br />
Let μ(c) be any constant and μ(e) be an identity element, then<br />
Assume that<br />
μ(c) = μ(x)<br />
μ(c) μ(e -1 ) = μ(x) μ(e -1 )<br />
using (5)<br />
μ(c) μ(e) = μ(x) μ(e)<br />
μ(c) μ(e) ≥ min { μ(c) , μ(e) } = μ(e)<br />
μ(x) μ(e) ≥ min { μ(x) , μ(e) } = μ(x)<br />
C is any constant it may be greater than or equal to identity<br />
element and x.<br />
Therefore, μ(c) ≥ μ(x)-(10)<br />
Using (9) and (10)<br />
If μ (xy -1 ) ≥ min { μ(x) , μ(y) }then P- fuzzy subalgebra is a<br />
fuzzy subgroup.<br />
Theorem:3.3 P – fuzzy subalgebra is a fuzzy coset of the group.<br />
Proof:<br />
Let μ be a fuzzy subgroup of a group G from fuzzy<br />
algebra A.<br />
To prove that: For any a Є G, a μ is defined by (aμ)x =<br />
μ(a -1 x) for every x Є G, also x Є P.<br />
Consider P – fuzzy subalgebra to prove fuzzy coset,<br />
assume that n = 1<br />
Then we use n – ary operation<br />
μ(f(x)) ≥ μ(x)<br />
Let a Є P and P Є G<br />
a μ(f(x)) ≥ aμ(x)<br />
(aμ)x = (μa)x<br />
Since P – fuzzy algebra satisfy commutative law<br />
(μa)x = μ(ax) using (5)<br />
= μ(a -1 x)<br />
Since P fuzzy subalgebra is afuzzy subgroup<br />
Therefore,<br />
(aμ)x = μ(a -1 x) for every x Є G<br />
IV. CONCLUSION<br />
This paper concludes the connection of P – fuzzy subalgebra<br />
with fuzzy subalgebra and fuzzy coset of a group.<br />
REFERENCES<br />
[1] Laszlo filep.Study of fuzzy algebras and relations from a general viewpoint,<br />
acta Mathematica Academiae Paedagogicae Nyrlregyhaziensis,Tonus<br />
14(1998), 49-55.<br />
[2] W.B.Vasantha kandasamy. Smarandache fuzzy algebra.american research<br />
press, Rehoboth 2003.11-12.<br />
[3] I. M. Anthony and H. Sherwood. Fuzzy groups redefined, Journal Math.<br />
Anal. Appl., 69:124-130,1979<br />
[4] L. Filep. Fundamentals of a general theory of fuzzy relations and algebras.<br />
In Proc. 4 th IFSA World congress, Pages 70-74, Brussels 1991.<br />
[5] J. A. Gougen. L-fuzzy sets. Journal Math. Anal. Appl., 18:145-1741,1967.<br />
[6] A. Rosenfeld. Fuzzy graphs. In Fuzzy sets and their applications to<br />
cognitive and decision process, pages 77-95, Academic Press, 1975.<br />
[7] L. A. Zadeh. Fuzzy sets. Information Control, 8:338-353, 1965.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 161<br />
ISSN 2250-3153<br />
[8] Ovchinnikov, S., Similarity Relation, Fuzzy Partitions and Fuzzy Orderings,<br />
Fuzzy Sets and Systems, 40(1991) 107-126.<br />
[9] Seselja, B., Tepavcevic, A., On a construction of codes by P-fuzzy sets,<br />
Univ. u Novom Sadu Zb. Rad. Prirod. – Mat. Fak. Ser. Mat., 20,2(1990),71-<br />
80.<br />
[10] Seselja, B., Tepavcevic, A., Partially Ordered and Relational Valued Fuzzy<br />
Relations I, Fuzzy Sets and Systems.<br />
[11] Fuzzy Set Theory and its Applications, Second edition by H. J.<br />
Zimmermann.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 162<br />
ISSN 2250-3153<br />
Energy Conservation through Roof Surface Evaporative<br />
Cooling for Air Conditioning System<br />
R.B. Lokapure, J.D.Joshi<br />
Dept of Mechanical Engg., Bharti Vidyapeeth College of Engg., Shivaji University Kolhapur, India<br />
Abstract- Day by day the demand of energy is rising<br />
tremendously, but there is lack in supply. So there is no option<br />
for proper and efficient utilization and conservation of energy. In<br />
this paper the main stress is given on energy conservation by<br />
using technique of Roof surface evaporative cooling for Airconditioning<br />
system. The target of saving and conserving energy<br />
up to 15 to 22% but in this case we achieved our goal of energy<br />
saving up to 13% by adopting RSEC technique.<br />
Keywords- Appliance load, Cooling load, DCS Room,<br />
Evaporative cooling, Energy conservation, Thermal<br />
transmittance (U), Vfds<br />
E<br />
I. INTRODUCTION<br />
nergy is a basic requirement for the existence and<br />
development of human life, primarily; the commercial<br />
sources such as fossil fuels (coal, oil and natural gas),<br />
hydroelectric power and nuclear power provide the energy needs<br />
of a country. The fear of release of radioactivity into the<br />
atmosphere in the event of an accident or from nuclear waste has<br />
forced people to reconsider the use of nuclear power. In view of<br />
these problems associated with conventional energy sources, the<br />
focus is now shifting to conservation of energy.<br />
In a commercial building, the cooling load can be saved by<br />
about 26% in a hot and dry climate (like Jodhpur) by adopting<br />
appropriate design considerations and operation strategies.<br />
Simple design procedures such as orientation, shading,<br />
insulation, etc. can be easily incorporated in any building,<br />
leading to substantial benefits from the point of view of comfort<br />
and energy saving.<br />
In some climates, simple techniques alone may not be<br />
adequate for achieving ideal comfort conditions. In such cases,<br />
advanced features such as wind tower, roof pond, Trombe wall,<br />
etc. may be used. Even in conditioned buildings, where<br />
mechanical devices are used to create a comfortable<br />
environment, the use of passive methods would help reduce the<br />
energy consumption (i.e. [1])<br />
Technique of Roof surface evaporative cooling is used for<br />
reducing cooling load on air-conditioning system ultimately this<br />
technique serves purpose of energy conservation.<br />
I. What is Roof Surface Evaporative Cooling (RSEC)<br />
In a tropical country like India, the solar radiation incident on<br />
roofs is very high in summer, leading to overheating of rooms<br />
below them. Roof surfaces can be effectively and inexpensively<br />
cooled by spraying water over suitable water-retentive materials<br />
(e.g. gunny bags) spread over the roof surface(i.e.[1]).As the<br />
water evaporates, it draws most of the required latent heat from<br />
the surface, thus lowering its temperature and reducing heat gain.<br />
Besides, evaporation also cools the air above the roof. The cool<br />
air slides down and enters the living space through infiltration<br />
and ventilation, providing additional cooling. This is an example<br />
of the passive indirect evaporative cooling technique. (i.e. [1])<br />
II. Procedure for Installing a Roof Surface Evaporative<br />
Cooling System:<br />
Suitable waterproofing treatment of the roof should be done.<br />
The roof must be covered with water absorptive and retentive<br />
materials such as gunny bags, brick ballast, sintered fly-ash,<br />
coconut husk or coir matting. On account of their porosity, these<br />
materials when wet, behave like a free water surface for<br />
evaporation. The durability of such materials is rather good, but<br />
they have to be treated for fire safety.<br />
During peak summer, the quantity of water needed is<br />
approximately 10 kg / day / m 2 of roof area. (i.e. [1])<br />
The roof must be kept wet throughout the day using a water<br />
sprayer. The sprayer can be manually operated or controlled by<br />
an automatic moisture-sensing device. The sprayer usually works<br />
at low water pressure which can be achieved either by a water<br />
head of the storage tank on the roof, or by a small water pump.<br />
III. Effectiveness of RSEC Depends on Ambient air<br />
temperature and humidity. Intensity of solar radiation.<br />
Wetness of the roof surface Roof type.<br />
The effect of evaporation increases when the air humidity is<br />
low and the air temperature as well as the intensity of solar<br />
radiation falling on the roof surface is high. A uniform and<br />
constant wetting of the roof surface is essential for continuous<br />
evaporation. It should be noted that the roof needs to be<br />
adequately treated with water proofing material.<br />
The evaporation of water causes cooling of the roof surface.<br />
This sets up a temperature gradient between the inside air and<br />
outside roof surface, resulting in loss of heat from the inside to<br />
outside. Thus, heat transfer through the roof is the dominant<br />
aspect in the overall performance of RSEC, Higher the rate of<br />
heat transfer, more effective is the RSEC. Consequently the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 163<br />
ISSN 2250-3153<br />
RSEC system is most effective when the roof has a high thermal<br />
transmittance (U). (i.e. [1]).<br />
A Case Study of-Shree Renuka Energy Ltd<br />
(30MW Co –Generation Project at Ichalkaranji.)<br />
Here, RSCE technique is used to reduce cooling load of DCS<br />
room (Distributed control system). In this Co-gen.Plant we have<br />
DCS room of 19.8 Mtr.Long x 7.8Mtr.Width and 3.06Mtr Ht.<br />
having Terrace area-151Sq.Mtr. (e.g.Fig.1)<br />
For this size room heat load calculations done as follows:<br />
Under the steady state approach the heat balance for room air can<br />
be written as (i.e. [2]).<br />
Q total = Qc + Qs+Qi+Qv – (1)<br />
Now, Total heat conduction through each side wall +door<br />
+Glazing +Roof + Hard Board.<br />
Qc Total =17.475 W<br />
Total solar heat gain through wall<br />
Qs = 10.422 W<br />
Internal heat gain due to -Artificial light + Occupants +<br />
Appliance load.<br />
In this case considering appliance load the major heat emitting<br />
source is VFD‘s (Variable Frequency Drive) used for various<br />
drives such as ID,FD,SA fan and Boiler feed pump.<br />
Qi Total = 82,219 W<br />
Now Heat flow rate due to Ventilation<br />
Qv = 12,096 W<br />
Now putting all calculated values in above eq‘. - (1)<br />
We get Q Total =1, 22,212 W = 122 kW.<br />
For this DC‘s Room we have terrace area Total = 151 Sq.Mtr<br />
For using RSEC technique for this area.<br />
Total Gunny Bag Req. = 196 Nos<br />
Also during peak summer the quantity of water required for<br />
sprinkling on terrace is Q water =1510 Ltr/ Day (Theoretical)<br />
Q water = 800 Ltr/ Day (Actual).<br />
Table I: List of Equipment’s and Material Required for<br />
RSEC.<br />
Item Name Qty. Cost in Rs.<br />
Monoblock pump 01 Nos 1575.00<br />
Drip Irrigation pipe<br />
with clips<br />
Four – Arm Sprinkler<br />
with stand<br />
1 ph Energy meter<br />
Range - 10-40 amp<br />
3 ph CT Meter<br />
Range – 200/5<br />
Gunny Bags (1100 x<br />
700 mm)<br />
Ø 1‖ M.S. Pipe<br />
+Fabrication<br />
Soft Pipes for water<br />
connections<br />
Plastic Barrel<br />
65 mtr 730.00<br />
01 Nos 230.00<br />
01 Nos 1400.00<br />
01 Nos 3378.00<br />
196 Nos 3920.00<br />
06 Mtr. 590.00<br />
13 mtr.<br />
223.00<br />
01 Nos. 500.00<br />
Miscellaneous Item 150.00<br />
Total = Rs. - 12,696.00<br />
II. EXPERIMENTAL SET UP<br />
Selection Criterion for Water Spray System<br />
During our project work on Roof Surface evaporative cooling,<br />
the system adopted for this project such as sprinkler & drip pipe<br />
system. While selecting this it become a problem some, since<br />
total Area where we going to carry out experiments divided into<br />
two parts.<br />
Part One – Plain Area of 51M 2 (out of 151 M 2 )<br />
Such area is open; there is no any restriction for using a water<br />
sprinkler system. There is no any steam line. So use of water<br />
sprinkler proved efficient way of spraying water on Gunny Bags.<br />
(e.g.Fig.3)<br />
Part Two – Area of 100M 2 (Under steam pressure reducing<br />
station.)<br />
This area is creating a headache to choose a water sprinkling<br />
system. Since near to this area main live steam line of 510 0 c<br />
leading to main T.G. set so use of water sprinkler create a<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 164<br />
ISSN 2250-3153<br />
horrible problem of steam joint leakage, so use of water sprinkler<br />
is out of use.<br />
To overcome this problem we use here irrigation drip pipe<br />
systems for providing better wetness to Gunny bags.<br />
The use of drip system proved a highly efficient & better way to<br />
overcome this problem. (e.g.Fig.2)<br />
Necessary Measurements Recorded<br />
During project – important parameters measured and recorded on<br />
hourly basis.<br />
I) During - with R.S.E.C. effect.<br />
Measurement of Ambient temperature both dry and wet.<br />
Measurement of relative humidity.<br />
Measurement of DCS room temperature.<br />
Measurement of terrace slab temperature.<br />
Measurement of DCS room ceiling temperature.<br />
Water evaporation rate during day hours.<br />
Electrical Measurements<br />
Energy consumption by air conditioning<br />
Energy machine – for 24 hrs and day hrs. (8 hrs)<br />
Consumption by monobloc pump set during day hrs.<br />
II) During - without R.S.E.C. effect<br />
.<br />
Measurement of Ambient temperature both dry and wet.<br />
Measurement of relative humidity.<br />
Measurement of DCS room temperature.<br />
Measurement of terrace slab temperature.<br />
Measurement of DCS room ceiling temperature.<br />
Electrical Measurements -Energy consumption by air<br />
conditioning machine – for 24 hrs and day hrs. (8 hrs)<br />
For this Measurement, we used 3 Phase Energy Meter<br />
(CT Meter, Range-200/5)<br />
Energy Consumption by monoblock pump- For this<br />
Measurement, we used 1 Phase Energy Meter<br />
(1Ph.Meter, Range-10-40Amp)<br />
Fig 1: Entire view of DCS Room.<br />
Fig 2: Drip irrigation pipes placed on roof top<br />
Fig 3: Water Sprinkler used for plain area.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 165<br />
ISSN 2250-3153<br />
Following graph shows temperature behaviour with and without<br />
RSEC effct.(Temp.recorded during Day time from 8.0 AM to 05<br />
PM)<br />
(Temp 0 C Vs Time Hr.)<br />
Fig 4: Shows temperature behavior with RSEC effect<br />
Fig. 5: Shows temperature behavior without RSEC effect.<br />
III. RECORDS OF TEMPERATURES<br />
Temperature parameters were recorded carefully as per time<br />
schedule. The following observations were recorded.<br />
Table II<br />
Details With RSEC Without RSEC<br />
Ambient temp. effect 44˚C effect 44˚C<br />
Terrace slab temp 35˚C 42˚C<br />
DCS Room<br />
23˚C 31˚C<br />
ceiling temp.<br />
DCS Room temp. 24˚C 25˚C<br />
Energy consumed 2,303 kWh 2.649 kWh<br />
by A/C Machine (08 hrs.)<br />
(08 hrs.)<br />
IV. ENERGY SAVING CALCULATION<br />
From observation sheets, we have following readings of energy<br />
consumption by A/C Machine &small pump.<br />
Table III<br />
Power Consumption (in kWh)<br />
With RSEC Effect Without RSEC<br />
Day Power<br />
Consump<br />
tion by<br />
A/C<br />
8Hrs.<br />
Power<br />
Consumption<br />
by<br />
Monoblock<br />
Pump<br />
Effect<br />
Day Power<br />
Consum<br />
ption by<br />
A/C 8Hr<br />
7/5/10 2,360 0.7 19/5/10 2,740<br />
8/5/10 2,250 0.7 20/5/10 2,680<br />
9/5/10 2,200 0.7 21/5/10 2,770<br />
13/5/10 2,280 0.7 22/5/10 2,650<br />
14/5/10 2,300 0.9 23/5/10 2,590<br />
15/5/10 2,360 0.7 28/5/10 2,580<br />
17/5/10 2,370 0.7 29/5/10 2,530<br />
Avg. 2,303 0.72 Avg. 2,649<br />
(Above Data collected from observation sheets.)<br />
Energy consumed by A/C machine with RSEC effect =2,303<br />
kWh /Day (08 Hrs.)<br />
Also, Energy consumed by A/C machine without RSEC effect<br />
=2,649 kWh /Day (08 Hrs.)<br />
Difference =2,649-2303<br />
=346 kWh /08 Hrs.<br />
Therefore, Net saving of Energy =346 kWh /08 Hrs. i.e. per day<br />
% of saving of energy = 13.06 % per day<br />
Assuming 150 Days of working Season (The RSEC system is<br />
more effective in the month of March, April, May& June.)<br />
Then, Total Saving =346x150<br />
Total Saving = 51,900 kWh /Season<br />
Now such an energy consumed may be purchased from State<br />
Electricity Board at a Rate of Rs.8.10 per kWh<br />
Total Saving =51,900 x 8.10<br />
Total Saving =Rs. 4, 20,390 per Season<br />
Now, investment done for achieving RSEC effect are shown in<br />
table no. I<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 166<br />
ISSN 2250-3153<br />
1. It is presumed that gunny bags will be required fresh<br />
every year. Rests of the items are assumed to have a life<br />
of 3 years.<br />
Hence cost of items from table I per year = Rs. 6845/-<br />
2. Cost of Electricity consumed by small pump<br />
(i.e. [4]) =1kWh/Day x8.10x150 =Rs.1215<br />
3. Sprinkling water required-800 lit. /Day<br />
(Water charges as per Jeevan Pradhikaran Agency-<br />
Rs.10.20/1000 Ltr.)<br />
Hence, Cost of Sprinkling Water (i.e. [3]) =8.16x150=<br />
Rs.1224<br />
Hence, after deducting the expenses incurred for implementing<br />
RSEC effect, the above costs from 1), 2), and 3) are deducted<br />
from total saving.<br />
Net saving = Total saving – (expenses 1+2+3)<br />
= Rs. 4, 20,390 – (Rs. 6845 +1215 +1224)<br />
= Rs. 4, 11, 106/- per season<br />
Net saving = Rs. 4, 11, 106/- per season<br />
V. CONCLUSION<br />
Historically sugar industry has been slow in its development<br />
and in adopting technology. However, in the recent past power<br />
shortage & other economical issues have forced technocrats and<br />
industry to use more efficient energy conservation system and<br />
cost reduction systems. The above paper highlights some efforts<br />
towards this direction.<br />
REFERENCES<br />
[1] J.K.Nayak,J.A.Prajapati,HANDBOOK ON - ‗ENERGY CONSCIOUS<br />
BUILDINGS‘ By IIT Bombay and solar energy center, Ministry of Non<br />
Conventional Energy Sources. Page no.2, 89, 90,164 .2006.<br />
[2] S.C. Arora & S. Domkundwar, Text Book on A COURCE IN –<br />
‗REFRIGERATION AND AIR-CONDITIONING‘. Page no.19.2, 19.6,<br />
19.7.2000.<br />
[3] http://www.maha mjp.com/news site/water_Tariff.aspx<br />
[4] www.forumofregulatory.gov.in/TOD_tariff_in_india.pdf<br />
[5] www.bee.india.nic.in.<br />
AUTHORS<br />
First Author – R.B. Lokapure, M.Tech (Energy Tech.), Bharti<br />
Vidyapeeth College of Engineering. Kolhapur. (India).<br />
E. Mail- lokapureraju@gmail.com, Cell No: 09860259513<br />
Second Author – J. D. Joshi, M.E., (Mechanical - Design),<br />
M.I.E., C. Engg. From Bharti Vidyapeeth College of<br />
Engineering. Kolhapur. (India)<br />
E. Mail- jawaharlalj@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 167<br />
ISSN 2250-3153<br />
A Carrier Based Compact Model for Long Channel<br />
Undoped and Doped Body Symmetric Double Gate<br />
MOSFETS<br />
Abstract- Double gate MOSFET is widely used for sub-50nm<br />
technology of transistor design .They have immunity to short<br />
channel effects, reduced leakage current and high scaling<br />
potential. The single gate Silicon–on-insulator (SOI) devices give<br />
improved circuit speed and power consumption .But as the<br />
transistor size is reduced the close proximity between source and<br />
drain reduces the ability of the gate electrode to control the flow<br />
of current and potential distribution in the channel. To reduce<br />
SCE we need increase gate to channel coupling with respect to<br />
source/drain to channel coupling. This paper deals with the<br />
compact modeling of long channel undoped and doped<br />
symmetric double-gate MOSFET. The formulation starts with the<br />
solution of Poisson‘s equation which is then coupled to the Pao-<br />
Sah current equation to obtain the analytical drain-current model<br />
in terms of carrier concentration. The performance analysis will<br />
be done by using the model.<br />
Index Terms- Symmetric DGMOS, Doped body, undoped<br />
body, Compact model, Volume inversion.<br />
D<br />
I. INTRODUCTION<br />
ouble gate MOSFET is widely used for sub-45nm<br />
technology of transistor design .They have immunity to<br />
short channel effects, reduced leakage current, nearly ideal subthreshold<br />
swing and high scaling potential. The single gate<br />
Silicon–on-insulator (SOI) devices give improved circuit speed<br />
and power consumption .But as the transistor size is reduced the<br />
close proximity between source and drain reduces the ability of<br />
the gate electrode to control the flow of current and potential<br />
distribution in the channel. To reduce SCE we need to increase<br />
the gate to channel coupling with respect to source/drain to<br />
channel coupling. Several technological approaches can be<br />
followed to design multiple gate MOSFETs. The various<br />
proposed architectures differ mainly by the number of gates and<br />
by the orientation of the conduction channel. We can define three<br />
main types of multiple gate devices: planar transistors, in which<br />
the gates and the channel are horizontal, FinFETs, in which the<br />
channel is vertical and the conduction is parallel to the wafer<br />
surface and the vertical transistors, in which the conduction<br />
direction is vertical.<br />
This paper deals with the compact modeling of long channel<br />
undoped and doped symmetric double-gate MOSFET. While<br />
modeling DG MOSFETs, we have to take a different approach<br />
Neha Goel, Dr.Vandana Nath<br />
Electronics and Communication Engineering, USIT,<br />
Guru Gobind Singh Indraprastha University, India<br />
from that of CMOS Technology as it has unique physical effects<br />
such as the two conducting interface coupling, volume inversion<br />
and carrier energy level quantization. Highly accurate physics<br />
based compact models are required which are computationally<br />
efficient. These requirements are easier to meet in the case of<br />
undoped body MOSFETs because of the absence of fixed charge<br />
in the channel.<br />
Recently, extensive study has been performed on the DG<br />
MOSFETs device physics.<br />
Some researchers have solved 1-D Poisson‘s equation for<br />
DGMOS to derive the analytical solution for surface potential<br />
and inversion layer charge density. But due to the complexity<br />
and need to solve a number of transcendental equations and<br />
auxiliary functions, these models needs more efforts to be<br />
implemented in the circuit simulator. Other groups used the<br />
charge based approach and focused on analytical charge and<br />
current expressions. These models provide simplified derivation<br />
of I-V characteristic but require special assumptions and<br />
approximations that compromise the physical detail in describing<br />
the device behavior.<br />
A fundamental complication of DG MOS‘s is the existence of<br />
multiple interfaces that coupled to each other. As a result, the<br />
drain current can‘t be fully described by an equation with respect<br />
to only source and drain surface potential but it requires the<br />
potential at the center of the Si film at the source and drain each.<br />
This carrier based method avoids the difficulties in calculating<br />
the surface and Si-film centric potential as long as the carrier<br />
concentrations at the boundaries are known. The calculations of<br />
the carrier concentrations are obtained directly by using<br />
Poisson‘s equation and thus we use minimum approximations.<br />
The model is formulated from the solution of the Poisson‘s<br />
equation and Pao-Sah drift-diffusion current expression and<br />
covers all three operating regions of a DG MOSFET: linear,<br />
active and saturation. Also in this model, we are ignoring some<br />
second order physical effects such as Short Channel Effects,<br />
Drain induced barrier lowering and quantum effects for the sake<br />
of simplicity.<br />
The paper is arranged as follows:<br />
6) Abstract<br />
7) Introduction<br />
8) Model Discussion for undoped body DGMOS<br />
9) Model Formulation for undoped body DGMOS<br />
10) Results and Discussions<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 168<br />
ISSN 2250-3153<br />
11) Conclusion<br />
II. MODEL DISCUSSION FOR UNDOPED BODY<br />
DGMOS<br />
Fig. 1 shows the energy level distribution diagrams of a<br />
symmetric double-gate MOSFET. The same voltage is applied to<br />
the two gates with the same work function to make them work as<br />
symmetric DGMOS. The voltage levels are referred to the<br />
electron quasi - fermi level of the source as there is no contact to<br />
the silicon body. Assuming that the quasi-fermi level is constant<br />
across the silicon film direction so that the device current flows<br />
only along the channel (y direction). The formulation starts with<br />
1-D Poisson‘s equation along the vertical direction considering<br />
the gradual channel approximation.<br />
Where, n and are the mobile electron concentration and<br />
spatial electrostatics respectively, is the permittivity of the<br />
silicon material. The transport due to holes is minimum in the nchannel<br />
and hence can be ignored.<br />
According to Boltzmann statistics, the mobile electron<br />
concentration is expressed by the potential<br />
And<br />
(1)<br />
(2a)<br />
(2b)<br />
Where and are the intrinsic carrier concentration and the<br />
induced carrier concentration respectively at the reference point<br />
in x-direction.<br />
The spatial derivative of the electron concentration from (2a) is<br />
written as<br />
Again differentiating the above equation we get<br />
Substituting (4) into (1)gives the equation for the electron<br />
concentration as<br />
There is a geometry symmetric point in the silicon film center<br />
due to the symmetric characteristic of double-gate MOSFETs.<br />
The symmetry boundary condition of a symmetric double gate<br />
MOSFET sets the electric field in the center of the silicon film to<br />
be zero. Thus, the reference coordinate takes the center of the<br />
silicon film as the coordinate point of x = 0. For consistency the<br />
value of the n(x) at x=0 is taken as .<br />
Substituting (6) into (2a) we get<br />
(3)<br />
(4)<br />
(5)<br />
(6)<br />
(7)<br />
The electric field distribution is obtained by differentiating<br />
equation (7)<br />
E(x)= (8)<br />
Fig.1 Structure and Energy Level Diagram of undoped DGMOS<br />
The symmetry of the boundary condition of the DGMOS<br />
allows the surface potential and the surface electric field to be<br />
calculated from equation (7) and (8) respectively.<br />
] (9)<br />
E(x)= (10)<br />
Defining we can calculate half of the total<br />
inversion charge.<br />
(11)<br />
The surface potential, concentration and field need to obey the<br />
Gauss‘s law for the applied gate to source voltage. So, we have<br />
= + (12)<br />
Substituting the expressions for surface potential and inversion<br />
charge in (12) we get<br />
= ] +<br />
(13)<br />
Using (13) is first solved for a given value of Vgs.along the<br />
channel direction the quasi –Fermi potential varies from<br />
This expression is useful because of its exactness, solid physics<br />
background, and the analytical characteristics in compact model<br />
construction.<br />
The current continuity principle requires the current to be<br />
constant and independent of the quasi –Fermi potential,<br />
following which we can determine the functional dependence<br />
between (y) and .<br />
Following the Pao- Sah current formulation which assumes that<br />
the drift-diffusion transport is valid for the long channel DGMOS<br />
, the drain current is obtained by integrating from the<br />
source to the drain ,expressed as (<br />
(14)<br />
Where are the solutions of (13) corresponding to<br />
=0 to respectively, is the effective mobility and W and L<br />
are the channel width and length of the DGMOS respectively.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 169<br />
ISSN 2250-3153<br />
Calculating from equation (13) and substituting it in (14)<br />
We get<br />
2* +<br />
(15)<br />
As the charge formulation accounts for only half of the channel,<br />
so the final current for symmetric DGMOS is doubled in (15).<br />
III. MODEL FORMULATION FOR DOPED BODY<br />
DGMOS<br />
In the doped body DGMOS there are significant mobile<br />
charges and fixed charges so the Gauss‘s law changes to<br />
= + (16)<br />
Where is fixed charge and its value is:<br />
(17)<br />
So the value of Vgs is increased which leads to an increase in the<br />
threshold voltage.<br />
= ]+<br />
+ (18)<br />
We‘ll calculate the value of using the previous<br />
considerations and using the Pao-Sah drift- diffusion current<br />
equation the value of the drain current is:<br />
2* +<br />
IV. RESULTS AND DISCUSSIONS.<br />
(19)<br />
We use this model to simulate an undoped double-gate<br />
MOSFET with the channel length of 2µm and gate oxide<br />
thickness of 2nm. Fig.2 show the DG MOSFET current voltage<br />
characteristics predicted by the derived analytical model with the<br />
constant mobility of 300 cm2 /V.s.<br />
Fig.2 I-V Characteristics of undoped body Symmetric DGMOSFET<br />
Fig.3: I-V Characteristics of doped body Symmetric DGMOSFET<br />
A.Transconductance curve:<br />
The transconductance curves of the two types of symmetric<br />
DGMOS clearly shows that as the concentration of the channel<br />
increases the threshold voltage also increases. So the threshold<br />
voltage for undoped body DGMOS is lower than the doped body<br />
DGMOS.<br />
Also as we can see from fig.4 as the silicon film thickness tsi<br />
increases the subthreshold current also increases so the value of<br />
tsi should be kept low but more than 2nm.<br />
Fig.4: Transconductance characteristics of undoped body Symmetric<br />
DGMOSFET<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 170<br />
ISSN 2250-3153<br />
Fig.5: Transconductance characteristics of doped body Symmetric DGMOSFET<br />
B. Volume inversion<br />
Fig.5 demonstrates the inversion charge versus gate voltage<br />
characteristics. The silicon film thickness affects the amount of<br />
sub-threshold inversion charge but has no effect on the strong<br />
inversion charge density. This verified the existence of the<br />
volume inversion and implies that decrease of the silicon<br />
thickness can effectively control the sub-threshold region leakage<br />
current. It illustrates a potential weakness in the used of undoped<br />
symmetric double MOSFETs for nano-CMOS application. To<br />
optimize the device performance, the silicon film thickness<br />
should be reduced to suppress the off-current.<br />
Fig.6: Inversion charge density per unit area is plotted at different values of Vgs<br />
and studied at tsi=10nm and tsi=50nm<br />
V. CONCLUSIONS<br />
In this paper a carrier based analytical<br />
model for long channel undoped body<br />
symmetric DGMOS is studied using carrier<br />
based approach. The drain is described by a<br />
single explicit equation with respect to<br />
the carrier concentration at the boundaries<br />
that is valid for all region of operation.<br />
This model is further extended to develop<br />
the model for doped symmetric DGMOS. Also<br />
we can check the performance of this model<br />
and compare it with the 2-D numerical<br />
simulation so as to check for the validity<br />
of the model. We can also derive the<br />
capacitance model for both the devices and<br />
study the radio-frequency characteristics<br />
of the two devices.<br />
REFERENCES<br />
[1] Zhang L.;J.He;Liu F.;Zhang J.;Song Y., ―A unified charge based model for<br />
symmetric DGMOSFETs valid for both heavily doped body and undoped<br />
body‖,in MIXDES 2008 Poland 19-21 June 2008 ,pp-367-372,2008.<br />
[2] Yadav K.Vinay;Rana K.Ashwani, ―Impact of Channel Doping on DG-<br />
MOSFET Parameters in Nano Regime-TCAD Simulation‖, in International<br />
Journal of Computer Applications (0975 – 8887) Vol. 37– No.11, January<br />
<strong>2012</strong>,pp-36-40,<strong>2012</strong>.<br />
[3] Gupta, R.S.; Sharma, N.; Bansal, J.; Chaujar, R.; Gupta, M.;, ―Two<br />
dimensional analytical modeling of multi-layered dielectric G4 MOSFET-A<br />
novel design‖, in Recent Advances in Microwave Theory and Applications,<br />
2008. MICROWAVE 2008., pp47 – 49,2008.<br />
[4] Yuan Taur; Jooyoung Song; Bo Yu, ―Compact modeling of multiple-gate<br />
MOSFETs‖, in Custom Integrated Circuits Conference, 2008. CICC 2008.<br />
IEEE, pp. 257 – 264,2008.<br />
[5] Kasturi, P.; Saxena, M.; Gupta, M.; Gupta, R.S., ―Dual Material Double-<br />
Layer Gate Stack SON MOSFET: A Novel Architecture for Enhanced<br />
Analog Performance—Part I: Impact of Gate Metal Work function<br />
Engineering ‖ in Electron Devices, IEEE , vol.55 Issue 1, pp372 – 381.<br />
[6] Jin He,Feng Liu, Jian Zhang, Jinhua Hu, Shengqi Yang and Mansun Chan,<br />
― A Carrier based Approach for compact modeling of the long channel<br />
undoped symmetric Double-gate MOSFETs‖,IEEE transactions on<br />
Electronic Devices,vol.54,pp-1203- 1209,2007.<br />
AUTHORS<br />
First Author – Neha Goel, Pursuing M.Tech in ECE, Indira<br />
Gandhi Institute of Technology, GGSIP University and e-mail –<br />
neha.agarwal12@gmail.com.<br />
Second Author – Dr. Vandana Nath, Electronics and<br />
Communication Dept. U.S.I.T., GGSIP University and e-mail –<br />
vandana.usit@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 171<br />
ISSN 2250-3153<br />
Removal of Multiple Access Interference in DS-CDMA<br />
System<br />
And<br />
1 (Lecturer, Department of E & TC, G.H.Raisoni College of Engineering & Management, Amravati)<br />
2 (Principal, G.H.Raisoni College of Engineering & Management, Amravati)<br />
Abstract- Multiple access interference (MAI) is a factor which<br />
limits the capacity and performance of DS-CDMA systems. MAI<br />
refers to the interference between direct-sequence users. This<br />
interference is the result of the random time offsets between<br />
signals, which make it impossible to design the code waveforms<br />
to be completely orthogonal. While the MAI caused by any one<br />
user is generally small, as the number of interferers or their<br />
power increases, MAI becomes substantial. The conventional<br />
detector does not take into account the existence of MAI. It<br />
follows a single-user detection strategy in which each user is<br />
detected separately without regard for other users. Because of the<br />
interference among users, however, a better detection strategy is<br />
one of multi-user detection (also referred to as joint detection or<br />
Interference cancelation). Here, information about multiple users<br />
is used jointly to better detect each individual user.<br />
Index Terms- Multiple Access Interference, Parallel<br />
Interference Canceller, Successive Interference Canceller, Code<br />
Division Multiple Access, Time Division Multiple Access,<br />
Frequency Division Multiple Access, Direct Sequence Code<br />
Division Multiple Access, Multiuser Detection, Base Station,<br />
Decision Feedback Equalizer, Maximum Likelihood detection,<br />
Maximum A posteriori Probability, Linear Minimum Mean<br />
Square Error, Turbo Multiuser Detection.<br />
I. INTRODUCTION<br />
1.1. Commercial CDMA System<br />
The Code Division Multiple Access (CDMA) offers many<br />
advantages over TDMA and FDMA. IS-95 CDMA allows each<br />
user within a cell to use the same radio channel, and users in<br />
adjacent cells also use the same radio channel, since this is a<br />
direct sequence spread spectrum CDMA system.<br />
CDMA completely eliminates the need for frequency within a<br />
market.<br />
Unlike other cellular standards, the user data rate (but not the<br />
channel chip rate) changes in real-time, depending on the voice<br />
activity and requirements in the network. Also,IS-95 uses a<br />
different modulation and spreading technique for the forward and<br />
reverse links. On the forward link, the base station<br />
simultaneously transmits the user data all mobiles in the cell by<br />
using a different spreading sequence for each mobile. A pilot<br />
code is also transmitted simultaneously and at a higher power<br />
level, thereby allowing all mobiles to use coherent carrier<br />
detection while estimating the channel conditions. On the reverse<br />
link, all mobiles respond in an asynchronous fashion and have<br />
ideally a constant level due to power control applied by the base<br />
station.<br />
The speech coder used in the IS-95 system is the Qualcomm<br />
9600 bps Code Excited Predictive (QCELP) coder. The original<br />
implementation of this vocoder detects activity, and reduces the<br />
data rate to 1200 bps during silent periods.<br />
IS-95 is specified for reverse link operation in the 824-849 MHz<br />
band and 869-894 for the forward link. A PCS version of IS-95<br />
has also been designed for international use in the 1800-2000<br />
MHz bands. A forward and reverse channel pair is separated by<br />
45 MHz for cellular band operation. Many users share a common<br />
channel transmission. The maximum user data rate is 9.6 kb/s.<br />
User data in IS-95 is spread to channel chip rate of 1.2288<br />
Mchip/s (a total spreading factor of 128) using a combination of<br />
techniques. The spreading process is different for the forward<br />
and reverse in the original CDMA specification. On the forward<br />
link, the user data stream is led using a rate 1/2 convolution code,<br />
interleaved, and spread by four orthogonal ling sequences (Walsh<br />
functions). Each mobile in a given cell is assigned different link<br />
sequence, providing perfect separation among the signals from<br />
different users, at least for the case where multipath does not<br />
exist. To reduce interference between mobiles that use the same<br />
spreading sequence in different cells, and to provide the desired<br />
wideband spectral characteristics (not all of the Walsh functions<br />
yield a wideband power spectrum), all signals in a particular cell<br />
are scrambled using a pseudorandom sequence of length 2 15<br />
chips.<br />
On the reverse link, a different spreading strategy is used<br />
since each received signal arrives at the base station via a<br />
different propagation path. The reverse channel user data stream<br />
is first convolutionally encoded with a rate 1/3 code. After<br />
interleaving, each block of six encoded symbols is mapped to<br />
one of the 64 orthogonal Walsh functions, providing sixty-fourary<br />
orthogonal signaling. A final fourfold spreading, giving a rate<br />
of 1.2288 Mchip/s, is achieved by spreading the resulting 307.2<br />
kchip/s stream by user-specific and base-station specific codes<br />
having periods of 2 42 - 1 chips and 2 15 chips, respectively. The<br />
rate 1/3 coding and the mapping onto Walsh functions result in a<br />
greater tolerance for interference than would be realized from<br />
traditional repetition spreading codes. This added robustness is<br />
important on the reverse link, due to the non-coherent detection<br />
and the in-cell interference received at the base station.<br />
Another essential element of the reverse link is tight control of<br />
each subscriber's transmitter power, to avoid the "near-far"<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 172<br />
ISSN 2250-3153<br />
problem that arises from varying received powers of the users. A<br />
combination of open-loop and fast, closed-loop power control is<br />
used to adjust the transmit power of each in-cell subscriber so<br />
that the base station receives each user with the same received<br />
power. The commands for the closed-loop power control are sent<br />
at a rate of 800 bits/s, and these bits are stolen from the speech<br />
frames. Without fast power control, the rapid power changes due<br />
to fading would degrade the performance of all users in the<br />
system.<br />
At both the base station and the subscriber, RAKE receivers<br />
are used to resolve and combine multipath components, thereby<br />
1.2 PROBLEMS IN CDMA SYSTEMS<br />
• A conventional DS/CDMA system treats each user separately<br />
as a signal, with other users considered as noise or MAI -<br />
multiple access interference<br />
• Capacity is interference-limited.<br />
• Near/far effect: users near the BS are received at higher<br />
powers than those far away.<br />
• suffer degradation in performance.<br />
• Need tight power control?<br />
1.3 MULTIUSER DETECTION<br />
• Multiuser detection considers all users as signals for each<br />
other for joint detection.<br />
• Reduced interference leads to capacity increase.<br />
• Alleviates the near/far problem.<br />
• MUD can be implemented in the BS or mobile, or both<br />
• In a cellular system, base station (BS) has knowledge of all the<br />
chip sequences<br />
FIGURE 1.1: IS-95 FORWARD CHANNEL BLOCK DIAGRAM<br />
reducing the degree of fading. RAKE receiver exploits the<br />
multipath time delays in a channel and combines the delayed<br />
replicas of the transmitted signal in order to improve link quality.<br />
In IS-95, a three finger RAKE is used at the base station. The IS-<br />
95 architecture also provides base station diversity during "soft"<br />
handoffs, whereby a mobile making the transition between cells<br />
maintains links with both base stations during the transition. The<br />
mobile receiver combines the signals from the two base stations<br />
in the same manner as it would combine signals associated with<br />
different multipath components.<br />
• Size and weight requirement for BS is not stringent<br />
Therefore MUD is currently being envisioned for the uplink<br />
(mobile to BS)<br />
1.4 SUCCESSIVE INTERFERENCE CANCELLERS<br />
• Successively subtracting off the strongest remaining signal<br />
• Cancelling the strongest signal has the most benefit<br />
• Cancelling the strongest signal is the most reliable<br />
cancellation<br />
• An alternative called the Parallel Interference Cancellers<br />
simultaneously subtract off all of the users' signals from all of the<br />
others<br />
• Works better than SIC when all of the users are received with<br />
equal strength (e.g. under power control).<br />
2.1 CDMA<br />
II. LITERATURE REVIEW<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 173<br />
ISSN 2250-3153<br />
One important property of the air interface of a cellular telephone<br />
system is the multiple access method. Each user of the cellular<br />
system is given a channel, and all users get different channels.<br />
The way in which these channels are different is determined by<br />
the multiple access method. .<br />
FIGURE 2.1: CDMA<br />
In a cellular system employing Direct Sequence Code<br />
Division Multiple Access, all users use the same frequency at the<br />
same time. Before transmission, the signal from each user is<br />
multiplied by a distinct signature waveform. The signature<br />
waveform is a signal which has a much larger bandwidth than the<br />
information bearing signal from the user. The CDMA system is<br />
thus a spread spectrum Technique. All users use different<br />
signatures waveforms to expand their signal bandwidth. The<br />
procedure is depicted in fig. 2.1 for a two-user case. Notice the<br />
phase shifts in the transmitted signal is due to the negative pulses<br />
in the data stream.<br />
2.2 The conventional receiver<br />
At the base station, the sum of all the broadband signals is<br />
received. To demodulate signals from a specific user, the<br />
received signal is correlated with the signature waveform of that<br />
user. The procedure is illustrated in fig. 2.2 by correlating the<br />
sum of all the above signals with the respective signature<br />
waveforms. Under ideal conditions, the correlation between<br />
different signature waveforms is zero; in that case, the output of<br />
the correlator will be the transmitted signal of the desired user as<br />
depicted in fig. 2.2. This correlation receiver is known as the<br />
conventional receiver.<br />
FIGURE 2.2: CONVENTIONAL RECEIVER<br />
2.3 Disadvantages with the conventional receiver<br />
The conventional receiver has some serious drawbacks. The<br />
underlying assumption is that the signals from different users are<br />
uncorrelated. In this case the conventional receiver is optimum.<br />
In practice the signals from different users will be correlated,<br />
which means the conventional receiver will be suboptimum. Still<br />
the conventional receiver will still work rather well under these<br />
two conditions:<br />
• The correlation between the signature sequences is small.<br />
• The signals from different users are received with<br />
approximately the same power.<br />
The first condition can be fulfilled by careful design of the<br />
code sequences that determine the signature waveforms. The<br />
second condition can be fulfilled by accurate power control. The<br />
base station measures the received power of all the transmitting<br />
signals. By sending power control commands to all the mobiles<br />
telling them to increase their transmit power, the received power<br />
levels of all the users can be kept at approximately the same<br />
level. Without power control, the received power levels may by<br />
60 dB or more. If the power of the received signals differs<br />
significantly, it suffers from the near-far problem.<br />
Code sequence design also has problems. It turns out that the<br />
correlation between signals from different users is critically<br />
dependent on the relative delays of the signals from different<br />
users. It is possible to design codes that are orthogonal, i.e. have<br />
zero cross correlation if the signals arrive at the base station<br />
synchronously. It is however impossible to design code<br />
sequences (with finite length) that have very low cross<br />
correlation for all relative delays.<br />
2.4 A Multiuser Detection Problem<br />
Due to the problems with the conventional receiver mentioned<br />
above, a different type of detector has been derived. These<br />
detectors, which do not treat other users as noise, but as digital<br />
signals are called multiuser detectors.<br />
Different Types of Multiuser Detectors: Most multiuser<br />
detectors are used in conjunction with the conventional receiver.<br />
This means that the received signal is first correlated with each<br />
of the signature waveforms. The output from this bank of<br />
correlators is treated as a vector. The multiuser receiver then<br />
performs some linear or non-linear transformation on this vector.<br />
Several multiuser detectors of this kind have been proposed.<br />
Usually, some letters need not be known, whereas others must be<br />
estimated. Unfortunately, some of: necessary parameter<br />
estimation may be difficult in a situation where there is a nearproblem.<br />
This is true in particular for estimation of the<br />
propagation delay, which is necessary for most of the multiuser<br />
detectors in this category.<br />
Other multiuser detectors do not operate on the output from<br />
the bank of correlators. Instead the demodulated wideband signal<br />
is sampled at a high rate and fed an adaptive discrete time filter.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 174<br />
ISSN 2250-3153<br />
The coefficients of the filter are adjusted so that the put of the<br />
filter resembles some known training sequence, which is<br />
transmitted before transmission of the actual message. These<br />
coefficients are then used during the remainder of the<br />
transmission.<br />
Amazingly enough, these detectors need no side information<br />
except the training sequence. Still, they have some problems. The<br />
use of these detectors place severe restrictions on the choice of<br />
spreading codes. Also the detectors may not be able to adapt to<br />
changing transmission conditions due to fading.<br />
2.4.1 A Multi-variable Decision Feedback Equalizer operating<br />
on the correlator outputs:<br />
As an example of a multiuser detector that operates on the<br />
output from the bank of correlators, a multivariable decision<br />
feedback equalizer (DFE) is studied. Decision feedback<br />
equalizers were first derived in the 1960's. They were then used<br />
to mitigate inter-symbol interference, which was a major<br />
problem for construction of high speed telephone line modems.<br />
For application as a multiuser detector in an asynchronous<br />
DS-CDMA system, the DFE has to be extended to have multiple<br />
inputs as well as multiple outputs. For this purpose the vector of<br />
sampled correlator outputs as the output of a discrete time<br />
variable channel model was used. Also the transmitted symbols<br />
of all users at a certain time instant in a vector were collected.<br />
The situation is depicted in the figure2.3.<br />
FIGURE 2.3: DS-CDMA TRANSMITTER<br />
Note that both input and output of the filter are vectors.<br />
By using the information about the transmission and reception in<br />
a DS-CDMA it is possible to relate the output to the input. This<br />
relation will be a discrete time multivariable FIR-filter with the<br />
number of inputs and the number of outputs equal to<br />
the number of users.<br />
FIGURE 2.4: MULTIVARIABLE DFE<br />
The vector of correlator outputs are used as input to the feed<br />
forward filter, which suppresses most of the inter-symbol<br />
interference and cross-couplings in the channel. From outputs of<br />
the feed forward filter, the outputs from the feedback filter<br />
remove the act of symbols that have been previously detected.<br />
Author observed that if graphically multivariable DFE in a<br />
CDMA scenario with two users is tried, the received powers of<br />
the two users will differ by 20 dB. and the codes used were Gold<br />
codes, which is a common choice in CDMA systems. The signal<br />
to noise ratio is varied between 5 and 20 dB, and counted the<br />
number of errors in the symbol decisions. The performance of<br />
the multivariable DFE was compared to the performance of the<br />
conventional receiver, and also to the performance of the<br />
decorrelating detector, a linear multiuser detector.<br />
The performance of the DFE is superior to the performance of<br />
the conventional detector. This is natural, since the performance<br />
of the conventional detector is limited by interference from the<br />
other user. This is in contrast to both the DFE and the relating<br />
detector, which strangely enough have the same performance. It<br />
should be however that the decorrelating detector cannot be<br />
implemented without modification in a real system, since it is a<br />
block detector. In a block detector, an entire sequence is received<br />
and demodulated simultaneously. It is then implicitly assumed<br />
that the transmission begins and ends at specified instances,<br />
which are not separated too far apart, will not be the situation in a<br />
real system: in a CDMA system, transmission takes place<br />
continuously.<br />
The performance of a practical implementation of the<br />
decorrelating detector is then over bounded by the performance<br />
indicated in the graph. Also, the correlating detector has been<br />
shown to perform very badly in a situation where the propagation<br />
delay has been estimated inaccurately. Thirdly, the complexity of<br />
the DFE is lower than the complexity of the decorrelating<br />
detector.<br />
2.4.2 A Multiuser Detector operating directly on the wideband<br />
signal:<br />
As previously stated, multiuser detector operating on the<br />
output of the correlator rely on accurate estimation of among<br />
other things the propagation delay. To circumvent the problem of<br />
propagation delay estimation, also multiuser detector operating<br />
directly on the wideband signal is devised. But the disadvantages<br />
associated such a detector: lack of flexibility in the code selection<br />
part and inability to cope fast fading were avoided. A multiuser<br />
detector for application in mobile radio must be able to adapt to<br />
rapid changes in transmission conditions. A multiuser detector<br />
fulfilling these conditions would be an ideal candidate for<br />
practical implementation. Such a detector can in fact be devised.<br />
By rewriting the system for transmission reception in a CDMA<br />
system, it becomes clear that the author is dealing with a pie<br />
equalization problem rather than a complex detection problem.<br />
There are only two differences from the equalization problems<br />
considered since the 1960's:<br />
The channel has several inputs, one for each user and<br />
The output of the channel must be sampled much more<br />
rapidly than once per symbol.<br />
The situation considered is as depicted in figure 2.5.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 175<br />
ISSN 2250-3153<br />
These equivalent channels are discrete time FIR filters. The<br />
coefficients of these filters will depend on two things<br />
• The codes that are used and<br />
• The physical channel.<br />
The former is known at the receiver, while the latter must be<br />
estimated using a training sequence. This estimation problem is<br />
relatively simple and does not suffer from the near-far problem.<br />
Based on knowledge of the channels, a number of different<br />
detectors can be designed. All of them have counterparts among<br />
equalizers used to combat inter-symbol interference. Examples of<br />
such detectors are<br />
• Fractionally spaced linear equalizers,<br />
• Fractionally spaced decision feedback equalizers (DFE‘s) and<br />
• Detector based on the Viterbi algorithm.<br />
The performance of the DFE to the performance of a single-user<br />
under the same conditions is compared. Graphically it can be<br />
proved that the performance of the system will be satisfactory,<br />
despite the heavy load and the severe near-far situation. The<br />
difference between the DFE and the single user case is rather<br />
large, but the system in which the DFE operates is very heavily<br />
loaded.<br />
Direct sequence code division multiple-access (DS-CDMA) has<br />
been selected as the fundamental signalling technique for third<br />
generation (3G) wireless communication system, due to its<br />
advantages of soft user capacity limit and inherent frequency<br />
diversity. However, it suffers from multiple-access interference<br />
(MAI) caused by the non-orthogonality of spreading codes,<br />
particularly for heavily loaded systems. Therefore, techniques for<br />
mitigating the MAI, namely multiuser detection, have been the<br />
subject of intensive research effort over the past two decades. It<br />
is well known that multiuser detection can substantially<br />
suppress MAI, thus improving system performance.<br />
Maximum likelihood (ML) multiuser detection was proposed in<br />
the early 1980s, and achieves the optimal performance at the cost<br />
of prohibitive computational cost when the number of users is<br />
large.<br />
In recent years, the turbo principle, namely the<br />
iterative exchange of soft lion among different blocks in a<br />
FIGURE 2.5: CDMA TRANSMITTER-RECEIVER<br />
communication system to improve the system performance, has<br />
been applied to combine multiuser detection with channel<br />
decoding. In such turbo multiuser detectors, the outputs of<br />
channel decoders are fed back to the multiuser detector, thus<br />
enhancing the performance iteratively. Turbo multiuser detection<br />
based on the maximum Aposterior probability (MAP) detection<br />
and decoding criterion has been proposed in together with a<br />
lower complexity technique based on interference cancellation<br />
and LMMSE filtering. Further simplification is obtained by<br />
applying parallel interference cancellation (PIC) for multiuser<br />
detection, where the decisions of the decoders are directly<br />
subtracted from the original signal to cancel the MAI.<br />
Practical wireless communication systems usually experience<br />
fading channels, whose state information is unknown to the<br />
receiver. Thus practical systems need to detection and decoding<br />
with uncertain channel state information. In the context short<br />
code CDMA systems, blind multiuser detection can be<br />
accomplished without explicit channel estimation by using<br />
subspace and other techniques.<br />
III. DESIGN METHODOLOGY<br />
Let us consider channel-coded CDMA systems operating over<br />
multipath fading channels whose channel state information is<br />
unknown to the receiver. To demodulate and decode such<br />
systems, we will apply the turbo principle to both channel<br />
estimation and multiuser detection. Consider a receiver that feeds<br />
back decisions from channel decoders to both an ML channel<br />
estimator and a PIC multiuser detector. The iteration will be<br />
initialized with training symbol based channel estimation and a<br />
non-iterative multiuser detection. The dissertation will be<br />
focused mainly on the performance analysis of such structures<br />
using semi-analytic methods. Here the contributions to the<br />
variance of the channel estimation error due to noise and<br />
decision feedback error, and the variance of the residual MAI<br />
after PIC will be analysed. Then this analysis will be used to<br />
describe the decoding process as an iterative mapping. Here<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 176<br />
ISSN 2250-3153<br />
conditions assuring convergence of this iterative mapping to a<br />
unique fixed point is proposed. Computation of the asymptotic<br />
multiuser efficiency (AME) of this overall system, under some<br />
mild assumptions on the channel decoders will be done. The<br />
analysis in this dissertation will be carried on large samples and<br />
large system analysis.<br />
IV. EXPECTED RESULTS<br />
Fig4.2: BER performance comparison between the turbo<br />
multiuser receiver with five inner iterations and one inner<br />
iteration, K = 6, processing gain N = 16, vehicle speed = 120<br />
km/h, data rate = 9.6 kb/s, carrier frequency = 2.0 GHz.<br />
V. CONCLUSION<br />
Multiuser detection holds much promise for improving Direct<br />
Sequence CDMA performance and capacity. Although multiuser<br />
detection is currently in the research stage, efforts to<br />
commercialize multi-user detectors are expected in the coming<br />
years as DS-CDMA systems are more widely deployed. The<br />
success of these efforts will depend on the outcome of careful<br />
performance and cost analysis for the realistic environment.<br />
ACKNOWLEDGMENT<br />
The author sincerely thanks to Prof. R.D.Ghongade, Prof. Dr.<br />
G.G.Sarate, Prof. S.R. Hirekhan, Prof. N.N.Mandaogade for their<br />
valuable suggestion, criticism and time to time encouragement.<br />
The author also expresses his warm appreciation to his<br />
Brother, Amol, for his help in editing this article.<br />
REFERENCES<br />
[1] P. Alexander, A. Grant and M. C. Reed, ―Iterative detection of codedivision<br />
multiple-access with error control coding,‖ European Trans.<br />
Telecomm., Vol. 9, pp. 419–426, Aug. 1998.<br />
[2] P. Alexander and A. Grant, ―Iterative channel and information sequence<br />
estimation in CDMA,‖ Proceedings of IEEE Sixth International Symposium<br />
on Spread Spectrum Techniques and Applications, pp. 593–597,<br />
Parsippany, NJ, Sept. 2000.<br />
[3] X. Wang and H. V. Poor, Wireless Communication Systems: Advanced<br />
Techniques for Signal Reception. Prentice-Hall, Upper Saddle River, NJ,<br />
2004.<br />
[4] X. Wang and H. V. Poor, ―Iterative (turbo) soft interference cancellation<br />
and decoding for coded CDMA,‖ IEEE Trans. Commun., Vol. 47, no.7, pp.<br />
1046–1061, July 1999.<br />
[5] T. C. Yang and W.-B Yang. "Interference Suppression for code division<br />
multiple-access Communications in an underwater acoustic channel,".J.<br />
Acoustic. Soc. Am 126(1), 220-228, July 2009.<br />
[6] S. Moshavi, ―Multi-User detection for DS-CDMA Communications,‖ IEEE<br />
Commun. Mag., Oct. 1996.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 177<br />
ISSN 2250-3153<br />
Modeling of Liquid-Liquid Extraction in Spray Column<br />
Using Artificial Neural Network<br />
S.L. Pandharipande, Aashish Nagdive, Yogesh Moharkar<br />
Department of Chemical Engineering, Laxminarayan Institute of Technology,<br />
Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India<br />
Abstract- Liquid-liquid extraction is a process for separating<br />
the components of a liquid feed mixture by contacting with a<br />
liquid solvent phase. The operation is carried out in spray<br />
columns, packed beds, rotating disc contactors & plate columns.<br />
The effective rate of mass transfer is dependent upon several<br />
factors such as mass transfer coefficient, transfer area and<br />
magnitude of driving force applied. Multi Layer Perceptron<br />
(MLP) is a type of feed forward neural network applied to<br />
chemical engineering operations. Present work is aimed at<br />
developing ANN models with different topologies for liquidliquid<br />
extraction carried in spray column for a system of acetic<br />
acid-water-benzene. The accuracy of the ANN model is<br />
dependent upon the number of hidden layers & number of<br />
neurons in each hidden layer. Artificial neural network models 1<br />
& 2 are developed for modeling liquid-liquid extraction spray<br />
column, correlating mass transfer coefficient & mass transfer rate<br />
with flow-rate of extract phase , equilibrium concentration of<br />
acetic acid in aqueous phase & height of organic phase in<br />
column. The topology of the architecture was different for both<br />
the models. Based on results & discussions it can be concluded<br />
that both the models are successful in estimating the parameters<br />
but because of higher accuracy of estimation for both the training<br />
& test data sets ANN model 2 is more suitable. The work is<br />
demonstrative and the accuracy of estimation can be improved<br />
by altering the topology.<br />
Index Terms- liquid-liquid extraction, spray column,<br />
modeling, artificial neural network, mass transfer coefficient<br />
L<br />
I. INTRODUCTION<br />
iquid-liquid extraction is a process for separating the<br />
components of a liquid feed mixture by contacting with a<br />
liquid solvent phase. The process takes advantage of differences<br />
in the chemical properties of the feed components, such as<br />
differences in polarity and hydrophobic or hydrophilic character,<br />
to separate them. The transfer of components from one phase to<br />
the other is driven by a deviation from thermodynamic<br />
equilibrium and the equilibrium state depends on the nature of<br />
the interactions between the feed components and the solvent<br />
phase. The potential for separating the feed components is<br />
determined by the differences in this interaction. The operation is<br />
carried out in spray columns, packed beds, rotating disc<br />
contactors & plate columns. The effective rate of mass transfer is<br />
dependent upon several factors such as mass transfer coefficient,<br />
transfer area and magnitude of driving force applied. The mass<br />
transfer coefficient for a spray column is a function of a number<br />
of parameters that include velocity of raffinate & extract phases,<br />
sparger specifications, drop size, contact height of column &<br />
column dimensions.<br />
II. LITERATURE SURVEY<br />
Artificial Neural Network<br />
An Artificial Neural Network (ANN) is an information<br />
processing paradigm that is inspired by the way the biological<br />
nervous system, such as brain processes information. It is<br />
composed of large number of highly interconnected processing<br />
elements (neurons) working in unison to solve specific problem<br />
(1) .<br />
Multi Layer Perceptron (MLP) is a type of feed forward<br />
neural network applied to chemical engineering operations. It<br />
consists of multilayer hierarchical structure with input & output<br />
layers & has at least one hidden layer of processing units in<br />
between them. The layers between the input and output layers are<br />
termed ―hidden‖ since they do not converse with the outside<br />
world directly. The nodes between the two successive layers are<br />
fully connected by means of constants called as weights. The<br />
outputs from nodes of input layer are fed to hidden layer nodes,<br />
which in turn, feed their outputs to the next hidden nodes. The<br />
hidden nodes pass the net activation through a nonlinear<br />
transformation of a linear function, such as the logistic sigmoidal<br />
or hyperbolic tangent to compute the outputs. For the training of<br />
MLP, error back propagation algorithm suggested by<br />
Rumelhart (2) is popular. This is based on a nonlinear version of<br />
the Windro-Hoff rule known as Generalized Delta Rule (GDR).<br />
The schematic of the typical MLP network used in developing<br />
ANN model in the present work is shown in fig 1.<br />
Figure no 1: Simple feed forward neural network with two<br />
hidden layer<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 178<br />
ISSN 2250-3153<br />
Various applications of ANN are, an approach to fault<br />
diagnosis in chemical processes (3) , fault diagnosis in complex<br />
chemical plants (4) , incipient fault diagnosis of chemical<br />
process (5) , leak detection in liquefied gas pipeline (6),(7) , for<br />
estimation of mass transfer coefficient for fast fluidized bed<br />
solids (8) , modeling of distillation column (9) , detergent<br />
formulation (10) , modeling of unsteady heat conduction in semi<br />
infinite solid (11) , prediction of mass transfer coefficient in<br />
downflow jet loop reactor (12) and modeling of packed column (13)<br />
and similar other (14,15,16) were also reported.<br />
Modeling of liquid-liquid extraction is a topic of interest<br />
among researchers & several papers have been reported in<br />
literature related to various aspects like modeling , simulation &<br />
control of liquid-liquid extraction columns (19) , modeling mass<br />
transfer coefficient for liquid-liquid extraction with the interface<br />
adsorption of hydroxyl ions (17) , a bivariate population balance<br />
simulation tool for liquid-liquid extraction columns (20) , use of<br />
neural network for modeling of liquid-liquid extraction process<br />
in the rotating disc columns (21) , multivariable control of a pulsed<br />
liquid-liquid extraction column by neural network (18) . The<br />
present work is aimed at modeling liquid-liquid extraction spray<br />
column using artificial neural network. The experimental data<br />
generated for acetic acid-water-benzene system has been used.<br />
Mass transfer coefficient is estimated for variation in volumetric<br />
flow rate of extract phase, height of organic phase in the column<br />
and equilibrium concentration of acetic acid. It is also aimed to<br />
develop Artificial Neural Network model for correlating these<br />
sets of parameters for liquid-liquid spray extraction column.<br />
III. MATERIALS AND METHODS<br />
A. Generation of equilibrium data experimentally for the<br />
liquid-liquid extraction in spray column for a system of<br />
acetic acid-water-benzene.<br />
B. Experimental set up for spray column<br />
The schematic for the experimental set-up liquid-liquid<br />
extraction is as shown in figure no 2 .It consists of a glass tube<br />
of diameter & height 70 & 88 cm respectively. The sparger<br />
having diameter of50 mm is placed inside the column.<br />
Centrifugal pump is provided to supply the extract phase to the<br />
column. Three ball valves are provided for monitoring flow<br />
rates. Rota meter is provided for measuring the inlet flow rate of<br />
extract phase to spray column. A tank is mounted at the top of<br />
the assembly for steady supply of mixture of acetic acid and<br />
benzene to the spray column. A tank is provided for storage of<br />
extract phase at the bottom section of column.<br />
Figure no. 2: schematic for the experimental set-up of liquid-liquid extraction of spray column<br />
Observations: The experimental data generated for various runs<br />
along with the calculated values of mass transfer coefficient and<br />
rate are given in table 1.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 179<br />
ISSN 2250-3153<br />
Sr no.<br />
Equilibrium<br />
concentration of acetic<br />
acid (gmol/lit)<br />
Height of feed<br />
in column (cm)<br />
Table no 1: Experimental data<br />
Flow rate<br />
(m 3 / sec)<br />
1×10 -5<br />
Mass transfer<br />
coefficient 1×10 -4<br />
(sec -1 )<br />
Mass transfer rate<br />
1×10 -4 (gmole/sec)<br />
1 0.4901 50 3.33 1.78 1.66<br />
2 0.4901 50 5 3.2 3<br />
3 0.4901 50 6.66 5.13 4.8<br />
4 0.4901 50 7.5 6.43 6<br />
5 0.4901 55 3.33 1.68 1.73<br />
6 0.4901 55 5 3.11 3.2<br />
7 0.4901 55 6.66 4.8 4.93<br />
8<br />
0.4901 55 7.5 6.14 6.3<br />
9 0.4901 60 3.33 1.6 1.8<br />
10 0.4901 60 5 299 3.3<br />
11 0.4901 60 6.66 4.51 5.06<br />
12 0.4901 60 7.5 5.76 6.45<br />
13<br />
0.4901 65 3.33 1.58 1.93<br />
14 0.4901 65 5 2.79 3.4<br />
15 0.4901 65 6.66 4.28 5.2<br />
16 0.4901 65 7.5 5.57 6.75<br />
17 0.5769 50 3.33 1.56 1.73<br />
18 0.5769 50 5 2.54 2.8<br />
19 0.5769 50 6.66 3.74 4.13<br />
20 0.5769 50 7.5 4.49 4.95<br />
21 0.5769 55 3.33 1.48 1.8<br />
22 0.5769 55 5 2.39 2.9<br />
23 0.5769 55 6.66 3.63 4.4<br />
24 0.5769 55 7.5 4.46 5.4<br />
25 0.5769 60 3.33 1.46 1.93<br />
26 0.5769 60 5 2.26 3<br />
27 0.5769 60 6.66 3.52 4.66<br />
28 0.5769 60 7.5 4.31 5.7<br />
29 0.5769 65 3.33 1.39 2<br />
30 0.5769 65 5 2.22 3.2<br />
31 0.5769 65 6.66 3.44 4.93<br />
32 0.5769 65 7.5 4.29 6.15<br />
33 0.6035 50 3.33 1.61 1.86<br />
34 0.6035 50 5 2.6 3<br />
35 0.6035 50 6.66 3.93 4.53<br />
36 0.6035 50 7.5 5.21 6<br />
37 0.6035 55 3.33 1.52 1.93<br />
38 0.6035 55 5 2.44 3.1<br />
39 0.6035 55 6.66 3.78 4.8<br />
40 0.6035 55 7.5 4.97 6.3<br />
41 0.6035 60 3.33 1.48 2.06<br />
42 0.6035 60 5 2.38 3.3<br />
43 0.6035 60 6.66 3.66 5.06<br />
44 0.6035 60 7.5 4.78 6.6<br />
45<br />
0.6035 65 3.33 1.46 2.2<br />
46 0.6035 65 5 2.33 3.5<br />
47 0.6035 65 6.66 3.56 5.33<br />
48 0.6035 65 7.5 4.61 6.9<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 180<br />
ISSN 2250-3153<br />
IV. DEVELOPING ARTIFICIAL NEURAL NETWORK<br />
MODELS 1 AND 2<br />
This part of present work is devoted for developing<br />
artificial neural network model for the liquid-liquid extraction<br />
data generated experimentally.<br />
The accuracy of the ANN model is dependent upon the<br />
number of hidden layers & number of neurons in each hidden<br />
ANN model<br />
ANN<br />
model-1<br />
ANN<br />
model-2<br />
Input layer<br />
layer. Artificial neural network models 1 & 2 having different<br />
topology are developed in the present work using elite-<br />
ANN (C) .The details of architecture of topology of ANN models 1<br />
& 2 is given in table 2. The total data set of 48 points is divided<br />
into two parts; training & test data set having 36 & 12 data points<br />
respectively as shown in table-2.<br />
Table no. 2 Details of architecture of topology for ANN models 1 & 2<br />
1 st Hidden<br />
layer<br />
The details of the output values of parameters mass<br />
transfer rate & coefficient for training & test data sets obtained<br />
by using ANN model -1 & model -2 are given in table -3 & 4.the<br />
iteration and the corresponding error during the training mode for<br />
developing ANN model 1 & 2 are plotted as shown in figure<br />
numbers 3 & 4.<br />
Figure no. 3: Iterations and the corresponding RMSE error for<br />
ANN model 1<br />
No. of neurons Data points<br />
2 nd Hidden<br />
layer<br />
3 rd Hidden<br />
layer<br />
Output layer<br />
3 0 5 5 2<br />
3 0 10 10 2<br />
Training<br />
data<br />
Test data<br />
36 12<br />
RMSE error<br />
0.01443<br />
RMSE error<br />
0.02933<br />
36 12<br />
RMSE Error<br />
0.00704<br />
RMSE Error<br />
0.07008<br />
Figure no.4: Iterations and the corresponding RMSE error for<br />
ANN model2<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 181<br />
ISSN 2250-3153<br />
Sr no<br />
Table no 3: Output values of parameters mass transfer rate & coefficient for training data sets predicted by using ANN model - 1 &<br />
model - 2<br />
Equilibrium<br />
concentration<br />
Height of<br />
column<br />
Flow<br />
rate<br />
Mass transfer<br />
coefficient<br />
Mass transfer<br />
rate<br />
Predicted output<br />
mass transfer<br />
coefficient for<br />
ANN<br />
model 1<br />
Predicted<br />
output mass<br />
transfer<br />
coefficient for<br />
ANN<br />
model 2<br />
Predicted<br />
output mass<br />
transfer rate<br />
for ANN<br />
model 1<br />
Predicted<br />
output mass<br />
transfer rate<br />
for ANN<br />
model 2<br />
1 0.4901 50 5 3.2 3 3.225 3.177 3.019 3.057<br />
2 0.4901 50 6.66 5.13 4.8 5.219 5.176 4.775 4.779<br />
3 0.4901 50 7.5 6.43 6 6.285 6.291 6.074 6.029<br />
4 0.4901 55 3.33 1.68 1.73 1.583 1.612 1.823 1.837<br />
5 0.4901 55 6.66 4.8 4.93 4.734 4.795 4.993 4.937<br />
6 0.4901 55 7.5 6.14 6.3 6.076 6.122 6.218 6.254<br />
7 0.4901 60 3.33 1.6 1.8 1.565 1.574 1.833 1.833<br />
8 0.4901 60 5 2.99 3.3 2.965 2.926 3.221 3.237<br />
9 0.4901 60 7.5 5.76 6.45 5.775 5.792 6.432 6.491<br />
10 0.4901 65 3.33 1.58 1.93 1.547 1.553 1.850 1.839<br />
11 0.4901 65 5 2.79 3.4 2.821 2.833 3.428 3.430<br />
12 0.4901 65 7.5 5.57 6.75 5.641 5.547 6.671 6.717<br />
13 0.5769 50 3.33 1.56 1.73 1.548 1.565 1.870 1.824<br />
14 0.5769 50 6.66 3.74 4.13 3.810 3.739 4.020 4.095<br />
15 0.5769 50 7.5 4.49 4.95 4.672 4.573 4.875 4.933<br />
16 0.5769 55 3.33 1.48 1.8 1.547 1.544 1.895 1.842<br />
17 0.5769 55 5 2.39 2.9 2.414 2.420 2.866 2.824<br />
18 0.5769 55 7.5 4.46 5.4 4.497 4.411 5.391 5.359<br />
19 0.5769 60 3.33 1.46 1.93 1.542 1.539 1.924 1.880<br />
20 0.5769 60 5 2.26 3 2.358 2.312 3.019 2.987<br />
21 0.5769 60 7.5 4.31 5.7 4.332 4.284 5.819 5.771<br />
22 0.5769 65 5 2.22 3.2 2.276 2.221 3.192 3.185<br />
23 0.5769 65 6.66 3.44 4.93 3.401 3.510 4.935 4.869<br />
24 0.5769 65 7.5 4.29 6.15 4.277 4.231 6.235 6.184<br />
25 0.6035 50 3.33 1.61 1.86 1.557 1.570 1.931 1.864<br />
26 0.6035 50 5 2.6 3 2.529 2.611 3.046 2.986<br />
27 0.6035 50 7.5 5.21 6 5.049 5.157 6.107 6.001<br />
28 0.6035 55 3.33 1.52 1.93 1.553 1.554 1.956 1.912<br />
29 0.6035 55 5 2.44 3.1 2.465 2.442 3.139 3.132<br />
30 0.6035 55 7.5 4.97 6.3 4.947 4.977 6.336 6.323<br />
31 0.6035 60 5 2.38 3.3 2.393 2.276 3.238 3.314<br />
32 0.6035 60 6.66 3.66 5.06 3.689 3.707 5.104 5.087<br />
33 0.6035 60 7.5 4.78 6.6 4.808 4.800 6.478 6.540<br />
34 0.6035 65 3.33 1.46 2.2 1.538 1.569 2.008 2.151<br />
35 0.6035 65 6.66 3.56 5.33 3.604 3.496 5.382 5.347<br />
36 0.6035 65 7.5 4.61 6.9 4.737 4.682 6.621 6.699<br />
www.ijsrp.org
Sr no<br />
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 182<br />
ISSN 2250-3153<br />
Figure no 5: Comparison of actual and predicted mass transfer<br />
coefficient obtained by ANN model 1 & model 2 for training<br />
data<br />
Figure no 6: Comparison of actual and predicted mass transfer<br />
rate by ANN model 1 & model 2 for training data<br />
Table no. 4: Output values of parameters mass transfer rate & coefficient for test data sets predicted by using ANN model 1 & model<br />
2<br />
Equilibrium<br />
concentration<br />
Height of<br />
column<br />
Flow<br />
rate<br />
Mass transfer<br />
coefficient<br />
Mass<br />
transfer rate<br />
Predicted<br />
output mass<br />
transfer<br />
coefficient for<br />
ANN<br />
model 1<br />
Predicted<br />
output mass<br />
transfer<br />
coefficient for<br />
ANN<br />
model 2<br />
Predicted<br />
output mass<br />
transfer rate<br />
for ANN<br />
model 1<br />
Predicted<br />
output mass<br />
transfer rate<br />
for ANN<br />
model 2<br />
1 0.4901 50 3.33 1.78 1.66 1.601 1.676 1.818 1.850<br />
2 0.4901 55 5 3.11 3.2 3.094 3.043 3.091 3.111<br />
3 0.4901 60 6.66 4.51 5.06 4.510 4.447 5.296 5.166<br />
4 0.4901 65 6.66 4.28 5.2 4.482 4.221 5.752 5.481<br />
5 0.5769 50 5 2.54 2.8 2.458 2.535 2.725 2.720<br />
6 0.5769 55 6.66 3.63 4.4 3.606 3.703 4.238 4.343<br />
7 0.5769 60 6.66 3.52 4.66 3.465 3.617 4.508 4.603<br />
8 0.5769 65 3.33 1.39 2 1.534 1.544 1.958 1.951<br />
9 0.6035 50 6.66 3.93 4.53 4.145 4.011 5.077 4.593<br />
10 0.6035 55 6.66 3.78 4.8 3.884 3.898 5.046 4.838<br />
11 0.6035 60 3.33 1.48 2.06 1.547 1.556 1.981 2.002<br />
12 0.6035 65 5 2.33 3.5 2.298 2.139 3.355 3.498<br />
V. RESULTS AND DISCUSSION<br />
Graphs are plotted between the actual and predicted values<br />
of output parameters mass transfer coefficient and mass transfer<br />
rate obtained by using ANN model 1 & 2, for training data set as<br />
shown in figure no. 5 & 6 respectively. It can be said that the<br />
actual & predicted values are close to each other. Both the ANN<br />
models 1 & 2 have high accuracy levels of prediction.<br />
Similarly graphs are plotted between the actual and<br />
predicted values of output parameters, mass transfer coefficient<br />
and mass transfer rate respectively for test data set for ANN<br />
model 1 & 2 as shown in figures 7 & 8 respectively. It can be<br />
said that the actual & predicted values are close to each other.<br />
Figure no 7: Comparison of actual and predicted mass transfer<br />
coefficient obtained by ANN mode -1 & model -2 for test data<br />
set<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 183<br />
ISSN 2250-3153<br />
Figure no 8: comparison of actual and predicted mass transfer<br />
rate by ANN model 1 and model 2 for test data set<br />
The criterion for selection of suitable ANN model is based on<br />
comparison between the relative error values for all the output<br />
data points estimated by using ANN model 1& 2 and is given in<br />
Table no. 5.<br />
Table no.5: Relative error of predicted output values for mass transfer coefficient and mass transfer rate using ANN model 1 and ANN<br />
model-2 for training data.<br />
Actual<br />
mass<br />
transfer<br />
coefficient<br />
Predicted<br />
mass<br />
transfer<br />
coefficient<br />
Model1<br />
Predicted<br />
mass<br />
transfer<br />
coefficient<br />
Model2<br />
Mass<br />
transfer<br />
coefficient<br />
Relative<br />
Error<br />
model 1<br />
Mass<br />
transfer<br />
coefficient<br />
Relative<br />
Error<br />
model 2<br />
Actual<br />
mass<br />
transfer<br />
rate<br />
Predicted<br />
mass<br />
transfer<br />
rate for<br />
Model 1<br />
Predicted<br />
mass<br />
transfer rate<br />
for Model 2<br />
Mass<br />
transfer rate<br />
for Relative<br />
Error for<br />
model 1<br />
Mass<br />
transfer<br />
rate for<br />
Relative<br />
Error for<br />
model 2<br />
3.2 3.225 3.177 -0.782 0.690 3 3.019 3.057 -0.647 -1.936<br />
5.13 5.219 5.176 -1.745 -0.901 4.8 4.775 4.779 0.505 0.421<br />
6.43 6.285 6.291 2.251 2.149 6 6.074 6.029 -1.247 -0.491<br />
1.68 1.583 1.612 5.729 4.027 1.73 1.823 1.837 -5.398 -6.207<br />
4.8 4.734 4.795 1.362 0.101 4.93 4.994 4.937 -1.306 -0.148<br />
6.14 6.076 6.122 1.034 0.287 6.3 6.218 6.254 1.290 0.715<br />
1.6 1.565 1.574 2.136 1.571 1.8 1.833 1.833 -1.835 -1.875<br />
2.99 2.965 2.926 0.816 2.109 3.3 3.221 3.237 2.365 1.887<br />
5.76 5.775 5.792 -0.261 -0.568 6.45 6.432 6.491 0.278 -0.636<br />
1.58 1.547 1.556 2.0473 1.690 1.93 1.850 1.839 4.117 4.685<br />
2.79 2.829 2.833 -1.130 -1.571 3.4 3.428 3.430 -0.827 -0.897<br />
5.57 5.641 5.5478 -1.289 0.395 6.75 6.671 6.717 1.160 0.475<br />
1.56 1.548 1.565 0.713 -0.347 1.73 1.870 1.824 -8.101 -5.437<br />
3.74 3.810 3.739 -1.896 0.0037 4.13 4.020 4.095 2.645 0.824<br />
4.49 4.672 4.573 -4.074 -1.850 4.95 4.875 4.933 1.510 0.332<br />
1.48 1.547 1.544 -4.532 -4.346 1.8 1.895 1.842 -5.326 -2.339<br />
2.39 2.414 2.420 -1.032 -1.289 2.9 2.866 2.824 1.146 2.598<br />
4.46 4.497 4.411 -0.838 1.087 5.4 5.391 5.359 0.157 0.759<br />
1.46 1.542 1.539 -5.648 -5.445 1.93 1.924 1.880 0.263 2.574<br />
2.26 2.358 2.312 -4.338 -2.339 3 3.019 2.987 -0.663 0.411<br />
4.31 4.332 4.284 -0.526 0.593 5.7 5.819 5.771 -2.089 -1.257<br />
2.22 2.276 2.221 -2.524 -0.059 3.2 3.192 3.185 0.245 0.464<br />
3.44 3.401 3.510 1.107 -2.058 4.93 4.935 4.869 -0.106 1.222<br />
4.29 4.277 4.231 0.287 1.371 6.15 6.235 6.184 -1.386 -0.557<br />
1.61 1.557 1.570 3.279 2.479 1.86 1.931 1.864 -3.843 -0.241<br />
2.6 2.529 2.611 2.719 -0.438 3 3.046 2.986 -1.536 0.4379<br />
5.21 5.049 5.157 3.081 0.999 6 6.107 6.001 -1.789 -0.018<br />
1.52 1.553 1.554 -2.221 -2.291 1.93 1.956 1.912 -1.353 0.897<br />
2.44 2.465 2.442 -1.050 -0.092 3.1 3.139 3.132 -1.264 -1.062<br />
4.97 4.947 4.977 0.445 -0.142 6.3 6.336 6.323 -0.574 -0.375<br />
2.38 2.393 2.276 -0.546 4.338 3.3 3.238 3.314 1.866 -0.453<br />
3.66 3.689 3.707 -0.817 -1.309 5.06 5.104 5.087 -0.872 -0.548<br />
4.78 4.808 4.800 -0.598 -0.427 6.6 6.478 6.540 1.839 0.899<br />
1.46 1.538 1.569 -5.369 -7.482 2.2 2.008 2.151 8.701 2.182<br />
3.56 3.604 3.494 -1.239 1.776 5.33 5.382 5.347 -0.980 -0.332<br />
4.61 4.737 4.682 -2.765 -1.577 6.9 6.621 6.699 4.036 2.901<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 184<br />
ISSN 2250-3153<br />
Fig no.9 & 10 show the graphs plotted between the relative error<br />
for the output parameters, mass transfer coefficient and mass<br />
transfer rate, estimated using ANN model 1 & ANN model 2<br />
respectively for training data set. It is seen that there are<br />
deviations of the relative error from the mean value for the ANN<br />
models, 1 & 2. The range of relative error for the output<br />
parameter, mass transfer coefficient for ANN model 1 & ANN<br />
model 2 is 0-6 & 0-4 respectively. Similarly the range for the<br />
second output parameter, mass transfer rate for ANN model 1 &<br />
ANN model 2 is 0-8% & 0-4% respectively. As the relative<br />
error for ANN model 2 is lower for both the output parameters<br />
than estimated by ANN model 1, hence it can be said that the<br />
ANN model 2 is superior to the ANN model 1.<br />
Figure no.9: Relative error of actual output and predicted output<br />
values for the mass transfer coefficient for training data<br />
Figure no.10: Relative error of actual output and predicted output<br />
values for the mass transfer rate for training data<br />
Similarly the relative error for all test data set points<br />
using models 1& 2 is calculated as given in Table 6.<br />
Table no.6: Relative error of predicted output values of mass transfer coefficient and mass transfer rate for ANN model 1 and ANN<br />
model-2 for test data.<br />
Actual<br />
mass<br />
transfer<br />
coefficient<br />
Predicted<br />
mass<br />
transfer<br />
coefficient<br />
Model1<br />
Predicted<br />
mass<br />
transfer<br />
coefficient<br />
Model2<br />
Mass<br />
transfer<br />
coefficient<br />
Relative<br />
Error<br />
model 1<br />
Mass<br />
transfer<br />
coefficient<br />
Relative<br />
Error<br />
model 2<br />
Actual<br />
mass<br />
transfer<br />
rate<br />
Predicte<br />
d mass<br />
transfer<br />
rate for<br />
Model 1<br />
Predicted<br />
mass<br />
transfer<br />
rate for<br />
Model 2<br />
Mass<br />
transfer<br />
rate for<br />
Relative<br />
Error for<br />
model 1<br />
Mass<br />
transfer<br />
rate for<br />
Relative<br />
Error for<br />
model 2<br />
1.78 1.601 1.676 10.013 5.792 1.66 1.818 1.850 -9.569 -11.501<br />
3.11 3.094 3.043 0.489 2.135 3.2 3.091 3.111 3.376 2.756<br />
4.51 4.510 4.447 -0.010 1.385 5.06 5.296 5.166 -4.664 -2.105<br />
4.28 4.482 4.229 -4.732 1.365 5.2 5.752 5.481 -10.62 -5.41<br />
2.54 2.412 2.535 3.227 0.167 2.8 2.725 2.720 2.676 2.828<br />
3.63 3.606 3.703 0.643 -2.020 4.4 4.238 4.343 3.673 1.290<br />
3.52 3.467 3.617 1.554 -2.758 4.66 4.508 4.603 3.250 1.214<br />
1.39 1.534 1.544 -10.400 -11.14 2 1.958 1.951 2.064 2.413<br />
3.93 4.145 4.011 -5.488 -2.071 4.53 5.077 4.593 -12.09 -1.4<br />
3.78 3.884 3.898 -2.756 -3.131 4.8 5.046 4.838 -5.142 -0.81<br />
1.48 1.547 1.556 -4.569 -5.188 2.06 1.981 2.002 3.825 2.802<br />
2.33 2.298 2.139 1.341 8.182 3.5 3.355 3.498 4.126 0.041<br />
Fig no.11 & 12 show the graphs plotted between the<br />
relative error for the output parameters, mass transfer coefficient<br />
and mass transfer rate, for ANN model 1 & ANN model 2<br />
respectively. It is seen that there are deviations of the percentage<br />
relative errors from the mean path of the ANN model 1 & 2. The<br />
range of relative errors for the output parameter, mass transfer<br />
coefficient for ANN model 1 & ANN model 2 is 0-10 & 0-6<br />
respectively. Similarly the range for the second output parameter,<br />
mass transfer rate for ANN model 1 & ANN model 2 is 0-12 &<br />
0-6 respectively. As the relative error for ANN model 2 is lower<br />
for both the output parameters than estimated by ANN model 1<br />
for the training as well as test data set, hence it can be conclude<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 185<br />
ISSN 2250-3153<br />
that the ANN model 2 is superior to the ANN model 1 baring one<br />
point.<br />
Figure no.11: Relative error of experimental output and predicted<br />
output values for the mass transfer coefficient.<br />
Figure no.12: Relative error of experimental output and predicted<br />
output values for the mass transfer rate.<br />
VI. CONCLUSION<br />
Artificial neural network models 1 & 2 are developed for<br />
modeling liquid-liquid extraction spray column, correlating mass<br />
transfer coefficient & mass transfer rate with flow-rate of extract<br />
phase , equilibrium concentration of acetic acid in aqueous phase<br />
& height of organic phase in column. The topology of the<br />
architecture was different for both the models. Based on results<br />
& discussions it can be concluded that both the models are<br />
successful in estimating the parameters but because of higher<br />
accuracy of estimation for both the training & test data sets ANN<br />
model 2 is more suitable. The work is demonstrative and the<br />
accuracy of estimation can be improved by altering the topology.<br />
ACKNOWLEDGMENT<br />
Authors are thankful to Director, LIT Nagpur for the<br />
facilities and the encouragement provided.<br />
REFERENCES<br />
[1] J.A. Anderson, ―An Introduction to Neural Networks (Prentice-Hall of<br />
India, Pvt. Ltd New Delhi),‖ 1999.<br />
[2] D.E. Rumelhart, McClleland ―Back Propagation Training Algorithm<br />
Processing,‖ M.I.T Press, Cambridge Massachusetts, 1986.<br />
[3] J.Y. Fan, M. Nikolau & R.E. White, ―An approach to Fault diagnosis of<br />
chemical processes in Neural networks,‖ AIChE, 1993, pp. 82-88.<br />
[4] J.C. Hoskins, K.M. Kaliyur & D.M. Himmelblau, ―Fault diagnosis in<br />
complex chemical plants using artificial neural network,‖ AIChEJ, 1991,<br />
pp. 137-141.<br />
[5] K. Watanabe., M. I. Matsuura Abe, M. Kubota, D. M. Himmelblau<br />
―Incipient fault diagnosis of chemical processes via artificial neural<br />
networks,‖ AIChEJ, 1989, pp. 1803-1812.<br />
[6] S. Belsito, S. Banerjee, ―Leak detection in liquefied gas pipelines by<br />
Artificial neural networks,‖ AIChEJ, 1998, pp. 2675-2688.<br />
[7] S. L. Pandharipande, Y.P. Badhe, ―ANN for leak detection in pipelines.‖<br />
Chem Eng World, 2003, pp. 70-72.<br />
[8] P. Zamankhan, P. Malinen, H. Lepomaki, ―Application of neural networks<br />
to mass transfer predictions in a fast fluidized bed of fine solids,‖ AIChEJ,<br />
1997, pp. 1684-1690.<br />
[9] R. Baratti, G. Vacca, A. Servida, ―Neural networks modeling of distillation<br />
columns,‖ Hydrocarbon Processing, 1995, pp. 35-38.<br />
[10] S. L. Pandharipande, R.S. Agarwal, B. B. Gogte, Y. P. Badhe, ―Detergent<br />
formulation by artificial neural network,‖ Chem Eng World, 2003, pp. 78-<br />
80.<br />
[11] S.L. Pandharipande, Y.P. Badhe, ―Unsteady state heat conduction in semi<br />
infinite solids artificial neural networks,‖ Chem Eng World, 2003, pp. 82-<br />
84.<br />
[12] S.L. Pandharipande, Y.P. Badhe, ―Prediction of mass transfer coefficient in<br />
downflow jet loop reactor using artificial neural network,‖ Indian Chemical<br />
Engineer, 2003, pp. 256-258.<br />
[13] S. L. Pandharipande, S. A. Mandavgane, ― Modeling of packed column<br />
using artificial neural networks,‖ Indian J Chem Tech, 2004, pp. 820-824.<br />
[14] S. L. Pandharipande, A. Bhaise, A. Poharkar, ―Steam tables: Using<br />
Artificial Neural Networks,‖ Chem Eng world, 2004, pp. 50-54.<br />
[15] S.L. Pandharipande, Y.P. Badhe, ―Artificial neural networks for Gurney-<br />
Lurie and Heisler Charts,‖ J Inst Eng, 2004, pp. 65-70.<br />
[16] S.L. Pandharipande, Y.P. Badhe,. elite-ANN©. 2004; ROC No SW-1471<br />
India.<br />
[17] Javad Saien & Shabnam Daliri, ―Modelling mass transfer coefficient for<br />
liquid-liquid extraction with the interface adsorption of hydroxyl ions,‖<br />
Korean Journal of chemical engineering, 2009,pp. 963-968<br />
[18] A. Chouai, M. Cabassud, M.V. Le Lann, C. Gourdon and G. Casamatta,<br />
―Multivariable Control of a Pulsed Liquid-Liquid Extraction Column by<br />
Neural Networks,‖ Neural computing & applications, 2009, pp. 181-189<br />
[19] O. Weinstein, R. Semiat, D.R. Lewin, ―Modeling, simulation and control of<br />
liquid-liquid extraction columns,‖ Chemical Engineering Science, 1998, pp.<br />
325–339<br />
[20] M. Menwer, Attarakiha, C. Hans-Jörg Bart, Tilmann Steinmetza, Markus<br />
Dietzena and Naim M. Faqirb, ―LLECMOD: A bivariate population balance<br />
simulation tool for liquid-liquid extraction columns,‖ The Open Chemical<br />
Engineering Journal, 2008, pp. 10-34<br />
[21] Normah Maan, Jamalludin Talib & Khairil Annuar Arshad, ―Use of neural<br />
network for modeling of liquid-liquid extraction process in The RDC<br />
Column,‖ Matematika, 2003, pp. 15–27<br />
AUTHORS<br />
First Author – S.L. Pandharipande, M. Tech, Associate<br />
Professor, Department of Chemical Engineering, Laxminarayan<br />
Institute of Technology, Rashtrasant Tukadoji Maharaj Nagpur<br />
University, Nagpur, India.<br />
E-mail id: slpandharipande@gmail.com<br />
Second Author – Aashish Nagdive, M.Tech, Department of<br />
Chemical Engineering, Laxminarayan Institute of Technology,<br />
Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 186<br />
ISSN 2250-3153<br />
Third Author – Yogesh Moharkar, M.Tech, Department of<br />
Chemical Engineering, Laxminarayan Institute of Technology,<br />
Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India.<br />
E-mail id: ymoharkar@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 187<br />
ISSN 2250-3153<br />
Testing Market Efficiency of Indian Stock Market<br />
Abstract- As long as financial markets are concerned, people<br />
tried to forecast the future movement of it. The purpose of<br />
forecast is to expect great fortunes. In reality it is an important<br />
question that ―is it possible to forecast market with the historical<br />
data?‖ If it is possible than excess returns can be made by<br />
picking up lottery stock. This situation is called ―Inefficient<br />
Market‖. On the other hand if market is efficient, it is west of<br />
time to predict stock market. The main intention of this paper is<br />
to study the efficiency level in Indian Stock market and the<br />
random walk nature of the stock market by using RUN test for<br />
the period from 1st January 2001 to 31st December 2010. In this<br />
paper, 6 major indices [BSE 30, BSE 100,200,500, BSE SMALL<br />
CAP and BSE MIDCAP] are studied.<br />
Keywords- Market efficiency, Random walk, Run test, ACF.<br />
―M<br />
I. INTRODUCTION<br />
y interest is in the future because I am going to spend<br />
the rest of my life there‖ - Charles F. Kettering<br />
(American engineer, inventor of the electric starter, 1876-1958).<br />
This quote explains the investors‘ attitude when they try to<br />
estimate future. The same efforts put by academicians to explore<br />
whether there is certain dependence in successive price changes<br />
that could profitably be exploited by various kinds of trading<br />
techniques.<br />
The Random Walk Hypothesis is concerned with the question<br />
of whether one can predict future prices from past prices. It<br />
assumed that successive price change is independent from the<br />
historical closings. There is no meaning to study past trend or<br />
patterns of prices to predict future movement. In its simple form,<br />
it states that price changes cannot be predicted from earlier<br />
changes in any meaningful manner (Weak form of hypothesis) 1 .<br />
The main purpose of this paper is to test the weak-from of<br />
efficiency of the Indian stock market by using daily data from the<br />
1 st January 2001 to 31 st December 2010. There are 2 major stock<br />
exchanges in India, Bombay Stock Exchange (BSE) and National<br />
Stock Exchange (NSE). There are various indices are available<br />
but for the study purpose only 6 indices of BSE is considered.<br />
Literature Review:<br />
In support of pattern finding, Lo, Mamaysky and Wang<br />
(2000) conclude that human judgment is superior to most<br />
computational algorithms. But recent advanced statistical model<br />
had successful applications in fingerprint identification,<br />
handwriting analysis, and face recognition which can be useful to<br />
identify pattern or trend in technical analysis 2 .<br />
In paper titled ―Quasi-Maximum Likelihood Estimation and<br />
Inference in Dynamic Models with Time Varying Covariance‖<br />
Mr. Divyang J Joshi<br />
Late. Smt. S. G. Patel Institute of Management, Dharmaj, India<br />
Brock, Lakonishok and LeBaron (1992) tested 26 simple<br />
technical trading rules on daily data of the Dow-Jones Industrial<br />
Average for the period 1897-1986. They conclude that buy<br />
signals generates higher returns during buy days compare to sell<br />
signals during sell signals 3 .<br />
The first researcher who linked the random walk process to<br />
economic processes was French mathematician Louis Bachelier<br />
in his Ph.D. dissertation titled "The Theory of Speculation" who<br />
noticed that changes of prices of French government papers are<br />
unpredictable what forced him to conclude that "The<br />
mathematical expectation of the speculator is zero" 4 .<br />
In against of Random walk theory, Alexander (1961) applies<br />
several filters to the DJIA in the period 1897 − 1929 and the S&P<br />
Industrials in the period 1929 − 1959. He developed a filter<br />
strategy. According to it buy the stock when price increases by x<br />
percent from a recent low and sell when price declines by x<br />
percent from a recent high. He concludes in support of technical<br />
analysis. He concludes that in speculative markets if price of a<br />
stock initiate one trend then it is going to persist for long time 5 .<br />
In the paper titled "A Comparative Analysis of Stock Price<br />
Behaviour on the Bombay, London and New York Stock<br />
Exchanges" Sharma and Kennedy (1977) compared the behavior<br />
of stock indices of the Bombay, London and New York Stock<br />
Exchanges for the period of 1963-73. He used run test and<br />
spectral analysis. He concludes that all 3 stock exchanges follow<br />
the random walk movement 6 ".<br />
MadhuriMalhotra, M. Thenmozhi, G Arun Kumar (2007), in<br />
their paper titled ―Stock Market Reaction and Liquidity Changes<br />
around Bonus Issue Announcement: Evidence from India‖ by<br />
(2007), examines share price reaction to the announcement of<br />
bonus issue for a sample of Indian companies. Standard event<br />
study methodology has been used for the purpose of studying the<br />
Bonus issue announcement reaction. Bonus issue announcement<br />
yields negative abnormal returns around the announcement date.<br />
There is a negative reaction after the bonus issue announcement<br />
conveying that the market under reacts after the announcement. It<br />
is also observed that there is no information leakage prior to the<br />
announcement 19 .<br />
II. OBJECTIVES OF THE STUDY<br />
The purpose of this study is to test the random walk theory in<br />
Bombay Stock Exchange (6 Indices). The 10 years daily closing<br />
data for 4 indices and 8 years data for Small-Cap and Midcap<br />
index is used to know whether past stock price movements<br />
follow a trend or not, so they can or cannot be used to predict<br />
their future movement. The results of the study are aimed to<br />
validate or not to validate the perceptions that stock prices in<br />
BSE do follow the random walk theory.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 188<br />
ISSN 2250-3153<br />
Hypothesis:<br />
1. Ho: BSE 30 Follows Random pattern.<br />
2. Ho: BSE 100 follows Random pattern.<br />
3. Ho: BSE 200 follows Random pattern.<br />
4. Ho: BSE 500 follows Random pattern.<br />
5. Ho: BSE Mid-Cap follows Random pattern.<br />
6. Ho: BSE Small-Cap follows Random pattern.<br />
III. METHODOLOGY<br />
For testing random walk of BSE indices, daily closing values<br />
used for the period of 1 st January 2001 to 31 st December 2010.<br />
The reason for selecting this period is that during this 10 years<br />
market seem too volatile. It touched the life time high in 2008<br />
and low in 2010. The total 2498 number of observations for BSE<br />
30, BSE 100, BSE 200 and BSE 500 each and 1938 for BSE<br />
Small-cap and Mid-cap each. The data are collected from BSE<br />
website only.<br />
Research methodology:<br />
After having 1 lag difference (t1 – t0), total runs are calculated<br />
with the help of Excel. The MINITAB software is used for<br />
applying run test.<br />
To check the Randomness among the data Run test is used.<br />
Run test is a non-parametric test. ―A Run test may be defined as<br />
a sequence of price changes of the same sign preceded and<br />
followed by price changes of different sign A ." It depends only on<br />
the sign of the price changes but not on the magnitude of the<br />
price. It does not require the specification of the probability<br />
distribution. It depends only on the sign of the price. They are<br />
essentially concerned with the direction of changes in the time<br />
series 1 .<br />
In a given time series of stock prices there are three possible<br />
types of price changes, namely positive, negative and no change.<br />
This gives three types of runs. A positive (negative) run is a<br />
sequence of positive (negative) price changes preceded and<br />
succeeded by either negative (positive) or zero price change.<br />
Similarly, a zero run is sequence of zero price changes preceded<br />
and succeeded by either negative or positive price change B . The<br />
assumption of Run test is that the successive price changes are<br />
independent and the sample proportion of positive, negative and<br />
zero price changes are unbiased estimates of the population<br />
proportions<br />
IV. RESULT AND DISCUSSION:-<br />
Table: 1 BSE Indices Run test output for 2001 to 2010<br />
Indices<br />
Run<br />
above &<br />
Below K<br />
Observed<br />
No. of<br />
Run<br />
Expected<br />
No. of Run<br />
Observation<br />
above K<br />
Observation<br />
below K<br />
P Value<br />
BSE 30 0.547676 1149 1237.65 1367 1129 0.000<br />
BSE 100 0.559696 1117 1231.21 1397 1099 0.000<br />
BSE 200 0.570513 1107 1224.18 1424 1072 0.000<br />
BSE 500 0.568510 1101 1225.57 1419 1077 0.000<br />
BSE MIDCAP<br />
(2003-10)<br />
BSE Small-Cap<br />
(2003-10)<br />
0.601240 773 929.314 1164 772 0.000<br />
0.598657 737 931.313 1159 777 0.000<br />
From the Table 1 it can observed that, the resulting p-value of all indices (0.0000) are smaller than the alpha level of 0.05, there is<br />
sufficient evidence to conclude that the data are not in random order and market is inefficient. It means with the help of past prices and<br />
trend we can predict the market. The above test was run on total observed runs of 10 years. And it can be interpret that market is not<br />
random.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 189<br />
ISSN 2250-3153<br />
But, if the run test applied on year wise data of BSE 30 and BSE 100, the result is different than the above.<br />
Table 2:- BSE 30 Run test output for 2001 to 2010<br />
BSE 30<br />
Run above<br />
& Below K<br />
Observed<br />
No. of Run<br />
Expected No.<br />
of Run<br />
Observation<br />
above K<br />
Observation<br />
below K<br />
P Value<br />
2001 0.506073 105 124.482 125 122 0.013<br />
2002 0.517928 112 126.339 130 121 0.069*<br />
2003 0.588933 105 123.498 149 104 0.016<br />
2004 0.562992 125 125.984 143 111 0.900*<br />
2005 0.573705 107 123.773 144 107 0.030<br />
2006 0.6 113 121 150 100 0.291*<br />
2007 0.574297 117 122.751 143 106 0.455*<br />
2008 0.451220 114 122.829 111 135 0.255*<br />
2009 0.555556 125 121 135 108 0.603*<br />
2010 0.543651 131 126.040 137 115 0.528*<br />
In table 2, it can observed that in the year 2001, 2003 and 2005 the P value is smaller than 0.05. It means market is non random. But<br />
in the year 2002, 2004, 2006, 2007, 2008, 2009 and 2010 the P value is greater than alpha value. It means in all 7 years, market follow<br />
the random pattern.<br />
Table 3:- BSE 100 Run test output for 2001 to 2010<br />
BSE<br />
100<br />
Run above<br />
& Below K<br />
Observed<br />
No. of Run<br />
Expected No.<br />
of Run<br />
Observation<br />
above K<br />
Observation<br />
below K<br />
P<br />
Value<br />
2001 0.477733 105 124.255 118 129 0.014<br />
2002 0.521912 112 126.259 131 120 0.071*<br />
2003 0.616601 99 120.621 156 97 0.004<br />
2004 0.574803 127 125.157 146 108 0.813*<br />
2005 0.581673 101 123.151 146 105 0.004<br />
2006 0.612 109 119.728 153 97 0.152*<br />
2007 0.606426 113 119.859 151 98 0.361*<br />
2008 0.459350 110 123.187 113 133 0.090*<br />
2009 0.588477 117 118.695 143 100 0.822*<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 190<br />
ISSN 2250-3153<br />
2010 0.555556 129 125.444 140 112 0.649*<br />
In table 3, it follows the same pattern of BSE 30. In the year 2001, 2003 and 2005 the P value is smaller than 0.05. It means market is<br />
non random. But in the year 2002, 2004, 2006, 2007, 2008, 2009 and 2010 the P value is greater than alpha value. It means in all 7<br />
years, market follow the random pattern.<br />
V. SCOPE OF THE STUDY<br />
The study is limited to 10 years and 6 indices only. The<br />
broader study is possible by increasing number of years and<br />
indices.<br />
The study is also limited to BSE, It can be expand by<br />
including NSE or other Nation‘s indices to prove randomness of<br />
the capital market.<br />
Here autoregression, ARIMA, GARCH tests are not applied.<br />
The detailed study is possible by knowing stationarity of the<br />
data.<br />
VI. CONCLUSION<br />
The results show the evidence of the inefficient form of the<br />
Indian Stock Market in long run but efficient form in short term.<br />
So, the findings support the Random-walk hypothesis in short<br />
duration but in long term doesn‘t. All indices of BSE do not<br />
support the weak form of market efficiency. The information<br />
regarding yesterday's and today‘s indices can be used to predict<br />
tomorrow‘s indices. The stocks in the index don‘t absorb the<br />
price information effectively. It means investors can identify<br />
available undervalued securities in the market make excess<br />
returns by correctly picking them.<br />
REFERENCES<br />
[1] Anand Pandeyy. [ October 2003] ―Efficiency of Indian Market‖. The paper<br />
was part of project for the Time Series Course by Dr. Susan Thomas.<br />
[2] Lo, A.W., Mamaysky, H., Wang, J. (2000), ―Foundations of technical<br />
analysis: computational algorithms, statistical inference and empirical<br />
implementation‖. Journal of Finance 55, 1705-1722.<br />
[3] Bollerslev, T., Wooldridge, J.M. (1992). ‖Quasi-Maximum Likelihood<br />
Estimation and Inference in Dynamic Models with Time Varying<br />
Covariances‖. Econometric Reviews 11,143-172.<br />
[4] Courtault, J.M., Kabanov, Y., Bru, B., Crepel, P., Lebon, I., Marchand, A.L.<br />
(2000). Louis Bachelier on the Centenary of Theorie De La speculation.<br />
Mathematical Finance, 10, 341- 353.<br />
[5] Alexander, S.S. (1961), Price Movements in Speculative Markets: Trends or<br />
Random Walks, Industrial Management Review 2, 7-26.<br />
[6] Sharma J. L. and Robert E. Kennedy [1977] "A Comparative Analysis of<br />
Stock Price Behaviour on the Bombay, London and New York Stock<br />
Exchanges", Journal of Financial and Quantitative Analysis Sep 1977.<br />
[7] D.B. Johnson and T. Mizoguchi (1978). "Selecting the Kth Element in X +<br />
Y and X1 + X2 + ... + Xm," SIAM Journal of Computing 7, pp.147-153.<br />
[8] Malkiel, B. (1995). Returns from Investing in Equity Mutual Funds 1971 to<br />
1991. Journal of Finance, 549-572.<br />
[9] McQueen, G., Pinegar M., & Thorley S. (1996). Delayed Reaction to Good<br />
News and the Cross-Autocorrelation of Portfolio Returns. Journal of<br />
Finance, 889-920.<br />
[10] Moore, A. (1964). Some Characteristics of Changes in Common Stock<br />
Prices Ed.: The Random Character of Stock Market Prices, Cambridge:<br />
Mass.<br />
[11] Guneratne, P.S.M., & Fernando, K.G.K., (2007) Market Response to Bonus<br />
Issues with Special Reference to Impact of Bonus Issue Ratio and Ex-day<br />
Price Adjustments; Evidence from Colombo Stock Exchange(2007)<br />
International Research Conference on Knowledge for Growth and<br />
Development Faculty of Management &Finance, University of Colombo,<br />
Sri Lanka.<br />
[12] Hirst, D.E., K.E. Jackson, and L. Koonce. 2003. ―Improving Financial<br />
Reports by Revealing the Prior Accuracy of Estimates‖, Contemporary<br />
Accounting Research, 20(spring): 1–31.<br />
[13] HumeraShahid, Xia Xinping, FaiqMahmood, Muhammad Usman (2010),<br />
Announcement Effects of Seasoned Equity Offerings in China, International<br />
Journal of Economics and Finance Vol. 2, No. 3; August 2010, Pages 163 –<br />
169<br />
[14] International Accounting Standards Board, IFRS 2: Share-Based Payment,<br />
IASB, London, 2004.<br />
[15] John Handly.C (1995) ―The pricing of Underwriting Risk in Relation to<br />
Australian Rights Issues‖ Australian Journal of Management, Vol.20, No.1,<br />
pp.43-58.<br />
[16] Kakati, M (2001), "price performance of Bonus issue", Finance India, Vol.<br />
XV, Nov-Dec, PP 1183-1190.<br />
[17] KaurKaramjeet and Singh Balwinder, Bonus Share Announcements and<br />
Market Efficiency: A Study of BSE Listed Companies, Advances in<br />
Management, 2010, vol. 3, issue 11.<br />
[18] Long, John B., Jr. 1978. "The Market Valuation of Cash Dividends: A Case<br />
to Consider." Journal of Financial Economics 6, no. 2/3: pp 235-264.<br />
[19] Malhotra, Madhuri; Thenmozhi, M.; Arun Kumar: Effect of bonus issue<br />
announcement on stock returns using market model, Journal of International<br />
Finance and Economics January 1, 2007.<br />
BOOKS<br />
[1] Richard I. Levin and David S. Rubin ―Statistics for Management‖, 7th<br />
edition. PP. 813, 839,840.<br />
[2] Donald R. Cooper and Pamela S. Schindler ―Business Research Methods‖,<br />
9th edition. PP. 660 to 665.<br />
AUTHORS<br />
Mr. Divyang J Joshi, Assistant Professor, Late. Smt. S. G. Patel<br />
Institute of Management, Dharmaj, India Email:<br />
divyang316ncm@yahoo.co.in, Phone: 094273 86078<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 191<br />
ISSN 2250-3153<br />
<strong>Online</strong> Shopping and the Transaction Protection in E-<br />
Commerce: A case Of <strong>Online</strong> Purchasing in Libya.<br />
Abdulghader.A.Ahmed, Hadya.S.Hawedi<br />
School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), Malaysia<br />
Center of System Science, Faculty of Computer and Mathematical Science, Universiti Teknologi MARA (UiTM) Malaysia<br />
E-mail: alyake2004@yahoo.com, hadia20008@yahoo.com<br />
Abstract- E-commerce is a successful business-based<br />
innovation via internet. This form of business transaction<br />
strategy offers many opportunities for growth in business and<br />
marketing services in various aspects. <strong>Online</strong> shopping is an<br />
intermediary mode between marketers or sellers to the end user<br />
or the consumers. Nature of online transaction in Libya is<br />
constrained by instability resulting from insecurity, unprotected<br />
transaction as well as trust. <strong>Online</strong> shopping could become<br />
predominant source of shopping method, if the barriers<br />
associated with insecurity, trust and customer‘s protection are<br />
tackled. Owing to the significance of e-commerce towards<br />
Libyan economic growth, this paper highlights the limitations<br />
associated with e-commerce transaction in Libya and proposes<br />
relevant steps towards overcoming these constrains. Relevance of<br />
integrating e-commerce in Libyan economic system is discussed<br />
with.<br />
Index Terms- E-commerce, online shopping, security,<br />
protection, trust<br />
E<br />
I. INTRODUCTION<br />
-commerce encompasses buying and selling of products and<br />
services through electronic systems<br />
Such as internet and other computer related networks. Recently,<br />
rapid global growth in e-commerce has increasingly become<br />
necessary component of business strategy for efficient<br />
transaction. E-commerce technology in business could<br />
revolutionize relationships within organizations and individual<br />
transaction settings [1].<br />
The Internet has improved traditional brick and mortar stores<br />
through the development of e-commerce web sites. Nowadays,<br />
many e-commerce especially online shopping had widened the<br />
access to their products through new methods of marketing via<br />
electronically mediated e-commerce. Good understanding of the<br />
requirements, expectations and the operational concept of<br />
internet shopping could an advantage to effective online retailing<br />
and as well help the manufacturers in developing more effective<br />
and targeted online retailer operations. E-stores can be operated<br />
by either a pure or a traditional retailer [4]. However, there is<br />
concern over online shopping especially when customer‘s<br />
personal information and financial transactions is required to<br />
facilitate transaction through internet medium. A lack of trust is<br />
likely to discourage online consumers‘ intentions from<br />
purchasing via online stores. However, with the existence ecommerce,<br />
Harridge-March [2] reported that e-commerce serves<br />
as cost-reducing strategy for customers through distribution<br />
network of goods and services from the provider to the<br />
consumer.<br />
Unlike conventional shopping which involves face-to-face<br />
transaction; online shopping uses internet, network and webbased<br />
technologies in creating interactive medium between<br />
sellers and consumers. In addition, the existence of online<br />
shopping yield benefits such as easy to business transaction<br />
network; saves times and reduces search costs compared to<br />
conventional shopping process. Because of these benefits,<br />
businesses and companies are widening their access to business<br />
transaction through fascinating method of delivery via<br />
electronically mediated shopping. With the recent growth of<br />
online shopping, it has become an attractive option for expanding<br />
the business opportunity available for sellers. By incorporating<br />
online shopping, into business transaction in companies can<br />
eliminate the need to construct new building to support services<br />
in other to accommodate the increase of consumers. E-commerce<br />
is potential tool for successful business innovation [3] with<br />
promising advantages over current Libyan online transaction<br />
which are noted to have been jeopardized by insecurity.<br />
However, this paper highlights the potential limitations<br />
associated with E-commerce transaction in Libya and proposes<br />
relevant steps to overcoming them. Relevance of integrating ecommerce<br />
into Libyan trade system is discussed with respect to<br />
their positive impact.<br />
II. THE CHALLENGES OF SECURITY, PROTECTION<br />
AND TRUST<br />
The problems associated with online shopping are more<br />
to consumer‘s protection in transaction that requires privacy and<br />
trust between different geographical locations or countries [5].<br />
There is increasing concern over online shopping because of<br />
insecurity, lack of customer‘s protection and trust which are vital<br />
elements for a successful online transaction between countries,<br />
organization as well as individual.<br />
Udo [6], report that the major problem faced by consumers in<br />
an online transaction is security. From survey report, it is obvious<br />
the most reports acknowledged that transaction base on ecommerce<br />
have been constrained by security. In addition,<br />
consumers are concern about their privacy especially when their<br />
personal information are required to facilitate transaction besides,<br />
potential risks are also posed to those using credit cards to make<br />
purchase online. Secured system is needed enhance online<br />
shopping since consumers cares for their privacy and security.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 192<br />
ISSN 2250-3153<br />
Furthermore, [6] online shopping paves way to fraudulent act and<br />
unworthy credit orders which is also attributed to unsecured<br />
services. Trust also plays an essential role on consumer‘s choice<br />
for online purchase. Roca et.al. [7] reported that trust in online<br />
businesses determines consumers‘ willingness to engage in<br />
online business.<br />
In another study [8], it was pointed out that security,<br />
protection policy and as well as reliabilities of companies are<br />
major barriers to online shopping. However, consumer‘s<br />
behavior towards online shopping includes and not limited to [9];<br />
concern over unauthorized sharing of personal information,<br />
unsolicited contacts from the online retailer, and undisclosed<br />
tracking of shopping behavior. Besides, system securityconsumers<br />
who are concern about illegal bridging technological<br />
protected devices to acquire consumer‘s personal, financial or<br />
transaction-related information. Concern over online retailer<br />
fraud cause by purposeful misrepresentation or non-delivery of<br />
goods paid for are among the potential threat over online<br />
purchase.<br />
Security such as the use of digital signature and certificates<br />
could be helpful in controlling risk of fraud for online-based<br />
transactions [7]. Improved security system for online shopping<br />
could reduce unworthy behavior of consumers‘ with increase<br />
intention for online transaction [10].<br />
Improved security in online shopping could tremendously<br />
encourage consumers to engage in e-commerce deal as well as its<br />
awareness and role among Libyan economic units. Consumers<br />
feel relaxed to use online medium when their capital and<br />
information are properly protected [11]. Disposing of the<br />
customer‘s personal detail and credit card information during and<br />
after online transaction should be avoided as it gives more room<br />
for illegal use of customer‘s information. Trust in online<br />
transaction could be enhanced through policies that incorporate<br />
legal, technical, rigorous standards for security, data protection<br />
and as well as certificates of independent trusted third parties<br />
[10]. In addition, online sellers should encourage trustworthy<br />
relationship in order to increase and attract consumers to online<br />
transaction by ensuring that every transaction is kept within the<br />
scope of agreement [12]. Owing to the need to facilitate ecommerce<br />
transaction in Libya we hereby proposed that efficient<br />
measures for effective implementation of e-commerce<br />
transaction in Libya economic developments should integrate<br />
web-based infrastructures so as to;<br />
a. Reduce high costs associated with internet access, such as<br />
pronounced in service connection charges, tariff on subscription<br />
and hosting charges for websites with sufficient bandwidth.<br />
b. Credit cards issuance should be regulated to monitor and<br />
control fraud through predetermined security code and features.<br />
c. Transportation infrastructure through which goods and<br />
services are delivered should be enhanced through adapting good<br />
maintenance and change of outdated facilities.<br />
d. Transaction should be carried out only through secured<br />
network besides; parties embarking on online transaction should<br />
be acquainted on security-related issues to ensure reliability.<br />
III. THE ISSUES OF SECURITY, PROECTION AND<br />
TRUST RAISED IN LIBYA ONLINE SHOPPING<br />
Last decade witnessed rapid accumulation of numerous studies<br />
on technology-oriented e-commerce weakness. As innovative<br />
approach of e-commerce spreads across various sectors, online<br />
marketers could benefit from the opportunities attached to online<br />
shopping by using taking into consideration the measure capable<br />
of reducing crime-prone shopping.<br />
E-commerce transaction in Libya is rapidly improving as<br />
industries and individual business unit faces increasing<br />
competition. Most companies in Libyan prefer online shopping<br />
however; creating globally-base competitive marketing will<br />
encourage the production of high value-added goods and<br />
services. However, Hunaiti et al. [13] recognizes that ecommerce<br />
in Libya are confronted with many challenges such as<br />
banking system services, postal system suitability, internet safety<br />
as well as customer‘s attitude towards the growth of e-commerce.<br />
With reference to blog at Face book website pertaining to online<br />
shopping in Libya, [14] many bloggers pointed out their thought<br />
and views on online shopping in Libya. Here are the listed<br />
bloggers‘ perceptions and most of them have pointed out that the<br />
issues that may rise if online shopping is introduced in Libya.<br />
The challenges of online shopping in Libya are;<br />
Anonymous Blogger 1:<br />
―There will be two main problems…the address and trust in the<br />
buyer and ways of payment.‖<br />
Anonymous Blogger 2:<br />
―…Libya is still fresh new to this kind of business‖<br />
Anonymous Blogger 3:<br />
―I personally think that Libya need to start having post codes and<br />
proper addresses because when you order something how are<br />
you going to receive it? You can't always rely on express<br />
couriers because they're expensive...”<br />
Anonymous Blogger 4:<br />
―I know online shopping in Libya isn't goanna be done and<br />
processed the same way its done in the U.S. etc. I guess the idea<br />
that I have is what Ahmed mentioned which is for people to go<br />
online. See something they like then they come to the warehouse<br />
and purchase it there. Not with a credit card. but just cash.”<br />
Anonymous Blogger 5:<br />
―Three things: Reliability (trust), payment methods, reachable<br />
addresses. E-commerce is a huge project and is an activity that<br />
needs to be coordinated by different entities including banks,<br />
suppliers, couriers and also and more importantly a willing<br />
buyer...”<br />
Based on these 5 different opinions from 5 different bloggers;<br />
frankly speaking from my opinion although e-commerce is not<br />
something new in this 21st century, however, e-commerce in<br />
Libya is at its early stage. Libyan consumers are ignorant about<br />
online shopping due to doubtful factors towards online shopping<br />
such as security, trust, privacy and when dealing with online<br />
sellers and consumers in and outside Libyan. Trust as an<br />
important factor affecting consumer behavior determines the<br />
success of online shopping in Libyan. In the other hand, lack of<br />
confidence and trust in online shopping are part of the<br />
determinant factor to mass acceptance of e-commerce as an<br />
efficient business transaction strategy in Libya. In addition,<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 193<br />
ISSN 2250-3153<br />
proper delivery address could raise concern among consumers<br />
embarking on online shopping in Libya.<br />
Libyan government and business organizations could lift the<br />
limitations by effectively planning and implementing quality ecommerce<br />
shopping strategy for consumers with accepted<br />
required. E-commerce remains a potential strategy to boost<br />
business transaction in Libya however, trust, security and<br />
protection offered in online transaction in Libya should be<br />
looked into.<br />
IV. POTENTIAL RELEVANCE OF E-COMMERCE TO<br />
LIBYAN ECONOMY<br />
Internet provides wider access for effective business<br />
transaction beside its inexpensive and reliability, transaction can<br />
be carried out faster and efficiently [15]. Libyan‘s developing<br />
economy could be effectively enhanced through integrating ecommerce<br />
technology into business related sectors. As a vast<br />
network of people and information, [16] the internet enables ecommerce<br />
transaction in Libya by showcasing product and<br />
services for sell to potential customers as well providing business<br />
access and information to interested partners. Electronic data<br />
interchanged to transact business among business parties in<br />
online should be kept private.<br />
Since the intranet allows instantaneous flow of goods and<br />
services as well as internal information, vital information could<br />
be processed simultaneously and matched with data flow from<br />
external e-commerce transactions which could allow for efficient<br />
and effective integration of organizational processes. Proper<br />
implementation of e-commerce in Libya will facilitate small and<br />
medium-sized enterprises to reach the global market since its<br />
operation is base on open standard [17].<br />
E-commerce implementation in Libya will facilitate mass<br />
customization through ordering systems that allow customers to<br />
make choice and order products with respect to their personal<br />
and unique specifications. For instance, a car manufacturing<br />
company with an e-commerce strategy allows for online order of<br />
newly built cars within few days based on the customer‘s desired<br />
specifications. However, the effectiveness of e-commerce<br />
integration into company‘s manufacturing process and ordering<br />
is profitable [17]. In addition, the integration of e-commerce<br />
could lead to reduction in costs, strategic targeted marketing, and<br />
the facilitation of selling add-on products, services, and new<br />
systems when needed.<br />
V. CONCLUSION<br />
E-commerce is a revolutionary tool with the potential to<br />
transform Libyan present business transaction. Integration of its<br />
benefits to Libyan economy will facilitate business services<br />
around the globe. The actual information of the security,<br />
protection and trust among consumers in Libya need to be<br />
investigated owing to consumers‘ perspective on the online<br />
shopping.<br />
The effect of security, protection and trust towards consumers<br />
as well as attitudes plays a key role in e-commerce<br />
implementation however, if well implemented, instantaneous<br />
flow of goods and services internally and externally. Besides,<br />
vital information could also be simultaneously processed to<br />
matched with data flowing from external e-commerce<br />
transactions which could allows for efficient and effective<br />
integration into organizational processes.<br />
ACKNOWLEDGMENT<br />
We appreciate the financial support from The Higher<br />
Education, Seventh of October University, Bane waleed and Al<br />
Mirqab University Libya.<br />
REFERENCES<br />
[1] Lee G-C., Lin H-F., ―Customer Perceptions of E-service Quality in <strong>Online</strong><br />
Shopping,‖ International Journal of Retail & Distribution Management, vol.<br />
33, no. 2, pp. 161-176, 2005.<br />
[2] Harridge-March S., ―Electronic Marketing, the New Kid on the Block,‖<br />
Marketing Intelligence & Planning, vol. 22, no. 3, pp. 297-309, 2004.<br />
[3] Yen C-H., Lu H-P., ―Factors Influencing <strong>Online</strong> Auction Repurchase<br />
Intention,‖ Internet Research, vol. 18, no. 1, pp. 7-25, 2008.<br />
[4] Lim H., Dubinsky A.J., ―Consumers‘ Perceptions of E-shopping<br />
Characteristics: An Expectancy-Value Approach,‖ Journal of Services<br />
Marketing, vol. 8 no. 7, pp. 500-513, 2004.<br />
[5] Patton M.A., Josang A., ―Technologies for Trust in vol. 4, pp. 9-21, 2004.<br />
[6] Udo G.J., ―Privacy and Security Concerns As Major Barriers for Ecommerce:<br />
A Survey Study,‖ Information Management & Computer<br />
Security, vol. 9, no.4, pp.165-174, 2001.<br />
[7] Roca J.C., Garcia JJ., de la Vega JJ., ―The Importance of Perceived Trust,<br />
Security and Privacy in <strong>Online</strong> Trading Systems,‖ Information Management<br />
& Computer Security, vol. 17, no. 2, pp. 96-113, 2009.<br />
[8] Chen Y-H., Barnes S., ―Initial Trust and <strong>Online</strong> buyer behavior,‖ Industrial<br />
Management & Data Systems, vol. 107, no. 1, pp. 21-36, 2007.<br />
[9] Roman S., Cuestas P.J., ―The Perceptions of Consumers Regarding <strong>Online</strong><br />
Retailers‟ Ethics and Their Relationship with Consumers‘General Internet<br />
Expertise and Word of Mouth: A Preliminary Analysis,‖ Journal of<br />
Business Ethics, vol. 83, pp. 641–656, 2008.<br />
[10] Grabner-Kraeuter S., ―The Role of Consumers‟ Trust in <strong>Online</strong>-Shopping‖<br />
Journal of Business Ethics, vol. 39, pp. 43-50, 2002.<br />
[11] Salo J., Karjaluoto H., ―A Conceptual Model of Trust in the <strong>Online</strong><br />
Environment‖ <strong>Online</strong> Information Review, vol. 31, no.5, pp. 604-621, 2007.<br />
[12] Mukherjee A., Nath P., ―Role of Electronic Trust in <strong>Online</strong> Retailing‖<br />
European Journal of Marketing, vol. 41, no. 9/10, pp. 1173-1202, 2007.<br />
[13] Hunaiti Z., Masa‘deh R.M.T., ―Electronic Commerce Adoption Barriers in<br />
Small and Medium-Sized Enterprises (SMEs) in Developing Countries: The<br />
Case of Libya‖ Ibima Business Review, no. 2, pp. 37-43, 2009.<br />
[14] Facebook, ―<strong>Online</strong> Shopping-Libya,”<br />
http://www.facebook.com/topic.php?uid=10594232095&topic=5234, 2010.<br />
[15] Mann, Catherine with Sue E. Eckert a Sarah Cleeland Knight. 2000. Global<br />
Electronic Commerce: A Policy Primer. Washington DC: Institute for<br />
International Economics.<br />
[16] Rosen, Anita. 2000. The E-commerce Question and Answer Book: A<br />
Survival Guide for Business Managers. American Management<br />
Association.<br />
[17] Smith, Dayle. 2001. The E-business Book: A Step-by-Step Guide to Ecommerce<br />
BIOGRAPHY<br />
Abdulghader.A.Ahmed.Moftah:<br />
He completed his undergraduate<br />
degree in computer science at 7th<br />
October University Bane wiled,<br />
Libya in 2001. He is a master<br />
candidate in computer science at<br />
Faculty of Computer Science &<br />
Information Technology.<br />
University Kebangsaan Malaysia (UKM),<br />
Malaysia.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 194<br />
ISSN 2250-3153<br />
Hadya.S.Hawedi :<br />
He received the degree in Computer Science<br />
from Al Mirqab University Libya in 1998.<br />
In 2007 He received the master degree of<br />
Information Technology and Communications<br />
From the Academy of Graduate Studies,<br />
Tripoli/Libya.<br />
He is a Ph.D candidate in IT Management at of<br />
Computer and Mathematical Science ,Universiti<br />
Teknologi MARA (UiTM) Malaysia .<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 195<br />
ISSN 2250-3153<br />
Potential Risk Comparison of Formaldehyde and<br />
Acetaldehyde Exposures in Office and Gasoline Station<br />
Workers<br />
Tanasorn Tunsaringkarn*, Wattasit Siriwong *, Tassanee Prueksasit**<br />
Saowanee Sematong *, Kalaya Zapuang*, Anusorn Rungsiyothin*<br />
*College of Public Health Sciences, Chulalongkorn University, Bangkok 10330, Thailand.<br />
** Department of General Science, Faculty of Science, Chulalongkorn University, Bangkok, 10330 Thailand<br />
Abstract- Assessment of exposures of formaldehyde and<br />
acetaldehyde that related to urinary biomarkers among office and<br />
gasoline station workers was conducted. Our results revealed that<br />
the evaluation of ambient air formaldehyde and acetaldehyde in<br />
official were significantly higher than in gasoline stations; 28.72<br />
to 11.31 µg m -3 and 7.85 to 3.34 µg m -3 respectively<br />
(independence t-test, p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 196<br />
ISSN 2250-3153<br />
D. Urinary Analyses<br />
The urinary analyses of formaldehyde, acetaldehyde and<br />
formic acid were analyzed by GC/FID [13]. The determinations<br />
of urinary creatinine (Cr) were performed by spectrophotometry<br />
method [14]. All urinary analyses performed at a standard<br />
laboratory (Special Laboratory, Bangkok, Thailand). All<br />
measured values were corrected by urinary Cr concentrations for<br />
clinical chemistry analysis.<br />
E. Cancer and Non-cancer Risk Calculation<br />
The cancer risk was calculated by multiplying chronic Daily<br />
Intake (CDI) by inhalation cancer slope factor (CSFi) and Hazard<br />
quotient (HQ) for non-cancer calculated by dividing exposure<br />
concentration (EC) by inhalation reference concentration (RfC)<br />
as followed equations:<br />
Cancer risk = CDIxCSFi;<br />
Where; CDI = (CAxIRxETxEFxED)/(BWxAT)<br />
CDI (mg kg -1 day -1 ) = Chronic Daily Intake; CSFi (mg kg -1 day -<br />
1 ) -1 = Inhalation cancer slope factor; CA (mg m -3 ) = Contaminant<br />
concentration in air; IR (m 3 hr -1 ) = Inhalation rate (0.875 m 3 hr -1<br />
assumed for adult); BW (kg) = Body weight (60.0 kg, average<br />
body weight of workers); ET (hrs day -1 ) = Exposure time (8 hr<br />
day -1 for workers); EF (days year -1 ) = Exposure frequency (350 d<br />
yr -1 for gasoline workers and 269 d yr -1 for official workers); ED<br />
(years) = Exposure duration (30 years for workers); AT (days) =<br />
Averaging time (70 yrs x 365 days)<br />
Cancer risk 1.00x10 -6 means Carcinogenic effects of concern;<br />
Cancer risk 1.00x10 -6 means Acceptable level<br />
For non-cancer risk assessment<br />
HQ = EC/RfCx1000; where; EC = (CAxETxEFxED)/AT<br />
EC (µg m -3 ) = Exposure concentration ; RfC (mgm 3 ) = Inhalation<br />
reference concentration<br />
HQ 1 means Adverse non-carcinogenic effects of concern; HQ<br />
1 means Acceptable level<br />
F. Statistical analyses<br />
All statistical analyses were carried out with SPSS 17.0<br />
statistical software package. Normal distribution was assessed by<br />
Kolmogorov-Smirnov test. The mean values of comparative<br />
variables were computed by descriptive statistics. The<br />
correlations between ambient air and urinary biomarkers were<br />
computed by Spearman‘s rho correlation. A statistically<br />
significant difference was accepted at a p-value of
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 197<br />
ISSN 2250-3153<br />
They also suggested that indoor sources are more important<br />
contributors to the indoor levels than outdoor sources such as<br />
infiltration of oxygenated gasoline and vehicle exhaust.<br />
Moreover, formaldehyde levels can be higher in indoor air than<br />
in outdoor air. Important determinants of indoor air levels<br />
include the sources of the formaldehyde, the age of the source<br />
materials, temperature, humidity, and ventilation rates [27].<br />
The averages lifetime cancer risk of office workers exposed to<br />
indoor air formaldehyde and acetaldehyde could be simply<br />
translated as 2.5 cancerous cases per 100,000 and 1.3 cancerous<br />
cases per 100,000 for the gasoline station workers over lifetime<br />
70-year [28]. It was possible that other environmental exposures<br />
during the remaining part of the day may aggravate both the<br />
actual cancer and non-cancer risk. The risk estimates assumed<br />
that the workers spend their life time (70 years) exposed to<br />
various hazardous air pollutants in their working areas [29]. The<br />
risk values estimated only inhalation dose with absolute<br />
absorption into the body, which means that the cumulative risk<br />
estimates for cancer and non cancer health effects may be under<br />
estimated [30].<br />
However, the HI for non-cancer risk, of formaldehyde and<br />
acetaldehyde were bellowed the reference levels (HI < 1). Thus,<br />
all workers did not have adverse health effects from<br />
formaldehyde and acetaldehyde exposures.<br />
Averages urinary formaldehyde and acetaldehyde<br />
concentrations of office workers were higher than those found in<br />
the gasoline workers but the urinary acetaldehyde showed<br />
significant higher in office workers. In addition, urinary<br />
formaldehyde was not correlated to ambient air formaldehyde but<br />
urinary acetaldehyde was significantly correlated to ambient air<br />
acetaldehyde while urinary acetaldehyde was significantly<br />
correlated to ambient air formaldehyde and urinary<br />
formaldehyde. However, formaldehyde can undergo rapid<br />
chemical changes immediately after absorption and is much more<br />
rapidly dialyzed by the kidneys and excreted through the urinary<br />
bladder than by respiration [31] but it reacts rapidly with serum<br />
protein and few protein in urine [32]. There were significantly<br />
and strongly correlated between ambient air formaldehyde and<br />
acetaldehyde as well as urinary formaldehyde was correlated to<br />
urinary acetaldehyde. In addition, urinary acetaldehyde was<br />
correlated to urinary formaldehyde. Thus, urinary formaldehyde<br />
may be correlated to ambient air formaldehyde in higher<br />
exposure concentration. Similar finding was done by Taranenko<br />
and Efimova studied [33] urinary formaldehyde from the<br />
pediatric population in the town of Shelekhov, of the Irkutsk<br />
Region and found significant correlation to air concentration of<br />
living rooms. Mautempo et al. [34] investigated the potential of<br />
using the formic acid for the biological monitoring of aldehyde<br />
exposure and report that the formaldehyde is metabolized in the<br />
body to formic acid and may be excreted in the urine which<br />
formic acid, which have a potential use as a biomarker of<br />
formaldehyde exposure in work environments. However, the<br />
amount of formaldehyde exposure had to be considered since if<br />
the formaldehyde exposure was less than 500 µg m -3 it did not<br />
significantly affect upon formic acid shift [35]. Our data<br />
exhibited the same results that ambient air formaldehyde and<br />
acetaldehyde levels in both groups investigated were not<br />
correlated to urinary formic acid level. However, the urinary<br />
formic acid in female gasoline workers was significantly higher<br />
than male. These high formic excretion and acidosis might be<br />
signaled the potential of inducing nephrotoxicity [36-37] so,<br />
female gasoline worker may had higher potential of this effect.<br />
V. CONCLUSION<br />
We concluded that the office workers had higher risk of<br />
formaldehyde and acetaldehyde exposures than gasoline workers.<br />
The urinary aldehyde may be used as non-invasive biomarkers<br />
for human exposures by inhalation.<br />
Table 1: Characteristic and biological measurements in<br />
formaldehyde and acetaldehyde exposed workers<br />
Parameter Official<br />
Workers<br />
(N=33)<br />
Gasoline<br />
Workers<br />
(N=41)<br />
pvalue*<br />
MeanSE MeanSE<br />
Age (year) 35.81.5 32.31.8 NS<br />
Male N(%) 16(48.5) 23(56.1) -<br />
Female N(%) 17(51.5) 18(43.9) -<br />
Ambient air<br />
formaldehyde<br />
(µg m -3 )<br />
28.721.15 11.310.20
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 198<br />
ISSN 2250-3153<br />
Total Risk 2.51E-05 - 0.40<br />
Gasoline station Workers<br />
Formaldehyde 5.42E-04 1.14E-05 1.55 0.16<br />
Acetaldehyde 1.60E-04 1.60E-06 0.46 0.05<br />
Total Risk 1.30E-05 - 0.21<br />
Table 3: Spearman‘s rho correlations between parameters<br />
Parameter<br />
Am. F Am. A U. F U. A U. FA<br />
Am.F 1 0.907 0.097 0.424 -0.139<br />
(p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 199<br />
ISSN 2250-3153<br />
Environmental Assessment, Environment Protection Agency, Washington<br />
DC, 1997, 20460.<br />
[30] L. Mckenzie, R. Witter, J. Adgate, Human health risk assessment for<br />
Battlement Mesa health impact assessment, University of Colorado Denver,<br />
Colorado School of Public Health, Denver, Colorado, 2010. Available from<br />
URL:<br />
http://www.tcgasmap.org/media/Health%20Risk%20Assessment%20Garfie<br />
ld%20Ritter%209-10.pdf. [Cited on 2011 June 1].<br />
[31] P. Spanel, D. Smith, T.A. Holland, W.A. Singary, J.B. Elder, ―Analysis of<br />
formaldehyde in the headspace of urine from bladder and prostate cancer<br />
patients using selected ion flow tube mass spectrometry,‖ Rapid Commun.<br />
Mass Spectrom. 1999, 13, 1354–1359.<br />
[32] Z. Tong, J. Zhang, W. Luo, W. Wang, F. Li, H. Li, H. Luo, J. Lu, J. Zhou,<br />
Y. Wan, R. He, ―Urine formaldehyde level is inversely correlated to mini<br />
mental state examination scores in senile dementia,‖ Neurobiol. of Aging.<br />
2011, 32(1), 31-41.<br />
[33] N. A. Taranenko, N. V. Efimova,. ―Biomonitoring of formaldehyde in the<br />
urinary samples from the pediatric population in the Irkutsk Region,‖ Gig.<br />
Sanit. 2009, 4 ,73-75.<br />
[34] C. Mautempo, M. D. L. Bastos, F. Carvalho, F. Remião, H. Carmo, P.<br />
Guedes-De-Pinho, ―Determination of formic acid in urine of workers<br />
occupationally exposed to formaldehyde,‖ Toxicol. Lett. 2010,<br />
196(Supplement 1), 74.<br />
[35] L. M. Gottschling, H. J. Beaulieu, W. W. Melvin, ―Monitoring of formic<br />
acid in urine of humans exposed to low levels of formaldehyde,‖ Am. Ind.<br />
Hyg. Assoc. J. 1984, 45, 19–23.<br />
[36] T. Green, J. Dow, J. Foster, ―Increased formic acid excretion and the<br />
development of kidney toxicity in rats following chronic dosing with<br />
trichloroethanol, a major metabolite of trichloroethylene,‖ Toxicology.<br />
2003, 191(2-3), 109-119.<br />
[37] G. Triebig, K.H. Schaller, ―A simple and reliable enzymatic assay for the<br />
determination of formic acid in urine,‖ Clinica. Chimica. Acta. 1980, 108<br />
(3), 355-360.<br />
AUTHORS<br />
First Author – Tanasorn Tunsaringkarn (M.Sc, Biochemistry):<br />
Corresponding author, she worked as researcher, assistant dean<br />
and an executive board member at College of Public Health<br />
Sciences (CPHS), Chulalongkorn University. She is a member<br />
of the Asia Pacific Academic Consortium of Public Health<br />
(APACPH). Her research interests include environmental health<br />
and toxicology. Her research interests include environmental<br />
health and toxicology. She has more than 50 papers in scientific<br />
journals as well as presentations in seminar and conference<br />
proceedings. College of Public Health Sciences, Chulalongkorn<br />
University, Institute Building 2-3, Soi Chulalongkorn 62<br />
Phyathai Rd., Bangkok 10330, Thailand.<br />
E-mail: tkalayan@chula.ac.th<br />
Second Author – Wattasit Siriwong (Ph.D., Environmental<br />
Management): He is a faculty member, Assistant Dean, and an<br />
executive board member of the College of Public Health<br />
Sciences (CPHS), Chulalongkorn University. He is an active<br />
researcher in the field of environmental health and also a member<br />
of the editorial board of International Journal of Occupational<br />
and Environmental Health and Journal of Health Research.<br />
College of Public Health Sciences, Chulalongkorn University,<br />
Institute Building 2-3, Soi Chulalongkorn 62 Phyathai Rd.,<br />
Bangkok 10330, Thailand.<br />
E-mail: Wattasit.S@chula.ac.th<br />
Third Author - Tassanee Prueksasit (Ph.D., Urban Engineering;<br />
Environmental Engineering): She is a lecturer and her research<br />
interests are the air pollution of some organic compounds<br />
including VOCs (BTEX, carbonyl compounds) and polycyclic<br />
aromatic hydrocarbons (PAHs), and of particulate matters, and<br />
health risk assessment of the exposure to such air pollutants.<br />
Department of General Science, Faculty of Science,<br />
Chulalongkorn University, Phyathai Rd., Bangkok 10330,<br />
Thailand<br />
E-mail: Tassanee.C@chula.ac.th<br />
Fourth Author - Saowanee Sematong (M.Sc., Ecology): She<br />
worked as researcher for College of Public Health Science,<br />
Chulalongkorn University. Her research interests include<br />
breastfeeding, environmental impact assessment and toxicology.<br />
College of Public Health Sciences, Chulalongkorn University<br />
Institute Building 2-3, Soi Chulalongkorn 62 Phyathai Rd.,<br />
Bangkok 10330, Thailand<br />
E-mail: Saowanee.Se@chula.ac.th<br />
Fifth Author - Kalaya Zapuang (B.Ed): She is a research-staff at<br />
College of Public Health Sciences (CPHS), Chulalongkorn<br />
University. College of Public Health Sciences, Chulalongkorn<br />
University Institute Building 2-3, Soi Chulalongkorn 62 Phyathai<br />
Rd., Bangkok 10330 Thailand<br />
E-mail: Zkalaya@chula.ac.th<br />
Sixth Author - Anusorn Rungsiyothin (B.Ed): He is a researchstaff<br />
in laboratory of College of Public Health Sciences (CPHS),<br />
Chulalongkorn University. College of Public Health Sciences,<br />
Chulalongkorn University Institute Building2-3, Soi Chulalon<br />
gkorn 62 Phyathai Rd., Bangkok 10330 Thailand<br />
E-mail:ranusorn@chula.ac.th<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 200<br />
ISSN 2250-3153<br />
An Approach to Increase Customer Retention and<br />
Loyalty in B2C World<br />
Abstract- Customers are always been important for the<br />
business. With the high rate of competition in every market, it is<br />
critical to retain the customer/ loyal customers. The purpose of<br />
the paper is to highlight how short term actions with bit<br />
compromise with the profit will turn into long term customer<br />
loyalty and hence long term benefit. In this paper we will be<br />
focusing on understanding the customer retention and customer<br />
loyalty, their importance to the business. After analyzing the<br />
importance of benefits, we will understand the approach of how<br />
to increase customer retention and customer loyalty towards your<br />
business. Though there will be many strategies for each of them,<br />
we will also understand what considerations should be done<br />
while deciding the best strategy for the business as different<br />
business has different scope and also their limitations too.<br />
Index Terms- Business-To-Customers (B2C), Return On<br />
Investment (ROI), Gift Certificate (GC), Equated Monthly<br />
Installment (EMI)<br />
I. INTRODUCTION<br />
With the increase in the options the customer have today, be it in<br />
online or at store, it has become a cumbersome job to get the<br />
customers back to you. Today, the use of loyalty programs as a<br />
technique for companies to enlarge customer loyalty is extremely<br />
popular as it is believed that both consumers and companies can<br />
reap benefits from it. [4] For many products, there has been the<br />
tendency to shift from mass marketing of a homogenous product<br />
to anonymous buyers towards customization of product to meet<br />
the needs of known individuals whose needs have become<br />
observable through some form of dialogue based relationship.[5]<br />
Customers also appear to prefer certain styles of marketing from<br />
suppliers. When customers enter into a relationship with a firm,<br />
they are often eager to forego other options and to limit their<br />
choice. Some of the motivations to do so result from greater<br />
efficiency in decision making, reduction in information<br />
processing, achievement of greater cognitive consistency in<br />
decisions, and reduction of perceived risks associated with future<br />
decisions. Customer loyalty is being seen as important to the<br />
success of any retail organization, because it is known that<br />
drawing new customers is more expensive than keeping existing<br />
one. [6]<br />
In this paper, we will discuss the strategies to increase the<br />
customer retention/loyalty which helps the business to make<br />
profit. We will first understand the importance of how they are<br />
important to the business, what could be the benefit while have<br />
the same customers to their business and then how to get them<br />
repeatedly.<br />
Roopa Singh, Imran Akhtar Khan<br />
Department of Computer Engg & IT, Shri JJT University, Jhunjhunu, Rajasthan, India<br />
II. WHAT IS CUSTOMER RETENTION/ LOYALTY?<br />
Customer loyalty can be loosely defined as the predisposition<br />
of any given customer to purchase your goods or services over<br />
comparable ones available in the marketplace. [1] Many<br />
companies have customer retention programs, incentives to<br />
motivate customers to remain customers. Think of supermarkets<br />
that recognize your patronage by giving you a percentage<br />
discount on your next purchase. [7]<br />
Customer Retention is the activity that a selling organization<br />
undertakes in order to reduce customer defections. Successful<br />
customer retention starts with the first contact an organization<br />
has with a customer and continues throughout the entire lifetime<br />
of a relationship. A company‘s ability to attract and retain new<br />
customers, is not only related to its product or services, but<br />
strongly related to the way it services its existing customers and<br />
the reputation it creates within and across the marketplace. [8]<br />
III. WHY CUSTOMER RETENTION AND LOYALTY IS<br />
IMPORTANT?<br />
On average, online retailers lose 25% of their customers every<br />
year. It has been published that a small increase in customer<br />
retention can increase profits by more than 25%. The calculation<br />
to prove this is actually very simple. Suppose that 100,000<br />
customers buy from you every year and you expect 20% to never<br />
buy from you again. If it costs you say $100 to acquire a new<br />
customer, then replacing the lost customers is costing you $2<br />
million dollars. In this scenario, for every percentage point that<br />
you decrease, you save $100,000. [2]<br />
Customer “satisfaction” isn’t enough anymore. Less than<br />
half of your satisfied customers will come back. You need to<br />
cross the bridge from customer satisfaction over to customer<br />
loyalty.[10] Customer retention is perhaps the most important<br />
influencer of profit growth, and a key motivator for executives to<br />
buy from you. It's so important because it costs so much to<br />
influence customers to buy and so little to induce a repurchase.<br />
[13]<br />
Customer retention in turn earns the business a good reputation<br />
and goodwill in the open market. It also generates a healthy<br />
competition with the opponents. The record of retention of the<br />
customer is the best proof regarding the quality of the products<br />
and the services provided to them. It also paves the way for more<br />
research and development to happen in their products and<br />
services. The business also hears the voice of its existing and<br />
potential customers and adopts a methodology to offer the best<br />
customer satisfaction products and services in the open market. If<br />
a business is able to add new clientele and retain customers then<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 201<br />
ISSN 2250-3153<br />
it is a good sign for the overall business and those associated<br />
with it. [13]<br />
It has been said and written many times – it‘s important to keep<br />
loyal customers happy and make them at least feel pampered as<br />
they repeat purchase, spend more and refer to your business,<br />
products and services to their peers [14]<br />
Figure 1: Why Customer Loyalty is Important?<br />
IV. WHAT IS THE BENEFIT?<br />
Customer Retention and Loyalty programs have very deep<br />
impact on the business which leads to a huge profit over a period<br />
of time. Fifty per cent consumer brands are taking their loyalty<br />
programs more seriously, said Florian Wolfframm, Head of<br />
Marketing and Rewards, PAYBACK India, while presenting the<br />
opening inaugural session of India‘s largest Loyalty summit. [18]<br />
A. Benefits of Customer Retention<br />
The benefits are innumerous but some of them are discussed<br />
below<br />
i. Customer Acquisition cost is negligible: We all know that<br />
hiring new customers require time. We need to itch out a<br />
strategy then create an acquisition plan, implement it, and<br />
wait for the data to flow in, so that we can analyze what is<br />
working and what is not. Meanwhile, it is also our job to<br />
keep an eye on the number of customers that come as an<br />
effect of new strategy. This will give us a lot of free time to<br />
create value by doing what we know best, and from what<br />
customers come to us.<br />
The cost of getting new customer is 5-12 times greater than<br />
the cost of retaining the old customer<br />
ii. Business knows who the existing customers are: Not just<br />
acquisition takes time, but building a relationship also takes<br />
time. After we have successfully wooed new customers, we<br />
need to spend time and energy on building a relationship<br />
with the new customers. We need time to understand their<br />
desires, aspirations, expectations, spending pattern, and their<br />
price sensitivity. And while we do that, the profit from new<br />
customers remain on the lower side<br />
iii. Helps to serve better: You are not in the business to have<br />
fun in hiring and firing your customers. We are here to make<br />
some money and that too without much effort — well, there<br />
are may be some people who love hiring and firing game<br />
iv. More profit: it takes time, energy, man power, and money<br />
to acquire a new customer, and all this add on to the cost,<br />
which means diminished profit. It is only after the customers<br />
are with us for some time that we recover the cost incurred<br />
during the acquisition process. With existing customers, we<br />
already have recovered the cost, so they are already<br />
profitable. This cannot be said about the new customers, as<br />
they are yet to prove their worth. And at the onset, we even<br />
do not know if they will stay with us or not. So why take<br />
chances? With existing customers, we already have<br />
recovered the cost, so they are already profitable. This<br />
cannot be said about the new customers, as they are yet to<br />
prove their worth. And at the onset, we even do not know if<br />
they will stay with us or not. So why take chances?<br />
The ROI is up to 10 times higher for investments in<br />
customer retention than for acquisition of new customers<br />
B. Benefits of Customer Loyalty<br />
While expanding your business' customer base is a crucial<br />
undertaking which you must work towards with clearly<br />
defined goals, the importance of retaining existing customers<br />
mustn't be overlooked. Working toward promoting customer<br />
loyalty (or brand loyalty) is critical to your goal for many<br />
reasons. [1] Some of the benefits obtained are:<br />
i. Increasing loyalty and customer retention by just 5% can<br />
increase profits by 75% [17]<br />
Figure 2: Retention Profit<br />
ii. Most dissatisfied customers will eventually tell nine other<br />
people about their problem [17]<br />
iii. Only 4% of dissatisfied customers actually complain to the<br />
company [17]<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 202<br />
ISSN 2250-3153<br />
iv. Satisfied customers, on the other hand, tell 5-6 other<br />
people about their positive experience [17]<br />
v. Repeat business: Loyal customers will offer you more<br />
business as these are the customers who tend to have<br />
approach and buy from you more than the new customers.<br />
In a year, you will end up in selling more to loyal<br />
customers as compared to the new customers coming in.<br />
vi. More Quantity: As you have built good and reliable<br />
relationship with the customers, it will lead to the selling<br />
of more number of goods. This comes naturally as they<br />
rely on you and your products more than anybody else. In<br />
any case, higher volumes means, greater sales resulting<br />
into higher profits<br />
vii. Cross Selling Opportunities: Customers who are loyal<br />
have faith in the quality and varieties you sell for the<br />
products. This creates a great opportunity to fulfill more of<br />
your customers' needs than the traditional ones you<br />
currently meet. What does this mean? You can make sales<br />
to loyal customers across product lines and thus increase<br />
your overall sales volume without needing to focus so<br />
much on attracting new customers<br />
viii. Less Competition: The more loyal customers you have in<br />
your business, the safer you are with the competition<br />
world around. [1] It works as immunity toward the<br />
competitive forces around you.<br />
V. CUSTOMER RETENTION ANALYSIS<br />
Customer Retention analysis helps us to answer the below<br />
queries<br />
i. What is my loyalty/retention rate?<br />
ii. What brands and product types did our customers defect to<br />
most often?<br />
iii. Why did they choose a competitor brand instead of ours?<br />
iv. Of those that repurchased us, what motivated them to stick<br />
with our brand?<br />
v. And, if you choose to include competitor brand owners in<br />
the analysis, you can also determine how your retention rate<br />
stacks up to the competition and why some competitor<br />
owners switch to your brand<br />
Customer Retention is calculated from the Churn Rate. Churn<br />
rate, when applied to a customer base, refers to the proportion of<br />
contractual customers or subscribers who leave a supplier during<br />
a given time period. It is a possible indicator of customer<br />
dissatisfaction, cheaper and/or better offers from the competition,<br />
more successful sales and/or marketing by the competition, or<br />
reasons having to do with the customer life cycle. The churn rate<br />
can be minimized by creating barriers which discourage<br />
customers to change suppliers (contractual binding periods, use<br />
of proprietary technology, unique business models, etc.), or<br />
through retention activities such as loyalty programs. It is<br />
possible to overstate the churn rate, as when a consumer drops<br />
the service but then restarts it within the same year. Thus, a clear<br />
distinction needs to be made between 'gross churn', the total<br />
number of absolute disconnections, and 'net churn', the overall<br />
loss of subscribers or members. The difference between the two<br />
measures is the number of new subscribers or members that have<br />
joined during the same period. [21]<br />
Retention Rate = 1 – (Churn Rate)<br />
VI. STRATEGY FOR CUSTOMER RETENTION AND LOYALTY<br />
With the innumerous benefits we have discussed with the<br />
Customer Retention and loyalty, it is important to know what<br />
should be the strategy in order to achieve them. It is a very<br />
cumbersome and important to understand the impact and<br />
implement them in our business<br />
A. Strategy for Customer Retention<br />
Though business implements some strategy to get the benefit<br />
out of the repeated customers, we need to understand the various<br />
strategies which they implement. Let us discuss some of the<br />
important ones below<br />
i. Proper Email Communication/Marketing: Avoid sending<br />
the emails to the huge list of customers with a high<br />
frequency. When the customer gets many mails which are<br />
not of their interest, then this leads to disengagement of<br />
customers rather than retention. Try to differentiate the<br />
customers with proper demographics and purchase<br />
information, and send the right mails with personalized<br />
information to the right customers.<br />
ii. Understand the value of lifetime: You should know how<br />
much business and profit you are going to gain with a<br />
customer over the lifetime. Once the analysis for a customer<br />
is done, it is easy to understand the importance of the<br />
customer retention in the business. Share of wallet combined<br />
with lifetime value help us to understand which customer<br />
has more potential for growth which allows to focus on the<br />
customers that is critical to the business<br />
iii. Analyze and sell: Retailers perform the research to find the<br />
frequency of customer visit and purchase of good. They<br />
focus on converting the site into the sale. You should know<br />
which products sell well together and which ones is an<br />
obvious after sale. You should also know how long it takes<br />
the customers to purchase again so you can strike when the<br />
customer is thinking of another purchase. [2] So, what you<br />
need to do is- sell and then analyze.<br />
iv. Customer Feedback and Solicit Complaints Regularly:<br />
There are a lot issues faced by the customers when they<br />
make a purchase of goods/services. But they feel hurt when<br />
there is nobody to help or resolve their issues – customer<br />
care representative did not answer your query, queue is long<br />
and unmanageable, no helper to describe the product. It<br />
takes less time to hear the customer‘s problem and resolve.<br />
When you do so immediately, customer feel they are being<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 203<br />
ISSN 2250-3153<br />
heard and valued. This may lead to forget the bad feedback<br />
he had and make him happier.<br />
v. Give Surprises To Customers: Loyalty programs will keep<br />
on adding the points when they make any purchase. There<br />
are several retailers who gift their customer when a threshold<br />
spent amount is reached. Consider that you are booking your<br />
flights with yatra.com by being registered user. Once you<br />
have reached to a reward point of 500, you will get the free<br />
Reebok wrist watch free. This would be a surprise for the<br />
customers as they were unaware of this.<br />
B. Strategy for Customer Loyalty<br />
Understanding the strategies for the customer loyalty is very<br />
important to the business as this provides them a huge profit over<br />
a period of time. The more better strategy, the more loyal<br />
customers and hence more benefit from them. Below we will<br />
discuss the different strategies:<br />
i. PAYBACK: PAYBACK is India‘s first and one of Europe‘s<br />
largest multi-partner loyalty programs. PAYBACK has 30<br />
partners in the network, namely ICICI bank, HPCL, BIG<br />
Bazaar, Make my trip, Megamart, UniverCell, Hometown,<br />
Food bazaar, Ezone, Central, Brand factory, book my<br />
show.com, Letsbuy.com. The largest partner portfolio and<br />
widest range of redemption points in India assure that<br />
members can not only collect points for everyday shopping<br />
quickly from many outlets using just one card but also easily<br />
convert them into attractive rewards. Companies benefit<br />
from PAYBACK‘s state-of-the art direct marketing and<br />
couponing services. [18]<br />
ii. Discount over time/volume of goods: The seller offers a<br />
low price of goods or services in return of the buyer<br />
purchasing the good at an extended period of time. Say, if<br />
you buy laptop from Croma and pay some amount then you<br />
may get extended warranty on your laptop. Also, there are<br />
offers from the retailer/seller that they provide the buyers<br />
with some percentage of the amount paid if you buy the<br />
premium for a period of time. This attracts many buyers and<br />
also makes the customer dedicated to the buyer for over the<br />
period of time.<br />
iii. Bundle goods: The seller sells ancillary goods or services<br />
with the main item at no extra cost. Personal computer<br />
manufacturers such as HP or Sony bundle printers, monitors<br />
and even 24-hrs service at the price of computer. But the<br />
seller needs to make sure that they do not compromise with<br />
the overall benefit with the bundles they create and sell<br />
iv. EMI option: With the price hikes over a period of time, it<br />
has become difficult for the middle class buyers to afford<br />
expensive products/services. In this case, EMI option is a<br />
boon to the sellers and the buyers. Buyers are attracted to the<br />
retailers which provide this facility which provide a term<br />
relationship and confidence with the sellers.<br />
v. Prepurchase/Buy Forward: The seller offers a discounted<br />
price to a buyer who pays in advance for an amount of goods<br />
or services to be delivered at some future date or over a<br />
certain time period, with the discount rate being greater than<br />
the interest rate paid on money placed in a low-risk<br />
investment. The benefit of this technique to the seller is that<br />
it locks in the buyer‘s business over a certain period. The<br />
benefit to the buyer is that it eliminates any price increases<br />
during the contracted period.[19]<br />
vi. Membership/Loyalty Program: Loyalty programs or<br />
memberships are structured marketing efforts that reward,<br />
and therefore encourage, loyal buying behavior - behavior<br />
which is potentially beneficial to the firm. In marketing<br />
generally and in retailing more specifically, a loyalty card,<br />
rewards card, points card, advantage card, or club card is a<br />
plastic or paper card, visually similar to a credit card or debit<br />
card, that identifies the card holder as a member in a loyalty<br />
program [20] Consider that a retailer sponsors a membership<br />
card which will add on the points to the purchases you do.<br />
Also the members of the loyalty program will get the special<br />
benefit (20% additional off on the current sales value). This<br />
will help the customers coming back to the retailer/seller<br />
repeatedly<br />
vii. Frequent Buyer Program: With the increase in<br />
competition in the retail world, retailers offer the rebate/low<br />
or free cost/service to the customers if the number of<br />
purchases or the total purchase amount reaches the limit.<br />
This creates the tendency in the customers to make those<br />
counts of purchases or the total purchase value in order to<br />
get the offer. It increases the sale of product leading to<br />
customer loyalty over that period of time<br />
viii. Issue Gift Card/Certificates: Retailers have introduced the<br />
concept of Gift vouchers (with some amount and validity) of<br />
their company known as Gift Certificates/cards (GC). With<br />
the variety of choices and different tastes of everybody, it is<br />
difficult to gift our dear ones with the things that they would<br />
love. So GC demand has increased a lot. With the GCs, it<br />
binds the buyer to go to the retailer who has issued the GCs<br />
and spend the amount. With the available amount of GC,<br />
customer will end up in buying the goods more than the cost<br />
and hence increase in selling of goods. If one likes the<br />
concept and the availability of goods, then customers<br />
become regular one. Also, issue some amount of gift<br />
certificate to the customer when the transaction amount<br />
reaches the offer limit (say make a purchase of Rs.2500, get<br />
the gift certificate of Rs200)<br />
ix. Return Policy for Privileged/Loyal Customer: The<br />
retailer/seller offers the extended return policy to the<br />
member of their shop (i.e. Loyal Customers). Consider that<br />
if you are member, you can return the goods within 45 days<br />
rather than 15 days for the regular customers who are not<br />
member. This provides confidence to the customers as return<br />
is always a major concern of many.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 204<br />
ISSN 2250-3153<br />
VII. HOW TO CHOOSE BEST LOYALTY PROGRAM?<br />
As we have discussed innumerous Loyalty Programs, it is<br />
important to understand which will suit your business. In order to<br />
come to a conclusion, it is good to consider the below<br />
i. Choose a web-based (cloud) solution that does not require<br />
local software<br />
ii. Choose a program that separates your business from the<br />
crowd and allows customized rewards<br />
iii. Keep it simple and focus on your business operations, not<br />
your loyalty program<br />
iv. Make sure you have the ability to quantify the use of your<br />
loyalty program<br />
v. Choose a loyalty program that gives you the ability to easily<br />
change rewards at any time<br />
vi. Choose a loyalty program that can also be used for direct<br />
email, mail, or social media marketing<br />
vii. A loyalty program that allows your business to provide<br />
nonprofits a fundraising program using your merchandise,<br />
food, or services is a bonus [16]<br />
VIII. CONCLUSION<br />
With the understanding of the behavior of the customers and<br />
satisfying them provides the benefit to the business in the long<br />
term. Establishing good relationship with them by providing<br />
better services will create customer loyalty and hence more visits<br />
over time. This will bring more profit to the business in longterm<br />
and will reduce the competition.<br />
We have identified the strategies which attract the customers to<br />
the retailer and also understood the considerations to be done<br />
while implementing them. With this, it will help the business to<br />
gain customer retention and loyalty towards their business if they<br />
implement them diligently. And also, we have scope to<br />
understand when the business has to re-visit their strategies so<br />
that they do not lag behind in this competitive world.<br />
REFERENCES<br />
[1] http://ezinearticles.com/?Why-is-Customer-Loyalty-Important-to-Your-<br />
Business?&id=2170553<br />
[2] http://www.imarkinteractive.com/general/tips-tricks/5-things-onlineretailers-can-do-to-improve-customer-retention/<br />
[3] http://www.business-standard.com/india/news/customer-loyalty-importantto-increase-retail-sales-emphasises-payback/463630/<br />
[4] Wulf K. D. Schroder G. O. Cannier M. H. and Oppen C. V. (2003) ‗What<br />
Drives Consumer Participation to Loyalty Programs? A Conjoint<br />
Analytical Approach‟, Journal of Relationship Marketing Vol.2 (1/2)<br />
[5] Palmer A. Bejou D. (2005) ‗The Future of Relationship Marketing‟, Journal<br />
of Relationship Marketing Vol.4 No. ¾<br />
[6] Sullivan, Malcolm and Adcock, Dennis. Retail Marketing. 1. Edition.<br />
Padstow: Thomson, 2002<br />
[7] http://www.cbsnews.com/8301-505125_162-31544189/dont-confusecustomer-retention-with-customer-loyalty/<br />
[8] http://en.wikipedia.org/wiki/Customer_retention<br />
[9] http://www.customerloyalty.org/<br />
[10] http://www.returnonhappiness.com/<br />
[11] http://www.va4business.com/business/472/why-customer-retention-ismore-important-than-customer-acquisition/<br />
[12] http://helpthembuy.com/articles/customer_retention.php<br />
[13] http://www.softsolutionsindia.net/softsolutionsindia.net/blog/default.aspx?i<br />
d=80&t=Why-Customer-Retention-is-so-important-f<br />
[14] http://www.business2community.com/loyalty-marketing/customer-loyaltyand-why-its-important-infographic-0131553<br />
[15] http://www.viralblog.com/social-media/why-is-customer-loyalty-important/<br />
[16] http://customerloyaltyprograms101.blogspot.in/<br />
[17] http://www.cvent.com/en/resources/customer-retention.shtml<br />
[18] http://www.business-standard.com/india/news/customer-loyalty-importantto-increase-retail-sales-emphasises-payback/463630/<br />
[19] Gitomer, Jeffrey. Customer Satisfaction is Worthless, Customer Loyalty is<br />
Priceless: How to Make Them Love You, Keep You Coming Back, and Tell<br />
Everyone They Know. Austin, TX: Bard Press, 1998.<br />
[20] http://en.wikipedia.org/wiki/Loyalty_program<br />
[21] http://en.wikipedia.org/wiki/Churn_rate<br />
AUTHOR<br />
First Author: Roopa Singh, MCA, Research Scholar in Shri JJT<br />
University, Jhunjhunu, Rajasthan, India.<br />
Email: roopas1983@gmail.com<br />
Second Author: Imran Akhtar Khan, MCA, Research Scholar in<br />
Shri JJT University, Jhunjhunu, Rajasthan, India.<br />
Email: imran4bc@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 205<br />
ISSN 2250-3153<br />
DIEL Variations of Physico-Chemical Factors and<br />
Planktonpopulation in a Swamp Of Harda, Purnia, Bihar<br />
(India)<br />
R.SIDDHARTHA, RANJANA KUMARI, K.D.TANTI* AND B.N.PANDEY<br />
P. G. DEPTT. OF ZOOLOGY, PURNIA COLLEGE PURNIA (854301) INDIA<br />
*DEPARTMENT OF ZOOLOGY,<br />
M.L.ARYA COLLEGE, KASBA, PURNIA (854301) INDIA<br />
E mail- b.n.pandey@hotmail.com<br />
Abstract- Diel variations of physic- chemical factors and<br />
plankton population were investigated in the swamps of Purnia<br />
district, Bihar on a seasonal basis, Air and water temperature,<br />
pH, DO2 and bicarbonate alkalinity were found to increase<br />
during day time which decreased during night hours. The amount<br />
of free CO2 was also observed higher during the night period.<br />
Water temperature showed a positive correlation with air<br />
temperature, pH, DO2 bicarbonate alkalinity and a negative one<br />
with free CO2 in most cases. Phytoplankton also showed<br />
increased number during day time. Not a very clear-cut pattern of<br />
diel variation was observed and this fluctuation was mostly due<br />
to photosynthetic activity of producers, respiratory activity of<br />
biota and fluctuation in water temperature. A complex interaction<br />
of various environmental factors e g., seasons, climate, nutrients,<br />
pollution, light hours etc. also play an important role to decide<br />
the fate of diel variation of abiotic factors and biotic population.<br />
Index Terms- Diel variations, Swamps, Physico-chemical<br />
factors, plankton population, Purnia<br />
C<br />
I. INTRODUCTION<br />
onsiderable investigations have been made on the diel<br />
variation in physico-chemical of various freshwater<br />
ecosystems, i.e., lakes, ponds, streams, reservoirs and rivers<br />
(Ganpati, 1955; George, 1961, Michael, 1970; Verma, 1967;<br />
Nasar and Datta Munshi; 1975; Saha and Bose, 1986; Saha and<br />
Pandit, 1986 b; Choudhary, et al., (1991). Saha (1981) even<br />
worked out the diel cycle of abiotic factors of the thermal stream<br />
of Bhimbandh, Munger. No such work has so far been done on<br />
any swamps in Purnia district (Bihar)).The present work was<br />
undertaken to study the diurnal changes of some abiotic factors<br />
and their relations with plankton population.<br />
II. TERRAIN<br />
The study site is located at a distance of 7 km. from Purnia<br />
district headquarters in the southward direction by NH 31 near<br />
Harda, a local halt. It is situated on 25º41‘ North Latitude and<br />
87º28‘ East longitude and at an altitude of 35 m. above sea level.<br />
It is a wide water body spread on either side of Saura river<br />
III. MATERIALS AND METHODS<br />
For the study of diel variations, the spot was selected keeping<br />
in mind its accessible position at night. For the investigation of<br />
fluctuation in physico-chemical parameters and plankton<br />
population, water samples were collected at 4 hour internal for a<br />
period of 24 hours and most of the analyses were made on the<br />
spot. Investigations were made on different dates to observe the<br />
results in different seasons i.e., on 20th March (Spring), 15th<br />
June (Summer), 21st September (Monsoon) and 18th December<br />
(Winter) during 2006. pH Temperature was measured by<br />
mercury –filled Celsius thermometer while p recovered with the<br />
help of a portable pH meter. Other chemical parameters e.g.,<br />
dissolved oxygen (DO2), free CO2, bicarbonate (HCO3‾)<br />
alkalinity and chloride were analysed at the spot adopting the<br />
standard methods (APHA, 1989, Trivedy and Goel,1984). Each<br />
sample of plankton was collected by filtering of water from<br />
different places, through a plankton net (made of bolting silk no.<br />
21 having 77 meshes/cm2). The concentrated planktons were<br />
then preserved in 4% formalin for subsequent qualitative and<br />
quantitative determination (Lackey, 1938; Ward and Whipple,<br />
1959; Desikachary, 1959; Fritsch, 1959). Counts were expressed<br />
in organisms per litre. Correlation coefficient among the physicochemical<br />
parameters and biological parameters were statistically<br />
calculated and analysed whether they follow any diel seasonal<br />
variations or not.<br />
IV. RESULTS AND DISCUSSION<br />
The diel cycle of abiotic factors and plankton population in<br />
different seasons has been presented in Table-1. The atmospheric<br />
temperature varied between 10.5ºC and 37.4ºC, maximum in<br />
summer and minimum in winter. Generally air temperature was<br />
observed lower in the morning hour and higher in noon periods.<br />
Temperature of water varied between 15.2ºC and 31.0ºC and<br />
observed to follow the same diel fluctuation pattern in all<br />
seasons. Similar results were observed by Michael (1970) and<br />
Datta et al. (1983). A significant positive correlation between the<br />
water temperature and atmospheric temperature was observed<br />
(Table-2) in almost all seasons while during winter, it was found<br />
insignificant. The lowest range of atmospheric temperature<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 206<br />
ISSN 2250-3153<br />
probably could not invade and affect the temperature provided by<br />
the bottom.<br />
Water temperature showed a direct relationship with<br />
DO2 and inverse relationship with free CO2 in spring and<br />
monsoon seasons. The increase in temperature increases DO2 by<br />
enhancing photosynthesis rate of phytoplanktons and<br />
macrophytes during day time. On the other hand, free CO2 in<br />
water decreased during day time and increased during night<br />
hours, as CO2 was utilized in the light periods while the amount<br />
of free CO2 increased in dark period due to biotic respiration and<br />
ceasing of photosynthesis. The number of phytoplanktons was<br />
also observed higher during day hours in almost all seasons.<br />
Similar observations were found by Itazawa(1957), Srivastava<br />
and Desai(1980), Saha (1981), Bhattacharya et al., (1988),<br />
Pandey et al., (1989), and Choudhary et al.,(1991).<br />
Inverse result was found in summer season during<br />
which water temperature showed a negative correction with<br />
dissolved oxygen and positive correction with free CO2. The high<br />
water temperature during summer season accelerated the<br />
decomposition of submerged vegetation causing increased value<br />
of free CO2 and decreased amount of dissolved O2. Pandey et al,<br />
(1989) also observed the hypoxic and hypercarbion condition of<br />
water due to decomposition of accumulated organic matters in<br />
the bottom sediments of the ponds. During the monsoon season,<br />
the amount of DO2 in the day hours was not found well due to<br />
the clouded weather decreasing the photosynthesis activity of the<br />
aquatic flora.<br />
Almost a significant negative correlationship was<br />
observed between DO2 and free CO2. Such inverse relationship is<br />
typical of a pond which is photo synthetically controlled<br />
(Goldman and Horne, 1983). The diel variations of free CO2 was<br />
noted between 9.2 mgl‾ 1 (16 hr of winter) and 40.4 mgl‾ 1 (16 hr.<br />
of summer) while the value of HCO3‾ was recorded maximum<br />
(148 mgl‾ 1 ) during 16 hr of spring and minimum (96 mgl‾ 1 )<br />
during 16 hr of summer. A positive and mostly significant<br />
correlation between HCO3‾ and pH was observed during almost<br />
all seasons while a negative correlation existed between free CO2<br />
and pH. Automatically free CO2 and HCO3 - were inversely<br />
correlated. The pH value was observed below 7 in summer while<br />
it was found almost above 7 in other seasons particularly during<br />
day hours. The low value of pH was due to high amount of free<br />
CO2 in water resulted from the decomposition of submerged<br />
vegetation. The graded decrease in pH value was observed from<br />
day to night hour (clearly) observed in spring and winter seasons)<br />
Such nocturnal decrease in pH was probably due to high level of<br />
free CO2, accumulated as a result of community respiration and<br />
absence of photosynthesis at night. According to Zafar (1966) the<br />
pH of water is controlled by the relative quantity of bicarbonate<br />
and CO2. Higher value of HCO3‾ and lower value of free CO2<br />
cause the higher value of pH. The changes in pH during day and<br />
night may be due to the conversion of carbon dioxide into<br />
carbonate and vice versa (Srivastava and Desai, 1980). The<br />
buffer system of most natural water involves the reversible<br />
transformation of carbon dioxide to bicarbonate to carbonate.<br />
Carbon dioxide recorded was in half bound state (HCO3‾) and<br />
free- state (CO2). As free CO2 and CO3 (Carbonate) cannot<br />
coexist, since they would neutralize each other to form<br />
bicarbonate (HCO3‾). The surplus CO2 was channelized into<br />
alkalinity system and retained in the form of HCO3‾ (Verma,<br />
1981).<br />
Thus it may be concluded that some physico-chemical<br />
factors of the swamps water, under investigation, such as<br />
temperature, pH, DO2, free CO2, bicarbonate alkalinity exhibit<br />
diel pattern of fluctuation to some extent which are controlled by<br />
complex interaction of various environmental factors operating<br />
in the system e.g., light hour, photosynthetic activity, community<br />
respiration of biota, seasons, climate, and nutrients present in<br />
water. All these physico-chemical factors also control each other<br />
and all these factors in turn influence the diel pattern of plankton.<br />
Table1 -Diel variations of some physico-chemical parameters and plankton population in swamps of Purnia<br />
Spring<br />
Summer<br />
Some interval<br />
Parameters<br />
4.00 8.00 12.00 16.00 20.00 24.00<br />
Atm.temp.(ºC) 19.5 22.2 26.0 29.2 24.0 22.5<br />
Wat.temp.(ºC) 18.0 19.3 22.2 25.5 22.1 21.0<br />
pH 7.3 7.2 7.4 7.4 7.1 7.1<br />
DO2(mgl‾ 1 ) 7.0 7. 8.0 8.2 6.9 6.8<br />
Free CO2(mgl‾ 1 ) 18.4 20.4 15.2 16.6 22.4 20.4<br />
HCO3‾(mgl‾ 1 ) 135 125 140 148 130 130<br />
Cl‾(mgl‾ 1 ) 20 19 22 22 20 22<br />
Phytoplank.(no/l) 11076 10030 11275 12817 7192 8225<br />
Zooplank.(no/l) 483 1025 795 924 371 324<br />
Atm.temp.(ºC) 26 28.2 36.6 37.4 31.5 30.0<br />
Wat.temp.(ºC) 24.6 26.0 30.2 31.0 28.1 26.5<br />
pH 6.8 6.7 6.2 6.0 6.4 6.8<br />
DO2(mgl‾ 1 ) 5.8 6.0 5.6 5.8 6.0 5.8<br />
Free CO2(mgl‾ 1 ) 28.2 30.6 38.2 40.4 32.2 26.0<br />
HCO3‾(mgl‾ 1 ) 122 110 102 96 115 120<br />
Cl‾(mgl‾ 1 ) 18 20 24 26 20 18<br />
Phytoplank(no/l) 6694 10112 8126 9845 7112 8814<br />
Zooplank(no/l) 70 62 96 106 92 68<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 207<br />
ISSN 2250-3153<br />
Monsoon<br />
Winter<br />
Atm.temp.(ºC) 24.7 26.2 34.5 32.4 28.0 26.2<br />
Wat.temp.(ºC) 18.5 20.6 27.2 26.0 20.8 20.0<br />
pH 7.2 7.1 7.0 7.0 7.2 7.3<br />
DO2(mgl‾ 1 ) 5.4 6.0 5.8 6.0 5.6 5.8<br />
Free CO2(mgl‾ 1 ) 28.2 20.6 18.4 20.2 22.2 26.0<br />
HCO3‾(mgl‾ 1 ) 144 140 130 135 140 142<br />
Cl‾(mgl‾ 1 ) 22 24 26 28 20 20<br />
Phytoplank(no/l) 2815 3008 3440 3612 3140 3208<br />
Zooplank(no/l) 322 255 338 294 235 208<br />
Atm.temp.(ºC) 11.5 12.2 15.6 14.4 13.5 10.0<br />
Wat.temp.(ºC) 17.2 15.6 18.0 16.0 15.2 16.5<br />
pH 6.9 7.0 7.3 7.4 7.0 6.9<br />
DO2(mgl‾ 1 ) 6.0 6.5 7.8 8.0 6.8 6.7<br />
Free CO2(mgl‾ 1 ) 16.2 12.8 10.2 9.2 12.0 14.4<br />
HCO3‾(mgl‾ 1 ) 128 130 140 144 138 130<br />
Cl‾(mgl‾ 1 ) 16 18 20 20 18 17<br />
Phytoplank(no/l) 12018 16522 14872 15522 12216 10143<br />
Zooplank(no/l) 33 45 61 50 36 45<br />
Table2 - Coefficient of Correlation (r) computed among various physico-chemical factors during their diel cycle in different seasons,<br />
of the swamps of Purnia<br />
AT = Atmospheric temperature<br />
WT = Water temperature<br />
Relationship Spring Summer Monsoon Winter<br />
r Prob. R Prob r Prob. r Prob.<br />
Water temp.vs. pH 0.342 Ins. -0.96 P>0.001 -0.538 Ins. 0.025 Ins.<br />
DO2 0.759 P0.05 -0.822 P
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 208<br />
ISSN 2250-3153<br />
[16] Srivastava, N.P. and Desai, V.R. (1980) Seasonal and diurnal variation in<br />
physico-chemicals of water and plankton in lotic sector of Rihand reservoir<br />
(U.P.). J. Inland Fish Soc. India, 12(1): 100-111.<br />
[17] Saha, S.K. (1981) The diel cycle of abiotic factors in a thermal stream:<br />
Comp. Physiol. Ecol. 6(3): 193-196.<br />
[18] Trivedy, R. K. and Goel, P.K. (1984) Chemical and Biological Methods for<br />
Water Pollution Studies. Environmental Publications, Karad<br />
[19] Verma, N. (1967): Diurnal variation in a fish pond in Seomi, India.<br />
Hydrobiol., 30: 129-137.<br />
[20] Verma, P.K. (1981) The limnological survey of Badua reservoir, Bhagalpur<br />
(Bihar). Doctoral thesis, Bhagalpur Univ., Bhagalpur, India.<br />
[21] Welch, P.S. (1948) Limnological Methods. McGraw Hill Book Co. New<br />
York.<br />
[22] Ward, H.B. and Whipple, G.C(1959) Fresh water Biology. Edited by W.T.<br />
Edmondson. John. Wiley & Sons, Inc. New York. 1248pp.<br />
[23] Zafar, A.R. (1966) Limnology of the Hussainsagar Lake, Hyderabad, India.<br />
Phykos, 5(1&2): 115 – 126.<br />
AUTHORS<br />
Editorial Correspondence: Acta Biologica Hungarica<br />
P.O. Box 35<br />
H-8237 Tihany, Hungary<br />
Phone: (36 87) 448 244 ext. 103<br />
Fax: (36 87) 448 006<br />
E-mail: elekes@tres.blki.hu<br />
SINET Editorial Office<br />
Faculty of Science, Addis Ababa University<br />
Freshman Building Last Floor (Room No. 403)<br />
Tel +251-111-232668 Fax +251-111-552350 PO Box<br />
31226<br />
E-mail: sinet-aau@ethionet.et<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 209<br />
ISSN 2250-3153<br />
Effect of Various Concentration of Octacosane,<br />
Pentacosane and Tricosane on Foraging Behavior of<br />
Trichogrammatids<br />
Shipra Mathur, Asfiya Zayeem, Srikanth Kanameni, Monica Tibrewal, Nitish Wadhwa, Priti Arora and Archna<br />
Kumar<br />
Amity Institute of Biotechnology, Amity University Uttar Pradesh, Sector -125, Expressway, Noida, U. P., 201303, India.<br />
Abstract- Semiochemicals especially their alkane constituents<br />
play vital role in governing the foraging behavior of egg<br />
parasitoids. Thus in the present study various concentrations of<br />
the three straight chain alkanes were prepared to determine the<br />
specific concentration(s) optimizing the foraging behavior of<br />
Trichogramma brasiliensis Ashmead and Trichogramma chilonis<br />
Ishii. Laboratory bioassays were carried out to assess the impact<br />
of various concentrations of octacosane, pentacosane and<br />
tricosane on the parasitic efficiency of targeted<br />
trichogrammatids. T. chilonis was found to exhibit enhanced<br />
parasitism for concentrations ranging from 7 000mg/L to 15<br />
000mg/L with maximum at 11 000mg/L for Pentacosane<br />
(17.23±0.56) whereas T. brasiliensis exhibited favorable<br />
response towards almost all the concentrations of tricosane and<br />
pentacosane showing more efficiency at 11 000mg/l<br />
(19.44±2.00) and 14 000mg/l(18.89±0.70) respectively. These<br />
studies indicate that alkanes can act as semiochemical source and<br />
can be exploited to enhance foraging efficiency of egg<br />
parasitoids in integrated pest management programs.<br />
Index Terms- Alkanes, Integrated Pest Management,<br />
Semiochemicals, Trichogramma.<br />
I<br />
I. INTRODUCTION<br />
n nature, tritrophic interactions of host plant, host insects and<br />
their natural enemies are mediated by a complex array of<br />
stimuli, of which the role of semiochemicals is commendable<br />
(Loughrin et al., 1994, Paul et al., 2008). The central role played<br />
by semiochemicals emanating from plants and host insects,<br />
during different phases of the natural enemies‘ searching<br />
behavior is well established (Hilker et al., 2002; Borges et al.,<br />
2003; Lou et al., 2005; Manrique et al., 2005; Yong et al., 2007;<br />
Tabone et al., 2010). Stimulus in form of infochemicals guide<br />
parasitoids to their host leading eventually to oviposition in or on<br />
the host (Moraes et al., 2005; Fatouros et al., 2008). Parasitoids<br />
exhibit varied foraging behavior in response to sensitization by<br />
semiochemical stimulus. The ability of infochemicals to enhance<br />
the orientation efficiency of parasitoids, culminating in control of<br />
the pest infestation forms the basis of IPM strategies (Powell,<br />
1991; Dicke and Vet, 1999; Romeis et al., 2005). Due to heavy<br />
reliance of natural enemies on infochemicals for optimal<br />
performance as biological control agents in IPM strategies<br />
identification of the chemical nature of these cues is vital.<br />
Various studies have reported these cues to be mainly<br />
hydrocarbons in nature (Yadav et al., 2002; Paul et al., 2008).<br />
Several follow-up studies have found saturated, straight chain<br />
hydrocarbons like tricosane, pentacosane, hexacosane,<br />
pentadecane, hexatriacontane, docosane, to act as biologically<br />
active cues and enhance the foraging efficiency of<br />
Trichogrammatids. Polyphagous nature of Trichogrammatids<br />
against many lepidopterous pests of economically high valued<br />
crops like rice, cotton tomato, and cole crops makes them one of<br />
the most promising biological control agents during field releases<br />
(Stinner, 1977; Bobendreier et al., 2003; Fatouros et al., 2008).<br />
Hence in present study various concentrations of straight chain<br />
saturated hydrocarbons viz., octacosane, pentacosane and<br />
tricosane were prepared to determine specific concentration(s)<br />
optimizing the foraging behavior of two Trichogrammatids viz.,<br />
Trichogramma brasiliensis Ashmead and Trichogramma chilonis<br />
Ishii.<br />
II. MATERIALS AND METHODS<br />
Insect rearing protocols<br />
The host, rice meal moth Corcyra cephalonica Stainton<br />
(Lepidoptera: Pyralidae), and isofemale lines of<br />
Trichogrammatids, T. brasiliensis and T. chilonis were obtained<br />
from a stock culture maintained at the Biological Control<br />
Laboratory, Amity Institute of Biotechnology, Amity University,<br />
Sec-125, Noida, U.P. Culture of C. cephalonica was established<br />
in rearing cages as described by Sreekumar and Paul (2000).<br />
Eggs of C. cephalonica were collected, cleaned and sterilized<br />
using UV; glued on paper egg cards in a single layer using<br />
Arabic gum and placed in glass vials (diameter = 2.5 cm, length<br />
= 10 cm). The 0-24-h-old C. cephalonica eggs were offered to T.<br />
brasiliensis for oviposition and the vials kept at 26±2 °C and<br />
65±5% RH for emergence (Bharti et al., 1994, Archna et al.,<br />
2009).<br />
Preparation of saturated hydrocarbon concentrations<br />
Three straight chain saturated hydrocarbons viz., tricosane,<br />
pentacosane, and octacosane- obtained from sigma-Aldrich were<br />
used for the preparation of test samples. Five different<br />
concentrations viz., 7 000 mg/L; 11 000 mg/L; 14 000 mg/L; 15<br />
000 mg/L and 25 000 mg/L, were prepared for each targeted<br />
hydrocarbon by adding appropriate quantity of distilled HPLC<br />
grade hexane. All concentrations of targeted hydrocarbons were<br />
tested for their activity with T. brasiliensis and T. chilonis.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 210<br />
ISSN 2250-3153<br />
Bioassay Protocol<br />
Petridish bioassays were carried out by placing egg cards (30<br />
eggs per card) sprayed with the respective hydrocarbon<br />
concentrations (@50 µl /egg card) in 150 x 15 mm petri dishes.<br />
In each petri dish, 10, 0-24h old Trichogrammatid females were<br />
released in the center. The petri dishes were replicated six times<br />
for each treatment. The parasitoids were observed at five minutes<br />
interval for 45 minutes and the total number of parasitoids that<br />
visited the egg card referred as ‗parasitoid activity index<br />
(PAI)‘was counted. Thereafter, the parasitoids were removed<br />
carefully from each egg card. The cards were kept individually in<br />
homeopathic vials (1 dram size) and number of blackened eggs<br />
was counted to estimate the parasitism (Singh et al., 1998).<br />
Laboratory conditions for the experiment were 26 ± 2°C, 65 ±<br />
5% RH and light intensity 160 LUX (Padamavathi and Paul,<br />
1998, Kumar et al., <strong>2012</strong>).<br />
Statistical analysis<br />
The data was tabulated and percent parasitism was calculated<br />
using the following formula:<br />
Percent parasitism = (Number of blackened eggs per card /<br />
Total number of eggs per card) X100.<br />
Data obtained for percent parasitism and PAI was analyzed<br />
by 2 way ANOVA, using applied indostat software version 8.5<br />
developed by Windostat Hyderabad, India. The difference<br />
between the means of various treatments was compared by LSD<br />
test at 5% significance level. Comparison of PAI and parasitism<br />
for different concentrations of crude hydrocarbon extracts with<br />
pure hexane (control) were carried out using paired T test.<br />
III. RESULT<br />
Effect on foraging efficiency of T. chilonis<br />
Highest parasitoid activity index was registered for<br />
15000mg/L concentration of tricosane for egg parasitoid T.<br />
chilonis, which was significantly different from control at 5%<br />
level of significance (14.00±1.16) (P=0.0001; t=10.6279).<br />
Parasitoid activity index was found to be significantly high for<br />
25000mg/L concentration of octacosane (3.50± 0.22) (P=0.0422;<br />
t=2.71) and 11000 mg/L and 14000 mg/L concentrations of<br />
Pentacosane (7.50± 0.22, 6.17± 0.83) (P=0.0001; t=12.47 and<br />
P=0.0422; t=2.71) respectively (Table 1).<br />
For egg parasitoid T. chilonis, 11000 mg/L concentration of<br />
pentacosane (17.23± 0.56) (P=0.0009; t=7.06) was found to<br />
register the highest mean percent parasitism. 7000mg/L and<br />
11000mg/L concentrations of octacosane (12.78± 1.03; 9.45±<br />
0.56) (P=0.0009; t=7.06 and P=0.002; t=5.97) respectively<br />
recorded significantly higher parasitism as compared to control at<br />
5% level of significance. Parasitization was recorded to be<br />
significantly high for 11000mg/L, 14000mg/L and 15000 mg/L<br />
concentrations of Pentacosane. 15000mg/L concentration of<br />
Tricosane registered significantly higher parasitism as compared<br />
to control (15.00± 3.19) (P=0.008; t=4.23) (Table 2).<br />
Effect on foraging efficiency of T. brasiliensis<br />
Highest parasitoid activity index was registered for<br />
25000mg/L concentration of tricosane (10.00±0.68) (P=0.01;<br />
t=4.10).. For pentacosane, 14000mg/L concentration reported<br />
significant level of response (8.00±0.37) (P=0.0001; t=19.03)<br />
whereas for octacosane 25000mg/L concentration shows<br />
significant level of parasitoid activity (4.17±0.17) (P=0.0001;<br />
t=13.00) (Table 3).<br />
11000mg/L concentration of tricosane elicited the highest<br />
mean percent parasitism (19.44+2.00) (P=0.0006, t=7.68) for T.<br />
brasiliensis, followed by 14000mg/L concentration of<br />
pentacosane (18.89+0.70) (P=0.0002, t=10.27) which were<br />
significantly different from control at 5% level of significance.<br />
All concentrations of pentacosane, except 15000 mg/L, were<br />
found to register a significantly high percent parasitism.<br />
Parasitism was recorded to be significant for all concentrations of<br />
Tricosane (Table 4).<br />
IV. DISCUSSION<br />
Foraging behavior of egg parasitoids is guided by a wide<br />
array of semiochemicals (Hilker and Meiners, 2006). Hendry et<br />
al., (1976) analyzed five host plants of Heliothis zea Boddie to<br />
determine the presence of hydrocarbons acting as synomones for<br />
Trichogramma evanescens Westwood. They identified series of<br />
hydrocarbons present in host plants ranging from C21 to C25 in<br />
varying quantities. Dutton et al. (2000) Yonggen et al. (2006)<br />
and Rani et al. (2008) revealed that variation in the quantity and<br />
concentration of saturated hydrocarbons influenced the<br />
parasitization efficiency of Trichogrammatids. Yadav et al.<br />
(2001) also reported the presence of pentacosane in potato<br />
(Solanum tuberosum) and soybean (Glycine max) and classified<br />
pentacosane as favourable saturated hydrocarbon for T. exiguum.<br />
Similarly in hexane extracts of ten different varieties of tomato<br />
(Lycopersicon esculentum Mill) obtained in the vegetative and<br />
flowering phase of growth, the synomonal response of the<br />
prominent egg parasitoid .T. chilonis was observed (Paul et al.,<br />
2008) which seemed to be associated mainly with tricosane (C23),<br />
heneicosane (C21), pentacosane (C25) and hexacosane (C26)<br />
during the vegetative period and heneicosane (C21), hexacosane<br />
(C26) during the flowering period. In present study, saturated<br />
hydrocarbons, tricosane, pentacosane and octacosane were found<br />
to elicit significant parasitism for T. chilonis. Among the eleven<br />
saturated hydrocarbons tested by Padmavathi and Paul (1998),<br />
tricosane, octacosane and docosane have been reported to<br />
enhance the activity and parasitic efficiency of T. chilonis. In<br />
another study, Trichogramma exiguum Pinto and Platner was<br />
found to respond positively to pentacosane, hexacosane,<br />
pentadecane, hexatriacontane, tricosane and docosane (Paul et<br />
al., 2002). This is in accordance with the current findings where<br />
tricosane and pentacosane were found to register a significant<br />
parasitization for T. brasiliensis whereas no significant<br />
parasitism was reported for octacosane. T. chilonis was found to<br />
exhibit enhanced parasitization at concentrations ranging from<br />
7000mg/L to 15000mg/L whereas T. brasiliensis exhibited<br />
favorable response towards almost all the concentrations of<br />
tricosane and pentacosane. Less response towards high<br />
concentrations of octacosane could be due to bulkiness of<br />
octacosane that led to deposition of flakes of this hydrocarbon on<br />
egg cards hindering the parasitization of eggs by the parasitoids.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 211<br />
ISSN 2250-3153<br />
V. CONCLUSION<br />
Present study results indicate that bulkiness and hence mass of<br />
hydrocarbons can influence their semiochemical activity and<br />
lesser the concentration of heavier hydrocarbons, more is their<br />
semiochemical activity. Utilization of optimal concentrations of<br />
favorable hydrocarbons can be exploited to enhance the foraging<br />
efficiency of Trichogrammatids in integrated pest management<br />
programs.<br />
ACKNOWLEDGMENT<br />
We are extremely grateful to Department of Science and<br />
Technology for granting financial support for this study. The<br />
authors are also thankful to the Director General, AIB, Amity<br />
University for providing the required facilities.<br />
REFERENCES<br />
[1] Archna, Singh A. K., Paul A.V.N. & Jain Anju, 2009. ―Synomonal effect of<br />
nine varieties and one culture of rice on Trichogramma japonicum Ashmead<br />
and Trichogramma chilonis (Ishii) (Hymenoptera: Trichogrammatidae)‖.<br />
Acta Entomol. Sin. 52(6): 656-664.<br />
[2] Babendreier, D., S. Kuske and F. Bigler, 2003. ―Parasitism of non-target<br />
butterflies by Trichogramma brassicae Bezdenko (Hymenoptera:<br />
Trichogrammatidae) under field cage and field conditions‖. Biological<br />
Control, 26: 139–145.<br />
[3] Bharti, D., A.V.N. Paul and S. Singh, 1994. ―UV radiation for prolonged<br />
storage of the eggs of Corcyra cephalonica Stainton (Galleriidae:<br />
Lepidoptera) for mass rearing of Trichogramma brasiliensis Ashmead<br />
(Trichogrammatidae: Hymenoptera)‖, Indian J. Entomol. 56: 352 – 355.<br />
[4] Borges, M., S. Colazza, P. Ramirez-Lucas, K.R. Chauhan, M.C.B. Moraes<br />
and J.R. Aldrich, 2003. ―Kairomonal effect of walking traces from<br />
Euschistus heros (Heteroptera: Pentatomidae) on two strains of Telenomus<br />
podisi (Hymenoptera: Scelionidae)‖. Physiol. Entomol. 28: 349 – 355.<br />
[5] Dicke, M., and L.E.M. Vet, 1999. ―Plant-carnivore interactions:<br />
evolutionary and ecological consequences for plant, herbivore and<br />
carnivore‖. In: Olff H, Brown VK, Drent RH, editors. Herbivores: between<br />
plants and predators. Oxford: Blackwell Science, 483–520.<br />
[6] Dutton, A., L. Mattiacci and S. Dorn, 2000. ―Learning used as a strategy for<br />
host stage location in an endophytic host-parasitoid system‖, Entomol. Exp.<br />
Appl. 94:123 – 132.<br />
[7] Fatouros, N.E., M. Dicke, R. Mumm, T. Meiners, and M. Hilker, 2008.<br />
―Foraging behavior of egg parasitoids exploiting chemical information‖.<br />
Behavioural Ecologie, 19: 677–689.<br />
[8] Hendry, L. B., J.K. Wichmann, D.M. Hindenlang, K.M. Weaver and S.H.<br />
Korzeniowski, 1976. ―Plants- the origin of kairomones utilized by<br />
parasitoids of phytophagous insects‖. J. Chem. Ecol. 2:271–283.<br />
[9] Hilker, M. and T. Meiners, 2006. ―Early herbivore alert: Insect eggs induce<br />
plant defense‖. J. Chem. Ecol., 32:1379–1397.<br />
[10] Hilker, M., C. Kobs, M.Varama and K. Schrank, 2002. ―Insect egg<br />
deposition induces Pinus sylvestris to attract egg parasitoids‖. J Exp Biol;<br />
205: 455-461<br />
[11] Kumar, A., A. Zayeem And S. Kanameni, <strong>2012</strong>. ―Synomonal effect of cole<br />
crops on individual and associative learning behavior of Cotesia plutellae‖.<br />
International Journal of Biology, Pharmacy and Allied Sciences 3: 285-298.<br />
[12] Lou Y.G., Ma B, and J.A.Cheng, 2005. ―Attraction of the parasitoid<br />
Anagrus nilaparvatae to rice volatiles induced by the rice brown<br />
planthopper Nilaparvata lugens‖, J Chem Ecol; 31: 2357-2372<br />
[13] Loughrin, J.H., A. Manukian, R.R. Heath, T.C.J. Turlings and J.H.<br />
Tumlinson, 1994. ―Diurna1 cycle of emission of induced volatile terpenoids<br />
by herbivoreinjured cotton plants‖. Proceedings of the National Academy of<br />
Sciences of the United States of America, 91: 11836-11840.<br />
[14] Manrique V, W.A. Jones and L.H. Williams, 2005. 3rd, Bernal JS.<br />
―Olfactory responses of Anaphes iole (Hymenoptera: Mymaridae) to<br />
volatile signals derived from host habitats‖. J Insect Behav; 18: 89-104.<br />
[15] Moraes M.C.B., R.Laumann, E.R., Sujii, C. Pires and M. Borges, 2005.<br />
―Induced volatiles in soybean and pigeon pea plants artificially infested<br />
with the neotropical brown stink bug, Euschistus heros, and their effect on<br />
the egg parasitoid, Telenomus podisi‖. Entomol Exp Appl; 115: 227-237.<br />
[16] Padmavathi, C. and A.V.N. Paul, 1998. ―Saturated hydrocarbons as<br />
kairomonal source for the egg parasitoid, Trichogramma chilonis Ishii<br />
(Hym.,Trichogrammatidae)‖. J Appl Entomol, 122:29–32.<br />
[17] Paul, A. V. N., M. Srivastava, P. Dureja, and A.K. Singh, 2008.<br />
‖Semiochemicals produced by tomato varieties and their role in parasitism<br />
of Corcyra cephalonica (Lepidoptera: Pyralidae) by the egg parasitoid<br />
Trichogramma chilonis (Hymenoptera: Trichogrammatidae)‖. International<br />
Journal of Tropical Insect Science, 28: 108–116.<br />
[18] Paul, A.V.N., S Singh, and A.K. Singh, 2002. ―Kairomonal effect of some<br />
saturated hydrocarbons on the egg parasitoids, Trichogramma brasiliensis<br />
(Ashmead) and Trichogramma exiguum, Pinto, Platner and Oatman (Hym.<br />
Trichogrammatidae)‖. Journal of Applied Entomology, 126: 409–416.<br />
[19] Powell, W., 1991. ―Tritrophic influence on aphid parasitoids(Hym.,<br />
Braconidae: Aphidiinae)‖. Redia 74(3); 129–133.<br />
[20] Rani, P.U., Y. Jyothsna and M. Lakshminarayana, 2008. ―Host and nonhost<br />
plant volatiles on oviposition and orientation behaviour of<br />
Trichogramma chilonis Ishii‖, J. Biopest. 1:17 – 22.<br />
[21] Romeis, J., D. Babendreier, F.L. Wäckers, and G. Shanower, 2005. ―Habitat<br />
and plant specificity of Trichogramma egg parasitoids – Underlying<br />
mechanisms and implications‖. Basic and Applied Ecolog., 3: 215-236.<br />
[22] Sreekumar, K.M. and A.V.N. Paul, 2000. ―Labour efficient technology for<br />
the mass production of rice meal moth Corcyra cephalonica‖. Indian. J.<br />
Entomol. 62:304 – 311.<br />
[23] Singh S, A.V.N. Paul and A.K. Singh, 1998. ―Host effect on the quality of<br />
Trichogramma brasiliensis and T. exiguum‖. Indian. J. Entomol. 60:379 –<br />
384.<br />
[24] Stinner, R.E., 1977. ―Efficacy of inundative release‖. Annu. Rev. Ent,<br />
22:513-531.<br />
[25] Tabone, E., C. Bardon, N. Desneux, and E. Wajnberg, 2010. ―Parasitism of<br />
different Trichogramma species and strains on Plutella xylostella L. on<br />
greenhouse cauliflower‖. Journal of Pest Science, 83; 251–256.<br />
[26] Yadav, B., A.V.N. Paul and R.K. Gautam, 2001. ―Synomonal effect of<br />
some potato varieties on Trichogramma exiguum Pinto, Platner and<br />
Oatman‖, In: Symposium on Biocontrol based Pest Management for<br />
Quality Crop Protection in the Current Millennium, 18 July – 19 July,<br />
Punjab Agricultural University, Ludhiana. 16 – 17.<br />
[27] Yadav, B., A.V.N. Paul, P. Dureja, and R.K. Gautam, 2002. ―Synomonal<br />
effect of some varieties of soybean on the egg parasitoid Trichogramma<br />
exiguum Pinto, Platner and Oatman‖, Biopesticides and Pest Management.<br />
(ed. by Koul O, Dhaliwal GS, Mawaha SS, Arora JK) Campus Books<br />
International, New Delhi, 2:260–270.<br />
[28] Yong, T.H., S. Pitcher, J. Gardner and M.P. Hoff mann, 2007. ―Odor<br />
specificity testing in the assessment of efficacy and non-target risk for<br />
Trichogramma ostriniae (Hymenoptera: Trichogrammatidae)‖. Biocontrol<br />
Sci Technol, 17:135–153.<br />
[29] Yonggen, L., H. Xiaoyan, T.C.J., Turlings, J. Cheng, X. Chen and G. Ye,<br />
2006. ―Differences in induced volatile emissions among rice varieties result<br />
in differential attraction and parasitism of Nilaparvata lugens eggs by the<br />
parasitoid Anagrus nilaparvatae in the field‖, J. Chem. Ecol. 32:2375–2387.<br />
AUTHORS<br />
Correspondence Author –Archna Kumar, Amity Institute of<br />
Biotechnology, Amity University Uttar Pradesh, Sector -125,<br />
Expressway, Noida, U. P., 201303, India,<br />
archnaaashi@yahoo.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 212<br />
ISSN 2250-3153<br />
Table 1: Effect of three saturated hydrocarbons on mean parasitoid activity index of T. chilonis:<br />
C1<br />
(7000 mg/L)<br />
C2<br />
(11000<br />
mg/L)<br />
C3<br />
(14000<br />
mg/L)<br />
C4<br />
(15000 mg/L)<br />
C5<br />
(25000<br />
mg/L)<br />
C6<br />
Hexane<br />
(control)<br />
Octacosane 1.83±0.31 0.67±0.21 1.50±0.22 2.50±0.22 3.50±0.22 1.50±0.21 2.00±0.20 c<br />
Pentacosane 5.50±0.81 7.50±0.22 6.17±0.83 3.50±1.15 1.67±0.33 3.67±0.21 4.87±0.49 b<br />
Tricosane 5.00±0.82 5.33±0.42 2.83±0.66 14.00±1.16 4.00±0.45 1.50±0.67 6.23±0.80 a<br />
*Value within column marked with different letters are significantly (P < 0.05) different.<br />
SE Cd<br />
hydrocarbon x hydrocarbon 0.35 0.69<br />
Concentration x concentration 0.42 0.84<br />
hydrocarbon x concentration 0.85 1.68<br />
Table 2: Effect of three saturated hydrocarbons on mean percent parasitism of T. chilonis:<br />
C1<br />
(7000 mg/L)<br />
C2<br />
(11000<br />
mg/L)<br />
C3<br />
(14000<br />
mg/L)<br />
C4<br />
(15000 mg/L)<br />
C5<br />
(25000<br />
mg/L)<br />
C6<br />
Hexane<br />
(control)<br />
Octacosane 12.78±1.03 9.45±0.56 2.78±0.56 2.22±0.70 2.78±0.55 3.33±0.86 6.00±0.85 b<br />
Pentacosane 8.33±2.95 17.23±0.56 16.11±2.00 16.11±1.59 8.88±1.11 7.78±1.41 13.33±1.19 a<br />
Tricosane 7.22±3.38 7.22±1.81 5.00±2.40 15.00±3.19 6.67±2.11 4.45±1.41 8.22±1.28 b<br />
*Value within column marked with different letters are significantly (P < 0.05) different.<br />
SE Cd<br />
Concentration x concentration 1.09 2.15<br />
hydrocarbon x hydrocarbon 1.33 2.64<br />
Mean<br />
Mean<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 213<br />
ISSN 2250-3153<br />
Octacosa<br />
ne<br />
Pentacos<br />
ane<br />
Tricosan<br />
e<br />
hydrocarbon x concentration 2.66 5.27<br />
Table 3: Effect of three saturated hydrocarbons on mean parasitoid activity index of T. brasiliensis:<br />
C1<br />
(7000 mg/L)<br />
C2<br />
(11000 mg/L)<br />
C3<br />
(14000 mg/L)<br />
C4<br />
(15000 mg/L)<br />
C5<br />
(25000 mg/L)<br />
C6<br />
Hexane<br />
(control)<br />
2.50±0.22 2.67±0.21 1.50±0.22 4.00±0.26 4.17±0.17 2.00±0.00 2.97±0.21 c<br />
2.00±0.45 4.33±0.42 8.00±0.37 0.83±0.17 5.67±0.21 1.50±0.22 4.17±0.50 b<br />
6.00±0.45 6.67±0.42 9.67±0.92 9.83±1.60 10.00±0.68 3.33±1.17 8.43±0.81 a<br />
*Value within column marked with different letters are significantly (P < 0.05) different.<br />
SE Cd<br />
hydrocarbon x hydrocarbon 0.25 0.50<br />
Concentration x concentration 0.31 0.61<br />
hydrocarbon x concentration 0.62 1.22<br />
Table 4: Effect of three saturated hydrocarbons on mean percent parasitism of T. brasiliensis:<br />
C1<br />
(7000 mg/L)<br />
C2<br />
(11000 mg/L)<br />
C3<br />
(14000 mg/L)<br />
C4<br />
(15000 mg/L)<br />
C5<br />
(25000 mg/L)<br />
C6<br />
Hexane<br />
(control)<br />
Octacosane 7.22±0.56 0.56±0.56 3.33±0.00 6.12±0.56 1.67±0.75 6.67±0.86 3.78±0.45<br />
b<br />
Pentacosane 12.22±0.70 12.22±0.70 18.89±0.70 4.44±0.70 11.67±0.75 4.44±0.70 11.89±0.9<br />
0 a<br />
Tricosane 10.00±1.49 19.44±2.00 17.22±3.38 11.11±0.70 16.11±1.59 5.56±0.70 14.78±1.8<br />
3 a<br />
*Value within column marked with different letters are significantly (P < 0.05) different.<br />
SE Cd<br />
hydrocarbon x hydrocarbon 0.51 1.01<br />
Concentration x concentration 0.63 1.24<br />
hydrocarbon x concentration 1.25 2.48<br />
Mean<br />
Mean<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 214<br />
ISSN 2250-3153<br />
Awareness of Health Insurance in Andhra Pradesh<br />
Jangati Yellaiah<br />
Ph.D. Scholar, Department of Economics, Osmania University, ICSSR Doctoral Fellow from (CESS), Hyderabad,<br />
Andhra Pradesh, India<br />
Abstract- This paper identifies the determinants of awareness<br />
of health insurance in Andhra Pradesh. The present study was<br />
carried out in Hyderabad city of Andhra Pradesh. Since the main<br />
objective of the study was to analyze determinants of awareness<br />
of the health insurance, we concentrated on the variables like the<br />
Age, Education, Gender, Occupation, Income, type of the family,<br />
and Health expenditure etc. Using pretested structured<br />
questionnaire, the primary data have been collected purposively,<br />
by covering the wide range of demographic, economic and social<br />
factors, from the randomly chosen two hundred respondents from<br />
the study area. We have applied simple statistical tools such as<br />
descriptive statistics, and along with logistic regression to<br />
identify the factors determining the awareness of the health<br />
insurance. We found that 33.5 percent of the respondents had<br />
aware of health insurance and 66.5 percent of the respondents<br />
had unaware of health insurance. The present paper concludes<br />
that the determinants of awareness of health insurance were<br />
religion, type of the family, education, occupation, annual<br />
income, when considered except type of the family, the other<br />
determinants had a statistically significant. The higher education<br />
and higher income had positive relation to the awareness of<br />
health insurance.<br />
Index Terms- Health Insurance, Awareness of Health<br />
insurance, Determinants of Health insurance<br />
W<br />
I. INTRODUCTION<br />
ealth is an important constituent of human resource<br />
development. Good health is real wealth of society. It not<br />
only increases human efficiency but also decreases private and<br />
public expenditure on sickness and diseases. Health has been<br />
declared as a fundamental human right. The present concern in<br />
both developed and developing countries is not only to reach the<br />
whole population with adequate healthcare services but also to<br />
secure an acceptable level of health for all though the application<br />
of primary healthcare programmes. Healthcare services help to<br />
reduce infant mortality rate, check crud death rate, keep diseases<br />
under control and raise life expectancy. Health insurance is fast<br />
emerging as an important mechanism to finance health care<br />
needs of the people. The need for an insurance system that works<br />
on the basic principle of pooling of risks of unexpected costs of<br />
persons falling ill and needing hospitalization by charging<br />
premium from a wider population base of the same community.<br />
There is growing evidence that the level of health care spending<br />
in India – currently at over 6 per cent of its total GDP – is<br />
considerably higher than that in many other developing<br />
countries. This evidence also suggests that more than threequarters<br />
of this spending includes private out-of-pocket expenses.<br />
1.1 Health Insurance<br />
Health insurance is a method to finance healthcare. The ILO<br />
defines health insurance as ―the reduction or elimination of the<br />
uncertain risk of loss for the individual or household by<br />
combining a larger number of similarly exposed individuals or<br />
households who are included in a common fund that makes good<br />
the loss caused to any one member‖ (ILO, 1996). To put it more<br />
simply, in a health insurance programme, people who have the<br />
risk of a certain event contribute a small amount (premium)<br />
towards a health insurance fund. This fund is then used to treat<br />
patients who experience that particular event (e.g.<br />
hospitalisation).<br />
1.2 Health Insurance in India<br />
Today many countries are shifting over to health insurance<br />
as a mechanism of financing their healthcare programme. In<br />
India, we need to shift from the current predominance of out-ofpocket<br />
payments to a health insurance programme. The reasons<br />
are very clear:<br />
Direct out-of-pocket payments are a financial barrier to<br />
accessing health services. On the other hand, an insured<br />
patient can walk into a health facility without the fear of<br />
financial burden;<br />
Direct out-of-pocket payments can push families into<br />
indebtedness or poverty. Health insurance protects the<br />
patient from the burden of raising funds at the time of<br />
illness;<br />
Direct out-of-pocket payments are inequitable as they<br />
place the burden on the vulnerable. Insurance through<br />
its risk pooling mechanism is more equitable; and<br />
Direct out-of-pocket payments do not permit patient‘s<br />
participation in his/her treatment. On the other hand, by<br />
its collective nature, a health insurance programme can<br />
negotiate for better quality care.<br />
Most health insurance schemes can be classified into three<br />
broad categories, social health insurance, private health insurance<br />
and community (or micro) health insurance. In India, we have a<br />
fourth category called government initiated health insurance<br />
schemes that do not fit into any of the above three categories.<br />
Each has its own specificities. However, there are some features<br />
that overlap among the three.<br />
A. Social Health Insurance (SHI)<br />
Social health insurance schemes are statutory programmes<br />
financed mainly through wage-based contributions and related to<br />
level of income. SHI schemes are mandatory for defined<br />
categories of workers and their employers. It is based on a<br />
combination of insurance and solidarity. The classical example<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 215<br />
ISSN 2250-3153<br />
of an SHI is the German or Belgian health insurance system.<br />
Here, employees and employers contribute to a ‗mutual fund(s)‘<br />
that is then used to finance the healthcare for the entire<br />
population. Citizens have to enroll compulsorily in one of these<br />
mutual funds. The government also provides significant funding<br />
to cover those who are not able to contribute.<br />
In many low-income countries, SHI has been<br />
implemented mainly for the civil servants and the formal sector.<br />
This can lead to gross inequities. For instance in India, 18 per<br />
cent of the central government budget is used to finance an SHI<br />
for the civil servants who constitute only 0.4 per cent of the<br />
population.<br />
In India, there are three well-known SHI schemes - the<br />
Employees‘ State insurance Scheme (ESIS), the Central<br />
Government Health Scheme (CGHS) and the ECHS (Ex-<br />
Servicemen‘s Contributory Health Scheme).<br />
B. Private Health Insurance (PHI)<br />
Private health insurance refers to insurance schemes that<br />
are financed through individual private health premiums, which<br />
are often voluntary, and risk rated. ‗For-profit‘ insurance<br />
companies manage the funds.<br />
In low-income countries like India, they provide<br />
primary insurance cover, i.e. they insure hospitalisations. On the<br />
other hand, in high-income countries, they usually provide<br />
supplementary secondary insurance cover.<br />
C. Community Health Insurance (CHI)<br />
Community health insurance is ―any not-for-profit<br />
insurance scheme aimed primarily at the informal sector and<br />
formed on the basis of a collective pooling of health risks, and in<br />
which the members participate in its management‖.<br />
The important point to note is that in CHI, the local<br />
community takes the initiative in establishing a health insurance<br />
scheme, usually to improve access to healthcare as well as<br />
protect against high medical expenses. The solidarity element is<br />
strongest in CHIs as most of the members know each other.<br />
Community health insurance as a movement is quite active<br />
in sub-Saharan Africa. Even in Asia, we have examples from<br />
India, the Philippines, Indonesia, Cambodia, Bangladesh, etc.<br />
D. Government-initiated Health Insurance Schemes (GHI)<br />
As stated earlier, India has a fourth category that is not<br />
usually seen in other countries. This is the ‗GHI‘. The specificity<br />
of this is that the government introduces a health insurance<br />
programme, usually for the poorest and vulnerable sections of the<br />
community. In many of the schemes, the premium is totally<br />
subsidised by the government (from tax-based revenues) and is<br />
paid directly to the insurance company. Rarely, the community<br />
may be expected to pay a token amount. The insurance company<br />
or an independent body is the organiser of the scheme. These<br />
schemes last for a couple of years, depending on the political will<br />
and longevity of the government. These are seen more as<br />
populist welfare schemes rather than a long-lasting intervention.<br />
II. REVIEW OF THE LITERATURE<br />
The review of literature of this study selected recent studies<br />
relating to awareness and determinants of health insurance India.<br />
B. Reshmi et al. (2007), they found that the awareness of health<br />
insurance was found to be 64.0 per cent. Around 45.0 per cent of<br />
the respondents came to know about health insurance from the<br />
media which played an important role in the dissemination of<br />
information. The middle and low socio-economic groups<br />
favoured government health insurance compared to private<br />
health insurance. They suggested that government should come<br />
out with a policy, where the public can be made to contribute to a<br />
health insurance scheme to ensure unnecessary out-of-pocket<br />
expenditures and also better utilization of health care facilities.<br />
Ahuja (2004) the study explained that health insurance was<br />
emerging as an important financing tool in meeting the health<br />
care needs of the poor. Households which have higher health<br />
expenditure and income have higher probability of renewing<br />
health insurance policy. Mudgal (2005) this study examined that<br />
whether consumption expenditure of households in rural India<br />
was insured against medical ailments. This study found that the<br />
villagers were not able to perfectly share the risk of all shocks.<br />
Indirani Gupta (2002) the study found a wide disparity across<br />
selections on willingness to participate. The challenges for the<br />
new system would be to pool individuals across risk and<br />
economic status categories, setup a multi-tier system to meet<br />
objectives of equity and efficiency in health care delivery and for<br />
planners and regulators, to keep health insurance separate from<br />
other non-health insurance. Gumber and kulkarani (2000), they<br />
found that there was strongly expressed need for health insurance<br />
among low income households in both rural and urban areas.<br />
This need has arisen primarily because of heavy burden of outof-pocket<br />
expenditure on them while seeking health care. The<br />
need for education for rural and urban populations alike on the<br />
concept of insurance and information on health insurance is a<br />
crucial aspect in extending health insurance coverage on large<br />
scale.<br />
III. OBJECTIVES OF THE STUDY<br />
1. To examine the socio- economic and demographic<br />
characteristics of the selected samples.<br />
2. To analyze the determinants of awareness of health<br />
insurance of selected samples.<br />
IV. DATA COLLECTION AND METHODS OF THE<br />
STUDY<br />
The present study was carried out in Hyderabad city of Andhra<br />
Pradesh. Since the main objective of the study was to analyze<br />
determinants of awareness of the health insurance, we<br />
concentrated on the variables like the Age, Education, Gender,<br />
Occupation, Income, type of the family, Premium of health<br />
insurance, and Health expenditure etc. Using pretested structured<br />
questionnaire, the primary data have been collected purposively,<br />
by covering the wide range of demographic, economic and social<br />
factors, from the randomly chosen two hundred respondents from<br />
the study area. The period of collection of the data was 2010-11.<br />
We have applied simple statistical tools such as descriptive<br />
statistics, percentages, mean and standard deviation along with<br />
logistic regression to identify the factors determining the<br />
awareness of the health insurance.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 216<br />
ISSN 2250-3153<br />
V. FINDINGS AND DISCUSSION<br />
Table 1 Socio- Demographic Characteristics of the<br />
Respondents<br />
Characteristics<br />
respondents<br />
Age (years)<br />
of the<br />
Numbers Percentage<br />
20-30 68 34<br />
31-40 77 38.5<br />
41-50 34 17<br />
51-60 12 6<br />
Above 61<br />
Gender<br />
8 4<br />
Male 144 72<br />
Female<br />
Religion<br />
56 28<br />
Hindu 131 65.5<br />
Christian 25 12.5<br />
Muslim<br />
Type of family<br />
44 22<br />
Joint 50 25<br />
Nuclear<br />
Education<br />
150 75<br />
Illiterate 13 6.5<br />
Primary 33 16.5<br />
Secondary 44 22<br />
Higher secondary 36 18<br />
Graduate 58 29<br />
Post-graduate<br />
Annual Income<br />
16 8<br />
Up to 25000 19 9.5<br />
25001-50000 129 64.5<br />
50001-75000 20 10<br />
75001-100000 11 5.5<br />
100001-125000 7 3.5<br />
125001-150000 5 2.5<br />
Above 150001 9 4.5<br />
The above table shows that socio demographic characteristics<br />
of the respondents. Most of the respondents were in the age<br />
group of 31-40 years of age (38.7 %) followed by 20-30 years of<br />
age (34 %). Only 8 percent of respondents were in the age group<br />
of above 61 years of age. Males constituted 72 per cent and<br />
females 28 per cent of the respondents. 65.5 per cent of<br />
respondents were Hindus while Christians and Muslims were<br />
12.5 per cent and 22 per cent respectively. 75 per cent of the<br />
respondents stayed in nuclear family and 25 per cent in the joint<br />
family, 29percent of the respondents were graduates, 22percent<br />
of the respondents were secondary education level, 18percent of<br />
the respondents were higher secondary level, 16.5percent of the<br />
respondents were primary level, 8percent of the respondents<br />
were post-graduates and only 6.5percent of the respondents were<br />
illiteracy. 64.5 per cent of the respondents had annual income<br />
between Rs. 25001 to 50000 and 4.5 per cent respondents had an<br />
income of above Rs. 150001.<br />
Table 2 Awareness and Source of information about Health<br />
insurance among the Respondents<br />
Awareness of the<br />
total respondents<br />
Number Percentage<br />
Awareness<br />
Yes<br />
No<br />
67<br />
133<br />
33.5<br />
66.5<br />
Total 200 100<br />
Source of<br />
Information<br />
Television 13 6.5<br />
Radio 2 1<br />
Newspaper 26 13<br />
Family/ friends 18 9<br />
Internet 2 1<br />
Insurance agents 6 3<br />
Total 67 33.5<br />
The whole study was based on the awareness of the<br />
respondents. 33.5 per cent of the respondents were aware of<br />
health insurance. Of the total 200 respondents, 33.5 per cent of<br />
the respondents were aware of health insurance whereas 66.5 per<br />
cent of them had no idea about it (Table 2). The present study<br />
found that the respondents have low awareness of the health<br />
insurance.<br />
Table 2 depicts the source of information and awareness of<br />
health insurance. 13 per cent of the respondents said that<br />
newspaper was the source of information followed by from<br />
family/friends (9 %), television (6.5 %), insurance agents (3 %)<br />
radio (1 %) and internet (1 %).<br />
Sl. No<br />
1 Male<br />
Table 3 Gender of the Respondents<br />
Gender of the<br />
Respondents<br />
Awareness on Health<br />
Insurance Scheme Total<br />
Yes No<br />
44 100 144<br />
(22%) (50%) (72%)<br />
23 33 56<br />
2 Female<br />
(11.5%) (16.5%)<br />
Total<br />
67<br />
(33.5%)<br />
133<br />
(66.5%)<br />
Note: Figures in the percentiles are percentage<br />
(28%)<br />
200<br />
(100.0%)<br />
The above table shows that 22 percent of the male respondents<br />
and 11.5 percent of the female respondents were aware of health<br />
insurance. Compare the male respondents, female respondents<br />
had less aware of the health insurance.<br />
Table 4 Religion wise awareness of the respondents<br />
Awareness on Health<br />
Sl. No Religion<br />
Insurance Scheme<br />
Total<br />
Yes No<br />
1 Hindu<br />
40<br />
(20 %)<br />
91<br />
(45.5 %)<br />
131<br />
(65.5 %)<br />
2 Christian<br />
12<br />
(6 %)<br />
13<br />
(6.5 %)<br />
25<br />
(12.5 %)<br />
3 Muslim 15 29 44<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 217<br />
ISSN 2250-3153<br />
(7.5%) (14.5 %) (22 %)<br />
Total<br />
67<br />
(33.5%)<br />
133<br />
(66.5%)<br />
200<br />
(100.0%)<br />
Note: Figures in the percentiles are percentage<br />
The above table shows that religion wise awareness of the<br />
respondents. 20 percent Hindu religion respondents, 6 percent<br />
Christian and 7.5 percent Muslim responds were had aware of<br />
health insurance. Compare to these three groups Hindu religion<br />
respondents had high rate of aware of health insurance.<br />
Table 5 Type of Family of the Respondents<br />
Awareness<br />
Health<br />
on<br />
Sl. No Type of Family Insurance Scheme Total<br />
Yes No<br />
1 Joint<br />
23<br />
(11.5%)<br />
27<br />
(13.5%)<br />
2 Nuclear<br />
44<br />
(22%)<br />
106<br />
(53%)<br />
Total<br />
67<br />
(33.5%)<br />
133<br />
(66.5%)<br />
Note: Figures in the percentiles are percentage<br />
50<br />
(25%)<br />
150<br />
(75%)<br />
200<br />
(100.0%)<br />
The above table 5 represents the type of family. Here joint<br />
family respondents were less aware of health insurance (11.5<br />
percent), 22 percent of the nuclear respondents were aware about<br />
health insurance.<br />
Sl.<br />
No<br />
Table 6 Educational levels of the Respondents<br />
Educational<br />
levels of the<br />
Respondents<br />
1 Illiterate<br />
2 Primary<br />
4 Secondary<br />
5<br />
6<br />
Higher<br />
secondary<br />
Graduate/<br />
Diploma<br />
Awareness on<br />
Health<br />
Insurance Scheme Total<br />
Yes No<br />
2 11 13<br />
(1%) (5.5%) (6.5%)<br />
4 29 33<br />
(2%) (14.5%) (16.5%)<br />
18 52 70<br />
(9%) (26 %) (35 %)<br />
4 19 23<br />
(2%) (9.5%) (11.5%)<br />
32 26 58<br />
(16%) (13%) (29%)<br />
13 3 16<br />
7 Post-Graduate<br />
(6.5%) (1.5%)<br />
Total<br />
67<br />
(33.5%)<br />
133<br />
(66.5%)<br />
Note: Figures in the percentiles are percentage<br />
(8%)<br />
200<br />
(100.0%)<br />
The above table 6 represents the education levels of the<br />
respondents. It is shown that there is less awareness about health<br />
insurance among the respondents who are less educated (primary<br />
2%). As the education qualification increases (graduates 16 %<br />
and post-graduates 6.5 %), it is clearly seen that the awareness<br />
among the respondents is being increased.<br />
Hence we can say from the above analysis that there is<br />
positive relationship between education and awareness of the<br />
health insurance.<br />
Sl.<br />
No<br />
Table 6 Occupations of the Respondents<br />
Occupation<br />
of the<br />
Respondents<br />
Awareness on<br />
Health<br />
Insurance Scheme Total<br />
Yes No<br />
1<br />
Self<br />
employment<br />
9<br />
(4.5%)<br />
60<br />
(30%)<br />
2<br />
Private<br />
employ<br />
31<br />
(15.5%)<br />
38<br />
(19%)<br />
3<br />
Government<br />
employ<br />
13<br />
(6.5%)<br />
0<br />
(.0%)<br />
4 Business<br />
14<br />
(7%)<br />
35<br />
(17.5%)<br />
Total<br />
67<br />
(33.5%)<br />
133<br />
(66.5%)<br />
Note: Figures in the percentiles are percentage<br />
69<br />
(34.5%)<br />
69<br />
(34.5%)<br />
13<br />
(6.5%)<br />
49<br />
(24.5%)<br />
200<br />
(100.0%)<br />
In the following table it was shows that the private employees<br />
(15.5 %) and government employees (6.5 %) were more aware of<br />
the health insurance, when compare to those respondents who are<br />
self employed (9 %) and business (7 %).<br />
Determinants of Awareness of Health insurance<br />
To analyze the determinants of awareness of health insurance,<br />
a logit model will be used in the analysis of individual<br />
household's choice between awareness of health insurance and<br />
un aware of health insurance. The model uses awareness of<br />
health insurance among the households as the dichotomous<br />
dependent variable. The model uses various households as the<br />
factors influencing determinants of awareness of health<br />
insurance.<br />
Pi = E<br />
<br />
<br />
<br />
Y<br />
1<br />
X<br />
i<br />
<br />
<br />
<br />
<br />
<br />
1<br />
b<br />
1 1<br />
<br />
b X<br />
e<br />
k ik<br />
<br />
<br />
<br />
. ( 1)<br />
Pi = Probability that awareness of health insurance<br />
b1 = constant term<br />
bk = coefficients<br />
Xk = for K = 1....5, are the independent variables and subscript i<br />
denotes i th observation.<br />
K1 = Religion<br />
K2 = Type of the Family<br />
K3 = Education<br />
K4 = Occupation<br />
K5 = Income<br />
Let<br />
Zi = b1 + ∑bk Xik ….. (2)<br />
Then<br />
Pi =<br />
e<br />
Z <br />
1<br />
1<br />
…… (3)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 218<br />
ISSN 2250-3153<br />
As Zi ranges from -∞ to + ∞, Pi ranges from 0 to 1 and Pi is nonlinearly<br />
related to Zi.<br />
In estimable form, the model is,<br />
Pi <br />
Z b b<br />
X<br />
Li = Ln 1<br />
Pi i 1 k ik<br />
..(4)<br />
Where L is the logit. It shows how the log odds in favor of<br />
awareness of health insurance change as the respective<br />
independent variable changes.<br />
Table 7<br />
Sl. No. Variables Coefficient P>|z|<br />
1 Religion -0.476 0.28**<br />
2<br />
Type of the<br />
Family<br />
0.203 0.619<br />
3 Education 0.402 0.002*<br />
4 Occupation -0.276 0.80***<br />
5 Income 0.012 0.000*<br />
6 Constant 5.103 0.000*<br />
R 2 0.277<br />
-2 Log likelihood 190.144<br />
Prob > chi 2 = 4.324<br />
* indicates significant at 1 % level, ** significant at 5 % and ***<br />
significant at 10 %.<br />
The above table shows that R Square 0.277, -2 Log likelihood<br />
is -190.144 and chi 2 4.324. The determinants of awareness were<br />
religion, type of the family, education, occupation, annual<br />
income, when considered except type of the family; the other<br />
determinants had a statistically significant association.<br />
Education and annual income had 1 percent level of significant,<br />
religion factor had 5 percent level of significant and occupation<br />
had 10 percent level of significant.<br />
VI. CONCLUSION<br />
From our study we conclude that the determinants of<br />
awareness of health insurance were: religion, type of the family,<br />
education, occupation, annual income. Education, annual<br />
income, occupation of the respondent and religion plays vital role<br />
of the Determinants of awareness of the health insurance. Higher<br />
education and higher annual income increase awareness of health<br />
insurance also will increase. Gumber and Kulkarni in their study<br />
found out that the need for education for rural and urban<br />
population was alike on the concept of health information which<br />
is a crucial aspect on extending awareness about health insurance<br />
on a large-scale. This calls for an effective information,<br />
education and communication activities which will improve the<br />
understanding of the people about insurance. The health<br />
insurance companies should come out with clear cut policy<br />
details, as many of the respondents had vague ideas about the<br />
various benefits and risks involved in a policy. And also health<br />
insurance companies to develop a viable health insurance<br />
scheme, it is important to understand people‘s perceptions and<br />
develop a package that is accessible, available, affordable and<br />
acceptable to all sections of the society.<br />
REFERENCES<br />
[1] Ahuja Rajeev, (2004), ―Health Insurance for the poor‖, Economic and<br />
Political Weekly, july 10, pp.3171-78.<br />
[2] Ahuja, R and A Narang (2005), ―Emerging Trends in Health Insurance for<br />
Low-income Groups‖, Economic and Political Weekly, September 17.<br />
[3] Anil Gumber and Veena Kulkarni, (2000). ―Health Insurance in Informal<br />
Sector: Case Study of Gujarat‖. Economic and Political Weekly, September<br />
30, PP.3607-13.<br />
[4] B. Reshmi et al. (2007), Awareness of health insurance in a south Indian<br />
population – a community-based study, Health and Population-<br />
Perspectives and Issues 30 (3): 177-188.<br />
[5] Berman (1996). Health Care Expenditure in India in Monica Dasgupta et al<br />
(eds), Health, Poverty and Development in India, Oxford University Press,<br />
Delhi, p.331-58.<br />
[6] Devadasan.N, et at (2004a), ―Accord Community Health Insurance<br />
Increasing Access to Hospital Care‖, Economic and Political Weekly, July<br />
10, PP.3189-3193.<br />
[7] Indrani Gupta, (2002) ―private Health Insurance and Health Costs Results<br />
from a Delhi Study‖, Economic and Political Weekly, July 6, PP.2795-2801.<br />
[8] Kirigia, et al. (2005), ―Determinants of health insurance ownership among<br />
South African women‖, BMC Health Services Research 2005,<br />
http://www.biomedcentral.com/1472-6963/5/17.<br />
[9] Mahal Ajay,(2002), ”Assessing private health insurance in India: Potential<br />
impact and regulatory issues‖, Economic and Political Weekly, February 9,<br />
pp. 559-71.<br />
[10] Mudgal Jyothi, Subrata Sarkar, et.al (2005), ―Health insurance in Rural<br />
India‖, Economic and Political Weekly, October 22, pp 460-469.<br />
[11] Reddy et al, 2011, A Critical Assessment of the Existing Health Insurance<br />
Models in India, Report submitted by Public Health Foundation of India.<br />
[12] Rao Sujatha, (2004), ―Health Insurance Concepts, Issues and Challenges‖,<br />
Economic and Political Weekly, August 21, PP.3835-44.<br />
[13] Sethi Jyotsna and Nisswa Bhatia, ―Elements of Banking and Insurance‖ PHI<br />
Publication, Learning Private Limited‖, New Delhi, (2009).<br />
[14] Srinivasan.J. and P.Ponmuthusaravanan, (2009). ―Detrminanats of Health<br />
Insurance In Pondicherry Region: An Econometric Analysis‖, International<br />
Research journal of Social Sciences Puducherry, Vol.2, No.2, PP.215-227.<br />
AUTHORS<br />
J.YELLAIAH, M.A., M.Phil., Ph.D Scholar, Department of<br />
Economics, Osmania University, ICSSR Doctoral Fellow from<br />
Centre for Economic and Social Studies (CESS), Hyderabad,<br />
Andhra Pradesh -500007. Mobile No: +91 9533118847, Email:<br />
yellaiah.ja@gmail.com.<br />
Correspondence Author<br />
J. Yellaiah, Email: yellaiah.ja@gmail.com, Contact Number: +91<br />
9533118847.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 219<br />
ISSN 2250-3153<br />
Comparative Study of Sign Language Recognition<br />
Systems<br />
Abstract- Sign Language (SL) is the communication method<br />
for deaf people. But these sign languages are not standard &<br />
universal. The grammar differs from country to country. As the<br />
sign language is the only method for deaf community to<br />
communicate with normal people, we need Sign Language<br />
Translators (SLT).<br />
The basic automatic SLT uses two approaches. First one is<br />
using the electronic data gloves. These gloves have inbuilt<br />
sensors & it is worn by the signer to detect hand posture. But<br />
these gloves are having high cost. So, visual approach is most<br />
suitable & widely used. Here a camera is used to capture images<br />
of signer & then image processing is carried out to perform<br />
recognition. For the vision based Sign Language Recognition<br />
(SLR), various methods are available. Three such methods are<br />
discussed & compared in this paper.<br />
Index Terms- Sign Language Recognition (SLR)<br />
Ms. Rashmi D. Kyatanavar, Prof. P. R. Futane<br />
Department of Computer Engineering, Sinhgad College of Engineering,<br />
Pune, India<br />
I. INTRODUCTION<br />
Deaf people interfacing is a very challenging issue due to its<br />
cardinal social interest and its inherent complexity like,<br />
(1) Nature of information is multi-channel.<br />
(2) Signing vary from person to person.<br />
(3) Presence of disturbances (surrounding furniture,<br />
cloths)<br />
(4) Sign languages from different region differ<br />
significantly.<br />
There are two main directions in sign language recognition. One<br />
is using data gloves & other is visual approach. Instrumented<br />
glove approach simplifies the recognition but complicates the<br />
hardware. Also it is expensive & less user friendly. On the other<br />
hand, vision-based approach is most suitable, user-friendly &<br />
affordable. So, it is widely used.<br />
II. VISION BASED METHODS FOR SIGN LANGUAGE<br />
RECOGNITION<br />
A. SLR Based on Skin Color [2]<br />
This is an intelligent & simple system for converting sign<br />
language into voice signal by tracking head & hand gestures.<br />
This system proposes a simple gesture extraction algorithm for<br />
extracting features from the images of a video stream.<br />
Figure 1: System block diagram for SLR using skin color [2]<br />
This system is very simple & subject is not required to wear<br />
any glove. But the subject must wear a dark color, long sleeve<br />
shirt. Then the gesture signs are recorded. Each image frame is<br />
segmented into three regions- head, left hand and right hand.<br />
Then these segmented images are converted into binary images.<br />
In feature extraction stage, for each frame the area of objects in<br />
segmented binary image is calculated. So, each frame has 3<br />
segmented areas- head area, left hand area and right hand area.<br />
There is a different segmented area for each gesture type. Each<br />
segmented area is treated as a discrete event & DCT is applied to<br />
it. First 15 DCT coefficients are considered as features. They<br />
correspond to each segmented area. Combination of DCT<br />
coefficients from 3 segmented image areas are used as feature<br />
vector for Neural Network (NN). Here, a simple NN model is<br />
developed for sign recognition. The features computed from<br />
video stream are given as an input to this NN. To classify the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 220<br />
ISSN 2250-3153<br />
gesture, a NN model uses error back propagation. So we get the<br />
classified signs at the end of gesture classification phase. Finally,<br />
an audio system is used to play words corresponding to gesture.<br />
B. SLR Using Custom Made Color Gloves [1]<br />
This is an automatic vision based SLT system. It uses custom<br />
made color gloves. These are ordinary gloves with specific color<br />
on palm & each fingertip. Initially, image acquisition is done<br />
using a camera & custom made color gloves. Then the frames of<br />
images are collected. Then, motion of hand is tracked using color<br />
segmentation & image processing. Finally, Artificial Neural<br />
Network (ANN) is used to classify gestures & to translate them.<br />
Figure 2: Vision-based automatic SLT using custom made color<br />
gloves [1]<br />
In image acquisition stage, camera is used to obtain images &<br />
video of signer. Signer uses color coded gloves. The color helps<br />
in extraction of data from sign images through color<br />
segmentation. In image acquisition, we collect frames of images<br />
at suitable interval so that frames are sufficient to detect the<br />
movement of hand. In motion tracking phase, color segmentation<br />
is performed to remove influence of moving objects in<br />
background. Then, centroid of color segmented region is found.<br />
Motion tracking phase consists of two steps:<br />
A. Hand posture extraction<br />
B. Tracking of hand movement<br />
In Hand Posture Extraction, location of each finger is determined<br />
& finally, NN classifier is used. Here we use two layered feed<br />
forward NN.<br />
C. SLR Using Finger Detection [3]<br />
This method introduces an efficient & fast algorithm for<br />
identifying the number of fingers opened in gesture. Here the<br />
finger detection is performed using the concept of boundary<br />
tracing & finger tip detection. This system does not have<br />
limitations like hand should be perfectly aligned to camera, use<br />
of special markers, use of input gloves on the hand etc.<br />
According to this method, it is possible to identify the gesture of<br />
an alphabet if we know the number of fingers opened. The aim of<br />
this method is to design a system that should automatically<br />
capture, recognize & translate sign language to the speech for<br />
blind people. Also it should analyze & convert the speech to<br />
either sign or textual display on screen for deaf people.<br />
This method has three main steps of processing – edge<br />
detection, clipping and boundary tracing.<br />
Figure 3: SLT using Finger Detection [3]<br />
The first phase of this method is edge detection. It is the process<br />
of identifying points in the digital image at which image<br />
brightness changes sharply or has discontinuities. For this phase<br />
Canny edge operator is used. The output of this step is an edge<br />
detected image. The next phase is clipping. It clips or removes<br />
the undesirable portion of edge detected image for further<br />
processing. The final step is boundary tracing. It is the phase<br />
which actually detects the finger tips n the number of fingers<br />
open.<br />
III. COMPARISON OF RESULTS<br />
A. SLR Based on Skin Color [2]<br />
This gesture recognition method based on skin color is an<br />
intelligent & simple system for converting sign language into<br />
voice signal using head & hand gesture. This system is very<br />
simple & subject is not required to wear any glove. But the<br />
subject must wear a dark color, long sleeve shirt. This system has<br />
minimum and maximum classification rates as 88.47 and 95.69<br />
respectively.<br />
B. SLR Using Custom Made Color Gloves [1]<br />
This method is an automatic visual based sign language<br />
translator system. This automatic visual-based sign language<br />
translator can achieve the recognition rate of over 90%.<br />
C. SLR Using Finger Detection [3]<br />
The finger detection algorithm designed for sign language<br />
recognition is a simple, fast, efficient and robust method to locate<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 221<br />
ISSN 2250-3153<br />
finger tips and enables us to identify a class of hand gestures.<br />
This system does not have limitations like hand should be<br />
perfectly aligned to camera, use of special markers and use of<br />
input gloves on the hand etc. Finger recognition works accurately<br />
for 95% of the cases.<br />
IV. CONCLUSION<br />
There are various methods for sign language recognition.<br />
Some use electronic glove while other use vision based approach.<br />
But, as the electronic glove approach is the costlier one, vision<br />
based approach is widely used. Three such methods are discussed<br />
and compared. The skin color based method is simple & does not<br />
require the signer to wear any glove. The accuracy of this method<br />
is also good. The custom made color glove method requires the<br />
color segmentation to be performed. But the accuracy is less. The<br />
SLR using finger detection is simple, fast and efficient. But it can<br />
detect only those gestures that have fingers open. Also, two<br />
different gestures having same number of fingers open will be<br />
recognized ambiguously. Each of these three methods has its<br />
own pros and cons. So, depending on the type of application,<br />
appropriate method should be chosen.<br />
ACKNOWLEDGMENT<br />
The research in this paper was carried out at Sinhgad College<br />
of Engineering, Pune. So, special thanks to Head of Computer<br />
Department, Principal and Management of Sinhgad College of<br />
Engineering.<br />
REFERENCES<br />
[1] Rini Akmeliawati, Melanie Po-Leen Ooi and Ye Chow Kuang, “Real-Time<br />
Malaysian Sign Language Translation using Colour Segmentation and<br />
Neural Network”, IMTC 2007 - Instrumentation and Measurement<br />
Technology Conference Warsaw, Poland, 1-3, May 2007.<br />
[2] Paulraj M P, Sazali Yaacob, Hazry Desa, Hema C.R., “ Extraction of Head<br />
& Hand Gesture Feature for Recognition of sign language”, International<br />
Conference on Electronic Design, Penang, Malaysia, December 1-3, 2008.<br />
[3] Ravikiran J, Kavi Mahesh, Suhas Mahishi, Dheeraj R, Sudheender S, Nitin<br />
V Pujari, “Finger Detection for Sign Language Recognition” , Proceedings<br />
of the International MultiConference of Engineers and Computer Scientists<br />
2009 Vol I IMECS 2009, Hong Kong, March 18 - 20, 2009.<br />
[4] Wu jiangqin Gao wen Song yibo Liu wei Pang bo, “A Simple Sign<br />
Language Recognition System Based On Data Glove”, firneedings of IiXP ,<br />
1998.<br />
[5] Tan Tian Swee, Sh-Hussain Salleh, A.K. Ariff, Chee-Ming Ting, Siew<br />
Kean Seng and Leong Seng Huat, “Malay Sign Language Gesture<br />
Recognition System”, International Conference on Intelligent and Advanced<br />
Systems, 2007.<br />
[6] Pham The Bao, Nguyen Thanh Binh, Tu Duy Khoa, “A New Approach To<br />
Hand Tracking And Gesture Recognition By A New Feature Type And<br />
Hmm”, Sixth International Conference on Fuzzy Systems and Knowledge<br />
Discovery, 2009.<br />
AUTHORS<br />
First Author – Ms. Rashmi Kyatanavar, ME Computer<br />
Networks, Sinhgad College of Engineering, Pune,<br />
r.d.kyatanavar@gmail.com<br />
Second Author – Prof. P. R. Futane, Head o Computer<br />
Department, Sinhgad College of Engineering, Pune,<br />
prfutane.scoe@sihngad.edu<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 222<br />
ISSN 2250-3153<br />
Age Related Changes in the Parasympathetic Control of<br />
the Heart<br />
Vinutha Shankar MS, Shivakumar Veeraiah<br />
Dept of Physiology, Sri Devaraj Urs Medical College, Sri Devaraj Urs Academy of Higher Education & Research,<br />
Kolar, Karnataka, India.<br />
Abstract- Age related impairment in the parasympathetic<br />
control of the heart is a causal component for increased risk of<br />
cardiovascular diseases like arrhythmia and sudden cardiac death<br />
in the elderly. Abnormal heart rate responses as a result of<br />
parasympathetic dysfunction have demonstrated altered<br />
sympatho vagal modulation of the heart in the elderly. Simple,<br />
bedside, non invasive ECG based tests designed by Ewing &<br />
Clarke assess parasympathetic function. These are heart rate<br />
responses to Deep breathing, Valsalva maneuver and to standing.<br />
Parasympathetic function was assessed by the above mentioned<br />
cardiovascular autonomic function tests in 60 elderly subjects<br />
above 60 years who were further grouped as young old (60-74<br />
yrs) and old old (75-90 yrs). The results thus obtained were<br />
compared with young healthy subjects (18-33 yrs) who served as<br />
controls to study the effect of aging on the parasympathetic<br />
control of heart rate. There was a significant reduction in heat<br />
rate responses to Deep breathing, Valsalva maneuver and to<br />
standing indicating reduction in parasympathetic function in the<br />
elderly above 60 years. There was no significant difference in all<br />
the tests of parasympathetic function between the young old and<br />
the old old suggesting no further decline in parasympathetic<br />
function after 75 years.<br />
Index Terms- parasympathetic, dysfunction, elderly, valsalva,<br />
aging.<br />
M<br />
I. INTRODUCTION<br />
ajority of deaths in the older population stem from<br />
cardiovascular disorders accounting for a third of the<br />
elderly mortality. Approximately 50% of these occur suddenly.<br />
Lethal ventricular arrhythmias are responsible for 80% of sudden<br />
cardiac deaths (1). Age related autonomic dysfunction in the<br />
cardio vascular regulatory control is a contributing factor for the<br />
increased incidence of arrhythmias in the elderly. Autonomic<br />
changes with aging include reduction in parasympathetic<br />
function and these changes are associated with high rates of<br />
cardiovascular disease and mortality (2). Aging is known to alter<br />
the neurohormonal mechanisms that control the cardiovascular<br />
system. Published reports have demonstrated a decline in<br />
sinoatrial node parasympathetic activity(3). Previous studies<br />
have demonstrated that there is parasympathetic decline in<br />
elderly leading to impaired parasympathetic control of heart<br />
rate.(4) Cardio vascular disturbances due to impaired<br />
parasympathetic control are usually subclinical and precede<br />
symptoms. So it goes unnoticed unless carefully scrutinized.<br />
Effects of aging on parasympathetic nervous system have been<br />
much studied. The impetus for continuing interest in this topic<br />
have come in part from the recognition that in a range of<br />
cardiovascular disorders including sudden cardiac death and<br />
ventricular arrhythmia, for all of which incidence rises with age,<br />
parasympathetic nervous system pathophysiology may be an<br />
important causal component. The Autonomic Nervous System<br />
mechanisms involved in the aging process are extremely<br />
complex and many questions concerning the neurologic effects<br />
of aging have yet to be answered. Some of the mechanisms<br />
associated with aging are pathologically induced but the<br />
distinction between these mechanisms and those that are part of<br />
the normal aging process remains somewhat cloudy (5). The<br />
importance to be able to differentiate between autonomic<br />
abnormalities which are associated with systemic diseases and<br />
those which are purely the consequence of the natural processes<br />
of aging is thus obvious.<br />
Cardiac Autonomic Neuropathy is grossly under diagnosed<br />
due in part to its frequently asymptomatic presentation and in<br />
part to the non utilization of tests for its diagnosis. Ewing and<br />
Clark have designed a battery of standardized quantitative<br />
autonomic function tests to test parasympathetic function that<br />
have been widely used to assess parasympathetic control of heart<br />
(6).These tests are performed since the procedures are straight<br />
forward, reproducible, non invasive and performed bedside.<br />
This study was conducted to evaluate the association between<br />
aging and parasympathetic function by assessing the<br />
parasympathetic function in the elderly and comparing it with<br />
young healthy subjects.<br />
II. MATERIALS AND METHODS<br />
Subjects.<br />
The study comprised of 90 subjects. 60 elderly subjects<br />
residing in old age homes / attending medical OPDs/ patients‘<br />
attendants between the age 60-90 yrs with a normal 12 lead ECG<br />
were included in the study. Informed consent was obtained from<br />
each subject. The 60 elderly subjects above 60 yrs were further<br />
grouped as young old aged between 60 – 74 yrs(n=30) and old<br />
old aged between 75 and 90 yrs(n=30). The study was approved<br />
by the Institutional ethical Committee. The control group<br />
consisted of 30 healthy subjects who were between the age 18 –<br />
33 yrs and with a normal 12 lead ECG. Subjects with history of<br />
hypotensive drug intake, heart or lung disease, Diabetes Mellitus,<br />
hypertension, alcohol consumption , smoking and any inter<br />
current illness like pyrexia and diarrhea were excluded from the<br />
study.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 223<br />
ISSN 2250-3153<br />
Methods:<br />
Autonomic function tests that evaluate the parasympathetic<br />
function were conducted on all the subjects. These are ECG<br />
based heart rate response tests to deep breathing, Valsalva<br />
maneuver and to change in posture. All of the tests were<br />
conducted between 11.30 and 13.30 hours. The temperature of<br />
the examination room was typically between 22 - 24°C. The<br />
subjects were also instructed not to have coffee, tea, cola 12<br />
hours before the tests and were asked to have light breakfast two<br />
hours before the tests. The subject was asked to relax in supine<br />
position for 30 minutes in the laboratory prior to conducting the<br />
tests. The resting heart rate was recorded on a standard ECG<br />
from lead II, at a paper speed of 25mm/sec. The cardiovascular<br />
tests that test parasympathetic function were performed after<br />
demonstrating these tests to the subjects.<br />
1. Deep breathing test:<br />
The subject was trained to breathe deeply at a rate of 6<br />
breaths/minute while sitting. The subject was asked to breathe<br />
deeply, steadily and slowly for I mm at the rate of 6 breaths/mm<br />
(5 sec inspiration and 5 sec expiration) while ECG was being<br />
continuously recorded. The heart rate change with deep breathing<br />
(deep breathing difference) was then expressed as the mean of<br />
the differences between the maximal and minimal heart rate in 6<br />
respiratory cycles.<br />
Deep Breathing Difference (DBD) = mean of heart rate<br />
differences in 6 breath cycles.<br />
2. Heart rate response to Valsalva maneuver:<br />
The subject was trained to maintain an expiratory pressure of<br />
40 mm Hg for 10 sec. Valsalva maneuver was performed by<br />
asking the subject to blow through a mouthpiece attached to a<br />
mercury manometer and maintain a pressure of 40 mm Hg up to<br />
15 sec (straining period not less than 7sec). A nose clip was<br />
applied and small air leakage (through a needle) incorporated in<br />
the mouthpiece to ensure that the expiratory pressure comes from<br />
the chest and that the subject does not blow with his cheeks.<br />
Cardiovascular Indices<br />
Heart rate response tests<br />
Table 1: Scoring of Cardiovascular autonomic function tests.<br />
Throughout the Maneuver, ECG was recorded continuously and<br />
for 30 sec after release of pressure. The heart rate changes<br />
induced by the Valsalva maneuver were expressed as the ratio of<br />
the maximal tachycardia during the maneuver to the maximal<br />
bradycardia after the maneuver. This ratio was defined as the<br />
Valsalva ratio and was calculated as the ratio of maximum R-R<br />
interval after the maneuver to minimum R-R interval during the<br />
maneuver.<br />
3. Heart rate response to standing (Postural tachycardia index,<br />
PTI):<br />
The subject was asked to rest in a supine position for at least two<br />
minutes and to stand unaided and remain standing for about a<br />
minute. While ECG was being recorded continuously. The heart<br />
rate response to standing (postural tachycardia index) is defined<br />
as the ratio between the heart rate at beat 15 after rising to the<br />
vertical position and the heart rate at beat 30.<br />
PTI = RR interval at 30 th beat / RR interval at 15 th beat.<br />
Autonomic Score:<br />
Each individual test was given a score of 0, 1, or 2 depending<br />
on whether they were normal, borderline or abnormal<br />
respectively(Table 1). The scores of individual tests are added<br />
and an overall autonomic score of 0-6 can then be obtained. This<br />
scoring by Bellavere et al provides a simple and efficient<br />
―staging‖ of autonomic involvement in subjects with autonomic<br />
neuropathy(7). Autonomic score of 4 – 6 is suggestive of definite<br />
cardiac autonomic neuropathy with involvement parasympathetic<br />
pathways (8).<br />
Normal<br />
(score 0)<br />
Borderline<br />
(score 1)<br />
Abnormal<br />
(score 2)<br />
Heart rate response to Valsalva Maneuver(VR) ≥1.21 1.11 -1.20 ≤1.10<br />
Heart rate response during deep breathing.<br />
(Deep Breathing Difference or DBD in bpm)<br />
≥15<br />
11-14<br />
beats/min<br />
Heart rate response to standing(PTI) ≥1.04 1.01-1.03 ≤1.00<br />
≤10<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 224<br />
ISSN 2250-3153<br />
III. RESULTS AND ANALYSIS<br />
Statistical Treatment of the data:<br />
Chi-square test was carried out to evaluate the significance of sex distribution between the 3 study groups. One way ANOVA was<br />
done to compare the cardiovascular indices and autonomic score between the 3 study groups. When difference was found Bonferroni<br />
test was used. The mean difference was defined as significant at p0.05).<br />
Table 3: DBD, VR, PTI and the total autonomic score in the 3 study groups with ANOVA results.<br />
Controls(18-<br />
33 yrs)<br />
Young old<br />
(60-74 yrs)<br />
Old old(75-<br />
90 yrs)<br />
ANOVA( F<br />
value)<br />
Heart rate<br />
response to<br />
Deep<br />
breathing<br />
DBD<br />
Heart rate<br />
response to<br />
Valsalva<br />
Maneuver<br />
VR<br />
Heart rate<br />
response to<br />
standing PTI<br />
# significant at p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 225<br />
ISSN 2250-3153<br />
Table 4: post hoc (Bonferroni test) to compare means of DBD, VR, PTI and autonomic score between the 3 study groups<br />
Control<br />
vs young<br />
old<br />
Control<br />
vs old old<br />
Young<br />
old vs old<br />
old<br />
IV. DISCUSSION<br />
The mean age in years of the subjects was 24.77 ± 4.38, 67.13<br />
± 4.32 and 81.17 ± 4.06 in the control, young old and old old<br />
groups respectively. Cardiovascular indices (DBD, VR and PTI)<br />
obtained by performing the tests of parasympathetic function and<br />
the autonomic score are expressed as mean ± SD (Table 3)<br />
ANOVA shows significant difference between the 3 study<br />
groups. Results of post hoc test (Bonferroni test) done to<br />
compare DBD, VR, PTI and Autonomic score between the<br />
control, young old and old old is shown in table 4.There was a<br />
significant difference in the young old and old old as compared<br />
to controls in all the tests of parasympathetic function. There was<br />
no significant reduction in the heart rate response to deep<br />
breathing, Valsalva maneuver and to standing in the old old<br />
above 75 yrs as compared to young old between 60 and 75 years.<br />
Heart rate response to Deep breathing:<br />
There was a significant reduction in DBD in both young old<br />
and old old as compared to young subjects who served as<br />
controls .Heart rate response to breathing is a normal<br />
phenomenon and is due primarily due to fluctuations in<br />
parasympathetic output to heart. Cardiac vagal innervation<br />
decreases with age as clearly shown by a reduction in DBD that<br />
reflects respiratory sinus arrhythmia. During inspiration impulses<br />
in vagi from stretch receptors in the lungs inhibit the cardioinhibitory<br />
area in the medulla oblangata. The tonic vagal<br />
discharge that keeps the heart rate slow decreases and heart rate<br />
rises (9). Depression of respiratory sinus arrhythmia with age<br />
also suggests a decrease in parasympathetic influence on sinus<br />
node function (10).<br />
DBD VR PTI Autonomic<br />
score<br />
p=0.000* p=0.000* p=0.000* p= .000*<br />
p=0.000* p=0.000* p=0.000* p=0.000**<br />
p = 0.123 ns<br />
p=0.84 ns<br />
p=0.46 ns<br />
* significant at p75 years(21).<br />
Heart rate response to Valsalva Maneuver:<br />
There was a significant reduction in VR in both young old<br />
and old old as compared to the controls.<br />
It can thus be concluded that there is a decrease in VR in the<br />
healthy elderly above 60 years thus demonstrating involvement<br />
of parasympathetic nervous system. Heart rate response to<br />
Valsalva maneuver relies to some extent on the integrity of<br />
sympathetic as well as parasympathetic pathways. Many factors,<br />
including blood volume, antecedent period of rest, cardiac<br />
sympathetic as well as peripheral sympathetic functions and NE<br />
response affect the Valsalva maneuver. Age may affect different<br />
components of Valsalva maneuver in different directions.<br />
This study is in conformity with the earlier studies done by<br />
Albert.B.Levin (22) & SJ. Piha (23)<br />
The present study is not in agreement with earlier studies<br />
like Ewing et al (15), Braune S et al(19) & C Neumann and<br />
Schnmid(20). It may be due to higher upper limit of age range of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 226<br />
ISSN 2250-3153<br />
subjects (up to 90 years) in our study. The less consistent effect<br />
of age on VR likely relates to the smaller change and greater<br />
complexity of the maneuver. C Neumann (20) was of the opinion<br />
that results of the test proposed by Ewing and Clarke, however<br />
might differ between researchers because of differences in the<br />
maneuvers and equipment (they are not commercially available),<br />
and because some techniques are completely computerized<br />
whereas others are not. Previous studies have demonstrated that<br />
age related reduction in Heart Rate Variability in response to<br />
Valsalva maneuver suggested that aging is associated with<br />
impaired parasympathetic control of heart rate. There was no<br />
significant difference in VR between young old and old old<br />
suggesting that there is no further decline after 75 years. This is<br />
similar to the observation made by Phyllis et al(21) and Islam et<br />
al (24) suggesting that parasympathetic impairment seen after 60<br />
years is not dependent on age with further advancement of age.<br />
Heart response to standing (PTI):<br />
Old group did not differ significantly from young-old with<br />
respect to heart rate response to standing.<br />
It can be concluded that heart rate response to standing, a<br />
measure of cardiac parasympathetic function is significantly<br />
reduced in healthy elderly subjects above 60 years comprising of<br />
both the young old and old-old groups. In elderly the immediate<br />
postural reflexes are controlled neurally by sympathetic and<br />
parasympathetic nerves whereas the later neural regulation of the<br />
postural adaptation is controlled via sympathetic nerves. Since<br />
the parasympathetic nervous system is more prone to the effect<br />
of aging (9) than sympathetic function, it is likely that the<br />
transient dysregulation of postural reflexes in older subjects at<br />
the beginning of standing is due to decrease in parasympathetic<br />
activity (23). This study is in conformity with earlier studies<br />
done by G.Vita (25), J.Gert van Dijk (26), S.J.Piha (14)and C.<br />
Neumann (20). This study differs from the study of Ewing D.J et<br />
al (27) who initially promoted PTI as an age-independent test of<br />
parasympathetic function, may be due to smaller sample size of<br />
older control( 10 subjects) and younger age of the older<br />
group(48-67 years).<br />
As seen with heart rate responses to deep breathing and<br />
valsalva maneuver, heart rate response to standing (PTI) is not<br />
different between the young old and old subjects. This<br />
strengthens the possible explanation that parasympathetic<br />
dysfunction seen after 60 years does not continue to decline with<br />
further advancing age. This observation is similar to that of<br />
Phyllis et al (21) and Islam et al(24).<br />
Autonomic score: Mean and SD of autonomic score are 1.77±<br />
1.30, 4.62± 1.27 and 5.03±1.03 respectively. Autonomic score<br />
differed significantly between the control, young old and old old<br />
groups.<br />
Autonomic score was significantly high in the young-old and<br />
old old (p = 0.000) when compared to controls suggesting the<br />
presence of severe cardiac autonomic neuropathy in the elderly.<br />
There was no difference in autonomic score between young old<br />
and old old (p = 0.17). Our study demonstrates reduction in<br />
parasympathetic function as suggested by significant decline in<br />
autonomic score after 60 with no further decline after 75 years.<br />
Phyllis et al(24) characterized the association between age, aging<br />
and HRV in 585 adults aged above 65 years and showed that<br />
cardiac autonomic function based on parasympathetic nervous<br />
system declines mostly at 60 – 75 years and levels off at age > 75<br />
years.<br />
Heart rate response to deep breathing:<br />
Valsalva maneuver and standing that reflect integrity of<br />
parasympathetic nervous system showed a significant decline in<br />
deep breathing difference, VR and PTI in both the young-old (60<br />
- 74 years) and old-old (75 years – 90 years) when compared to<br />
control (18 - 33) suggesting impairment of parasympathetic<br />
function in the elderly aged > 60 years. The basis for this finding<br />
is multifactorial and may be at multiple levels of neuraxis<br />
including peripheral and central mechanisms. Dysfunction in the<br />
activity of the neural portion (afferent, central or efferent) of the<br />
vagal system and the cardiac muscarinic receptor may be<br />
involved in the parasympathetic changes associated with aging<br />
(2).<br />
The underlying mechanisms of aging are complex and<br />
uncertain. Aging is a, multifactorial process that clearly affects<br />
the Autonomic Nervous System. Its impact on the autonomic<br />
neuraxis is at multiple levels and heterogeneous. The altered<br />
autonomic function at the transition from adulthood to old age is<br />
continuation of process of modulation of autonomic function<br />
from fetal to postnatal and postnatal to adulthood. Age related<br />
changes in cardiovascular Structure and function increase the<br />
probability of disease modify the threshold at which symptoms<br />
and signs arise and affect the clinical course and prognosis.<br />
The altered autonomic function of long term heart rate<br />
behavior with advancing age may arise from age related changes<br />
in various organs and body systems, which may interact with<br />
each other and thereby impair the function of cardiovascular<br />
autonomic regulatory systems. Altered autonomic regulation of<br />
cardiac function may contribute to the onset of cardiovascular<br />
disease and provide a substrate for malignant ventricular<br />
arrhythmia.<br />
Additional changes in the heart with aging are structural<br />
changes in the SA node, with reduction in cell no‘s of such a<br />
degree (28) that the capacity for chronotropic responses might be<br />
impaired. Factors such as these could blunt cardiac<br />
responsiveness in the elderly. Cardiac electrophysiologic studies<br />
have demonstrated a progressive decline in sinoatrial conduction<br />
and sinus node recovery time with age (29).<br />
V. CONCLUSION<br />
According to available literature and the findings of present<br />
study, heart rate response to deep breathing, Valsalva maneuver<br />
and to standing which reflect integrity of parasympathetic<br />
function is reduced after the sixth decade even in normal healthy<br />
subjects. There was no significant difference in all the tests of<br />
parasympathetic function between the young old and old old<br />
indicating no further decline in parasympathetic function after 75<br />
years. Physicians have to bear in mind the age related<br />
impairment of autonomic function while evaluating<br />
cardiovascular diseases in elderly.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 227<br />
ISSN 2250-3153<br />
REFERENCES<br />
[1] Satyendra C. Gupta MD, Cardiovascular problems. In: Geriatric Medicine<br />
for the House Officer edited by Kim Goldenberg, Alice Faryana, Williams<br />
and Wilkins p 150.<br />
[2] Wichi Rogério Brandão, De Angelis Kátia, Jones Lia, Irigoyen Maria<br />
Claudia. A brief review of chronic exercise intervention to prevent<br />
autonomic nervous system changes during the aging process. Clinics [serial<br />
on the Internet]. 2009 Mar ; 64(3): 253-258.<br />
[3] Mark AL. Sympathetic dysregulation in heart failure: mechanisms and<br />
therapy. Clin Cardiol 1995;18:I3-8.<br />
[4] Aging and the Autonomic Nervous system. In;Primer on the Autonomic<br />
Nervous System edited by David Robertson, Italo Biaggioni, Geoffrey<br />
Burnstock, Phillip A. Low, Julian F.R. Paton.p 272<br />
[5] Kathryn L. Mc. cance, Sue.E. Iluel, Pathophysiology, 2nd Edition. 1994 by<br />
Mosby Year Book,Inc.pp-428.<br />
[6] David. J. Ewing ,basil. F.Ciarke, 9 – Autonomic neuropathy: its diagnosis<br />
and prognosis. Clinics in Endocrinology and MetabolismV ol. 15,No.4,Nov.<br />
l986.pp855-885.<br />
[7] Bellavere F, Bosello G, Fedele D, C Cardone, and M Ferri. Diagosis and<br />
management of diabetic autonomic neuropathy [letter]. BMJ 1983;287:61.<br />
[8] Ekta Khandelwal, Ashok Kumar Jaryal and Kishore Kumar Deepak. Pattern<br />
and prevalence of cardiovascular autonomic neuropathy in diabetics visiting<br />
a tertiary care referral center in India. Indian J Physiol Pharmacol 2011; 55<br />
(2) : 119–127<br />
[9] Michael A. Pfeifer M.D. Differential changes of Autonomic Nervous<br />
System..Function with Age in Man., The American journal of Medicine Vol<br />
75 Aug 1983.<br />
P248- 258.<br />
[10] Kuo TB, Lin T, Yang CC, Li CL, Chen CF, Chou P. Effect of aging on<br />
gender differences in neural control of heart rate. Am J Physiol. 1999; 277:<br />
H2233-9.<br />
[11] Shailaja Moodithaya, Sandhya T. Avadhany. Gender Differences in Age-<br />
Related Changes in Cardiac Autonomic Nervous Function Journal of Aging<br />
Research Volume <strong>2012</strong> (<strong>2012</strong>), Article ID 679345, 7<br />
pages.doi:10.1155/<strong>2012</strong>/679345.<br />
[12] Malvin Torsvik , Amanda Häggblom, Geir E Eide, Erich<br />
Schmutzhard, Kaare Vetvik , Andrea S Winkler. Cardiovascular autonomic<br />
function tests in an African population. BMC Endocrine<br />
Disorders 2008, 8:19 doi:10.1186/1472-6823-8-19<br />
[13] Pandian JD, Dalton K, Scott J, Read SJ, Henderson RD. Cardiovascular<br />
autonomic function tests to provide normative data from a healthy older<br />
population. J Clin Neurosci. 2010 Jun;17(6):731-5. Epub 2010 Mar 19.<br />
[14] Piha SJ, Age-related diminution of the cardiovascular autonomic responses:<br />
diagnostic problems in the elderly. Clin Physiol. 1993 Sep;13(5):507-17.<br />
[15] Ewing DJ, Martyn CN, Young RJ, Clarke BF. the value of cardiovascular<br />
function tests: 10 years experience in diabetes. Diabetes care 1985: 8; 491-<br />
498<br />
[16] Bengt. Bergstrom, Autonomic nerve function tests, Reference values in<br />
healthy subjects. Clinical Physiology (1986) 6,523-528.<br />
[17] Kaijser L, Sachs C Autonomic cardiovascular responses in old age. Clin.<br />
Physiol. 1985,Aug; 5(4):347-57.<br />
[18] Phillip A Low The Effect of Aging on Cardiac Autonomic and<br />
Postganglionic sudomotor function. Muscle and Nerve 13: 152-157 1990.<br />
[19] S. Braune, A. Auer, J. Schulte-Mönting, S. Schwerbrock and C. H. Lücking<br />
. Cardiovascular parameters: sensitivity to detect autonomic dysfunction<br />
and influence of age and sex in normal subjects. Clin Auton Res. 1996.<br />
Feb;6(1):3-16.<br />
[20] Neumann.C, Schmid H, Standardization of a computerized method for<br />
calculating autonomic function test responses in healthy subjects and<br />
patients with diabetes mellitus, Braz J Med Biol Res, February 1997,<br />
Volume 30(2)197 - 205.<br />
[21] Phyllis K Stein, Joshua I Barzilay, Paulo H M Chaves, Peter P Domitrovich,<br />
John S Gottdiener Heart rate variability and its changes over 5 years in<br />
older adults. Age and Ageing (2009).Volume: 38, Issue: 2, Publisher:<br />
Oxford University Press, Pages: 212-218<br />
[22] Albert.B Levin, A simple test of cardiac function based upon the heart<br />
changes induced by the Valsalva manouver, The American Journal of<br />
Cardiology,Vol 18, July<br />
1966, pp90-99.<br />
[23] Piha SJ, Cardiovascular autonomic reflex tests: normal responses and agerelated<br />
reference values. Clin Physiol. 1991 May;11(3):277-90.<br />
[24] Islam T, Begum N, Begum S, Ferdousi S, Ali T , Evaluation of<br />
Parasympathetic Nerve Function Status in Healthy Elderly Subjects. J<br />
Bangladesh Soc Physiol.2008 Dec;(3):23-28.<br />
[25] G. Vita, P. Princi, R. Calabro,A. Toscano,L. Manna,C. Messina1 ,<br />
Cardiovascular reflex tests: Assessment of age-adjusted normal range, J<br />
Neurol Sci. 1986 Oct;75(3):263-74.<br />
[26] van Dijk JG, Koenderink M, Zwinderman AH, Haan J, Kramer CG, den<br />
Heijer JC, Autonomic nervous system tests depend on resting heart rate and<br />
blood pressure, Journal of autonomic nervous system, 35 (1991) p15-24.<br />
[27] D. J. Ewing, I. W. Campbell, A. Murray, J. M. M. Neilson and B. F. Clarke<br />
Immediate heart-rate response to standing: simple test for autonomic<br />
neuropathy in diabetes, BMJ, 1978, 1, 145-157.<br />
[28] Davies MJ. Pathology of the conduction system. In: Caird FI, Dall JLC,<br />
Kennedy RD, eds. Cardiology in old age. New York: Plenum Press,<br />
1976:57-9.<br />
[29] M. De Marneffe, P. Jacobs, R. Haardt..M. Englert. Variations of normal<br />
sinus node function in relation to age: role of autonomic influence.<br />
.European Heart Journal.Volume 7, Issue 8<br />
AUTHORS<br />
First Author –Dr Vinutha Shankar MS, Professor, Dept Of<br />
Physiology, Sri Devaraj Urs Medical college, Sri Devaraj Ur<br />
Academy of Higher Education & Research, Kolar, Karnataka,<br />
India, E mail: vinutha.shankar@gmail.com<br />
Second Author –Dr. Shivakumar Veeraiah, Professor & HOD,<br />
Dept of Physiology, Bangalore Medical College & Research<br />
Institute, Bangalore, Karnataka, India.<br />
Correspondence Author – Dr vinutha Shankar MS, Professor,<br />
Dept Of Physiology, Sri Devaraj Urs Medical college, Sri<br />
Devaraj Urs Academy of Higher Education & Research, Kolar,<br />
Karnataka, India, E mail: vinutha.shankar@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 228<br />
ISSN 2250-3153<br />
The Folk Medicinal Plants of the Mao Naga in Manipur,<br />
North East India<br />
Abstract- The present paper exclusively deals with the Mao<br />
Naga Folk medicinal plants which are used for treating various<br />
ailments and diseases in their day today life. They are settled<br />
agriculturist and have a very rich knowledge on plant based<br />
resources utilization for their survival since time immemorial.<br />
They practices folk medicines to take care of their health and<br />
related problems primarily from the plant resources available<br />
within and the vicinity of their environment. During the<br />
investigation it has recorded 61 species belonging to 39 families<br />
and 57 genera which are widely used as medicines by this ethnic<br />
community. The most common part of the plant utilized by the<br />
indigenous people as the source of medicine is the leaves with 32<br />
species. Flower and inflorescence are the least part of the plant<br />
with only two species viz. Crassocephalum crepidiodes and<br />
Hibiscus subdariffa which used for treating cuts, wounds and<br />
appetizer during sickness. The most dominant family is<br />
Asteraceae with 10 species that are used for several diseases.<br />
Index Terms- Mao Naga, Ethno-medicinal plants,<br />
Agriculturalist, Makhel.<br />
T<br />
I. INTRODUCTION<br />
he Northeast India comprises of eight states viz., Assam,<br />
Arunachal Pradesh, Manipur, Meghalaya, Mizoram,<br />
Nagaland, Sikkim and Tripura and they are physiographically<br />
categorized into the Eastern Himalayas, Northeast hills (Patkai-<br />
Naga Hills and Lushai Hills) and Brahmaputra and the plains of<br />
Barak valley. There are approximately 225 tribes hailing from<br />
the Northeast region, out of the total 450 tribes that are found in<br />
the country (Chatterjee et al., 2006). Besides ethnic and cultural<br />
diversity, it is one of the mega biodiversity regions in the world<br />
which falls under the Himalaya and the Indo-Burma biodiversity<br />
hotspots forming a unique biogeographic province harbouring<br />
major biomes recognized in the world. It has the richest reservoir<br />
of plant diversity and supporting about 50% of India‘s<br />
biodiversity (Mao, Hyniewta & Sanjappa, 2009). Majority of the<br />
tribal communities resides in the hills and some parts of the<br />
plains and valleys in different parts of the region. Ethnic-cultural<br />
diversity and rich biodiversity in the region are one of the charms<br />
that attract the attention of the tourists and equally the<br />
academicians or researchers for various reasons. There is a huge<br />
potential to do ethnobotanical research in the region, primarily,<br />
because, half of the total Indian tribal communities lives and<br />
practices their cultures in its own unique way. Several works has<br />
been done on Ethnomedicinal plants used by the different tribal<br />
communities from Northeast India, the north Cachar hills<br />
Adani Lokho<br />
Department of Botany, Siksha Bhavan, Visva Bharati, Santiniketan<br />
West Bengal-731235, India<br />
(Sanjem, Rout and Nath, 2008); Tai-Khamyangs of Assam (<br />
Sonowal and Barua, 2011); Mizoram (Rai & Lalramnhinglova,<br />
2010); Sikkim (Singh, Birkumar and Rai, 2007); Tinsukia,<br />
Assam (Buragoham, 2011); Apatani, Arunachal Pradesh (Kala,<br />
2005); Khasi and Garos, Meghalaya (Neogi, Prasad and Rao,<br />
1989); Reang, Tripura (Sil and Choudhury, 2009); Angami-a,<br />
Nagaland (Megoneitso and Rao, 1983); Lotha, Nagaland (Jamir,<br />
Takatemjen and Limasengla, 2008) etc. However this is the first<br />
report on the Mao Naga Folk medicinal plants.<br />
The Naga tribes belong to the Mongolian stock and speak a<br />
Tibeto-Burmese language, and have socio-cultural affinities with<br />
the Southeast Asia (Ao Alemchiba, 1970). They have a very rich<br />
culture and traditional practices which is unique from one tribe to<br />
the other. The Nagas have a great heritage of oral traditions<br />
which involves beliefs and practices associated with nature,<br />
plants and animals. The diversity of the ethnic tribes among the<br />
Nagas presents a vast scope of ethnobotanical researches. There<br />
are 31 different tribes- Angami, Chakeshang, Ao, Sema,<br />
Rengma, Lotha, Chang, Konyak, Sangtam, Phom, Zeliang, Mao,<br />
Maram, Tangkhul, Maring, Anal, Mayan-Monsang, Lamkang,<br />
Nockte, Haimi, Htangun, Ranpan, Kolyo, Kenyu, Kacha,<br />
Yachimi, Kabui, Uchongpok, Makaoro, Jeru and Somra (Horam,<br />
1975). However, only a few accounts on ethnobotany mainly<br />
emphasized on medicinal and wild edible plants used by the<br />
Angami-a (Megoneitso and Rao, 1983); Ao (Rao and Jamir,<br />
1990); Nagaland (Rao and Jamir, 1982a, 1982b); Zeliang (Jamir<br />
and Rao, 1990); Zeme (Rout et al., 2010); Lotha (Jamir et al.,<br />
2008); Mao (Mao and Hyneiwta, 2009; Mao, 1993, 1998, 1999);<br />
Nagaland (Chankija, 1975), has been reported by few<br />
researchers. The Nagas people live and spread out in the state of<br />
Nagaland, Naga hills in Manipur, North Cachar and Mikir hills,<br />
Lakhimppur, Sibsagar and Nowgong in Assam, north-east of<br />
Arunachal Pradesh, Somrat tract and across the border into<br />
Burma.<br />
The Mao Naga tribe inhabits the northern most part of the<br />
hills of Manipur, under Senapati district in the Northeast region<br />
of India. The termed ‗Mao‘ has two connotations which refer the<br />
name of the place as well as the people living in the area. The<br />
vernacular name for the people is „Ememie‟ and the place is<br />
„Ememiechiijii‟. Historically, ‗Makhel‘ a village from Mao is the<br />
place of origin for settlement for most of the Naga tribes and has<br />
a significant mark in the pages of Naga history and civilization.<br />
A symbolic „wild Pear tree‟ which was protected and guarded<br />
for several hundred years by the Naga ancestors signified as the<br />
evidence and revered by everyone, stands tall in the midst of the<br />
Mao Naga till today. They are settled agriculturalist and practices<br />
both terrace and wet paddy field cultivation. Apart from the two<br />
major forms of cultivation (terrace & wet paddy) kitchen<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 229<br />
ISSN 2250-3153<br />
gardening for vegetables and fruits for the family is a common<br />
practice amongst the tribe. In general the agricultural practices of<br />
the Mao tribe are considered to be the most advance form<br />
amongst the various Naga tribes in North-east India (Mao, 1993).<br />
The most common cash crops are Potato, Maize, Millet, Soya<br />
bean, Cabbage both leafy and ball, Tomato, Chilli, Paddy,<br />
Pumkin, Brinjal, Beans, Peas, Raddish, Leafy mustard, Summer<br />
onion, Tamarillo, Squash, Ginger, Garlic etc. The common fruits<br />
that are grown are Peach, Plums of several varieties, Pears,<br />
Passion fruit, Banana, Lemon, Guava, Mango, Cucumber,<br />
Avocado, Kiwi fruit, Strawberry and Cherry etc. There are<br />
several works done on ethnobotany, medicinal plants and<br />
traditional techniques from the northeast region by various<br />
workers for different ethnic tribal communities. However, very<br />
few works has been done on the ‗Mao‘ and ethnic Naga groups<br />
in general. Thus, the present work is an attempt to assess and<br />
study the folk medicinal plants of the Mao Naga in Manipur,<br />
India<br />
II. METHODOLOGY<br />
The information was gathered during the study period from<br />
2009-2011 through interviewed conducted to the village elders<br />
and practitioners from the Mao area in Manipur, India. The<br />
details were recorded in the information sheets. The field survey<br />
was conducted in the respective localities and the plant materials<br />
are collected by following the standard method (Rao and Jain,<br />
1977). All the informations presented in the paper are the actual<br />
version of the people interviewed during the study period. The<br />
specimens were identified with the help of adjacent floras, the<br />
Flora of Assam (Kanjilal), Forest Flora of Meghalaya<br />
(Haridasan) and consulted the Botanical Survey of India (BSI)<br />
museum, Shillong. The specimens were submitted to the North<br />
Eastern Biodiversity Research Cell (NEBRC), N.E.H.U. Shillong<br />
for future reference.<br />
Ethnomedicinal Plants and Their Uses:<br />
The vernacular name, botanical name, family and the parts used<br />
and its utilization were presented under its plant species.<br />
Polygonum orientale Linn.<br />
Vernacular name: Obuvii<br />
Family: Polygoncaeae<br />
Part used: Leaves<br />
Treatment: Diarrhoea and Dysentry<br />
Mode of Utilization: Fresh leaves are boiled with or without rice<br />
and serve the patient suffering from serious diarrhea and<br />
dysentery for quick relief.<br />
Maesa indica (Roxb) A. DC.<br />
Vernacular name: Kohravii<br />
Family: Myrsinaceae<br />
Parts used: Leaves<br />
Treatment: Throat/Vocal cord<br />
Mode of utilization: Young leaves are boiled with water and<br />
taken for treating hoarse voice.<br />
Paedaria foetida Linn.<br />
Vernacular name: Oboripro<br />
Family: Rubiaceae<br />
Part used: Leaves<br />
Treatment: Gastritis and Fungal/Bacteria infection<br />
Mode of utilization: A bunch of fresh leaves are crush and the<br />
squeeze juice is mixed with water in a cup and drink for<br />
gastritis/acidity. The paste of fresh leaves apply for<br />
fungal/bacterial infections between the toes during rainy seasons.<br />
Melia azaderach Linn.<br />
Vernacular name: Siikhasii<br />
Family: Meliaceae<br />
Part used: Barks<br />
Treatment: Blood pressure, Acidity and Ringworm infection<br />
Mode of utilization: A handful of fresh peelings of the endoderm<br />
of the bark is crush or grounded and boiled with water and the<br />
decoction is taken for treating blood pressure and acidity. The<br />
paste of the bark is applied on the skin for ring worm.<br />
Anthogonium gracile Wall.<br />
Vernacular name: Oke<br />
Family: Orchidaceae<br />
Part used: Tuber/Rhizome<br />
Treatment: Cracking heels<br />
Mode of utilization: The tuber/rhizome is crush/grounded into a<br />
paste and applies on the cracking heels for quick relief from pain.<br />
Chenopodium ambrosoides Linn.<br />
Vernacular name: Nopuepro<br />
Family: Chenopodiaceae<br />
Part used: Leaves<br />
Treatment: Headache, fever and blood pressure<br />
Mode of utilization: One or two handfuls of leaves are boiled in<br />
water and the decoction is taken for treating headache, fever and<br />
blood pressure.<br />
Morus nigra Linn.<br />
Vernacular name: Khelosii<br />
Family: Urticaceae<br />
Part use: Leaves and Roots<br />
Treatment: Jaundice<br />
Mode of utilization: A hand of fresh young leaves or the<br />
covering of the roots are crush along with water and the<br />
decoction is taken for treating jaundice.<br />
Urtica dioca Linn.<br />
Vernacular name: Shiingho<br />
Family: Urticaceae<br />
Part used: Leaves<br />
Treatment: Mumps<br />
Mode of utilization: Five to ten numbers of fresh leaves are crush<br />
or grounded and the paste is apply on the affected part for<br />
treating mumps.<br />
Cannabis sativa Linn.<br />
Vernacular name: Kanjapro<br />
Family: Cannabaceae<br />
Part used: Leaves<br />
Treatment: Bone fracture, Sprain and Muscle pain<br />
Mode of utilization: Five to ten leaves are crush and the paste is<br />
apply on the affected part for cuts and wounds for blood clotting.<br />
Two to three handfuls of leaves are boiled in water and the mixer<br />
is use for treating muscle pain, sprain and fracture of the bones.<br />
Ricinus communis Linn.<br />
Vernacular name: Midziipro<br />
Family: Euphorbiaceae<br />
Part used: Leaves<br />
Treatment: Sprain and Muscle pain<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 230<br />
ISSN 2250-3153<br />
Mode of utilization: Five to ten numbers of leaves are heated or<br />
boiled in water and apply on the affected part of sprain, tearing<br />
of ligaments and muscle pain to reduce swollen and quick relief<br />
from pain.<br />
Dichrocephala integrifolia (Linn.f.) Kuntze<br />
Vernacular name: Orekoropro<br />
Family: Asteraceae<br />
Part used: Leaves<br />
Treatment: Fungal infection<br />
Mode of utilization: Three to five numbers of fresh leaves are<br />
crush and squeeze juice is apply on the affected part on the face<br />
from fungal infection.<br />
Acorus calamus Linn.<br />
Vernaculr name: Donia<br />
Family: Araceae<br />
Part used: Root<br />
Treatment: Stomache<br />
Mode of utilization: Fresh roots extracts are taken for stomache.<br />
Cucurma aromatic Salisb.<br />
Vernaculr name: Kodziipa<br />
Family: Zingiberaceae<br />
Part used: Rhizome<br />
Treatment: Stomache<br />
Mode of utilization: The fresh rhizome/roots extracts is taken for<br />
stomache.<br />
Polytricum juniperinum Hewd.<br />
Vernacular name: Shiipa<br />
Family: Polytricaceae<br />
Part used: Whole plant<br />
Treatment: Cuts and Nose bleeding<br />
Mode of utilization: The whole plant is crush or grounded and<br />
applies on the cuts and wounds for blood clotting and nose<br />
bleeding.<br />
Bidens pilosa Linn.<br />
Vernacular name: Shanghapiti-e<br />
Family: Asteraceae<br />
Part used: Leaves<br />
Treatment: Cold and fever, Headache and Blood presssure<br />
Mode of utilization: One or two handful of fresh leaves is boiled<br />
in water and the mixer is taken orally for cold, flu, fever,<br />
headache and blood pressure.<br />
Centella asiatica Linn.<br />
Vernacular name: Korivii<br />
Family: Umbelliflorae<br />
Part used: Whole plant<br />
Treatment: Gastritis, Ulcer and Blood pressure<br />
Mode of utilization: The whole plant is taken raw or boiled with<br />
water and taken for gastritis/acidity, ulcer pain and blood<br />
pressure.<br />
Erythrina variegate Linn.<br />
Vernacular name: Letosii<br />
Family: Papilionaceae<br />
Part used: Bark<br />
Treatment: Poison<br />
Mode of utilization: A handful of the fresh peelings of the bark,<br />
the endodermis layer is crush with water and the decoction is use<br />
as an antidote.<br />
Acacia pruinescens Kurz.<br />
Vernacular name: Motusii<br />
Family: Mimosaceae<br />
Part used: Bark<br />
Treatment: Fish poisoning<br />
Mode of utilization: The fresh peelings of the bark are grounded<br />
along with water and used for stupefying fish in the streams or<br />
river for fishing.<br />
Elsholtzia ciliate Thunb.<br />
Vernacular name: Shipriikholo<br />
Family: Lamiaceae<br />
Part used: Leaves<br />
Treatment: Gas formation<br />
Mode of utilization: A handful of fresh leaves extract is taken for<br />
stomached due to gas formation and quick relief from stomach<br />
upset.<br />
Rhus semialata Linn.<br />
Vernacular name: Omoshii<br />
Family: Anacardiaceae<br />
Part used: Fruits<br />
Treatment: Dysentry and Diarrhoea<br />
Mode of utilization: One or two handful of fresh or dried ripens<br />
fruits are boiled with water and the decoction is taken for treating<br />
dysentery and diarrhea. The decoction is also good for stomach<br />
upset and gas formation.<br />
Clerodendron colebrookianum Walp.<br />
Vernacular name: Pijiivii<br />
Family: Verbanaceae<br />
Part used: Leaves<br />
Treatment: Blood pressure and Abdominal pain<br />
Mode of utilization: A bundle of leaves consisting of 15 to 20<br />
numbers are boiled with water as vegetables and taken for blood<br />
pressure and abdominal problems.<br />
Gynura bicolor (Roxb. & Willd) DC.<br />
Vernacular name: Tabovii<br />
Family: Asteraceae<br />
Part used: Leaves and young stems<br />
Treatment: Ulcer, Chronic acidity<br />
Mode of utilization: One or two handful of leaves along with the<br />
young stems is boiled with or without rice and is taken for<br />
treating gastritis/chronic acidity and blood pressure. The crush of<br />
the fresh leaves is squeeze and the juice is mixed with water and<br />
taken fresh for ulcer and abdominal cleansing.<br />
Spilanthus paniculata Wall ex DC.<br />
Vernacular name: Cheviivii<br />
Family: Asteraceae<br />
Part used: Whole plant<br />
Treatment: Abdominal pain and Expulsion of worms<br />
Mode of utilization: A handful bundle of whole plant is boiled<br />
with water and taken for treating stomached and abdominal<br />
problem. It is taken for expulsion of worms from the stomach.<br />
Houttuynia cordata Thunb.<br />
Vernacular name: Shakama<br />
Family: Saururaceae<br />
Part used: Whole plant<br />
Treatment: Stomache, Gas formation and Expulsion of worms<br />
Mode of utilization: Fresh whole is either taken raw or boiled<br />
with water or taken for stomached, gas formation and expulsion<br />
of worms from abdomen. The fresh roots are sliced into small<br />
pieces and taken as salad for the same purpose of treatment.<br />
Artemisia vulgaris Buch. Linn.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 231<br />
ISSN 2250-3153<br />
Vernacular name: Shiipriiprini<br />
Family: Asteraceae<br />
Part used: Leaves<br />
Treatment: Dandruff, Cuts and Wounds<br />
Mode of utilization: Depending on the size of the cuts bruised<br />
and wounds few or a handful of fresh leaves are crush with a few<br />
drops of water or saliva and the juices is squeeze and apply on<br />
the affected part. The paste of the leaves is pasted on the wounds<br />
and cuts. The leaves crush is also use as shampoo for dandruff.<br />
Artemisia nilgarica (CL.) Camp.<br />
Vernacular name: Shupriipriso<br />
Family: Asteraceae<br />
Part used: Leaves<br />
Treatment: Dandruff, Cuts and Wounds<br />
Mode of utilization: Depending on the size of the cuts bruised<br />
and wounds few or a handful of fresh leaves are crush with a few<br />
drops of water or saliva and the juice is squeezed and applies on<br />
the affected part. The paste of the leaves is pasted on the wounds<br />
and cuts. The leaves crush is also use as shampoo for dandruff.<br />
Eupatorium adenophorum Spreng<br />
Vernacular name: Japanpro<br />
Family: Asteraceae<br />
Part used: Leaves<br />
Treatment: Acidity, Cuts and Wounds<br />
Mode of utilization: A handful of fresh leaves are crush with a<br />
few drops of water or saliva and the juice is squeezed and applies<br />
on the affected part. The paste of the leaves is pasted on the<br />
wounds and cuts. The young tender shoots are taken raw for<br />
chronic acidity for quick relief.<br />
Eleutherococcus cissifolius Griff. ex C. B. Clarke<br />
Vernacular name: Kosa Motsii<br />
Family: Araliaceae Juss.<br />
Part used: Leaves<br />
Treatment: Stomache upset<br />
Mode of utilization: One or two handful bundles of fresh leaves<br />
are boiled and taken for stomach disorder.<br />
Berchemia floribunda Wall.<br />
Vernacular name: Tovuni Rei<br />
Family: Rhamnaceae<br />
Part used: Whole plant<br />
Treatment: Dandruff<br />
Mode of utilization: The whole is crush with water and the<br />
extract is use as shampoo for washing hairs and dandruff.<br />
Xanthosoma sagittifolium (Linn.) Schott<br />
Vernacular name: Birovii<br />
Family: Araceae<br />
Part used: Stem<br />
Treatment: Bees sting and Insects bites<br />
Mode of utilization: Freshly cut stems juice is rubbed against on<br />
the skin to prevent swollen and suppress the pain from sting of<br />
bee wasps and insects.<br />
Elsholtzia blanda Bentham<br />
Vernacular name: Shiipriikholo<br />
Family Lamiaceae<br />
Part used: Leaves<br />
Treatment: Hypertension, Headache and Blistered lips<br />
Mode of utilization: One or two handful of bundles of fresh<br />
leaves is boiled with water and the decoction is taken for treating<br />
hypertension and headache. Three to five leaves are warm/<br />
heated gently and dabbed against the affected part of the<br />
sore/blistered lips.<br />
Zanthophyllum armatum DC.<br />
Vernacular name: Momo mochu<br />
Family: Rutaceae<br />
Part used: Fruits<br />
Treatment: Gas formation and Stomache<br />
Mode of utilization: The whole fruit is crush and apply on the<br />
abdomen or stomach or three to five seeds fleshy covers are<br />
chewed and taken for stomached, stomach disorder and<br />
expulsion of gas from the stomach.<br />
Butea buteiformis (Voigt) Grierson & D. G. Long<br />
Vernacular name: Chiikhovii<br />
Family: Fabaceae<br />
Part used: Seed<br />
Treatment: Expulsion of worms<br />
Mode of utilization: The seed pop containing a single seed is<br />
roasted and taken for expulsion of tape worms and worm from<br />
the stomach and intestine.<br />
Bombax ceiba Linn.<br />
Vernacular name: Pikriisii<br />
Family: Malvaceae (Bombacaceae)<br />
Part use: Bark<br />
Treatment: Snake bites<br />
Mode of utilization: The fresh peeling of the bark is crush in the<br />
form a paste and stuck on the affected portion of the snake bites<br />
to prevent swellings and quick healing. It is also use on the cattle<br />
for the same purposes.<br />
Viburnum foetidum Wallich.<br />
Vernacular name: Shiikriisii<br />
Family: Adoxaceae<br />
Part used: Leaves<br />
Treatment: Ear pain<br />
Mode of utilization: A handful of fresh leaves are boiled with<br />
little water and the concentrated mixture/ decoction or few fresh<br />
leaves are crush and the squeeze juice is used as an ear drops.<br />
Brugmansia sauveolens (Humb. & Bonpl. ex Willd.) Bercht.<br />
& J. Presl.<br />
Vernacular name: Mikrii Tabopro<br />
Family: Solanaceae<br />
Part used: Leaves and barks<br />
Treatment: Sprain, Muscle pain and Snake bites<br />
Mode of utilization: Several fresh leaves are warm/heat up<br />
gently till the colour changes to dark green and dabbed/ rubbed<br />
on the affected part for reducing the pain and swelling for sprain,<br />
tearing of muscles and ligaments and dislocation of the joints.<br />
Fresh peelings of the bark are crush into a paste and bandage<br />
with a soft cloth on the affected portion for snake bites.<br />
Drymeria cordata (Linn.) Willd. ex Schultes<br />
Vernacular name: Pfiipfiipro<br />
Family: Caryophyllaceae<br />
Part used: Whole plant<br />
Treatment: Sinitis and Sprain of body parts<br />
Mode of utilization: The plant is crush into a paste and stick on<br />
the affected part of the sprain on the body. For sinusitis, a<br />
handful of plant is gently warm or heat up and rolled with a soft<br />
cloth/handkerchief and sniff through the nostril for quick relief.<br />
Thalictrum foliossum D. C.<br />
Vernacular name: Okhruvii<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 232<br />
ISSN 2250-3153<br />
Family: Ranunculaceae<br />
Part used: Whole plant<br />
Treatment: Diarrhoea and Dysentry<br />
Mode of utilization: The whole plant is boiled or taken raw for<br />
chronic acidity, diarrhea and dysentery,<br />
Oroxylon indicum (Linn.) Benth. ex Kurz.<br />
Vernacular name: Kakidziihe<br />
Family: Bignonaceae<br />
Part used: Bark and Root<br />
Treatment: Cancer, Diarrhoea, Diabetes and Hypertension<br />
Mode of utilization: Decoction of the freshly peelings of the bark<br />
and outer covering of the root is taken for treating cancer,<br />
diabetes and hypertension. Dried peels of the bark grounded and<br />
mixed with water and drink for diabetes.<br />
Achyranthes aspera Hook. F. /Justicia adhota Linn.<br />
Vernacular name: Tohuopa<br />
Family: Acanthaceae<br />
Part used: Leaves and Roots<br />
Treatment: Malarial fever, Abdominal pain, Indigestion and<br />
Urine disorder<br />
Mode of utilization: Decoction of fresh leaves, seeds and fruits is<br />
taken for acidity, abdominal pain, indigestion, appetizers and<br />
preventing reoccurring of malarial fever and promote urine flow.<br />
Hibiscus subdariffa Linn.<br />
Vernacular name: Okhrivii<br />
Family: Malvaceae<br />
Part used: Leaves and Calyx<br />
Treatment: Tonic and Skin allergy<br />
Mode of utilization: Fresh as well as dried leaves and sepals is<br />
boiled and taken as a tonic to improve blood count in the body.<br />
Fresh sepals are crush and apply on the skin for allergy.<br />
Crassocephalum crepidiodes Benth.<br />
Vernacular name: Tabo Khephapha Pro<br />
Family: Asteraceae<br />
Part used: Leaves and inflorescence<br />
Treatment: Cuts and Wounds<br />
Mode of utilization: Fresh leaves and inflorescence are crushed<br />
into a paste and apply on the cuts and wounds to stop blood<br />
oozing.<br />
Physalis perviana Linn.<br />
Vernacular name: Tsiibobopro<br />
Family: Solanaceae<br />
Part used: Leaves and Fruit<br />
Treatment: Dysentry, Diarrhoea, Jaundice and Tonic<br />
Mode of utilization: The leaves are taken raw or boiled and the<br />
decoction is taken for diarrhea and dysentery. Leaves are crushed<br />
along with water in proportion with amount of leaves and taken<br />
for jaundice. The fruit is taken as a tonic and purifier of blood.<br />
Solanum torvum Sw.<br />
Vernacular name: Modoro Shiikhokha<br />
Family: Solanaceae<br />
Part used: Fruits<br />
Treatment: Blood pressure, Headache and fever<br />
Mode of utilization: Both fresh and dried ripe and unripe fruits is<br />
crushed and boiled with water and taken for blood pressure,<br />
headache, cold and fever.<br />
Solanum nigrum Linn.<br />
Vernacular name: Ohomira Kosopro<br />
Family: Solanaceae<br />
Part used: Fruits and leaves<br />
Treatment: Malarial fever and Jaundice<br />
Mode of utilization: The decoction of fresh leaves or with fruits<br />
is taken for jaundice and malarial fever.<br />
Solanum khasianum C. B. Clarke<br />
Vernacular name: Sokheriibvii<br />
Family: Solanaceae<br />
Part used: Seedpod<br />
Treatment: Toothache<br />
Mode of utilization: The dried seedpod as well as the placenta of<br />
the seed are rolled up in a paper and fumigate the affected teeth<br />
for toothache.<br />
Viscum articulatum Burm.<br />
Vernacular name: Otsiibu<br />
Family: Viscaceae<br />
Part used: Root<br />
Treatment: Bone fracture and Sprained<br />
Mode of utilization: The peelings of the epidermal layer of the<br />
root are crushed into a paste and apply to the affected part of the<br />
body from sprain and bone fracture.<br />
Zingiber officinale Rosc.<br />
Vernacular name: Ravo<br />
Family: Zingiberaceae<br />
Part use: Rhizome<br />
Treatment: Cough, Cold and fever, Throat and Witch spelled<br />
Mode of utilization: A thumb size of the rhizome is crush and<br />
boils with water and the decoction is drunk for treating cold and<br />
cough. The decoction is used for clearing the throat so as to<br />
produce a clear voice for singing. Also the rhizome is used for<br />
protection against the spell of evils by the witch or from the evil<br />
spirit.<br />
Momordica charantia Linn.<br />
Vernacular name: Khenavii<br />
Family: Cucurbitaceae<br />
Part used: Leaves<br />
Treatment: Fever, Headache, Blood pressure and Cold<br />
Mode of utilization: A bundle of fresh leaves or preferably a<br />
pinch or two of dry leaves is boiled and the whole preparation is<br />
taken to treat any type of fever, headache and cold.<br />
Cucurbita maxima Linn.<br />
Vernacular name: Omo<br />
Family: Cucurbitaceae<br />
Part used: Seed<br />
Treatment: Expulsion of Worms<br />
Mode of utilization: The roasted seeds numbering 10-15 are<br />
taken for the expulsion of worms from the stomach of the young<br />
ones.<br />
Passiflora edulis Lindl.<br />
Vernacular name: Kheboshii<br />
Family: Passifloraceae<br />
Part used: Fruit and leaves<br />
Treatment: Dysentry and Diarrhoea<br />
Mode of utilization: A handful or two bunches of fresh leaves are<br />
boiled with water and the decoction as well as the leaves is taken<br />
for treating dysentery, diarrhea and stomach upset. The fruit is<br />
also taken alone or in the form of chutney for the same treatment.<br />
Colocassia esculenta (Linn.) Schott<br />
Vernacular name: Obi<br />
Family: Araceae<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 233<br />
ISSN 2250-3153<br />
Part used: Rhizome/Tuber<br />
Treatment: Labour pain<br />
Mode of utilization: The rhizome/tubers are cooked in significant<br />
amount and given to the pregnant mother during labour pain for<br />
easy and quick delivery.<br />
Musa paradisica Linn.<br />
Vernacular name: Ovii<br />
Family: Musaceae<br />
Part used: Fruit<br />
Treatment: Diarrhoea<br />
Mode of utilization: One to three ripe bananas is taken at a time<br />
to subdued or stopped loose motion/ diarrhea. Unripe banana is<br />
roasted and taken for serious condition for the same ailment.<br />
Musa velutina Wendl. & Drude<br />
Vernacular name: Ovii Viichu<br />
Family: Musaceae<br />
Part used: Leaves<br />
Treatment: Sore Lips<br />
Mode of utilization: One or two fresh leaves are taken and warm<br />
up gently near the fire and dabbed on the affected part of the sore<br />
lips before going to bed for three to four times daily.<br />
Psidium guajava (Linn.) Kuntze<br />
Vernacular name: Pondal<br />
Family: Myrtaceae<br />
Part used: Fruit and young tender Leaves<br />
Treatment: Dysentry and Diarrhoea<br />
Mode of utilization: One or two handful bunches of young tender<br />
leaves are boiled and the decoction is taken for treating diarrhea<br />
and serious dysentery. Also the young leaves are also taken raw<br />
for the same treatment. The fruit is also taken raw for subduing<br />
the effect of loose motion or diarrhea.<br />
Glochidion oblatum J. D. Hooker<br />
Vernacular name: Lokhro todu<br />
Family: Euphorbiaceae<br />
Part used: Stem and Root<br />
Treatment: Dysentry<br />
Mode of utilization: Fresh stem and roots extracts are taken for<br />
dysentery.<br />
Embilica officinalis Gaertn.<br />
Vernacular name: Shiihoshii<br />
Family: Euphorbiaceae<br />
Part used: Fruit<br />
Treatment: Cold and Cough<br />
Mode of utilization: 3-5 numbers of fruits are eaten after every<br />
meal along with warm water for treating cold and cough.<br />
Mentha arvensis Linn.<br />
Vernacular name: Opfokoso pro<br />
Family: Lamiaceae<br />
Part used: Young shoot and Leaves<br />
Treatment: Stomache, Stomach upset and Constipation<br />
Mode of utilization: A bunch of young shoots and the leaves are<br />
either taken raw or boiled with water and the whole content is<br />
consumed for stomache, stomach upset and constipation.<br />
Chrysanthemum morifolium (L) Desmond<br />
Vernacular name: Shiipriipa<br />
Family: Asteraceae<br />
Part used: Leaves<br />
Treatment: Cough, diarrhea and dysentery<br />
Mode of utilization: Five to ten young leaves are raw chewed and<br />
taken for cough, diarrhea and dysentery.<br />
Juglans regia Linn.<br />
Vernacular name: Okhoshii<br />
Family: Juglandaceae<br />
Part used: Bark<br />
Treatment: Tooth plague and bleeding gums<br />
Mode of utilization: The peelings of the bark especially the inner<br />
layer are used for tooth plague as well as for gum bleeding by<br />
brushing against the teeth gently.<br />
Prunus persica (Linn.) Batsch.<br />
Vernacular name: Mikriihoshii<br />
Family: Rosaceae<br />
Part used: Leaves<br />
Treatment: Ring worm<br />
Mode of utilization: Five to ten fresh leaves are crushed by hands<br />
and the juice is rubbed on the affected portion for treating ring<br />
worm.<br />
III. RESULTS AND DISCUSSION<br />
The present study is the first of its kind with reference to Folk<br />
medicinal plants of the Mao Naga in northeast, India, which has<br />
reveals the use of diverse plants consisting of 39 families, 57<br />
genera and 61 species for treating various ailments and diseases<br />
in a traditional method. It is observed that many of the plant<br />
species that are used by them have a broad spectrum for treating<br />
for various diseases with the same plant. The thirty common<br />
diseases that are prevailing amongst the community are treated<br />
with 61 species which are available in their surroundings. The<br />
most common part of the plant utilized by the indigenous people<br />
is leaves with 32 species recorded for various ailments and<br />
treatments. Flower and inflorescence are the least part of the<br />
plant with only two species viz. Crassocephalum crepidiodes and<br />
Hibiscus subdariffa used for treating cuts and wounds and tonic<br />
as an appetizer in the present study. The whole plant, stem, bark,<br />
seeds and fruits are moderately used by the Mao‘s as medicinal<br />
purposes. The most common plant used for fever and headache is<br />
the leaves of Mormodica charantia. The indigenous people<br />
considered this plant as a panacea and heavily depended on the<br />
plant for all purposes for treating the sick persons. The fruit of<br />
Rhus semialata is considered a potent for treating diarrhoea,<br />
dysentery and stomach related problems and the dry fruit is<br />
preserved and kept throughout the year in every home. The fruit<br />
and the seeds of Solanum torvum are dried and preserved and<br />
kept at home throughout the year for any eventuality among the<br />
family for treating several diseases such as cold, fever, headache,<br />
stomache and blood pressure. These are some of the important<br />
medicinal plants for the indigenous people as a home remedy<br />
since time immemorial. The leaves of Maesa indica used by the<br />
Mao Naga from northeast India, as an agent for clearing the<br />
throat/vocal cord for producing a melodious sound is unique and<br />
interesting. The most dominant family of the present study is<br />
Asteraceae with 10 species which is in conformity with study of<br />
Saklani & Jain (1994) in which they have reported the same<br />
family as the most dominant family of medicinal plants across<br />
the North Eastern States of India. The second most important<br />
family with a record of 5 species as medicinal plants during the<br />
present survey is Solanaceae. Despite of the richness of plant<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 234<br />
ISSN 2250-3153<br />
wealth in the area the numbers are dwindling every passing day<br />
due to deforestation for agricultural practices and various<br />
developmental activities. Therefore there is a dearth need for<br />
conservation of these precious medicinal plants for further<br />
scientific study to harvest its constituents to cater the needs of<br />
vibrant healthcare products in future.<br />
IV. CONCLUSION<br />
The Mao Nagas are settled agriculturalist and heavily<br />
depended upon the cultivated and wild plants for their survival as<br />
they live at the proximity of the hill forest. They practiced<br />
organic farming since time immemorial and consumed the<br />
products which are free from hazardous elements that keep them<br />
healthy. Thorough scientific study is required so as to tap the<br />
plant rich resources with special reference to the Mao folk<br />
medicinal plants, which, there is a probability of discovering new<br />
compounds for developing into a modern medicine. Despite of<br />
the richness of plant wealth in the area the numbers are<br />
dwindling every passing day due to deforestation for agricultural<br />
practices and various developmental activities. Therefore there is<br />
an urgent need for conservation and management of these<br />
precious medicinal plants for sustainable use and scientific study<br />
so as to harvest its constituents to cater the needs of vibrant<br />
healthcare products in future.<br />
ACKNOWLEDGMENT<br />
The author is thankful to all the Folk medicine practitioners,<br />
elders and the people of the Mao Naga tribe for their helped and<br />
sincere co-operation throughout the survey and field trips in their<br />
respective locality. Sincere thanks to BSI, Shillong for<br />
identification and accessed to their herbarium.<br />
REFERENCES<br />
[1] Ao Alemchiba, M.<br />
1970 A brief historical account of Nagaland, Kohima: Naga Institute of<br />
Culture.<br />
[2] Buragohain Jitu.<br />
2011 Ethnomedicinal Plants Used by the ethnic Communities of Tinsukia<br />
District of Assam, India. J. Rec. Res. Sci. and Techno, 3(9): 31-42.<br />
[3] Chankija, S.<br />
1999 Folk medicial Plants of the Nagas in India. Asian Folk Studies, 58:<br />
205-230.<br />
[4] Chatterjee , S., Saikia, A., Dutta, P., Ghosh, D., Pangging, G. and<br />
Goswami, A. K.<br />
2006 Biodiversity Significance of North East India. WWF-India, New<br />
Delhi.<br />
[5] Haridasan, K. and Rao, R. R.<br />
1985-86 Forest flora of Meghalaya, 2 vols. Bishen Singh Mahendra Pal<br />
Singh, Dehradun.<br />
[6] Horam, M.<br />
1975 Naga Polity, B. R. Publ. Corp. Delhi.<br />
[7] Jain, S. K. Rao, R. R.<br />
1977 A handbook of field and herbarium methods. Today and tomorrow‘s<br />
printers and Publishers, New Delhi.<br />
[8] Jamir, N.S. and Rao, R. R.<br />
1990 Fifty new or interesting medicinal plants used by the Zeliang of<br />
Nagaland (India), Ethnobotany 2: 11-18.<br />
[9] Jamir, N. S., Takatemjen and Limasemba.<br />
2008 Traditional knowledge of Lotha-Naga tribes in Wokha district,<br />
Nagaland, Indian J. Tradit. Knowle. 9(1): 45-48.<br />
[10] Kala Chabdra, P.<br />
2005 Ethnomedicinal botany of the Apatani in the Eastern Himalayan<br />
region of India. http://www.ethnobiomed.com/content/1/1/11.<br />
[11] Kanjilal, U. N. Kanjilal, P. C., De, R. N. and Das, A.<br />
1991 Flora of Assam. 1-4 vols. Govt. of Assam. Shillong.<br />
[12] Mao A. A.<br />
1993 A preliminary report on the folklore Botany of Mao Naga of Mnaipur<br />
(India), Ethnobotany 5: 143-147.<br />
[13] Mao A. A.<br />
1998 Ethnobotanical Observation of Rice Beer ‗Zhuchu‘ preparation by the<br />
Mao Naga tribe from Manipur (India), Bull. Bot. Surv. India. 40(1-4): 53-<br />
57.<br />
[14] Mao, A. A, Hyniewta, T. M and Sanjappa, M.<br />
2009 Plant Wealth of Northeast India with reference to ethnobotany, Ind. J.<br />
Tradit. Knowle. 8(1): 96-103.<br />
[15] Mao, A. A, Hynniewta, T. M.<br />
2009 Plants used as Agricultural seasons indicator by Mao Naga tribe,<br />
Manipur, India, Ind. J Tradit Knowle,10(3): 578-580.<br />
[16] Mao, A. A.<br />
1999 Some symbolic and superstitious botanynical, folklore about Mao<br />
Naga tribe of Manipur (India), J. Econ. Taxon. Bot. 23(2): 625-628..<br />
[17] Megoneitso and Rao R. R.<br />
1983 Ethnobotanical studies in Nagaland, sixty two medicinal plants used<br />
by the Angami-a Naga, J. Econ. Taxon. Bot. 4(1): 167-172.<br />
[18] Neogi, B., Prasad M. N. V. and Rao R. R.<br />
1989 Ethnobotany of some weeds of Khasi and Garo Hills, Meghalaya,<br />
Northeastern India, J. Economic Botany. 43(4): 471-479.<br />
[19] Rai, P. K. and Lalramnhinglova, H.<br />
2010 Lesser Known Ethnomedicinal plants of Mizoram, North East India:<br />
An Indo-Burma hotspot region, J. Medicinal Plants Research. 4(13): 1301-<br />
1307.<br />
[20] Rao, R. R. and Jamir, N. S.<br />
1990 Ethnobotanical of the Ao and Angami Nagas of Nagaland. J. Econ.<br />
Bot. 4(3): 593-604.<br />
[21] Rao, R. R. and Jamir, N. S.<br />
1982a. Ethnobotanical studies in Nagaland 1. Medicinal plants, Econ.<br />
Bot.36: 176-181.<br />
[22] Rao, R. R. and Jamir, N. S.<br />
1982b.Ethnobotanical studies in Nagaland 2. Fiftyfour Medicinal plants<br />
used by Nagas, J. Econ. Bot.3 (1): 11-17.<br />
[23] Rout, J., Sanjem, A. L. and Nath, M.<br />
2010 Traditional Medicinal Knowledge of the Zeme (Naga) tribe of North<br />
Cachar Hills District, Assam on the treatment of Diarrhoea, Assm. Univ. J.<br />
Sci. and Tech. Biol. and Environ. Sci. 5(1): 63-69.<br />
[24] Saklani, A and Jain, S. K.<br />
1994 Cross cultural ethnobotany of Northeast India. New Delhi: Deep<br />
Publications.<br />
[25] Sanjem Albert, L., Rout, J. and Nath, Minaram.<br />
2008 Traditional Tribal knowledge and Status of some Rare and Endemic<br />
medicinal Plants of north Cachar Hills District of Assam, Northeast India, J.<br />
Ethnobotanical Leaflets. 12: 261-275.<br />
[26] Shil, S. and Choudhury, M. D.<br />
2009 Ethnomedicinal Importance of Pteridophytes used by Reang tribe of<br />
Tripura, North East India, J. Ethnobotanical Leaflets. 13: 634-43.<br />
[27] Singh, H., Birkumar Prasad, P. and Rai L. K.<br />
2002 Folk Medicinal Plants in the Sikkim Himalayas of India. 61: 295-310.<br />
[28] Sonowal, R. and Barua, I.<br />
2011 Ethnomedical Practices among the Tai-Khamyangs of Asssam, India.<br />
J. Ethno. Med. 5(1): 41-50.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 235<br />
ISSN 2250-3153<br />
AUTHORS<br />
First Author – Adani Lokho, Department of Botany, Siksha<br />
Bhavan, Visva Bharati, Santiniketan West Bengal-731235,<br />
Email:lokhoabba@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 236<br />
ISSN 2250-3153<br />
Women and Soap-Operas: Popularity, Portrayal and<br />
Perception<br />
Abstract- In the multi-media world of today, television has<br />
emerged as an important instrument of transmission of<br />
knowledge and information. Working as a complimentary agent<br />
to other sources, television has enhanced the process of change<br />
by providing timely information about education, hygiene,<br />
health, customs and so on. The purpose of television is to inform,<br />
educate and entertain its viewers. Television, because of its<br />
predominance of visual movement has the capacity of bringing<br />
the world into the living room with great authenticity and<br />
efficacy. As a result of this, television has a more profound and<br />
persuasive impact on its viewers, particularly women. Women<br />
are treated as ―special audience groups‖, so that appropriate<br />
measures can be taken to cater to their propensities and<br />
inclinations. In this context, problems and issues pertaining to<br />
women are shown regularly on television in different<br />
programmes. Soap operas are one of the most popular genres on<br />
television and as a cultural produce, this format is extremely<br />
popular among the masses. Soap-operas, inevitably, have<br />
attracted a large and loyal fan base. Soaps enjoy a momentous<br />
and immense popularity among the contemporary society and<br />
they have found a place for themselves and also allow a<br />
multiplicity of interpretations to suit the diverse tastes of the<br />
dominant Indian middle class.<br />
Index Terms- Television, women, soap-operas, popularity,<br />
audience.<br />
T<br />
I. SOAP OPERAS<br />
he term "soap opera" was coined by the American press in<br />
the 1930s to denote the extraordinarily popular genre of<br />
serialized domestic radio dramas, which, by 1940, represented<br />
some 90% of all commercially-sponsored daytime broadcast<br />
hours. The "soap" in soap opera alluded to their sponsorship by<br />
manufacturers of household cleaning products; while "opera"<br />
suggested an ironic incongruity between the domestic narrative<br />
concerns of the daytime serial and the most elevated of dramatic<br />
forms. The defining quality of the soap opera form is its seriality.<br />
Soap operas are of two basic narrative types: "open" soap operas,<br />
in which there is no end point toward which the action of the<br />
narrative moves; and "closed" soap operas, in which, no matter<br />
how attenuated the process, the narrative does eventually close.<br />
(Pingree and Cantor,1983). Examples of the open soap include<br />
(The Guiding Light, etc.), the wave of primetime U.S. soaps in<br />
the 1980s (Dallas, Dynasty, Falcon Crest), such British serials as<br />
Coronation Street, East Enders, and Brook side), most Australian<br />
serials (Neighbours, Home and Away, A Country Practice), and<br />
Indian soaps as Balika Vadhu, Uttaran Pavitra Rishta enjoy<br />
Dr. Aaliya Ahmed<br />
Media Education Research Centre, Kashmir University, India<br />
immense popularity. The closed soap opera is more common in<br />
Latin America, where it dominates primetime programming from<br />
Mexico to Chile. In India, Geet, Dil Mil Gaye fall in this<br />
category. These ‗telenovelas‘ are broadcast nightly and may<br />
stretch over three or four years and hundreds of episodes. They<br />
are, however, designed eventually to end, and it is the<br />
anticipation of closure in both the design and reception of the<br />
closed soap opera that makes it fundamentally different from the<br />
open form. The term itself signals an aesthetic and cultural<br />
incongruity: the events of everyday life elevated to the subject<br />
matter of an operatic form.<br />
II. AUDIENCE AND SOAP OPERAS<br />
Soaps in general have a predominantly female audience,<br />
although prime-time soaps such as Dallas (U.S), Bade Acche<br />
lagte hain (BALH) are aimed at a wider audience, and in fact at<br />
least 30% of the audiences for this soap are male. According to<br />
Ang, in Dallas the main interest for men was in business<br />
relations and problem and the power and wealth shown, whereas<br />
women were more often interested in the family issues and love<br />
affairs. In the case of BALH, it is clear that the programmes<br />
meant something different for female viewers compared with<br />
male viewers.<br />
The audience for soaps does include men sometimes but<br />
some theorists argue that the gender of the viewer is 'inscribed' in<br />
the programmes so the soaps address women in particular. Soaps<br />
appeal to those who value the personal and domestic world.<br />
Dorothy Hobson argues that women typically use soaps as a way<br />
of talking indirectly about their own attitudes and behavior.<br />
There is no doubt that viewing and talking with family and<br />
friends about soap operas is experienced by many women as a<br />
pleasurable experience, and the dismissal of the worth of the<br />
genre by many commentators, including some feminists critical<br />
of gender stereotyping, is open to the charge of cultural elitism.<br />
Some feminist theorists have argued that soap operas spring from<br />
a feminine aesthetic, in contrast to most prime-time television.<br />
Women are stereotyped in soap operas but the image of the<br />
modern women has changed. From being a meek, docile,<br />
subservient housewife, she has grown and evolved into a strong<br />
individual. She not excels in her profession but is also an able<br />
homemaker. This change is partially if not fully perceptible in<br />
the soap operas shown on Indian television.<br />
Soaps create a world dominated by interpersonal relationship,<br />
where characters discuss marital, romantic and family problems.<br />
There is little physical violence or crime. The soap opera world<br />
seems emotionally hazardous-mainly because of the continual<br />
sorting and re-sorting of relationships.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 237<br />
ISSN 2250-3153<br />
Soaps undoubtedly have immense potential to present positive<br />
images of contemporary women, a potential similar to that of<br />
other forms of media designed for women‘s service-newspapers,<br />
magazines, radio forums and so on. Soaps focusing on<br />
relationships and family life could easily present more story lines<br />
and characters, discussing social issues and problems central to<br />
their changing roles. Soaps opera writers have contended that<br />
part of their mission is to teach the ―lesson of life‖ to their<br />
viewers (Nixon, 1972, LeMay, 1982). Soaps are an example of<br />
women‘s literature that supports the status quo regarding<br />
women‘s place in the social order. Women‘s concern in soaps are<br />
changing somewhat. Many women leave a family – centered<br />
world to become an integral part of the work world.<br />
III. PORTRAYAL IN SOAP OPERAS<br />
Though not as strongly as in earlier years, the portrayal of<br />
both men and women on television is largely traditional and<br />
stereotypical. This serves to promote a polarization of gender<br />
roles. With femininity are associated traits such as emotionality,<br />
prudence, co-operation, a communal sense, and compliance.<br />
Masculinity tends to be associated with such traits as rationality,<br />
efficiency, competition, individualism and ruthlessness. Meehan<br />
has shown how on TV, 'good' women are presented as<br />
submissive, sensitive and domesticated; 'bad' women are<br />
rebellious, independent and selfish. The 'dream-girl' stereotype is<br />
gentle, demure, sensitive, submissive, non-competitive, sweetnatured<br />
and dependent. The male hero tends to be physically<br />
strong, aggressive, and assertive, takes the initiative, is<br />
independent, competitive and ambitious. TV and film heroes<br />
represent goodness, power, control, confidence, competence and<br />
success. They are geared, in other words, to succeed in a<br />
competitive economic system. There is no shortage of aggressive<br />
male role-models in Westerns war films and in contemporary<br />
Indian soap-operas. Soaps have no beginning or end, no<br />
structural closure. (Pingree and Cantor,1983). They do not build<br />
up towards an ending or closure of meaning. Viewers can join a<br />
soap opera at any point. There are built-in devices to recap on<br />
aspects of the plot. There is no single narrative line. In this sense,<br />
the plots of soaps are not linear. Narrative lines are interwoven<br />
over time. The structure of soaps is complex and involves<br />
multiple perspectives and no consensus. Ambivalence and<br />
contradiction is characteristic of the genre. This leaves soaps<br />
particularly open to individual interpretations. .<br />
Television offers a wide range of potential role-models, both<br />
positive and negative. Many people find these models of some<br />
use to them. It is not inevitable that viewers accept television<br />
gender images without question, but many popular commentators<br />
tend to assume that they are more discriminating than ordinary<br />
mortals. Not all women, children - or even men - are passive<br />
victims of patriarchal stereotyping. Though there is little doubt<br />
that television presents largely traditional gender images, there is<br />
mixed evidence about the impact of such images on gender<br />
attitudes and behavior. It is difficult to isolate the role of<br />
television, since people are influenced by their whole<br />
environment, although there is fairly widespread agreement that<br />
over time television seems likely to influence people's ideas<br />
about gender roles.<br />
Most significantly though, soap opera's concern with the<br />
everyday lives of everyday people and their problems, big and<br />
small, appears to be one of the main reasons why this genre is so<br />
popular .’Hum Log’, the first soap on Indian television also<br />
represented the values, thinking and beliefs of the middle-class<br />
Indians and was tremendously popular among all sections of<br />
society.(Singhal and Rogers, 2001). The soaps that followed<br />
dealt with different issues prevalent at that time. Soaps that<br />
gained immense popularity were „Humrahi‟, „Bunyaad‟, „Yeh jo<br />
hai Zindagi‟ „Tamas‟, „Mahabharata‟, „Ramayana‟. Telecast at<br />
the national level, they were watched by a large section of<br />
society across the country. The surveys conducted by various<br />
agencies revealed that the viewers rotated their work and leisure<br />
patterns around the timing of these soaps so as to avoid missing<br />
of any of the episodes. These soaps were telecast from<br />
Doordarshan which is available throughout the country.<br />
However, soaps gained momentum in Indian history of<br />
broadcasting when cable television came to India and soaps<br />
became a regular fare in television programming. They soon<br />
captured the attention of the viewers and these soaps took the top<br />
position in the rating scales. For a majority of viewers, soaps are<br />
a major attraction for them to watch television for 2-3 hours<br />
every day and without any breaks. Each satellite channel<br />
approximately telecasts 10-12 soaps everyday of half hour<br />
duration and run into 100s of episodes for 3-4 years<br />
continuously.<br />
IV. TELEVISION AND SOAP OPERAS IN INDIA<br />
Television, in recent times, has emerged as the most powerful<br />
and all pervading force throughout the world. It can disseminate<br />
information with lightning speed and impact, as well as infuse<br />
viewers with images and values in subtle and imperceptible<br />
manner. Because of its very inherent nature, television not only<br />
reflects the values of our society but also influence them.<br />
Indications from research suggests that TV has had a significant<br />
impact on the personal reality structure of its viewers.(Seiter,<br />
Borchers, Kreutzner and Warth, 1989). Television programmes<br />
lead to awareness, provide information which creates curiosity in<br />
the minds of its viewers. Communication is not only an essential<br />
element to the persistence of social order but to look at it more<br />
positively, communication can be an effective means to<br />
developmental change. There is no denying the fact that<br />
television is a major force to be dealt with in our society.<br />
Television in India today has acquired newer dimensions, greater<br />
popularity and a much wider reach. The satellite invasion of<br />
India in 1993 has contributed the most to the multi-lateral, multilingual,<br />
and multi-channel television system, operating on an<br />
elaborate schedule. The moving images of television demand<br />
attention and eventually influence the thoughts and behavior of<br />
the viewers Television has entered our life and become an<br />
inseparable part of our daily lives<br />
The phenomenal expansion of Indian television in recent<br />
years has influenced people in two ways. First, those living in<br />
remote corners have been pulled and merged into the national<br />
mainstream. Secondly television has contributed to an<br />
unprecedented explosion of information in our times. (Gopal<br />
Saxsena, 1996) An awareness of the socio-economic<br />
developmental plans can be ascribed to the wide-reach of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 238<br />
ISSN 2250-3153<br />
television. The breaking down of social-barriers can reasonably<br />
be attributed to the presence of television in our lives<br />
Waves of dynamic changes have flashed across the canvas of<br />
Indian television during the last decade. Earlier Indian television<br />
was restricted to Government-controlled Doordarshan only. But<br />
currently there are more than 400 channels available on the<br />
Indian television diaspora offering round the clock services and<br />
multifarious programming to a huge, heterogeneous television<br />
audience. STAR TV, ZEE TV, Sony, have been offering<br />
variegated programmes of various dimensions and perspectives.<br />
Invariably, Doordarshan projected some interesting programmes.<br />
They not only included programmes like ―Patrika‖ or<br />
―Spectrum‖ but also number of serials were telecast. These<br />
included well known works of literature like ―Raag<br />
Darbari‖,―Nirmala‖ (Premchand), ―Pratham Pratishruti‖<br />
(Ashapoorna Devi)‖Charitraheen‖ and ―Shrikant‖(Sharat<br />
Chandra). Epics like ―Mahabharata‖ , ‖Ramayana‖ and ―The<br />
Bible‖ have been among the very popular telecasts. Equally<br />
noteworthy has been: Gul Gulshan Gulfam: bearing on the life in<br />
a Shikara in Kashmir and other aspects of its social life. (Gopal<br />
Saxsena,1996).<br />
―Hum Log‖ however, was successful in setting a trail for the<br />
soap-opera to assert itself with an identity in this country. Along<br />
with ―Yeh Jo Hai Zindagi‖ which was packed with fun and<br />
frolic, made a substantial contribution to Doordarshan's software<br />
programming in those years. Both were immensely popular and<br />
became the measuring yardsticks for other serials that followed.<br />
―Khandaan‖ was yet another popular soap-opera which was<br />
telecast in 1985. It portrayed the day-to-day wranglings,<br />
intrigues, conspiracies and rivalries of high-class industrialists.<br />
Those identifying with the various characters found their own<br />
moods and moorings reflected in the soap-opera. ―Nukkad‖ was<br />
another sponsored serial on the soap-operatic style, which made<br />
its presence felt in India. It portrayed common man‘s actions and<br />
reactions, caused by different incidents taking place in the life of<br />
different characters.<br />
However, it was ―Buniyaad‖ which was presented in the true<br />
tradition of a soap-opera. Running into 104 episodes, it was<br />
woven round the life of a family of pre-partition Punjab. The<br />
sufferings and acts of fortitude of those affected were shown in<br />
this soap-opera. This was followed by ‖Humraahi‖ which was<br />
conceived and designed as a purposive serial from Doordarshan.<br />
The important aspect of the serial was the emphasis it laid on the<br />
status of women in India. Their various problems from early<br />
marriage to higher education and other problems were taken up<br />
in different episodes of this serial. Clashes between tradition and<br />
modernity were depicted. It was a success story and even<br />
garnered international acclaim as an effort to motivate people to<br />
reinforce the power of social communication. America‘s ―The<br />
Soap Opera Digest‖ attributed it as ―Soap in the Service of<br />
Society.‖<br />
There are clear indications that soap-operas are a format<br />
which carry great appeal for a large audience. Popularity of soaps<br />
like from ―Parvarish‖(Sony), ‗Kya Hua Tera<br />
Wada‖(Sony),‖Afsar Bitiya,‖ ―Punar Vivaah―(ZeeTV) ―Iss Pyaar<br />
Ko Kya Naam Doon‖ (STAR),‖Kucch To Log Kahenge‖(Sony)<br />
confirm that soaps have come to stay in India.<br />
Watching these soaps has become a way of life. The<br />
engagements, both indoors and outdoors are once again<br />
conditioned by the telecast schedule of these soaps. According to<br />
Anand Mitra:<br />
―Television and all that encompasses it now implicates<br />
popular culture, social, political practices. It is this mature<br />
medium that can now reshape Indian popular Culture.‖(Gopal<br />
Saxsena,1996)<br />
Frank and Gerbner (1980), in their study combined market<br />
segmentation and need and gratification research in their survey.<br />
They present explanation for why people watch that vary from<br />
one audience segment to another. Members of the soap opera<br />
audience are intellectually limited and watch soap because they<br />
are socially isolated, lonely and emotionally deprived. Herta<br />
Herzog (1944) reported three reasons for listening to radio soaps.<br />
a. Emotional release – a chance to know that others<br />
have a problem too.<br />
b. Wishful thinking -they fill in gaps in the listeners<br />
own lives or compensate for families.<br />
c. Advice -practical explanations of appropriate<br />
patterns of behavior, useful when confronted with<br />
various life situations.<br />
One important area of mass media research is the extent to<br />
which television influences viewers concepts of social reality,<br />
Gerbner and Gross (1976) argue that television is the central<br />
cultural arm of American society serving to socialize people into<br />
standardized roles and behaviors. Television accomplishes this<br />
through a presentation of basic assumption about the way life is<br />
and what values are important. They suggest that television<br />
cultivates people‘s beliefs, about how the world works more<br />
through the sum total of interactions, behaviors and values<br />
present in television content. Buerkle-Rothfuss and Maryes<br />
argue.<br />
―There appears to be an important relationship between what<br />
a person watches on soap operas and what he or she believes to<br />
be true about those aspects of the ‗real world‘ which tends to be<br />
portrayed with exaggerated frequency on soap operas‖.<br />
While reviewing soap opera audience, less attention has<br />
been paid to how soap operas affect consciousness, especially<br />
feminist consciousness. Feminist have argued that although soaps<br />
are women‘s fiction, they present a conservative view of the<br />
world. Many of the interactions that occur on soaps are family<br />
centered / spouses, parent, child and so forth. Viewers may tend<br />
to believe that families are centrally important.<br />
Soap operas are a unique form of entertainment, different<br />
from other television drama, although both are broadcast over the<br />
same networks. There are suitable differences among the soaps<br />
themselves-differences in format, content / expressive elements<br />
and audience. As the audiences have changed over the years, so<br />
has the content of soap operas, more so by the production mode,<br />
which has extended glamour and glitz to this T.V. format.<br />
V. SOAP OPERAS AND THEIR POPULARITY<br />
Soap-opera is the most popular form of television<br />
programming in the world. A large proportion of television<br />
viewers watch and enjoy soap-operas. Soap-operas dominate the<br />
national audience ratings over other programmes that are<br />
telecast. The popularity of soap-opera appears to rest on its<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 239<br />
ISSN 2250-3153<br />
undemanding nature and its preoccupation with everyday<br />
concerns. (Pingree and Cantor, 1983) .This undemanding nature<br />
has been seen as one of the contributory factors to the genres<br />
popularity. Most significantly, soap operas concern with the<br />
everyday lives of everyday people and their problems, big and<br />
small, appears to be the other reason for this genre being so<br />
popular. Some soaps, like Balika Vadhu ( Colors) are referred to<br />
as being 'realistic' in that they focus on the domestic and<br />
personal, and on everyday concern and problematic issues such<br />
as death, friendship, marriage, romance and divorce, personal<br />
relationship and the role of the female in the marital home. Soap<br />
operas which contain these 'social realist conventions' attract the<br />
attention of the soap viewer, who enjoys watching the portrayal<br />
of many things that are happening today, including the problems<br />
that we face in day to day lives. It can, however, be argued that<br />
soap opera owes a part of its popularity to the fact that the viewer<br />
even enjoys forming a kind of participatory 'relationship' with the<br />
character, and also like to identify themselves with the plots and<br />
character. At the same time, they experience the gratification of<br />
forming para - social relation with the character. It is due to this<br />
formation of para - social relations that enables the soap- opera<br />
viewers to gain pleasure from being able to understand how a<br />
certain character feels or behaves in particular circumstances,<br />
due to themselves having been in a similar situation. This para<br />
social relationship can be recognized in its extreme form when a<br />
viewer puts himself deeply into a character, so that he can feel<br />
the same emotion and experience, the same events as the<br />
character is supposed to feel. (Pingree and Cantor,1983).<br />
Another point of identification which the viewer enjoys<br />
forming with the characters is that of personal identity. Based on<br />
personal experience, it is evident that viewers often use the<br />
behavior of a character in order to justify their behavior in a<br />
similar situation. In this context, the popularity of soap- opera<br />
stems from the pleasures offered by the points of identification<br />
presented by the characters. Viewers want to watch what happens<br />
to those specific characters locked into specific network of<br />
relationships. (Pingree and Cantor,1983).<br />
Soap-opera is also popular due to its continuity, regularity and<br />
familiarity. It has been labeled as a' ritual pleasure ' which offers<br />
reassurance in its familiarity and longevity, its predictable<br />
familiarity being the main force which pulls us in. (Mary Ellen<br />
Brown,1994) .Also due to the soap being solely based in one<br />
place geographical and portraying the lives of same characters in<br />
each episode, the viewer can be assured of familiarity and<br />
continuity. This familiarity, however does not cause it to become<br />
boring because as Geraghty argues, ―the presence of' well<br />
established characters leads to value familiarity and predictability<br />
in the audience who relish change and disruption (Mary E.<br />
Brown,1994).<br />
The distinct popularity of soap-opera can also be attributed to<br />
its ―openness―in that it is an open text with no start, middle or<br />
end. It is continuous, consistent and open-ended following into<br />
the next episode. ―The viewer is presented with a range of<br />
conflicting viewpoints- interest rests on the juxtaposition of'<br />
them, in that there‘s no single answer, and he has to resolve the<br />
issue himself"' (Mary E. Brown, 1994). The implication is<br />
evident that the viewer is actively involved as he predicts and<br />
speculates the future events. The resolutions are left open to<br />
viewer‘s interpretation (Mary E. Brown,1994) and he enjoys it,<br />
thus adding to the popularity of the genre.<br />
Talking about television program‘s and what has happened in<br />
them is essential to making a program popular (Seiter, Borchers,<br />
Kreutzner and Warth, 1989). It has been argued that discussing<br />
soaps can seem to be very therapeutic, as there is some evidence<br />
to prove that viewers talk about certain issues in the soaps as a<br />
way of discussing their own problems, "with some of the serious<br />
issues we have dealt with, they were carefully researched and<br />
they have had positive results in the community". (Seiters,<br />
Borchers, Kreutzner and Warth, 1989)<br />
We cannot escape from the fact that soap operas are one of<br />
the most popular genres on television. An increasing amount of<br />
research has been carried out as to why this is the case, one<br />
important field of study being associated with the uses and<br />
gratifications of the viewers. The presence of suspense, where<br />
viewers are kept guessing about the characters and their fate also<br />
seems to be a major factor relating to the soaps' popularity. Many<br />
viewers also like to predict future events, and gain pleasure from<br />
doing so.<br />
Remarkably, there are a large number of different characters<br />
who all take an equal role in the soaps, although during one<br />
episode one may find particular focus on one or two specific<br />
characters: it is not usually for too long, before the camera<br />
focuses on another character. In this way, the viewer cannot<br />
become bored with certain characters and their problems.‖ The<br />
popularity of soap opera appears to rest on its undemanding<br />
nature and its preoccupation with everyday concerns"<br />
(Livingstone 1990). Indeed, it has been argued that the<br />
undemanding nature of soap opera can be seen as a contributory<br />
factor to the genre's popularity. For example, a regular viewer of<br />
a particular soap opera may find viewing an undemanding<br />
activity due to his or her familiarity with the plots and characters.<br />
This could, therefore, mean that soaps are easy viewing for their<br />
fans due to the low level of concentration needed in<br />
comprehending each episode, as illustrated here: a person who<br />
has been a fan of a particular show hasn't seen the show for<br />
years, only to catch up for the missed years by watching only one<br />
or two episodes" (Brown 1994).<br />
Soap opera as a genre has been successful in creating a style<br />
that fits well with women‘s discourse and problems. Women in<br />
the relationship established through discussion about the soap<br />
and in the affective pleasure of watching practice can establish<br />
solidarity among themselves that they may operate as a threat to<br />
dominant ideological system.<br />
VI. SOAP OPERAS IN DEVELOPING COUNTRIES<br />
Soap- operas are proving to be especially influential in<br />
developing countries. They can improve marital communication,<br />
advise people on HIV and AIDS prevention, and counsel<br />
children about how to get along with their parents. Researchers<br />
in Ohio University, in their study of a radio soap-opera broadcast<br />
in India suggest the programs can carry effective educational<br />
messages and change mass behavior. According to Arvind<br />
Singhal, ―if the message is appropriate and the problem is<br />
common, you reach a large number of people with this<br />
communication‖. Soaps -operas needn't be perceived as a<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 240<br />
ISSN 2250-3153<br />
mindless genre. Viewers have an ongoing relationship with<br />
characters so they become an important part of their daily life.<br />
His studies have also drawn from the social learning theory,<br />
which suggests that human beings don't always learn directly<br />
from the humans, but learn from observing characters in mass<br />
media .Evidence was seen where a radio soap -opera was used in<br />
Northern India-where .population problems were increasing and<br />
soap operas changed the perspectives of people on a number of<br />
issues. Researchers at University of Mexico and Ohio University<br />
analyzed feedback to the themes in "Tinka Tinka Sukh "<br />
.(Happiness lies in Small Things ).It was a 104 episode program<br />
broadcast in 1996 over 27 radio stations to an estimated tens of<br />
millions of listeners in the Hindi speaking region. Topics<br />
included community pride, equal treatment of boys and girls,<br />
marital issues, empowerment of women, educating women and<br />
many other gender themes. Nearly 150,000 letters were received;<br />
including a letter signed by an entire village that noted the soap-<br />
opera encouraged better treatment of women and increased<br />
school attendance among children in the village.<br />
VII. CONCLUSION<br />
Media are very effective, powerful and influential in<br />
disseminating new knowledge, useful for behavior change among<br />
women, thus influencing women‘s empowerment variables as<br />
well. Hum Log in 1987, which reached an audience of 80 million<br />
promoted smaller families and equal status for women. Humraahi<br />
focused on the rights of women to equal education and<br />
employment, to choose their own marriage partners, and to<br />
determine whether and when to have children. The exposure of<br />
woman to media, media portrayal of women in the media, are<br />
some of the important dimensions to be analyzed to examine the<br />
role of media in women‘s empowerment. Exposure to media,<br />
particularly television because of its visual aspect causes<br />
knowledge accumulation and behavior change among women<br />
reflecting the participation of women in decision – making, inter<br />
family communication and role-negotiation of women at home<br />
which can help in achieving better quality of life. The Beijing<br />
Platform of Action (BPFA) outlines two strategic objectives in<br />
regard to women and media that are aimed at promoting<br />
women‘s empowerment and development-1) increase the<br />
participation and access of women to expression and decision –<br />
making through the media and new – technologies of<br />
communication ; 2) promote a balanced portrayal of women in<br />
the media.<br />
Television is a cultural commodity. At the same time, it is a<br />
two vision mirror-reflecting society and in turn being modified<br />
by society. McLuhans medium is the message holds true even in<br />
the new millennium. Genre of soap –opera has over the years<br />
made rapid development in terms of content, presentation and<br />
production. Issues like rape, extra marital relationship, murder<br />
which were considered taboo even to be talked have earned<br />
acceptance in the social setup of our country. People no-longer<br />
switch off their TV sets when a situation of this type arises. They<br />
are curious to see how the issue is resolved. But soaps portraying<br />
interpersonal problems, crisis in the family, balance between<br />
career and home, modern yet traditional in beliefs and values<br />
have gained immense popularity among the masses.<br />
It can be said that soap operas in some ways have given<br />
women their voice. Discussions about soap-operas provide an<br />
outlet for a kind of discourse in which problems about women<br />
can be heard. Paradoxically, soap operas are still spoken of as<br />
trash. If women‘s lives and women‘s stories are to be taken<br />
seriously, then women genres need a serious look.<br />
Women feel connected to the soap operas since they can<br />
relate their own personal and business life to the show. The<br />
viewers sustain a steady relationship with the characters that<br />
relate to themselves and these characters help the viewers find<br />
their own inner self. Watching soap-operas is more meaningful to<br />
women. They are a reflection of the viewer‘s life. It helps the<br />
viewers deal with their own problems and it motivates them to do<br />
what normally women consider the impossible to achieve and do.<br />
Femininity is also shown by the way ―the viewer is positioned by<br />
the narrative‖, who analyses the character he is watching. This<br />
makes the viewer utilize the skills she is watching being enacted.<br />
Also lot of beauty and glamour is attached to the different roles<br />
of women. This offers another ―textual contribution of possible<br />
modes of femininity on which women can draw when<br />
constructing and reconstructing their feminine identities‖.<br />
Consequently, women can relate their life and themselves to<br />
soap-operas.<br />
Television has transformed our social and cultural<br />
environment. It has transformed the relationships between public<br />
and private spheres and between physical and social spaces. It<br />
has made the world visible and accessible in new ways. What is<br />
it there in television that makes it such a potential object for<br />
ushering in change? It is a reasonable question because television<br />
is neither malleable nor neutral object. Television comes prepacked<br />
– a combination of complex communication of sound and<br />
image with powerful reality and emotional claims. Television is<br />
constantly available in almost all homes. It can and it does<br />
occupy a potential space throughout an individual‘s life, though<br />
with varying degrees of intensity and significance. Television has<br />
become the most persuasive and pervasive means of information<br />
diffusion in society. The medium of television plays a very<br />
significant role in bringing about change among people.<br />
Television has the potential and strength to act as a ‗modern<br />
information multiplier‘ which can help people in smoothening<br />
the process of national development, economic growth and social<br />
development. The part played by television, through its varied<br />
content, as a galvanizer in the spectrum of change cannot be<br />
overlooked or ignored. The need of the hour is to harness its<br />
potential in the right direction or rather than let it be a trite<br />
reflection of society‘s lowest common denominator.<br />
Indian soap opera emphasize the process of decision making<br />
showing the plethora of details and nuances in the articulation of<br />
problems that advance the plot lines. If one is reading from a<br />
dominant perspective, one could say that women are only<br />
interested in the trivial details of everyday life, and soap operas,<br />
therefore, reinforce already problematic aspects of women‘s<br />
lives. Another way of reading is that soaps value the fabric of<br />
women‘s lives. Women in contemporary soap operas are given<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 241<br />
ISSN 2250-3153<br />
powerful positions in different contexts. This genre of television<br />
programming can be an effective tool for creating awareness<br />
about the changing dynamics of society.<br />
REFERENCES<br />
[1] Ang, Ien. ―Dallas‖: Soap Opera and the Melodramatic Imagination.<br />
London.Methuen.1985<br />
[2] Brown, Ellen Mary.(ed). Television and Women‘s Culture: The Politics of<br />
the Popular: London: Sage Publication.1991<br />
[3] Cantor, Muriel G. and Pingree, S. The Soap Opera: California: Sage<br />
Publication.1983<br />
[4] Doordarshan. Doordarshan. New Delhi. Prasar Bharati Corporation of<br />
India. 1998.<br />
[5] Gerbner. G and Gross. Larry. Journal of Communication. 1976<br />
[6] Geraghty. C. Women and Soap Opera. Cambridge. Polity Press. 1991<br />
[7] Livingstone. Sonia M. Making Sense of Television. Oxford. Pergamon<br />
Press.1990<br />
[8] Mitra. Charulata. Women‘s Development Goals: Reshaping Globalization:<br />
Delhi. Authorpress Global Network.2003.<br />
[9] Meehan. D. M. Ladies of the Evening: Women Characters of Prime Time<br />
Television. Metuchen. NJ-Scarecrow. 1983.<br />
[10] Newcomb. Horace. Television: The Critical View. New York. Oxford<br />
University. 1987.<br />
[11] Prasad. Kiran. Women and Media: Challenging Feminist Discourse. Delhi.<br />
The Women Press. 2005.<br />
[12] Saxena. Gopal. . Television in India: Changes and Challenges. New Delhi.<br />
Vikas Publishing House. 1996<br />
[13] Seiter. E. Borchers, H. Kreutzner. G and Warth, Eva-Maria. Remote<br />
Control: Television Audiences and Cultural Power. New York. Routledge.<br />
1989<br />
[14] Singhal, Arvind and Rogers. M. Everett. India‘s Communication<br />
Revolution: From Bullock Carts to Cyber Marts. New Delhi. Sage<br />
Publication. 2001<br />
[15] United Nations. Report of the Fourth World Conference on Women.<br />
Beijing. China.<br />
Zoonen. Van.E. Feminist Media Theory. London. Sage Publications. 1994.<br />
AUTHORS<br />
First Author – Dr. Aaliya Ahmed Ph.D. Sr. Asst. Professor,<br />
Media Education Research Centre, University of Kashmir,<br />
Email:aaliyahmed@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 242<br />
ISSN 2250-3153<br />
Global and Factor Domination in Fuzzy Graph<br />
G.Nirmala 1 , M.Sheela 2<br />
1<br />
Associate Prof. PG and Research Department of Mathematics, K.N.G.A.College (Women), Autonomous, Thanjavur, Tamilnadu, India<br />
2<br />
Research Scholar, Manonmaniyam Sundharanar University, Thirunelveli, Tamilnadu, India<br />
Abstract- The purpose of this paper is to introduce the concept<br />
of Global Domination number in fuzzy graph .Then we introduce<br />
the concept of Factor Domination number in fuzzy graph and<br />
theorems based on Global and Factor domination in fuzzy graphs<br />
are proved.<br />
Index Terms- Fuzzy Global Domination Number, Fuzzy<br />
Factor Domination Number<br />
T<br />
I. INTRODUCTION<br />
he study of dominating sets in graphs was begun by ore and<br />
berge, the domination number is introduced by cockayne and<br />
Hedetniemi. Rosenfeld introduced the notion of fuzzy graph and<br />
several fuzzy analogs of graph theoretic concepts such as paths,<br />
cycles and connectedness. A Somasundram and S. Somasundram<br />
discussed domination in fuzzy graph. They defined domination<br />
using effective edges in fuzzy graph. Nagoor Gani and<br />
Chandrasekaran discussed domination in fuzzy graph using<br />
strong arc. We also discuss the domination number γ (G) of the<br />
fuzzy graph G, the fuzzy factor domination number of the fuzzy<br />
graph G and the fuzzy global domination number of the fuzzy<br />
graph are discussed in this paper.<br />
Preliminaries1.1<br />
A fuzzy subset of a nonempty set V is a mapping σ: V<br />
→ [0,1]<br />
A fuzzy relation on V is a fuzzy subset of V × V.<br />
A fuzzy graph G = (σ , μ) is a pair of function σ:<br />
V→[0,1] and μ :V×V→[0,1] where μ(u, v )≤σ(u)Λ σ(v)<br />
for u ,v є V.<br />
The underlying crisp graph of G= (σ , μ) is denoted by<br />
G*=(V,E) where V={u є V :σ(u)>0}and E={(u , v) є V<br />
× V : (u ,v )>0}.<br />
The order p and size q of the fuzzy graph G = (σ , μ )<br />
are defined by<br />
p= ∑σ(v) and q= ∑μ ( u ,v ) .<br />
v є V (u, v)є E<br />
Let G be a fuzzy graph on V and S⊆V, then the fuzzy<br />
cardinality of S is defined to be ∑σ(v).<br />
v є S<br />
The strength of the connectedness between two nodes<br />
u , v in a fuzzy graph G is μ ∞ (u , v)=sup{μ k (u<br />
,v):k=1,2,3…..},where μ k (u ,v)=sup{μ(u,u1)Λ<br />
μ(u1,u2)………Λ μ(uk-1,v)}.<br />
An arc (u, v) is said to be a strong arc or strong edge, if<br />
μ (u, v) ≥ μ ∞ ( u ,v) and the node v is said to be a<br />
strong neighbor of u.<br />
A node u is said to be isolated if μ (u , v)=0 for all u ≠ v.<br />
In a fuzzy graph, every arc is a strong arc then the graph<br />
is called strong arc fuzzy graph.<br />
A path in which every arc is a strong arc then the path is<br />
called strong path and the path contains n strong arcs is<br />
denoted by pn<br />
Let u be a node in a fuzzy graph G then N(u)={v: (u ,<br />
v) is a strong arc} is called neighborhood of u and<br />
N[u]=N(u)U{u} is called closed neighborhood of u.<br />
Let G be a fuzzy graph and S be a subset of V.A node v<br />
is said to be fuzzy private neighbor of uє S with respect<br />
to S or S- private neighbor of u, if N[v]∩ S= {u}.<br />
Define a fuzzy private neighborhood of u є S with<br />
respect to S to be P N [u , S] = {v: N[v]∩S={u}} In<br />
other words P N[u,S]=N[u]-N[S-{u}].<br />
If u є P N [u , S], then u is an isolated node in G[S]. It<br />
is also stated that u is its own private neighbor.<br />
II. FUZZY GLOBAL AND FACTOR DOMINATION NUMBER<br />
Definition 2.1:<br />
The complement of a fuzzy graph G=(σ , μ) is a fuzzy<br />
graph G=(σ , μ) where σ=σ and μ(u ,v )=σ(u) Λ σ(v)-μ(u ,v ) for<br />
all u , v in V.<br />
Example2.2<br />
www.ijsrp.org
V 6(0.2)<br />
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 243<br />
ISSN 2250-3153<br />
Figures 2.1, 2.2 be a fuzzy graph and its complement<br />
Definiton2.3<br />
A Fuzzy graph is self complementray if G =G<br />
Definition2.4<br />
Let G=(σ , μ) be a fuzzy graph. A subset D of V is said to be<br />
fuzzy dominating set of G if for every v є V-D there exists u єD<br />
such that (u,v) is a strong arc.<br />
Definition 2.5<br />
A fuzzy graph H=(σ,μ) is said to have a fuzzy t-factoring into<br />
factors F(H)= {G1 G2,G3,......Gt} if each fuzzy graph<br />
Gi=(σi,μi)such that σi=σ and the set{μ1,μ2,μ3……..μt}form a fuzzy<br />
partition of μ.<br />
Definition 2.6<br />
Given A t-factoring F of H, a subset Df⊆V is a fuzzy factor<br />
dominating set if Df is a fuzzy dominating set of Gi, for1≤i≤t.<br />
Example2.7<br />
0.15<br />
V6(0.2)<br />
0.15<br />
0.15<br />
0.15<br />
V1(0.25) 0.2 V2(0.5)<br />
V3(0.3) 0.3<br />
V1(0.25)<br />
Figure2.3: H<br />
0.2<br />
0.2<br />
V3(0.3)<br />
0.15<br />
V5(0.2)<br />
Figure 2.4: G1<br />
V5(0.2)<br />
0.15<br />
0.15<br />
0.15<br />
0.3 0.30.3<br />
V2(0.5)<br />
0.3<br />
V4(1.0)<br />
0.3<br />
V4(1.0)<br />
V1(0.25) 0.2 V2(0.5)<br />
V6(0.2) 0.2 V5(0.2) 0.3<br />
0.15<br />
V3(0.3)<br />
Figure 2.5 G2<br />
V4(1.0)<br />
The fuzzy t-factoring and a fuzzy factor dominating set in<br />
given in figures 2.3,2.4 and 2.5 the set of vertices<br />
{v2(0.5),v6(0.2)} in H dominate each of the fuzzy factor G1 and<br />
G2, while no smaller fuzzy factor dominating set exists, since G1<br />
and G2has two fuzzy components that is at least two vertices are<br />
required to dominate G1 and G2<br />
Definition2.8<br />
The fuzzy factor domination number γft(F(H)) is the<br />
minimum cardinality of a fuzzy factor dominating set of F(H).<br />
The fuzzy factor domination number is that max{γi}≤γft≤Σγi<br />
1≤i≤t i=1 to t<br />
Definition2.9<br />
In a fuzzy graph G=(σ, μ) the minimum cardinality set D of<br />
G which is the fuzzy dominating set of both G and G . is called<br />
a fuzzy global dominating set.<br />
Definiton2.10<br />
The minimum cardinality of a fuzzy global dominating set is<br />
denoted by γg(G) is called the fuzzy global domination number.<br />
Definition2.11<br />
A vertex cover of a fuzzy graph G is a set of vertices that<br />
covers all the edges and an edge cover of a fuzzy graph is a set<br />
of edges that covers all the vertices. The minimum cardinality of<br />
vertex cover is α0(G) and the minimum cardinality of edge<br />
cover isα1(G).<br />
Theorem2.1<br />
If I is the set of vertices in V(H) which are isolated in atleast<br />
one fuzzy graph Gi, then γft≤α0(H)+│I│<br />
Proof.<br />
Let S be a minimum vertex cover for a fuzzy graph H and let<br />
v be a non isolated vertex of Gi with an incident edge μ. since μ<br />
is an edge in H, at least one vertex, say u, covers μ in H, and<br />
therefore this vertex u dominates v in Gi . It follows that the set<br />
SUIis a fuzzy factor dominating set F(H)<br />
Theorem2.2<br />
For any fuzzy graph H, γft≥t if t≤∆(H). γft=n otherwise<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 244<br />
ISSN 2250-3153<br />
Proof.<br />
Let Df be a minimum fuzzy factor dominating set for F(H).<br />
If t≤∆(H), then any vertex v in V(H)-Df must have in H at least<br />
μt edges to Df so it can be dominated in each Gi. Hence<br />
│Df│≥t.If t>∆(H), no such vertex v can exist and H-Df must be<br />
empty, that is γft=n<br />
Theorem2.3<br />
For any fuzzy graph H,γft≤γ+t-2 if t≤∆(H): γft=n otherwise<br />
Proof.<br />
The proof of theorem 2.2 shows that for t>∆(H),γft=n.<br />
Therefore, assume that t≤∆(H) and let Df be a minimum fuzzy<br />
factor dominating set. If Df=V(H) then γft=n≥γ+∆(H)≥γ+t>γ+t-<br />
2.If Df≠V(H),let vєV(H)-Df. since v must be adjacent to at least t<br />
vertices of Df. let X⊆Df be a set of t-1 vertices contained in<br />
N(v)in H. In H every vertex of V(H)-(DfU{v })is adjacent to at<br />
least one vertex of Df-X. Thus(Df-X)U{v} dominates H.so<br />
γ≤│Df-X│+1=γft-(t-1)+1, or γft≤γ+t-2<br />
Theorem2.4<br />
For any fuzzy graph H and any fuzzy t-factoring<br />
F(H)={G1,G2,G3,….Gt}of H,γft+єft=n<br />
Proof.<br />
If t>∆(H), then γft=n and єft=0 and the equality holds .Assume<br />
therefore, that t≤∆ and γft3, then diam(G)
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 245<br />
ISSN 2250-3153<br />
[8] B.Bollabas, E.J.Cockayne, Graph Theoretic Parameters Concerning<br />
Domination, Independence, and Irredundance, Journal of Graph Theory,<br />
Vol-3 (1979) 241-249.<br />
[9] B.R.Allan and R.Laskar on domination and Independent domination<br />
numbers of a graph, Discrete Mathematics, 23, (1978) 73-76.<br />
[10] E.J.Cockayne, O.Favaron, C.Payan, and Thomason, A.G. Contribution to<br />
The Theory of Domination Independence and Irredundance in Graph,<br />
Discrete Mathematics 33 (1981) 249-258.<br />
[11] J.N.Mordeson, and P.S.Nair, Fuzzy Graphs and Fuzzy Hyper Graphs,<br />
Physica-Verlag, Heidelberg, 1998; Second Edition, 2001.<br />
[12] K.R.Bhutani, and A.Rosenfeld, Strong arcs in fuzzy graphs, Information<br />
Sciences, 152 (2003), 319-322.<br />
[13] O.Faravan, Stablity, Domination and Irredundance in Graph, Journal of<br />
Graph Theory, Vol-10 (1986) 429-438.<br />
[14] T.Haynes, S.T.Hedetniemi., P.J.Slater, Fundamentals of Domination in<br />
Graph, Marcel Deckker, New York, 1998.<br />
AUTHORS<br />
First Author –G. Nirmala, Associate Prof. PG and Research<br />
Department of Mathematics, K.N.G.A.College (Women),<br />
Autonomous, Thanjavur, Thanjavur District. Tamilnadu, India.<br />
Second Author – M. Sheela, Research Scholar, Manonmaniyam<br />
Sundharanar University, Thirunelveli, Tamilnadu, India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 246<br />
ISSN 2250-3153<br />
Active Device Usage in Filter Design – An Overview<br />
SHEIKH AJAZ BASHIR *<br />
Department of Electronics& Instrumentation Technology,<br />
University of Kashmir, Srinagar-190006<br />
Kashmir, India<br />
Email: iamsheikhajaz@gmail.com<br />
*corresponding author<br />
N.A.SHAH<br />
Department of Electronics& Instrumentation Technology,<br />
University of Kashmir, Srinagar-190006<br />
Kashmir, India<br />
Email: nassgr@hotmail.com<br />
ABSTRACT<br />
Usage of Inductors as passive components in filter design poses a number of problems in terms of non-linearity, losses,<br />
large physical size , weight and possibility of their integration at very high frequencies only.<br />
Bulky nature of Inductors put a question mark on the foot print of filters designed using them. Microminiaturization of<br />
circuits resulted in desire for replacement of Inductors by active elements like Operational Amplifiers which led to the<br />
introduction of new class of filters called as active filters. Active filter design has evolved over a period of time. Starting<br />
with OP AMPs , we have witnessed phenomenal growth of active component usage in filter design and development<br />
catering to varying requirements. This has contributed greatly in emergence of circuits with minimal limitations and<br />
advantages in terms of wide Bandwidth and High slew rates.<br />
The aim of this paper is to review and compare the functionality of certain novel active blocks .<br />
While doing so it will be amply clear that the development of newer active blocks follows a pattern and one<br />
combination of blocks leads to a new active element design and the process goes on.<br />
KEYWORDS<br />
OA; CDBA ; OTA;CFA ; CC-II ; FTFN ; CDTA; Trade Off : Signal Linearity ; Bandwidth ;<br />
INTRODUCTION<br />
In the development of microelectronic technologies the demand for electronic circuits with extremely low supply voltages and low<br />
power consumption constitute long-term trends [1]. The speed or the accuracy of signal processing are the other requirements<br />
which are needed in case of certain specific applications. While fulfilling one requirement another may have to be<br />
compromised which leads to non fulfillment of all parameters simultaneously. To overcome this impediment a trade-off<br />
solution is used in practice.<br />
Over a period of time , the evolution of modern applications of analog signal processing has followed the trends of so-called<br />
current mode [2], when signals, representing the information being processed, are in the form of electric currents. In contrast to the<br />
conventional voltage mode, which utilizes electric voltages, the current mode circuits can exhibit under certain conditions – among<br />
other things – higher bandwidth and better signal linearity. Since they are designed for lower voltage swings, smaller supply voltages<br />
can be used. Simultaneously with the development of current-mode applications, the mixed-mode circuits are also analyzed because of<br />
the necessity of optimizing the interface between the sub-blocks, which are working in different modes.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 247<br />
ISSN 2250-3153<br />
The mixed-mode operation and even the comeback to the conventional voltage mode alsohave another justification: it appears that<br />
some generally accepted statements about the advantages of the current mode probably have no real basis [3]. However, the criticism<br />
of [3] not with standing, the current-mode techniques have given way to a number of important analog signal processing - signal<br />
generating circuits as is evident from a vast amount of literature on current-mode circuits and techniques published in the recent past .<br />
Advancements in integrated circuit (IC) technology during the last two decades, have led circuit designers to exploit the potential of<br />
current-mode analog techniques for evolving elegant and efficient solutions to several circuit design problems. As a consequence, the<br />
current-mode approach to signal processing has often been claimed to provide one or more of the following advantages: higher<br />
frequency range of operation, lower power consumption, higher slew rates, improved linearity, and better accuracy.<br />
Besides classical active filters, the target applications of the blocks include advanced fully-integrated input blocks of modern<br />
communication circuits. With the exception of DC-precise low-pass filters, the requirements on DC precision of the new blocks are<br />
not so relevant in comparison with the requirements on their speed.<br />
In the case of oscillators and other generators, some additional requirements regarding their precision (linearity, offset, etc.) have<br />
appeared. For non-linear circuits such as rectifiers of weak signals, precise comparators and Schmitt triggers, shaping networks, etc.,<br />
the demands for accuracy can be considerable.<br />
The initial set of active elements for analog signal processing is currently proceeding and evolving in following pattern.<br />
The evolution of active blocks is happening by modification of the basic elements such as VFA (Voltage Feedback Amplifier),<br />
CFA (Current Feedback Amplifier), OTA (OperationalTrans conductance Amplifier), and particularly current conveyors (CC). The<br />
important motivations for such modifications consist in the effort to increase the application potential of the element. Simultaneously,<br />
this element should have a simple internal structure in order to retain low power consumption and high-speed operation.<br />
An important urge for new elements is due to electronic control requirements . Evolution of active elements , besides the<br />
modification of current ones , is happening by way of emergence of new elements which extend the original VFA-CFA-OTA-CC<br />
active set.<br />
Now we will evaluate a few active blocks in brief to drive home the point that the process of evolution has been<br />
going on and follows a particular pattern.<br />
Evolution of Current Feedback Amplifier (CFA) from Current Conveyor CC<br />
II<br />
Current Feedback Amplifier (CFA) was developed to improve the finite gain-bandwidth product of the conventional<br />
voltage - feedback operational amplifier[07]. It can provide not only a constant bandwidth independent of closed loop gain but<br />
also a high slew – rate capability[08]. Usage of CFA as a basic building block in active filter design is highly beneficial on<br />
account of these factors.The applications and advantages in realizing active filter transfer functions using current feedback<br />
amplifiers have received great attention because the amplifier enjoys the features of constant bandwidth independent of closed-loop<br />
gain and high slew rate, besides having low output impedance. Thus, it is advantageous to use CFA as a basic building block in the<br />
accomplishment of various analog signal processing tasks.<br />
CFA is an operational transimpedance amplifier and is internally a CCII+ followed by a voltage follower [10].<br />
CFA can be represented symbolically as shown in Fig-1<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 248<br />
ISSN 2250-3153<br />
FIG-1 Symbolic Representation of CFA<br />
Evolution of Four Terminal Floating Nullor (FTFN) bycascading CFAs<br />
Four Terminal Floating Nullor (FTFN) was introduced after the advent of Current Feedback amplifier .As part of the<br />
process of development of continuous-time circuits FTFN [09] was introduced as more flexible and versatile building block than<br />
an operational amplifier (OP-AMP) or a second-generation current conveyor (CCII) .The circuit symbol of the FTFN is shown in<br />
Figure-2 . The positive FTFN can be implemented by cascading two Current feedback amplifiers (AD844s from analog devices)<br />
as shown in Fig-2(b)<br />
Fig-2 (a) Symbolic representation of FTFN (b) Realization of FTFN using two CFAs<br />
Further the FTFN functionality is subservient to following port relations;<br />
Vx=Vy ; Ix=Iy=0 ; Iw=Iz<br />
Evolution of Current Differencing Buffered Amplifier(CDBA) fromCFACascading.<br />
Current Differencing Buffered Amplifier (CDBA), a current-mode component, has beenintroduced by C. Acar and S. Ozoguz<br />
in 1999 [6]. It offers advantageous features such as high slew rate, absence of parasitic capacitance, wide bandwidth, and simple<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 249<br />
ISSN 2250-3153<br />
implementation .Since the CDBA consists of a unity-gain current differential amplifier and a unity-gain voltage amplifier, this element<br />
would be suitable for the implementation of voltage and current-mode signal processing applications. As far as the applications of the<br />
CDBA are concerned, various voltage-mode and current-mode filters and oscillators have been reported in literature.<br />
CDBA can be represented symbolically as shown in Fig-3<br />
Fig-3 (a) Symbolic representation of CDBA (b) Cascading of CFAs to build CDBA<br />
Evolution of Current Difference Transconductance Amplifier (CDTA) by adding two Current Conveyors CC II & OTA<br />
Current Difference Transconductance Amplifier being analogous to the CDBA, has difference currentinputs p and n. The<br />
difference of these currents flows from terminal z into an outside load. The voltageacross the z terminal is transferred by a<br />
transconductanceg to a current that is taken out as a current pair to the x terminals. This last element part is the familiar<br />
transconductance operational amplifier (OTA). In general, the transconductance is controllable electronically through an auxiliary port<br />
.The pair of output currents from the x terminals, shown in Fig. 4, may have three combinations of directions:<br />
1. Both currents can flow out.<br />
2. The currents have different directions.<br />
3. Both currents flow inside the CDTA element.<br />
This leads us tothe CDTA configurations of CDTA++, CDTA+-, and CDTA-- elements. It is suitable to mark the current<br />
directions in the circuit symbol by the signs + (outside) and – (inside) as shown in Fig. 4.<br />
Fig- 4 Symbolic representation of CDTA<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 250<br />
ISSN 2250-3153<br />
Fig-5 Realization of CDTA with CC II & OTA.<br />
The effort is going on to evolve new buiding blocks to address the problem of higher acceptability of a circuit<br />
element. Universality of a circuit element without making it complex is a big challenge for circuit developers. Removal of<br />
parasitic effects , better analog or digital control of parameters and decreasing the footprint by way of usage of lesser<br />
number of components are some of the new challenges that designers will face in future.<br />
OA<br />
CC-II<br />
Four Terminal<br />
Floating Nullor<br />
Voltage<br />
Follower<br />
OTA<br />
CC-II CFA FTFN CDBA CDTA<br />
Current<br />
Feedback<br />
Amplifier<br />
Current<br />
Feedback<br />
Amplifier<br />
Current<br />
Conveyor-II<br />
Current<br />
Differencing<br />
Buffered<br />
Amplifier<br />
Current<br />
Conveyor-II<br />
Current<br />
Differencing<br />
Transconductance<br />
Amplifier<br />
Fig-6 :Evolution of active devices by suitable modifications of basic active blocks.<br />
Operational<br />
Transconductance<br />
Amplifier<br />
Operational<br />
Transconductance<br />
Amplifier<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 251<br />
ISSN 2250-3153<br />
CCCDT<br />
A<br />
CDTA<br />
MO-<br />
FTFN<br />
OFA<br />
DDOF<br />
A<br />
DC-<br />
CDTA<br />
GCMI<br />
Fig-7 Active Element Tree.<br />
( Not in an order)<br />
DC-<br />
CDBA<br />
TCOA<br />
DDC-<br />
CFA<br />
VFA<br />
OTRA<br />
OC<br />
CCCDB<br />
A<br />
CDBA<br />
DDA<br />
DCCF+<br />
CC-<br />
CFA<br />
BOTA<br />
DV-<br />
CFA<br />
DC-<br />
CCTA<br />
CTTA<br />
OTA<br />
TOA /<br />
CFA<br />
DC-<br />
CCII<br />
+1<br />
FBFTF<br />
N<br />
TFTFN<br />
CCTA<br />
CCCCT<br />
A<br />
OMA<br />
CD-<br />
CTTA<br />
FTFN<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 252<br />
ISSN 2250-3153<br />
CONCLUSION<br />
The tree of active building blocks is growing and the present family of active blocks as shown by Fig-7 will<br />
have additions as we address the issues of Universality , Smaller Footprint , Digital Control and decreased component<br />
density .<br />
The development of new circuit elements over the last ten years, Viz; CDBA, CDTA, ICCII, FDCCII, MCCIII, CCOA, DDOFA,<br />
FBFTFN, CFA-OTA, CC-CFA, CCTA, CCCDTA,CCCCTA, CTTA, CCCDBA, DC-CDBA, CMI, DCCF, etc. shows that the<br />
procedure of finding new circuit elements is going at a very good pace and we will continue to evolve in right direction<br />
with respect to design of better active elements.<br />
Further as is depicted in Fig-6 , the development and evolution of Active elements used as gain devices in Filter design<br />
is following a pattern and the combination of building blocks gives birth to new elements with better acceptability ,<br />
smaller size with less component usage and better control.<br />
REFERENCES<br />
[1] FERRI, G., GUERRINI, N.C. Low-Voltage Low-Power CMOS Current Conveyors. Cluwer Academic Publishers, 2003.<br />
[2] TOUMAZOU, C., LIDGEY, F.J., HAIGH, D.G. Analogue IC Design: The current mode approach. IEEE Circuits and<br />
SystemsSeries 2. Peter Peregrinus Ltd., 1990.<br />
[3] SCHMID, H. Why ‖Current Mode‖ does not guarantee goodperformance. Analog Integrated Circuits and Signal<br />
Processing,2003, vol. 35, p. 79-90.<br />
[4] SMITH, K.C., SEDRA, A. The current conveyor: a new circuit building block. IEEE Proc. CAS, 1968, vol. 56, no. 3, p.<br />
1368-1369.<br />
[5] SEDRA, A.S., SMITH, K.C. A second generation current conveyor and its application.IEEE Trans., 1970, CT-17, p. 132-<br />
134.<br />
[6] C. Acar and S. O¨ zogˇuz, “A new versatile building block: current differencing buffered amplifier suitable for analog signal<br />
processing filters,”Microelectronics Journal, vol. 30, no. 2, pp. 157–160, 1999.<br />
[07] Comlinear Corp., “Designer‘s guide for 200 series Op amp”,Application note 200-1, 4800, wheaton Drive, Ft.collins, CO<br />
80525, Nov.1984.<br />
[08] Analog Devices: “Linear Products Data Book ”Norwood MA, 1990.<br />
[09] ABUELMA‘ATI, M.T., Al-ZAHER, H. A. Universal two-input current-mode active biquad using FTFNs. Int. Journal<br />
ofElectronics, 1999, vol. 86, p. 181-188.<br />
[10] SVOBODA, J.A, Mc GORY, L., WEBB, S. Application of commerciallyavailable current conveyors. International Journal<br />
ofElectronics, 1991, p. 159-164.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 253<br />
ISSN 2250-3153<br />
Tracking of Reference Signals by Advanced Unified<br />
Power Flow Controller<br />
K. Manoz Kumar Reddy<br />
Associate professor, Electrical and Electronics Department, Sri Aditya Engineering College, A.P, India<br />
Abstract- Unified Power Flow Controller (UPFC) is the most<br />
real time multivariable device among the different FACTS<br />
controllers. Control of power flow in the transmission line is the<br />
most important property of UPFC. Due to importance of power<br />
flow control in transmission lines, the proper controller should be<br />
reliable against uncertainty and faults . For this purpose, an<br />
advanced controller is designed based on the Lyapunov theory .<br />
The main objective of this paper is to design an advanced<br />
controller which enables a power system to reach reference<br />
signals accurately and to be reliable in the presence of<br />
uncertainty of system parameters and faults. The performance of<br />
the proposed controller is simulated on a two bus test system and<br />
compared with a conventional PI controller. Simulations were<br />
carried out using MATLAB software to check the performance<br />
of UPFC.<br />
Index Terms- Multivariable device, Power flow control, Two<br />
bus system, UPFC<br />
G<br />
I. INTRODUCTION<br />
enerally the growth of power systems will rely more on<br />
increasing capability of existing transmission systems,<br />
rather than on building new transmission lines and power<br />
stations, for economical and environmental reasons. Due to<br />
deregulation of electricity markets, the existence for new<br />
controllers capable of increasing transmission capability,<br />
controlling power flows through predefined corridors and<br />
ensuring the security of energy transactions will certainly<br />
increase.<br />
In order to expand or enhance the power transfer capability of<br />
existing transmission network the concepts of FACTS (Flexible<br />
AC transmission system) is developed by the Electric Power<br />
Research Institute (EPRI) in the late 1980s. The main objective<br />
of facts devices is to replace the existing slow acting mechanical<br />
controls required to react to the changing system conditions by<br />
rather fast acting electronic controls. FACTs means alternating<br />
current transmissions systems incorporating power electronic<br />
based and other static controllers to enhance controllability and<br />
increase power transfer capability [1].<br />
The potential benefits with the utilization of flexible ac<br />
transmission system (FACTS) devices include reduction of<br />
operation and transmission investment costs, increasing system<br />
security and reliability, and increasing transfer capabilities in a<br />
deregulated environment. FACTS devices are able to change, in<br />
a fast and effective way, the network parameters to achieve a<br />
better system performance [2].<br />
UPFC is a power electronic based device which can provide a<br />
proper control for impedance, phase angle and reactive power of<br />
a transmission line. Each converter of a UPFC can independently<br />
generate or absorb reactive power. This arrangement enables free<br />
flow of active power in either direction between the ac terminals<br />
of the two converters. In the case of the parallel branch of<br />
UPFC, the active power exchanged with the system, primarily<br />
depends on the phase shift of the converter output voltage with<br />
respect to the system voltage, and the reactive power is<br />
controlled by varying the amplitude of the converter output<br />
voltage. However series branch of UPFC controls active and<br />
reactive power flows in the transmission line by amplitude and<br />
phase angle of series injected voltage. Therefore active power<br />
controller can significantly affect the level of reactive power<br />
flow and vice versa.<br />
In recent years a number of investigations have been carried<br />
out on various capabilities of UPFC such as power flow control,<br />
voltage control, transient stability enhancement, oscillation<br />
damping and control of active and reactive power flows in<br />
transmission lines [3].<br />
The performance of the control scheme deteriorates in the<br />
presence of uncertainties in system parameters. In this paper, a<br />
new controller of UPFC based on Lyapunov theory for power<br />
flow control is designed which is able to reach reference signals<br />
accurately and is reliable in the presence of uncertainty of system<br />
parameters and faults [8]. The proposed controller is considered<br />
as effective controller which always consists of a set of error<br />
terms to provide stability condition in the presence of uncertainty<br />
and faults.<br />
II. UPFC MODEL<br />
The schematic diagram of a UPFC is shown in Figure 1. It<br />
consists of two back-to-back, self-commutated, voltage source<br />
converters connected through a common dc link.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 254<br />
ISSN 2250-3153<br />
Figure 1: Schematic diagram of the UPFC system.<br />
As it can be seen Figure 1 converter1 is coupled to the AC<br />
system through a shunt transformer (excitation transformer) and<br />
the converter 2 is coupled through a series transformer (boosting<br />
transformer). Note that, subscripts‗s‘ and ‗r‘ are used to represent<br />
sending and receiving end buses respectively. By regulating the<br />
series injected voltage vse, the complex power flow (Pr + jQr)<br />
through the transmission line can be controlled. The complex<br />
power injected by the converter 2, (Pse + jQse) depends on its<br />
output voltage and transmission line current. The injected active<br />
power Pse of the series converter is taken from the dc link, which<br />
is in turn drawn from the AC system through the converter 1. On<br />
the other hand, both converters are capable of absorbing or<br />
supplying reactive power independently. The reactive power of<br />
the converter 1 can be used to regulate the voltage magnitude of<br />
the bus at which the shunt transformer is connected [4-7].<br />
The single-phase representation of a three-phase UPFC<br />
system is shown in Figure 2. In this figure both converters are<br />
represented by voltage sources vse and vsh, respectively. Also<br />
(R = Rse + RL) and (L = Lse + LL) represent the resistance and<br />
leakage inductance of series transformer and transmission line<br />
respectively, similarly Rsh and Lsh represent the resistance and<br />
leakage inductance of the shunt transformer respectively.<br />
Figure 2: Single phase representation of the UPFC system.<br />
The current through the series and shunt branches of the circuit<br />
of Figure 2 can be expressed by the following differential<br />
equations for one phase of the system. These equations can be<br />
written for other phases similarly.<br />
The three-phase system differential equations can be transformed<br />
into a ―d, q” reference frame using Park‘s transformation as<br />
follows:<br />
where ωb = 2πfb, and fb is the fundamental frequency of the<br />
supply voltage. Since the Park‘s transformation used in finding<br />
(3) and (4) keeps the instantaneous power invariant and the daxis<br />
lies on the space vector of the sending end voltage vs, thus<br />
vs = (vsd + jvsq) = (vsd + j0).<br />
Note that in the above equations, subscripts ‗d‘ and ‗q‘ are<br />
used to represent the direct and quadrature axes components,<br />
respectively (x = xd + jxq).<br />
Since the dynamic equations of converter 1 are identical to<br />
that of converter 2 as described before, both converters should<br />
have identical control strategy. Therefore for the sake of brevity<br />
in this paper only the technique of designing the controller of<br />
converter 2 is described in detail in the form of state space.<br />
where d is the uncertainty vector and x, u and y are respectively<br />
state, control and output variables vector of converter 2 which<br />
are defined as ,X=[ised iseq] T , u =[ vsed vseq] T and<br />
y = [ised iseq] T .Comparing Eqs (3 )and (5), when vs and vr are<br />
kept constant, the system matrices A, B, and C can be written as:<br />
As mentioned previously, the common connection between the<br />
two converters is formed by a dc-voltage bus. When the losses in<br />
the converters are neglected, the active power balance equation at<br />
the dc link can be written as Eq. (8)<br />
(1)<br />
(2)<br />
(3)<br />
(4)<br />
(5)<br />
(6)<br />
Pdc=Pse+Psh (7)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 255<br />
ISSN 2250-3153<br />
where Psh and Pse are active power supplied by the converters 1<br />
and 2, respectively which can be obtained as follows:<br />
(9)<br />
Note that, since the power loss of the shunt transformer can be<br />
ignored, active power of converter 1 Eq.(9) can be written<br />
approximately as:<br />
(10)<br />
Also the active power of the dc link is represented as<br />
equation(11)<br />
Substituting Eq.(11) in (7) , Eq.(12) will be obtained.<br />
(8)<br />
(11)<br />
(12)<br />
It is clear that the above equation is non linear, therefore for<br />
linearizing and simplifying, Eq.(14) is defined by substituting<br />
Eq.(13) into (12).<br />
(13)<br />
(14)<br />
The following section is assigned to introduce the design of a<br />
controller based on the Lyapunovtheory. This analysis is based<br />
on a simplified mathematical model of the converter connected<br />
to a two bus system as shown in Figure 1.<br />
III. CONTROLLER DESIGN BASED ON LYAPUNOV THEORY<br />
Figure 3 shows the schematic of a system state space. As it<br />
was mentioned, the main objective of this paper is to design an<br />
advanced controller which enables the power system to track<br />
reference signals accurately and to be reliable in the presence of<br />
uncertainty of system parameters and faults [8]. To reach this<br />
purpose a new controller is designed based on the Lyapunov<br />
theory in this paper. The controller based on the Lyapunov<br />
method is designed as slope changes of energy function which<br />
always remains negative ( ). This energy function consists<br />
of a set of error terms which provides stability condition of error<br />
terms in the presence of uncertainty and disturbance. Therefore<br />
the tracking error and its derivative are defined as below:<br />
e=Xd - X (15)<br />
where x is the vector of state variables and<br />
is the vector of reference signals. In xd<br />
(16)<br />
equation, and can be obtained similarly by Eq.(8) and (9)<br />
knowing the active and reactive power references of transmission<br />
line Pr * and Qr *<br />
where<br />
.<br />
Figure 3: Schematic of system state space.<br />
(17)<br />
(18)<br />
Substituting Eqs. (15) and (16) in (5), the derivative of tracking<br />
(dynamic error) can be obtained:<br />
(19)<br />
To fulfill stability condition of the system dynamic error,<br />
multiplication of control matrix and control variables vector is<br />
defined as:<br />
(20)<br />
(21)<br />
The control variables vector (21) is calculated by<br />
multiplication of B -1 by Eq.(20). The amounts of variables of row<br />
matrix k at (20) are set such as the whole Eigen values of matrix<br />
(A−Bk) are laid on the left side of imaginary axis. Vector us is<br />
also values of matrix (A−Bk) are laid on the left side of<br />
imaginary axis. Vector us is also described as a robustness signal.<br />
The function of this vector is to accomplish stability condition<br />
based on Lyapunov theory. Therefore by substitution Eq. (20)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 256<br />
ISSN 2250-3153<br />
into (19), the new equation is obtained for dynamic error of the<br />
system.<br />
where in the above equation, A0=A-Bk<br />
(22)<br />
To accomplish stability condition, the robustness signal is<br />
defined as below:<br />
where I ∗ is a positive number I ∗ ≥ 1.<br />
(23)<br />
It is necessary to be noted that (e T P) is not a square matrix<br />
and therefore pseudo inverse matrix is used to calculate us vector<br />
.. The block diagram of the overall UPFCcontrol system is<br />
depicted in Figure 4. This block diagram is implemented for d–q<br />
axis.<br />
Figure 4: Block diagram of the overall UPFC control system.<br />
IV. SIMULATION RESULTS<br />
In an ideal system, there is no uncertainty in system<br />
parameters. However, in a practical system, it is considered that<br />
the system parameters are corrupted by some uncertainties. It<br />
should be mentioned that such uncertainties are usually present<br />
in any physical system and will be often limited to achieve the<br />
desired performance. In this paper, the proposed controller is<br />
designed so as the uncertainty in the system is reduced. The<br />
uncertainty is entered to the system equations as a vector. The<br />
performance of the proposed controller, for various disturbances<br />
is evaluated through MATLAB/SIMULINK software in a two<br />
bus test system. The simulation results of proposed controller are<br />
compared with a conventional PI controller. The parameters of<br />
converters 1 and 2 of PI controllers are given in Table 1<br />
TABLE 1<br />
parameters Converter 1 Converter 2<br />
KP 0.27 0.3<br />
KI 62 66<br />
TABLE 2<br />
parameters Value<br />
R( pu) 0.051<br />
wL (pu) 0.25<br />
Rsh (pu) 0.015<br />
wLsh (pu) 0.15<br />
1/ wC (pu) 0.5<br />
According to the parameters of the system and UPFC which<br />
are presented in the Table 2, the system matrices for these<br />
converters are as follow:<br />
In the above matrices, fundamental frequency (fb) is equal to<br />
50 Hz. In this study, as it is shown in Figure 4 the sending and<br />
receiving end bus voltages are maintained constant and the dc<br />
link voltage, active and reactive powers of the transmission line<br />
are controlled.<br />
The initial complex power flow (Pr + jQr) at the receiving<br />
end of the transmission line is found as (1.278−j0.5) p.u. In the<br />
first case study, the active power of the transmission line is<br />
changed from 1.278 to 2.278 p.u at t = 2 s for a system with 10%<br />
uncertainty. The simulation results of this study are depicted in<br />
Figure 5. It is shown that the speed of response of the proposed<br />
controller is much better than that of the conventional controller<br />
approach (PI controller).<br />
In the second case study, both the active and reactive powers<br />
of the transmission line is changed from initial values to<br />
(2.278−j0.8) at t = 2 s. In this case, the uncertainty factor is<br />
considered to be equal to 16%. The simulation results of this<br />
scenario are displayed in Figure 6. As mentioned, the reactive<br />
power of the transmission line is changed too and the uncertainty<br />
factor is changed much more than previous case, but it is seen<br />
that the proposed controller has a good response to this changes.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 257<br />
ISSN 2250-3153<br />
Figure 5: Response of UPFC system with 10% uncertainty.<br />
Blue line, advanced controller; green line, PI controller.<br />
(a) Real power of the transmission line;<br />
(b) Kvar power of transmission line;<br />
(c) D axis current reference of converter 2;<br />
(d) Q axis current reference of converter 2;<br />
(e) D axis voltage reference of converter 2;<br />
(f) Q axis voltage reference of converter 2.<br />
Figure 6: Response of UPFC system with 16% uncertainty.<br />
Blue line, advanced controller; green line, PI controller.<br />
(a) Real power of the transmission line;<br />
(b) Kvar power of transmission line;<br />
(c) D axis current reference of converter 2;<br />
(d) Q axis current reference of converter 2;<br />
(e) D axis voltage reference of converter 2;<br />
(f) Q axis voltage reference of converter 2.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 258<br />
ISSN 2250-3153<br />
V. CONCLUSION<br />
This paper presented an advanced design of controller which<br />
enables a power system to reach reference signals accurately and<br />
to be reliable in the presence of uncertainty of system parameters<br />
and faults. The new controller which is designed based on the<br />
Lyapunov theory is successful in reaching the reference signals.<br />
The main advantage of the proposed approach with respect to PI<br />
controller is the stability of the closed loop system under<br />
uncertainties. The proposed approach also has simple structure<br />
and quick performance in comparison with intelligence methods<br />
such as fuzzy theory and neural network. The simulation results<br />
of the proposed controller are compared with a conventional PI<br />
controller and its performance is evaluated in a two bus test<br />
system. In this study, the sending and receiving end bus voltages<br />
were maintained constant and the dc link voltage, active and<br />
reactive powers of the transmission line were controlled. The<br />
obtained results from above case studies describe the power,<br />
accuracy, fast speed and relatively low overshoot response of the<br />
proposed controller.<br />
REFERENCES<br />
[1] N.G.Hingorani and L.Gyugyi, ―Understanding FACTS,‖ Concepts and<br />
Technology of Flexible AC Transmission Systems.IEEE press,2000.<br />
[2] L.gyugi, ―A unified power flow concept for flexible AC transmission<br />
systems,‖ IEEE proc.c 139(4)1992.<br />
[3] S.kannan,S.jayaram and M.salama, ―Real and reactive power coordination<br />
for a unified power flow controller,‖ IEEE transactions on power systems,<br />
vol 19,no 3 ,august 2004.<br />
[4] H.f.wang, ‖Interactions and multi variable design of unified power flow<br />
controller,‖ electrical power and energy systems 24(2002).<br />
[5] I. papic, P. zunko, D. povh, M. Weinhold, ―Basic control of Unified power<br />
flow controller,‖ IEEE transactions on power systems.12 (4) (1997) 1734-<br />
1739.<br />
[6] A.W.Green,J.T.Boys, ―Hysteresis current forced three phase voltage<br />
source reversible rectifiers,‖ IEEEproc.136(1989) 113-120.<br />
[7] K. Manoz kumar reddy, ―simulation of unified power flow controller,‖<br />
proceedings of National conference on recent trends in power systems and<br />
power electronics,( Feb <strong>2012</strong>)148-151.<br />
[8] M.I.EI Hawwary, A.L.Elshafei, ―output feedback control of a class of<br />
nonlinear systems using direct adaptive fuzzy controller,‖ IEE proc. On<br />
control theory applications 151 (5) (2004) 615-625.<br />
AUTHORS<br />
K. Manoz kumar reddy, Mtech, Associate professor, SriAditya<br />
Engineering College, India, kmkreddyy@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 259<br />
ISSN 2250-3153<br />
Robust Digital Watermarking Using MDKP<br />
Mr A. Chandra, Ms. T. Kavitha<br />
Department of Computer Science and Systems Engineering, Sree Vidyanikethan Engineering College,<br />
A.Rangampet, Tirupathi, India<br />
Abstract- The growth of digitalization of data creates a need<br />
for protecting digital content against counterfeiting, piracy and<br />
malicious manipulations. Digital water marking is one of the<br />
methods of protecting multimedia data. A robust digital<br />
watermarking method is proposed in this paper, which has<br />
greatest robustness against various attacks and preserves the<br />
image quality after water marking. It embeds a watermark into an<br />
image in DCT domain. The image is divided into blocks and<br />
each block is processed using Multi Dimensional Knapsack<br />
Problem (MDKP) and in turn converts to spatial domain. The<br />
watermark is extracted from the image and compared with the<br />
original image. The measurement of quality of image is also<br />
concerned. The proposed scheme exhibits better performance in<br />
robust digital watermarking. The experiment is carried using<br />
MATLAB 7.x and results are verified.<br />
Index Terms- Copyright protection, Digital Watermarking,<br />
DCT, MDKP<br />
D<br />
I. INTRODUCTION<br />
igital technologies have grown dramatically and widely<br />
used within home computers and open networks. Digital<br />
content is volatile and easily processed. Digital objects may be<br />
modified easily without any control. Digital watermark is a piece<br />
of information embedded into potentially vulnerable images in<br />
such a way it is in separable from the image.<br />
The digital watermarks can be divided into three different<br />
types as visible watermark, Invisible-Robust watermark, and<br />
Invisible-Fragile watermark. Visible watermark is a transparent<br />
object overlaid into the primary image. The watermark will be<br />
visible to a casual viewer on a careful observation. The invisiblerobust<br />
watermark is embedded in such a way that changes made<br />
to the pixel value are not noticed, which can be recovered only<br />
with appropriate decoding mechanism. The invisible-fragile<br />
watermark is embedded in such a way that any alternations of the<br />
image would alter or destroy the watermark [3].<br />
Several applications of watermarking have been considered<br />
by researchers [2]:<br />
Copyright: In this case, the mark is associated with an identity<br />
number. In this way, the mark identifies the owner of the content<br />
and can be used for copyright purposes (prevent illegal copies).<br />
The embedding and the detection of the mark depend on a secret<br />
key. The mark has to be robust and detectable after numerous<br />
processing treatments or attacks that preserve the original<br />
content.<br />
Database Retrieval and Data Hiding: In this case, the mark<br />
permits the identification of the content. The mark contains a<br />
description of the content or a pointer to this description and can<br />
be used for database ―classification.‖ In this application, the<br />
robustness of the mark is not decisive but the mark has to be<br />
detected after basic format conversion.<br />
Authentication: The mark can be a fragile mark that will<br />
disappear after image manipulation. It can be used to authenticate<br />
the content and to prove that its integrity has been preserved. The<br />
function of the mark is to prove that the content has not been<br />
manipulated and consequently the robustness of the marking<br />
algorithm is not a prior achievement.<br />
Original<br />
Image<br />
Watermark<br />
Embedding<br />
Procedure<br />
Watermarked<br />
Image<br />
Figure 1: Block Diagram of Watermarking<br />
Attacks which attempt to destroy or invalidate watermarks<br />
can be classified into two types, noise-like signal processing and<br />
geometric distortions. Noise like signal processing is intended to<br />
remove embedded water marks from the cover image by a signal<br />
processing approach. Geometric distortion makes a detector fail<br />
to detect the existence of watermark even if they are still on the<br />
image. Geometric distortions can be resisted by transform-based,<br />
pilot-based and feature-based schemes [1].<br />
Watermark can be inserted into the image using various<br />
techniques like spread spectrum and feature based techniques.<br />
Insertion and detection of watermark using the above techniques<br />
consumes too much computation time. As a result, we propose a<br />
method of inserting watermark into image using MDKP in DCT<br />
domain to reduce the computation time. The cover image is<br />
divided into blocks and an MDKP is formulated to optimize the<br />
selection of most robust blocks in the image. Watermark is<br />
inserted into the blocks by transforming them to DCT domain.<br />
After insertion of watermark they transformed back to spatial<br />
domain. The experimental results is applied to some images the<br />
proposed method will have better robustness than existing<br />
methods.<br />
The paper is organized as follows. Various watermarking<br />
schemes are described in section II. Proposed watermarking<br />
scheme using MKDP in DCT domain is described in section III<br />
and concluding remarks is made in section IV.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 260<br />
ISSN 2250-3153<br />
II. RELATED WATERMARKING SCHEMES<br />
Several previous digital watermarking methods have been<br />
proposed. In [4], the authors propose a scheme for watermarking<br />
images. The method breaks up an image into 8×8 block and<br />
computes a DCT to each of these blocks. A pseudorandom subset<br />
of the blocks is chosen, then, in each such block, a triple of<br />
frequencies is selected from one of 18 predetermined triples and<br />
modified so that their relative strengths encode a one or zero<br />
value. The 18 possible triples are composed by selection of three<br />
out of eight predetermined frequencies within the 8 × 8 DCT<br />
block. The choice of the eight frequencies to be altered within the<br />
DCT block is based on a belief that the ―middle<br />
frequencies...have moderate variance,‖ i.e. they have similar<br />
magnitude. This property is needed in order to allow the relative<br />
strength of the frequency triples to be altered without requiring a<br />
modification that would be perceptually noticeable.<br />
Chih-Wei Tang and Hsuesh-Ming Hang [5] propose a<br />
scheme that takes original image; the feature extraction method<br />
which generates reference centers of disks for watermark<br />
embedding and detection. Then it performs the image<br />
normalization technique on disks in the original image. The<br />
coordinate transformation coefficients between the original<br />
image disks and the normalized ellipse images are generated. The<br />
location of blocks in the original image for watermark<br />
embedding is determined from the normalized image. Then,<br />
coordinates of selected points are transformed from normalized<br />
image back to the original image. Next, a 2-D FFT is applied to<br />
these 32×32 blocks on each qualified disk in an original image.<br />
The watermark is embedded in the transform domain. Last, the<br />
watermarked blocks are 2-D IFFT converted back to the spatial<br />
domain to replace the original image blocks. The drawback of<br />
this scheme is watermark resistance is low for severe geometric<br />
distortions.<br />
Jin S. Seo and Chang D. Yoo [6] propose a procedure that<br />
constructs invariant regions at each scale from the scale space<br />
Harris points of an image; selects invariant regions for<br />
watermarking, considering the spatial positions and the<br />
repeatability measures. Watermark is embedded additively into<br />
the selected regions after geometric normalization according to<br />
the shape of the regions.<br />
Jen-Sheng Tsai, Win-Bin Huang and Yau-Hwang Kuo [1],<br />
in this scheme a region set is obtained by a feature detector. Here<br />
the algorithm works in two phases. During the primary feature<br />
set searching stage, watermark is inserted into the detected<br />
feature regions and secondly simulated attacking is performed.<br />
By analyzing the attack resistance of the regions primary feature<br />
set is identified. On which genetic algorithm based feature set<br />
solution is done to resist undefined attacks. There are several<br />
drawbacks of this scheme. Only predefined attacks can be<br />
simulated and algorithm consumes too much computation time<br />
robustness of feature regions due to simulated attacking.<br />
The existing techniques are generally resistant to various<br />
attacks but consume more computation time. The proposed<br />
method is a secure digital watermarking scheme and is a faster<br />
robustness measurement scheme.<br />
III. WATERMARKING USING MDKP<br />
One of the major difficulties for watermarking is that<br />
watermark embedding and detection should be performed over<br />
the same blocks of an image. The flow diagram of the scheme<br />
shown in fig 2. Watermark is embedded into the original image<br />
in DCT domain using MDKP. Extraction of watermark is also<br />
implemented.<br />
A. Implementation of Work<br />
We propose an algorithm which works in DCT domain<br />
using MDKP. The algorithm uses the DCT block size as 2×2.<br />
The original size of the image considered in the experiment is<br />
64×64. The image is processed into blocks; the blocks are<br />
transformed using DCT.<br />
The symbol is defined to indicate the overall resistance<br />
degree of the block b against attack a. It is determine by<br />
Where , indicates if block b can resist the i th<br />
predefined attack ai and Na is the total number of predefined<br />
attacks. The symbol indicates the property related to corner<br />
response of the block b. It is zero, if it is less than threshold is set<br />
to 1% of the maximum response value. We use binary symbol<br />
to indicate whether region belongs to the middle scale band or<br />
not. This can be formulated into an MDKP as [8]<br />
maximize (2)<br />
subjected to<br />
is defined as<br />
(3)<br />
1, if the block is selected (4)<br />
0, otherwise.<br />
(1)<br />
The variables and represent the composite weights<br />
and constraints of quality distortion and overlapping conditions.<br />
This MDKP is solved for determining the best choice of blocks.<br />
Insert watermark into the block, transform block back into<br />
spatial domain and move on to the next block, and write the<br />
watermarked image out to a file. Finally separate the watermark<br />
from the image using DCT block size. Compare the watermark<br />
extracted image to the file compare it with the original image. If<br />
the change is less than threshold then the image is not distorted.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 261<br />
ISSN 2250-3153<br />
T<br />
T<br />
Image Distorted<br />
Start<br />
Set the DCT block size 2x2 size of the image is 64x64<br />
Process the image into block; Transform the block using DCT<br />
Identify the Blocks into which<br />
watermark is to be inserted by<br />
solving MDKP<br />
Insert watermark, transform the<br />
block back to spatial domain<br />
Any block<br />
remaining<br />
Write the watermarked image to a file<br />
Figure 2: Flow diagram of the proposed scheme<br />
F<br />
Remove the watermark from the<br />
above image and compare with<br />
original image<br />
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 262<br />
ISSN 2250-3153<br />
Figure 3: comparison between block selection and region<br />
selection<br />
Best fitness is for block selection and mean fitness is for<br />
feature region selection [1].<br />
IV. CONCLUSION<br />
In this paper, a method based on DCT domain using MDKP<br />
solving procedure is developed to select image blocks for robust<br />
digital image watermarking under the constraint of preserving<br />
image quality. The robustness of the watermark is significantly<br />
improved and image quality after watermarking is still preserved.<br />
The development of a MDKP techniques leads to numerous<br />
perspectives. The next step of the work can be JPEG<br />
watermarking. The techniques proposed in this paper can help<br />
validate claims of ownership that required for intellectual<br />
property law enforcement.<br />
REFERENCES<br />
[1] Jen-Sheng Tsai, Win-bin Huang and Yau-Hwang Kuo, ―On the Selection of<br />
optimal Feature Region Set for Robust Digital Image Watermarking‖, IEEE<br />
Transactions on Image Processing, Vol.20,No.3,March 2011.<br />
[2] Patrick Bas, Jean-Marc Chassery, and Benoit Macq, ―Geometrically<br />
Invariant Watermar king Using Feature Points‖, IEEE Transactions on<br />
Image Processing, Vol.11,No.9,Sepetember 2002.<br />
[3] Munesh Chandra, Shika Pandey, and Rama Chaudary, ―Digital<br />
Watermarking Technique for Protecting Digital Images‖, IEEE 2010.<br />
[4] Inegar J. Cox , Joe Kilian, F.Thomson Leigthon and Talal Shamoon ,<br />
―Secure Spread Spectrum Watermarking for multimedia‖, IEEE<br />
Transactions on Image Processing, Vol.6,No.12,December 1997.<br />
[5] Chih-Wei Tang and Hsueh-Ming Hang, ―A Feature-Based Robust Digital<br />
Image Watermarking Scheme‖, IEEE Transactions on Image Processing,<br />
Vol.51, No.4, April 2003.<br />
[6] Jin S. Seo and Chang D.Yoo, ―Image Watermarking Based on Invariant<br />
Regions of Scale-Space Representation‖, IEEE Transactions on Image<br />
Processing, Vol.54, No.4, April 2006.<br />
[7] E.Koch , J.Rindfrey and J.Zhao, ―Copyright Protection of Multimedia<br />
Data‖, in proceedings International Conference Digital Media and<br />
Electronic Publishing,1994.<br />
[8] H. Kellerer, U. Pferschy, and D. Pisinger, Knapsack Problems. Berlin:<br />
Springer,2004.<br />
[9] Jen-Sheng Tsai, Win-bin Huang, Chao-Leigh Chen, Yau-Hwang Kuo ―A<br />
Feature-Based Digital Image Watermarking for Copyright Protection and<br />
Content Authentication‖ IEEE, 2007<br />
AUTHORS<br />
First Author – Mr A. Chandra, Department of Computer<br />
Science and Systems Engineering, Sree Vidyanikethan<br />
Engineering College, A.Rangampet, Tirupathi, India<br />
Second Author – Ms. T. Kavitha, Mr A. Chandra, Department<br />
of Computer Science and Systems Engineering, Sree<br />
Vidyanikethan Engineering College, A.Rangampet, Tirupathi,<br />
India<br />
Mr. A.Chandra was born in<br />
Katherapalli, Chittoor(Dt),<br />
A.P.,India. He received his<br />
B.Tech degree in Computer<br />
Science and Engineering in<br />
2004 from JNT University, Hyderabad. He had his<br />
M.Tech student from JNTUA, Anantapur. His research<br />
interests are image processing, computer networks and<br />
network security. Presently he is working as Assistant<br />
professor in the Department of Computer Science and<br />
Systems Engineering, Sree Vidyanikethan Engineering<br />
College, A.Rangampet, Tirupati.<br />
Ms. T.Kavitha was born in<br />
Chittoor, A.P, India.<br />
She received her<br />
B.Tech degree in Computer<br />
Science and Engineering in<br />
2006 from JNT University, Hyderabad. She received her<br />
M.Tech degree from Acharya Nagarjuna University,<br />
Guntur. Her research interests are computer networks<br />
and network security. Presently She is working as<br />
Assistant professor in the Department of Computer<br />
Science and Systems Engineering, Sree Vidyanikethan<br />
Engineering College, A.Rangampet, Tirupati.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 263<br />
ISSN 2250-3153<br />
Evaluation of antifungal activities of certain plant against<br />
Fusarium udum Butler causing wilt in pigeonpea (Cajanus<br />
cajan (L.) Millsp.)<br />
Tongbram Ranjana Devi and GKN Chhetry<br />
Department of Life sciences, Manipur University, Canchipur, Imphal – 795003<br />
Abstract- The antifungal effect of aqueous extracts of locally<br />
available plant species have been investigated in vitro conditions<br />
against Fusarum udum , the causal agent of Fusarium wilt of<br />
pigeonpea. The plant extracts were screened against mycelial<br />
growth and spore germination of F. udum at different<br />
concentrations of 5%, 10%, 15%, and 20% using poisoned food<br />
technique and cavity slide method. Among the tested plants<br />
higher inhibition was noticed in Allium sativum, Azadirachta<br />
indica,Spilanthes acmella and Adhatoda vasica.The remaining<br />
plants produced less inhibitory effect. Among them A. sativum at<br />
20% alone recorded 100% inhibition of mycelial growth and<br />
spore germination. In field experiment, aqueous extract of A.<br />
sativum showed highest percentage of disease control.<br />
Index Terms- Antifungal properties, Fusarium udum,<br />
Pigeonpea, Plant extract, Wilt<br />
P<br />
I. INTRODUCTION<br />
igeonpea (Cajanus cajan (L.) Millsp.) is an important grain<br />
legume crop of the family Fabaceae. It is the most important<br />
kharif pulse crop with much higher productivity. In Manipur the<br />
crop is cultivated on marginal lands by resource-poor farmers,<br />
who commonly grow traditional medium- and long- duration<br />
landraces. It is cultivated either as sole crop or mixed with<br />
pearlmillet (Pennisetum glaucum L) and maize (Zea mays L) [3].<br />
Diseases are major biological constraints to production. Of these<br />
Fusarium wilt are widespread and causes heavy damage. As the<br />
management of this soil borne disease through conventional<br />
technology such as growing resistant varieties, fungicidal seed<br />
treatment, single treatment of fungicide or bio-agent cannot<br />
provide a remedy for disease control [6], a need was felt to<br />
develop botanical based biofungicides for control of plant<br />
diseases. Because non judicious use of synthetic fungicides since<br />
last four decades led to several problems to human and animal<br />
health besides environmental problems. This scenario, therefore,<br />
calls for alternative approaches which are economically feasible<br />
and ecofriendly to increase yield of pigeonpea. In view of the<br />
hazardous effect of synthetic fungicides, that too for the soil<br />
borne ones the present investigation has been carried out for<br />
evaluating the phytotoxic activity of locally available plants<br />
against wilt disease of pigeonpea.<br />
II. MATERIALS AND METHODS<br />
Ten plants viz., Allium cepa, Allium sativum, Carica papaya,<br />
Citrus limon, Eryngium foetidum, Gynura angulosa, Aloe vera,<br />
Azadirachta indica, Spilanthes acmella, Adhatoda vasica,<br />
locally known for their medicinal values for the treatment of<br />
common human diseases were selected to determine the<br />
antifungal activity against F. udum. Extracts of plant parts such<br />
as leaf, flower, bulb, clove, etc. were prepared by the standard<br />
method used by Gerard Ezhilan et al. [2]. Fresh plant parts were<br />
washed with tap water followed by sterile distilled water,<br />
processed with sterile distilled water @1mlg -1 of plant tissue<br />
(1:1v/w) with pestle and mortar and filtered through a double<br />
layered cheese cloth. The filtrate so obtained formed the<br />
standard plant extract solution. The plant extract so prepared<br />
were screened in vitro against F. udum using poisoned food<br />
technique. Stock solution 5, 10, 15, and 20 ml were mixed<br />
respectively with 95, 90, 85 and 80 ml of sterilized molten<br />
Potato Dextrose Agar (PDA) media to obtained 5, 10, 15 and 20<br />
percent concentration of plant extract. The mixed medium was<br />
thoroughly shaken to ensure uniform mixing of extract. 20 ml of<br />
poisoned PDA was poured into sterile petriplates. Five<br />
replications were maintained for each concentration. After<br />
solidification of poisoned media, the plates were inoculated with<br />
mycelium disc (4mm diameter) of vigorously growing pure<br />
culture colony of F. udum. The control petriplates in five<br />
replications were maintained using only sterile water without<br />
any plant extract but with mycelium disc (4mm) for comparison .<br />
The inoculated petriplates were incubated at 25 ± 1 0 C. The radial<br />
growth of F. udum was measured in treated and control<br />
petriplates after seven days of incubation . The percent growth<br />
inhibition was calculated following the formula given by Vincent<br />
[8].<br />
C T<br />
I x100<br />
where, I=percent inhibition<br />
C<br />
C = growth in control<br />
T = growth in treatment<br />
Effect of plant extracts on the spore germination of Fusarium<br />
udum.<br />
Antifungal activity of aqueous extract of the test plants on the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 264<br />
ISSN 2250-3153<br />
spore germination of F. udum was assayed by cavity slide<br />
method. One drop( about 0.1ml ) of spore suspension containing<br />
40-50 spores per microscopic field (10×40x) was put over a<br />
concentrations viz. 5,10,15 and 20 percent .The slides were kept<br />
in moist chamber prepared by putting two folds of filter paper in<br />
both sides of petriplates. These plates were incubated at 25± 1 0 C<br />
for 24 hours. Cavity slides with sterilized distilled water serve as<br />
control. Three replications were kept for each treatment. Spore<br />
germination was calculated by observing the number of spores<br />
germinated / microscopic field. Percent inhibition of<br />
germination over control was calculated.<br />
FIELD EXPERIMENT:<br />
The experiments were carried out in Chirang a village located at<br />
the outskirt of Imphal city where pigeonpea was grown regularly<br />
in a randomized block design for two consecutive years (2009<br />
and 2010). A wilt susceptible local variety was shown in third<br />
week of April in each plot (2×2m 2 ).<br />
Plant extracts that produced high percentage of inhibition at<br />
20% concentration viz. A.sativum, A. indica, S.acmella, A. vasica<br />
were tested further to see their effect in vivo conditions. Plant<br />
extracts of test plant were prepared afresh on the day of foliar<br />
application and used for spray immediately after preparation. The<br />
spray treatments were started after 45 days of planting followed<br />
by two subsequent sprays at 15 days interval. A standard check<br />
with untreated control (water spray) was also maintained. Data<br />
on disease incidence were recorded and calculated by using the<br />
formula:<br />
Botanicals Parts<br />
used<br />
Eryngium<br />
foetidum<br />
Carica<br />
papaya<br />
Adhatoda<br />
vasica<br />
IV. TABLES<br />
Percent Disease incidence<br />
(DI%) ×100<br />
III. RESULTS<br />
Result showed significant effect of plant extracts against the<br />
mycelial growth of F. udum causing wilt of pigeonpea (table 1).<br />
Among them, extract of Allium sativum showed complete<br />
inhibition of radial growth of F. udum followed by Azadirachta<br />
indica (79.4%), Spilanthes acmella (68.8%) and Adhatoda<br />
vasica (58.8%), Gynura angulosa (55.9%), Aloe vera (55.9%),<br />
Eryngium foetidum (50%).The other test extracts showed less<br />
than 50% inhibition of mycelial growth. Result presented in table<br />
2 showed that highest inhibition of spore germination was<br />
observed in A. sativum extract followed by A.indica(60.7%),<br />
S.acmella and A. vasica showed more or less similar inhibitory<br />
effect. The other tested plants showed less inhibitory effect. .<br />
Under field conditions, among the four plants, maximum control<br />
of disease was observed with A. sativum(35.3%), followed by A.<br />
indica(25.9%), S acmella(14.2%) and A. vasica(10.2%). The<br />
results proved that application of bulb extract of A. sativum<br />
could be biopesticidal and ecofriendly substitute for chemical<br />
fungicide. However, further studies are needed to standardized<br />
the dose of bulb extract for foliar spray in the field to achieve<br />
better results.<br />
Table1: Effect of plant extracts on the radial growth of mycelium of F. udum<br />
Local name *Mycelial growth (cm) mean Percent inhibition of<br />
mycelium growth over<br />
control<br />
leaf awaphadigo<br />
m<br />
5% 10% 15% 20% 5% 10% 15% 20%<br />
2.9 2.9 1.9 1.7 2.35 14.7 14.7 44.1 50.0<br />
leaf awathabi 2.7 2.6 2.2 1.9 2.35 20.6 23.5 35.3 44.1<br />
leaf Nongmangk<br />
ha<br />
angouba<br />
2.5 2.4 1.8 1.4 2.03 26.5 29.4 47.1 58.8<br />
Allium cepa bulb tilhou 3.0 2.9 2.9 2.7 2.86 11.8 14.7 14.7 20.6<br />
Citrus<br />
limon<br />
leaf champra 2.9 2.7 2.4 2.4 2.60 14.7 20.6 29.4 29.4<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 265<br />
ISSN 2250-3153<br />
Spilanthes<br />
acmella<br />
flowe<br />
r<br />
chinlengbi 2.5 2.1 1.3 0.9 1.70 26.5 37.7 61.2 68.8<br />
Gynura<br />
angulosa<br />
leaf terapaibi 2.5 2.5 1.8 1.5 2.08 26.4 29.4 47.1 55.9<br />
Allium<br />
sativum<br />
clove chanam 1.5 0.3 00 00 0.45 55.9 92.1 100 100<br />
Aloe vera leaf ghritakumari 2.5 2.3 1.5 1.5 1.95 26.5 32.4 55.9 55.9<br />
Azadirachta<br />
indica<br />
leaf neem 1.9 1.5 0.9 0.7 1.25 44.1 55.9 73.5 79.4<br />
Control 3.5 3.5 3.2 3.4 3.40<br />
Mean 2.6 2.3 1.8 1.7<br />
CD@5% Between plant extracts : 2.7<br />
Between concentrations:4.4<br />
*mean of five replications<br />
Table2: Effect of plant extrac ts on the spore germination of F. udum<br />
Botanicals *Spore germination (%) Mean * Percent inhibition<br />
5% 10% 15% 20% 5% 10% 15% 20%<br />
E.foetidum 82.6 78.2 72.3 65.6 74.68 10.3 15.1 21.5 28.8<br />
C.papaya 82.8 78.3 72.8 70.2 76.03 10.1 15.0 20.9 23.8<br />
A. vasica 81.1 74.9 71.0 61.3 72.73 11.9 18.7 22.9 33.4<br />
A.cepa 86.5 80.4 75.4 73.5 78.95 6.1 12.7 18.1 20.2<br />
C.limon 85.1 78.6 73.4 72.6 77.43 7.6 14.7 20.3 21.2<br />
S. acmella 75.8 74.1 68.1 60.6 69.65 17.7 19.5 26.1 34.2<br />
G.angulosa 81.7 75.4 71.6 65.5 73.55 11.3 18.1 22.3 28.9<br />
A. sativum 9.2 7.0 4.5 00 5.12 9.0 92.4 95.1 100<br />
A.vera 79.0 74.3 69.1 63.9 70.93 14.2 19.3 25.0 30.6<br />
A. indica 60.5 40.6 45.5 36.2 45.70 34.3 55.9 50.6 60.7<br />
Control 93.0 92.1 92.5 90.8 92.1<br />
Mean 74.3 68.5 65.1 60.0<br />
CD@5% Between plant extracts : 2.6<br />
Between concentrations : 4.4<br />
*mean of three replications<br />
Table 3: Effect of plant extracts on wilt disease of pigeonpea under field condition<br />
Name of plants *DI%<br />
2009 2010<br />
Pooled mean % Disease control<br />
A. sativum 61.1 (51.41) 62.8 (52.42) 62.0 (51.94) 35.3<br />
A. indica 71.1 (57.48) 71.1 (57.48) 71.1 (57.48) 25.9<br />
S. acmella 76.7 (61.14) 87.8 (69.56) 82.3 (65.12) 14.2<br />
A. vasica 82.2 (65.05) 90.0 (71.57) 86.1 (68.11) 10.2<br />
Control 94.5 (76.44) 97.2 (80.37) 95.9 (78.32)<br />
*average value of the occurrence of disease<br />
*figure in parentheses are arcsin transformed values<br />
V. DISCUSSION<br />
The major setback in the control of Fusarium udum has been<br />
low capita per income, with household poverty which has<br />
hindered farmers acquiring synthetic chemicals to control the<br />
disease. Locally available plants have been tested as an<br />
alternative to synthetic chemicals. A. sativum extract completely<br />
inhibited mycelial growth and spore germination.A.indica also<br />
inhibited the growth of the pathogen above 50%.The<br />
effectiveness of garlic and neem extract in micelial growth and<br />
spore germination might be due to the presence of antifungal<br />
compounds like diallyl disulphide and diallyl trisulphide and<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 266<br />
ISSN 2250-3153<br />
azadirachtin. Effectivenees of garlic and neem as bio-fungicides<br />
has already been reported by many against different fungi. Garlic<br />
extract at 15% inhibited the growth of the pathogen (88.26%) [1].<br />
Pradeep Kumar Singh et al [5] also reported highest inhibition of<br />
radial growth of F. udum by A. indica(67.8%) at 5%.<br />
Effectiveness of garlic and neem extract in different fungi is also<br />
reported by many workers [4,7].<br />
VI. CONCLUSION<br />
Present investigation suggests that locally available plant<br />
resources such as A. sativum and A. indica may be of use for<br />
possible control of F.udum. However, further work is needed to<br />
explore potential of selected plants at the field level.<br />
REFERENCES<br />
[1] Ankita Shukala and S. K. Dwivedi.(<strong>2012</strong>). Bioefficacy of plant extracts<br />
against Fusarium species causing wilt in pulses.IOSR Journal of<br />
Engineering. 2(1): 136-144.<br />
[2] Gerard E .Chandrasekar and V. Kurucheve. (1994).Effect of six selected<br />
plant products and oil cakes on the sclerotial production and germination of<br />
Rhizoctonia solani. Indian Phytopath. 47 (2): 183-185.<br />
[3] G.K.N. Chhetry.(2004). Dispersion statistics and sequential sampling plan<br />
for timing fungicides application against Cercospora cajani leaf spot in<br />
pigeonpea. J. Mycol. Pl. Pathol. 34 (2):554-557.<br />
[4] N. Siva, S.Ganesan, N. Banumathy and Muthuchelian.(2008). Antifungal<br />
effect of leaf extract of some medicinal plants against Fusarium oxysporum<br />
causing wilt disease of Solanum melogena L. Ethnobotanical Leaflets 12:<br />
156-163.<br />
[5] Pradeepkumar Singh, Anish Khan, Robin Gogoi and Ritesh Kumar Jaiswal<br />
(2010). Plant leaf extracts and bioagents for eco-friendly management of<br />
wilt of pigeonpea caused byFusarium udum. Indian Phytopath. 63 (3) : 343<br />
– 344.<br />
[6] R. M. Gade , K.K. Zote and C. D. Mayee. (2007). Integrated management<br />
of pigeonpea wilt using fungicide and bio-agent. Indian Phytopath. (60) 1:<br />
24-30.<br />
[7] R. R. Sharma, H.N. Gour and Pankaj Sharma.(2005). Effect of plant<br />
extracts on growth of Rhizoctonia solani and disease development in<br />
maize. J. Mycol. Pl. Pathol. 35(2): 377-379.<br />
[8] Vincent JM. (1947). Distortion of fungal hyphae in the presence of certain<br />
inhibitors. Nature 150:850.<br />
AUTHORS<br />
First Author – Tongbram Ranjana Devi. Ph,D Student,<br />
Department of Life Sciences, Manipur University, Imphal,<br />
Canchipur,795003<br />
Email address: ranjanatongbram@yahoo.in<br />
Second Author – GKN Chhetry, Professor, Department of Life<br />
Sciences, Manipur University, Imphal, Canchipur,79500<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 267<br />
ISSN 2250-3153<br />
Recent Developments in Signal Encryption – A Critical<br />
Survey<br />
S. Rajanarayanan and A. Pushparaghavan<br />
Department of computer science and Engineering, Selvam College of Technology, Namakkal, India<br />
srnarayanan_slm@yahoo.co.in<br />
Abstract- In digitally modern world, the fundamental issue<br />
of multimedia data security (such as digital audio signals,<br />
images, and videos) is becoming a major concern due to the rapid<br />
development of digital communications and networking<br />
technologies. The methods and algorithms which are currently<br />
available for data protection uses cryptographic primitives for<br />
secure data transmission and reception by assuming that both<br />
sides must trust on each other. Nowadays, the range of<br />
cryptography applications have been expanded a lot in the<br />
modern area after the development of communication means;<br />
cryptography is essentially required to ensure that data are<br />
protected against penetrations and to prevent espionage. The<br />
major two conceptual blocks of cryptography is encryption and<br />
decryption. This is achieved by sending encrypted version of the<br />
data to the untrusted computers to process. Once when the<br />
computation process is completed on the encrypted data, the<br />
results will be sent back and the decryption is applied to extract<br />
the original data content. To ensure the decrypted result to be<br />
equal to the intended computed value, a structural method of<br />
encryption should be followed. Encryption is a technique<br />
which maintains confidentiality while sending and receiving data<br />
or storing the information. The principle of Kerckoffs‘ on the<br />
encryption states that the security must not rely on the<br />
obfuscation of code, but only on the secrecy of the decryption<br />
key. In this paper detailed description of symmetric and<br />
asymmetric encryption are given to provide a wider view of<br />
encryption techniques. The field of secure signal processing<br />
poses significant challenges for both signal processing and<br />
cryptography research; only few ready-to-go fully integrated<br />
solutions are available.<br />
Index Terms- Encryption, Cryptography, Kerckoffs‘,<br />
Symmetric, Asymmetric<br />
D<br />
I. INTRODUCTION<br />
igital signal processing field has immensely wide range of<br />
applications including communication systems, multimedia<br />
data production, biological signal processing for health<br />
monitoring etc. Although these applications are widely<br />
developed, protection of information for secure communication<br />
is one of the major requirements. The methods and algorithms<br />
which are currently available for data protection uses<br />
cryptographic primitives for secure data transmission and<br />
reception by assuming that both sides must trust on each other.<br />
Using this technique, data cannot be accessed by third parties,<br />
but just not enough to provide complete security to the<br />
application.<br />
Confidentiality of data should be ensured during<br />
communication and data storage while encryption is taken place.<br />
Recently, some additional features providing ability to delegate<br />
computations for encryption in untrusted computers or devices<br />
are added. This is achieved by sending encrypted version of the<br />
data to the untrusted computers to process. Once when the<br />
computation process is completed on the encrypted data, the<br />
results will be sent back and the decryption is applied to extract<br />
the original data content. To ensure the decrypted result to be<br />
equal to the intended computed value, a structural method of<br />
encryption should be followed.<br />
Rivest et al. in 1978 proposed a homomorphic encryption [1] to<br />
solve this issue. Brickell and Yacobi in [2] pointed out some of<br />
the security weakness in the first proposals of Rivest et al.<br />
Followed the first attempt of Rivest et al, a numerous methods<br />
and algorithms have proposed to solve issues related to the data<br />
encryption on various contexts. These are: secret sharing<br />
schemes, threshold schemes [3], zero-knowledge proofs [4],<br />
oblivious transfer [5], commitment schemes [3], anonymity,<br />
privacy, electronic voting, electronic auctions, lottery protocols<br />
[6], protection of mobile agents[7], multiparty computation [3],<br />
mix-nets [8, 9], watermarking or fingerprinting protocols [10–<br />
11], and so forth.<br />
II. FUNDAMENTALS OF ENCRYPTION<br />
Encryption is a technique which maintains confidentiality<br />
while sending and receiving data or storing the information. The<br />
principle of Kerckoffs‘ on the encryption states that the security<br />
must not rely on the obfuscation of code, but only on the secrecy<br />
of the decryption key. In general, encryption techniques are<br />
classified into two broad categories: symmetric and asymmetric.<br />
The detailed explanation of these two types is given in the<br />
following section.<br />
A. Symmetric Encryption<br />
The term ―Symmetric‖ states that both encryption and<br />
decryption of the data are carried out with the same secret key.<br />
Hence, the key must be known to both sender and the receiver in<br />
order to perform any secure communication. The major<br />
advantage of using symmetric encryption is for its fastness.<br />
However, it is not possible for two people who never met to use<br />
such schemes directly. Block ciphers (AES [14, 15]) and stream<br />
ciphers (One-time pad [16], Snow 2.0 [17]), which are belongs to<br />
this category performs encryption faster.<br />
B. Asymmetric Encryption<br />
In terms of asymmetric encryption, the key used for encryption<br />
is different for it is used in decryption procedure. The encryption<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 268<br />
ISSN 2250-3153<br />
key is public as the decryption key remains private. Since there is<br />
no need of sender or receiver to agree on the sharing of secret<br />
key, these schemes are more functional than the symmetric<br />
techniques. More number of features are added to asymmetric<br />
schemes. However, asymmetric schemes have two major<br />
disadvantages; they are based on nontrivial mathematical<br />
computations, and much slower than the symmetric ones. RSA<br />
[18] and ElGamal [19] are the prominent algorithms belong to<br />
this category.<br />
C. Issues of Encryption Performance<br />
When compared block cipher against RSA algorithm, like AES<br />
it is typically 100 times faster while encryption and 2000 times<br />
faster while decryption, with about 60MB per second on a<br />
modest platform. Stream ciphers are even faster, some of them<br />
being able to encrypt/decrypt 100MB of data per second or more.<br />
Thus, the whole content of a DVD will take about a minute with<br />
a fast stream cipher encryption/decryption. In practice, it would<br />
require hours, or even days, to encrypt or decrypt for such huge<br />
amount of data when asymmetric encryption/decryption is used.<br />
Hence, the asymmetric cipher is used to encrypt only a short<br />
data, while the symmetric one is used for the longer one. The<br />
sender and the receiver do not need to share anything before<br />
performing the encryption/decryption as the symmetric key is<br />
transmitted with the help of the public key of the receiver. By<br />
combining the advantages of both efficiency of symmetric<br />
schemes and functionalities of the asymmetric schemes,<br />
performance of the encryption can be improved.<br />
D. Encryption Security Issues<br />
In first, Shannon [20] formalized the security of encryption<br />
schemes in his seminal paper. He introduced the notion of perfect<br />
secrecy/unconditional security. According to this, knowledge of<br />
a cipher text does not give any information either about the<br />
corresponding plain text or about the key. Estimation of the<br />
security level is necessary in order to evaluate how secures the<br />
encryption schemes. Different authors addressed this security<br />
level estimation on their papers. This estimation may not be<br />
sufficient for several reasons. First, there may be other ways to<br />
break the system than solving the reference mathematical<br />
problem [21, 22]. Second, most of security proofs are performed<br />
in an idealized model called the random oracle model. In recent,<br />
more realistic model called the standard model is used to perform<br />
proofs ([23], [24]). Usually, to evaluate the attack capacity of the<br />
opponent, we distinguish among several contexts [25]: cipher<br />
text-only attacks where the opponent has access only to some<br />
cipher texts, known-plaintext attacks where the opponent has<br />
access to some pairs of corresponding plaintext-cipher texts,<br />
chosen-plaintext attacks which is same as previous, but the<br />
opponent can choose the plaintexts and get the corresponding<br />
cipher texts, and chosen-cipher text attacks ,the opponent has<br />
access to a decryption oracle, behaving as a black-box, that takes<br />
a cipher text and outputs the corresponding plaintext.<br />
E. Appropriate Encryption Technique Selection<br />
Selection of a right encryption scheme involves consideration<br />
of many constraints such as time, memory, security, and so forth.<br />
The time and memory criteria are very important in highly<br />
constrained architectures, often encountered in very small<br />
devices (PDAs, smart cards, RFID tags, etc.). They are also very<br />
important when a huge amount of data is processed at the same<br />
time. Schemes such as AES or RSA are generally used because<br />
of their reputation, but it is also to be noted that new schemes are<br />
proposed each year. Also, any new encryption proposal should<br />
satisfy the following diversity. First, it is necessary in order to be<br />
able to face new kinds of requirements. Second, should be able to<br />
rely an attack breaks.<br />
III. LITERATURE REVIEW<br />
Cuomo et al. in 2008[26] proposed a feature-based data<br />
embedding framework that synchronizes both embedder and<br />
receiver for error correction. The method employs modification<br />
of pitch for data embedding and uses Davey and Mackay's codes<br />
for insertion, deletion, and substitution (IDS) for synchronization<br />
and error recovery. Also, performance of the presented algorithm<br />
is improved using the expectation-maximization algorithm at the<br />
receiver end by estimating the channel parameters for the IDS<br />
decoding. The proposed method is very robust to the low-bit-rate<br />
speech coding channels.<br />
An algorithm that embeds the data in the phase of non-voiced<br />
speech was presented by Hofbauer et al. in 2009 [27]. The<br />
method replaces the autoregressive excitation signal of speech<br />
signal in a frequency sub-band, which is robust against band pass<br />
filtering channels. Several sets of pulse shapes are derived to<br />
prevent inter-symbol interference for creating pass band<br />
embedding signal by simple filtering. Location of the embedded<br />
data is detected using a marker based scheme without the<br />
insertions or deletions occurrence. Chen et al. in 2007[28]<br />
proposed a Vector quantization (VQ) of linear prediction<br />
coefficients (LPCs) based method for speech encryption. Secret<br />
key is generated using the vector quantization indices of<br />
neighboring frames derived from the natural speech‘s characters.<br />
Chen et al. in 2007[29] presented a Codebook-excited linear<br />
prediction (CELP)-based speech encryption algorithm. This<br />
proposed algorithm utilizes compressed speech data for insertion,<br />
deletion and replacement for data embedding. Initially, speech<br />
data are slatted into multiple speech frames groups. The data<br />
encryption in the current frame is generated using the feature,<br />
line spectrum frequency (LSF) extracted in the current frame, the<br />
extracted pitch from of the succeeding frame, the embedded data<br />
in the preceding frame and the location index of the current<br />
frame. Finally, some of the least significant bits (LSBs)<br />
indicating the excitation pulse positions or excitation vectors are<br />
substituted for the watermark.<br />
Speech encryption based on the time-trajectory model of the<br />
sinusoidal components of voiced speech signals is addressed<br />
Laurent Girin et al. in 2007[30]. This global approach is called<br />
long-term (LT) model, which uses amplitude and phase<br />
parameters of the discrete cosine functions for each entire voiced<br />
section of speech. Stankovic et.al in 2010 [31] proposed a unified<br />
encryption approach that can be used for different types of data<br />
such as audio, image or video based on multidimensional timefrequency<br />
analysis is presented over here. Speech signals utilize<br />
time-frequency analysis while space/spatial-frequency analysis is<br />
used for image encryption. The combination of both methods<br />
used in speech and image encryption is extended for video<br />
encryption. Encryption coefficients are selected by computing<br />
local frequency content of the signal. Also, non-stationary<br />
filtering of the host signal is carried out in order to provide<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 269<br />
ISSN 2250-3153<br />
imperceptibility of the encryption. A study on the perceptual<br />
watermarking impacts on the stationary audio signals was<br />
presented by Larbi et.al in 2005[32]. The study is based on<br />
stationary indices, which represent a measure of variations in<br />
spectral characteristics of signals, using time-frequency<br />
representations. Separation of multiple source audio signals from<br />
a mixture using the watermarking concept was presented by<br />
Parvaix et.al in 2010[33]. In their approach, a specific two level<br />
encoder-decoder procedure is discussed over here. At the<br />
encoder end, before the mixing of source audio signals, each<br />
signal is encrypted with set of parameters that gives additional<br />
information. Then, these encrypted signals are mixed and<br />
transmitted. At the receiver end, using the prior knowledge of the<br />
encrypted source signals, each signal is separated from the<br />
mixture. This method of separation is called informed source<br />
separation (ISS). Results obtained in this method shows high<br />
performances.<br />
Xiangyang et.al in 2007[34] proposed a novel approach for<br />
adaptive blind digital audio encryption. The method uses support<br />
vector regression algorithm for the extraction of the embedded<br />
information. The signal to be encrypted is first embedded in the<br />
audio signal along the template information. Adaptive<br />
quantization according to the local audio correlation and human<br />
auditory masking is used for embedding the information. At the<br />
decoding, corresponding template feature is selected and SVR is<br />
trained. Then, this trained model is used to predict actual outputs<br />
of the embedded information. The main features of this method<br />
include inaudible, robustness and high practicability. In addition<br />
to these, the algorithm can also extract the embedded information<br />
without original audio help.<br />
Chen et.al in 2008[35] presented an audio encryption method<br />
which solves the tradeoff between robustness and<br />
imperceptibility of the echo hiding method. The method<br />
combines analysis-by-synthesis approach, interlaced kernels, and<br />
frequency hopping in order to achieve high robustness,<br />
perceptual quality and security. During the embedding process,<br />
the algorithm not only considers the characteristics of the host<br />
signal, but also the various attacks of embedded audio signals.<br />
Also, the influence of host signals and various attacks on the<br />
embedded data are minimized by introducing the interlaced<br />
kernels. In addition to these two techniques, frequency hopping<br />
is used to increase the security and robustness of the proposed<br />
algorithm. In frequency hopping, each audio segment for<br />
embedding is established by combining the fractions selected<br />
from all frequency bands based on a pseudo noise sequence as a<br />
secret key. The presented algorithm is superior in terms of<br />
robustness, security, and perceptual quality.<br />
Satti et.al in 2009[36] presented a method for scrambling the<br />
signal for secret data hiding using quasi-group. This is a<br />
multilevel indexed transformation which is very effective in<br />
destroying the structure of the input signal and, therefore, it can<br />
be used as an excellent encryption technique. A novel method<br />
that hides data in digital audio was presented by Malik et.al in<br />
2007[37]. Their algorithm exploits the low sensitivity of the<br />
human auditory system for the distortion of phase. Data hiding is<br />
carried out using set of all pass filters and its pole-zero locations<br />
are chosen as parameters to encode the information. In the<br />
separation procedure, power spectrum of the audio signal is<br />
estimated in the z-plane away from the unit circle. The estimated<br />
power spectrum is used to find the pole locations of the all pass<br />
filters in decoding procedure. The results of the mentioned<br />
algorithm shows effectiveness to withstand data attacks and<br />
provides improved perceptual and robustness to the data hiding.<br />
A wavelet based Patchwork Method (MPM) for audio signal<br />
embedding is presented by Kalantari et.al in 2009[38]. The<br />
embedding process in their method uses two subsets features of<br />
the host signal. One subset is modified multiplicatively according<br />
to the embedding information while another one is not changed.<br />
The approximation coefficients of the wavelet domain are used<br />
to embed data. To achieve error free detection, data embedding is<br />
carried out only in the frames where the energy ratio of the<br />
subsets lies between two predefined values. The quality of the<br />
method is achieved using iterative algorithm and the quality is<br />
evaluated using Perceptual Evaluation of Audio Quality (PEAQ)<br />
method at each iteration level. The algorithm presented in this<br />
paper is high robustness and provides inaudibility of the<br />
watermark insertion.<br />
A binary information hiding system in the audio data was<br />
presented Baras et.al in 2006[39]. Their innovative embedding<br />
method consist various stages. A procedure for controlling<br />
inaudibility of the embedding, robustness of the system is<br />
maximized using informed embedding method and an efficient<br />
synchronization mechanism for low computation cost. The<br />
mentioned algorithm is evaluated on a real time audio signal and<br />
shows improved inaudibility, transmission reliability and<br />
computation cost. A modified Patchwork Algorithm for audio<br />
encoding was presented by In-Kwon Yeo et.al in 2003[40]. This<br />
statistical algorithm uses not only discrete cosine transform, but<br />
also discrete Fourier and wavelet domain. This enhanced<br />
Patchwork algorithm withstands various attacks defined by the<br />
Secure Digital Music Initiative (SDMI).<br />
Sridharan et.al in 1991[41] presented a DFT based speech<br />
encryption system. Coefficients of DCT are modified to achieve<br />
the desired permutation in their method. The presented algorithm<br />
is used in band limited telephone channel for its low residual<br />
intelligibility and good recovered voice quality. Servetti et.al in<br />
2002[42] proposed a speech encryption method based on the low<br />
complexity perception based partial schemes. In their proposed<br />
algorithm, the speech signal which is compressed by ITU-T<br />
G.729 standard is partitioned into two classes. These are: one, to<br />
be encrypted which is most perceptually relevant and another one<br />
is to be left unprotected. A two level partial encryption<br />
techniques are carried out, a low-protection and high-protection<br />
technique. The first one is used to prevent eavesdropping and the<br />
second one is used for performing full encryption of the<br />
compressed bit stream. Goldburg et.al in 1993[43] proposed an<br />
analog speech encryption based on the discrete transform domain<br />
is discussed. In their method, four discrete orthogonal transforms<br />
have been evaluated for their suitability in encryption and found<br />
that DCT is the best transform to use in transform based<br />
encryption. Scrambling of the speech is achieved by modifying<br />
the DCT coefficients in this paper. Dawson et.al in 1991[44]<br />
described a discrete cosine transform based speech-encryption<br />
system suitable for communication over band-limited telephone<br />
channels. An energy modification technique is presented which<br />
dramatically reduces the residual intelligibility of the scrambled<br />
speech. In addition, a method used to reduce the undesirable<br />
effects of band limitation is described. Simulation results are<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 270<br />
ISSN 2250-3153<br />
included which demonstrate the improved performance of the<br />
scheme.<br />
Goldburg et.al in 1993[45] investigated a technique for the<br />
frequency domain speech encryption. This method investigates<br />
codebook vector which is similar to the vector quantization of<br />
speech that can be used in speech scramblers attacks. The<br />
proposed algorithm shows improved security in the frequency<br />
domain speech encryption. Li et.al in 2003[46] proposed a novel<br />
condition for synchronization and stabilization of Chua's<br />
cryptosystems which is used for multimedia encryption. As per<br />
their concept, a magnifying glass is used to enlarge and observe<br />
any mismatch in the parameter and hence increase the security<br />
level and sensitivity of the Chua‘s cryptosystem.Chung-Ping Wu<br />
et.al in 2005[47] proposed an algorithm which uses two<br />
approaches for combining encryption and compression of<br />
multimedia data. They are selective encryption and modified<br />
entropy coders. First, the limitation of the selective encryption is<br />
examined using cryptanalysis, and, using multiple statistical<br />
models, entropy coders are turned into encryption ciphers. A<br />
high level security is achieved in this technique without affecting<br />
the performance and computational speed of the encoders.<br />
A wavelet based approach for speech encryption was proposed<br />
by Shahreza et.al in 2008[48]. The algorithm utilizes Least<br />
Significant Bits of detail coefficients of the wavelet transform to<br />
achieve encryption in an adaptive manner. Since, the information<br />
is not hidden in the silent parts of the speech signal; there is no<br />
need of silent detection algorithms when using this approach.<br />
When compared to a typical wavelet domain LSB, this method<br />
achieves zero error in hiding/unhiding process. Also, the SNR<br />
measure of the encrypted signal using this method implies that<br />
the imperceptible level of the audio is high than original audio. A<br />
method using augmented identity matrix for the speech<br />
encryption was presented by Tingting Xu et.al in 2009 [49]. By<br />
analyzing the redundancy parameters of the coded speech signal,<br />
enhanced encryption is achieved with low computational<br />
complexity in real time applications using this method.Shirali-<br />
Shahreza et.al in 2010[51] proposed a novel algorithm for speech<br />
signal encryption. In their method, information hiding is<br />
achieved by changing the silent intervals of the speech signal.<br />
The main features of this method are robustness MPEG-1 layer<br />
III (MP3) compression, low computation without scarifying the<br />
quality of the speech.<br />
Aoki in 2010[51] proposed a loss less steganography technique<br />
for G.711 codec which is mainly used in telephony systems such<br />
as VoIP. The LSB of the redundancy parameters of G.711 is<br />
exploited in order to achieve encryption.<br />
Chai Peiqi et.al in 2005[52] proposed a novel blind speech<br />
authentication algorithm which comprises linear predictive<br />
coding (LPC) and least significant bit (LSB) steganography. In<br />
this method of speech authentication, the encryption is carried<br />
out by replacing the LSB with extracted invariable LPC<br />
prediction error feature of the speech signal. Djebbar et.al in<br />
2010[53] addressed a method to limits the impact of large data<br />
embedding on to the wideband speech signal. The maximum<br />
number of bits that can be confined without inducing any<br />
noticeable distortion on the speech is first determined and the<br />
encryption is applied only on selected frequency components.<br />
The algorithm is very robust against noise addition, achieves<br />
high security without affecting the quality of the noise signal.<br />
Yong Feng Huang et.al in 2011[54] presented a data<br />
embedding algorithm using G.723.1 codec mainly used in Voice<br />
over Internet Protocol (VoIP). The algorithm analyzes the<br />
inactive frames of low bit rate audio streams for the embedding<br />
process. The proposed algorithm in this paper achieves high<br />
perfect imperceptibility with a high data embedding capacity.<br />
Another speech encryption on VOIP was presented by Hui Tian<br />
et.al in 2009[55]. Their algorithm uses well known least<br />
significant bits substitution approach for information embedding<br />
with a trade between well security and high hiding capacity. By<br />
distributing the LSBs non-uniformly, the algorithm provides<br />
resistance to the statistical detection of the data with the use of<br />
M-sequence technique. The encrypted information is accurately<br />
retrieved using a RSA key agreement and the synchronized<br />
sequence transmission techniques. The proposed system is<br />
effective and provides good security and transparency.<br />
Zhi-jun Wu et.al in 2003[56] presented an analysis by synthesis<br />
approach for speech information embedding. This approach<br />
provides the ability to embed dynamic secret speech information<br />
onto the host speech signal with good achievement in efficiency<br />
and quality. Rui Miao et.al in 2011[57] presented an effective<br />
speech encryption using least significant bits substitution in<br />
VOIP. Unlike a conventional LSB encryption which uses flat<br />
regions of speech signal for embedding, the presented method<br />
suggests a adaptive steganography scheme that selects lower<br />
embedding bit rate in the flat segments, while the sharp segments<br />
can camouflage more secret message. A study that analysis and<br />
encrypts message on the unused bits of G.723.1 codec audio<br />
frames was presented by Huang et.al in 2011[58]. In this novel<br />
analysis, the authors suggest second detection and regression<br />
analysis in order to achieve encryption over VOIP. A system for<br />
speech information hiding telephone was presented by Wu Zhijun<br />
et.al in 101[59]. The overall system is designed using one<br />
fixed point DSP TMS320C54x and three floating DSPs<br />
TMS320C31, and a single-chip micro-controller for embedding<br />
the information. Hui Tian et.al in 2008[60] proposed another<br />
speech encryption method for VOIP using LSBs. The system<br />
presented by them can not only protect the information, but can<br />
also withstand both extraction attack and deceptive attack<br />
effectively.<br />
Skopin et.al in 2010[61] proposed an analog audio<br />
steganography, which allows embedding human speech signal to<br />
the sound file. The authors presented two approaches for the<br />
speech hiding. In their first approach, unheard places of human<br />
speech in a music spectrum is analyzed and used for speech<br />
encryption using the technology called spectrum shift. In the<br />
second method of their proposal, a technique called spectrum<br />
spreading is used for the purpose of encryption on a new signal<br />
which is obtained by inverse Fourier transform of combined<br />
human voice harmonics and music. A study that addresses<br />
solution for speech quality degradation due to the packet loss in<br />
VOIP using steganography was presented by Aoki in 2007[62].<br />
The authors suggest a technique called packet loss concealment<br />
for the reduction speech quality degradation. Sinha et.al in 2006<br />
[63] attempted a speech signal encryption onto the image using<br />
the concept neuro-genetic speech processing. In this method, null<br />
ciphers are extracted from the voice signal of Bengali speaker<br />
using neuro genetic approach and then veiled with an image.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 271<br />
ISSN 2250-3153<br />
COMPARATIVE SECURITY TECHNIQUES<br />
Fig.1 Monte-carlo simulation results illustrating dependence of<br />
synchronization performance on QIM step size.<br />
To further examine the performance of the Monte-Carlo<br />
simulations were performed and the percent of times the<br />
successful synchronization and data recovery was accomplished<br />
was determined. This percentage was computed for different<br />
value of the QIM embedding steps Δ for the case of no<br />
compression. The corresponding result are shown in Fig.1. Note<br />
that the performance degrades with decrease in QIM steps size as<br />
expected. For Δ = 15 no cases of failed synchronization /<br />
recovery were observed and for Δ=10 over 95% of times<br />
synchronization was regained. To evaluate the pitch-modificaton<br />
based speech watermark with synchronization.[26]<br />
CDW (CONTENT DEPENDENT MULTIPURPOSE<br />
WATERMARKING ).Ten varieties of gray-scale cover images<br />
of size 512 X 512 were used. One of them was watermarked,<br />
estimated, and copied to the other 9 unwatermarked images to<br />
form 9 counterfeit stego images. By repeating this procedure,90<br />
counterfeit stego images were obtained. All BERs obtained by<br />
applying IWCA to our method fell within [0.4847 0.5198] (all<br />
were sufficiently larger than T), which indicates the absence of<br />
watermarks. Obviously, the experimental results are consistent<br />
with the analytic result (Eq. (4)) [27].<br />
The implementation target device is the TMS320C5502 digital<br />
signal processor, which is a commercially popular device in lowpower<br />
areas. Under the assumption that the PE algorithms are<br />
implemented on this device using the C language, the execution<br />
cycle counts of the PE algorithms with the different PESs are<br />
compared in Table 3. To quantify the computational complexity<br />
in an actual condition, the cycle counts were measured during a<br />
three-minute period, which is equivalent to the average call<br />
duration. Implementation results show that, compared to the FE<br />
algorithm, the PE algorithm with the class 3 PES only requires<br />
nearly 40% cycle counts.[42]<br />
Table 1. Comparison of computational load of the PESs<br />
PES Encryption<br />
rate(%)<br />
Cycle counts<br />
per<br />
call(3min)<br />
Cycle count<br />
ratio (%)<br />
Class 1 5 3,528,000 26.20<br />
Class 2 10 4,284,000 31.82<br />
Class 3 20 5,292,000 39.30<br />
Class 4, LPS 30 6,480,000 48.13<br />
Class 5 40 7,704,000 57.22<br />
HPS 45 8,388,000 62.30<br />
FE 100 13,464,000 100.00<br />
#cycles<br />
(key,block<br />
length)<br />
Table 2. Number of cycles for the key expansion<br />
AES CD(Ansi C) BrianGladman<br />
(VC++)<br />
Rijndael Rijndael-1 Rijndael Rijndael-1<br />
(128,128) 2100 2900 305 1389<br />
(192,128) 2600 3600 277 1595<br />
(256,128) 2800 3800 374 1960<br />
The cipher and its inverse take the same time. The difference in<br />
performance that is discussed in the section on mplementation,<br />
is only caused by the difference in the key set-up. Table 3 gives<br />
the figures for the raw encryption, when implemented in C,<br />
without counting the overhead caused by the AES API.[14]<br />
Table 3.Cipher (and inverse) performance<br />
(key,block AES CD(Ansi C) BrianGladman<br />
length)<br />
(VC++)<br />
Speed #cycl Speed #cycles/blo<br />
(mbits/s es/blo (mbits/s ck<br />
ec) ck ec)<br />
(128,128) 27.0 950 70.5 363<br />
(192,128) 22.8 1125 59.3 432<br />
(256,128) 1.8 1295 51.2 500<br />
We gratefully accepted the generous offer from Cryptix to<br />
produce the Java implementation. Cryptix provides however no<br />
performance figures. Our estimates are based on the execution<br />
time of the KAT and MCT code on a 200 MHz Pentium, running<br />
Linux. The JDK1.1.1 Java compiler was used. The performance<br />
figures of the Java implementation are given in Table 4.<br />
Table 4.Cipher (and inverse) performance in java<br />
Key/block length Speed #cycles for rijndael<br />
(128,128) 1100 kbit/s 23.0kcycles<br />
(192,128) 930 kbit/s 27.6kcycles<br />
(256,128) 790 kbit/s 32.3kcycles<br />
IV. CONCLUSION<br />
In this paper, we have presented the art encryption and<br />
decryption schemes discussing their performances and security<br />
issues. Different researchers have contributed their work to this<br />
field, and some of the algorithms are been explained here.<br />
Nowadays, such techniques are studied in wide application<br />
contexts, but the research is still challenging in the<br />
encryptographic community to design more powerful/secure<br />
schemes.<br />
REFERENCES<br />
[1] R. Rivest, L. Adleman, and M. Dertouzos, ―On data banks and privacy<br />
homomorphisms,‖ in Foundations of Secure Computation, 1978, pp. 169–<br />
177.<br />
[2] E. Brickell and Y. Yacobi, ―On privacy homomorphisms,‖ in Advances in<br />
Cryptology (EUROCRYPT ‘87), Lecture Notes in Computer Science,<br />
Springer, 1987, vol. 304, pp. 117–126,<br />
[3] D. Rappe, ―Homomorphic cryptosystems and their applications‖, Ph.D.<br />
thesis, University of Dortmund, Germany, 2004,.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 272<br />
ISSN 2250-3153<br />
[4] R. Cramer and I. Damgard, ―Zero-knowledge for finite field arthmetic, or:<br />
can zeroknowledge be for free?‖ in Advances in Cryptology (CRYPTO<br />
‘98), Lecture Notes in Computer Science, Springer, vol. 1462 , pp. 424–<br />
441.<br />
[5] H. Lipmaa, ―Verifiable homomorphic oblivious transfer and private<br />
equality test,‖ in Advances in Cryptology (ASIACRYPT‘03), Lecture<br />
Notes in Computer Science, Springer, vol. 2894, pp. 416- 433.<br />
[6] P.-A. Fouque, G. Poupard, and J. Stern, ―Sharing decryption in the context<br />
of voting or lotteries,‖ in Proceedings of the 4th International Conference<br />
on Financial Cryptography, 2000,vol. 1962, pp. 90–104 .<br />
[7] T. Sander and C. Tschudin, ―Protecting mobile agents against malicious<br />
hosts,‖ in Mobile Agents and Security, Springer, 1998, vol. 1419, pp. 44–<br />
60.<br />
[8] P. Golle,M. Jakobsson, A. Juels, and P. Syverson, ―Universal reencryption<br />
for mixnets,‖ in Proceedings of the RSA Conference Cryptographers,2004,<br />
vol. 2964, pp. 163–178.<br />
[9] I. Damgard and M. Jurik, ―A length-flexible threshold cryptosystem with<br />
applications,‖ in Proceedings of the 8th Australian Conference on<br />
Information Security and Privacy, 2003, vol. 2727.<br />
[10] A. Adelsbach, S. Katzenbeisser, and A. Sadeghi, ―Cryptology meets<br />
watermarking: detecting watermarks with minimal or zero-knowledge<br />
disclosures,‖ in Proceedings of the European Signal Processing Conference,<br />
2002.<br />
[11] M. Kuribayashi and H. Tanaka, ―Fingerprinting protocol for images based<br />
on aditive homomorphic property,‖ IEEE Transactions on Image<br />
Processing, 2005, vol. 14, no. 12, pp. 2129–2139.<br />
[12] A. Kerckhoffs, ―La cryptographie militaire (part i),‖ Journal des Sciences<br />
Militaires, 1883, vol. 9, no. 1, pp. 5–38.<br />
[13] A. Kerckhoffs, ―La cryptographie militaire (part ii),‖ Journal des Sciences<br />
Militaires, 1883, vol. 9, no. 2, pp. 161–191.<br />
[14] J. Daemen and V. Rijmen, ―The block cipher RIJNDAEL,‖ (CARDIS‘98) ,<br />
Springer ,2000, vol. 1820, pp. 247–256.<br />
[15] J. Daemen and V. Rijmen, ―The design of Rijndael,‖ in AES—the<br />
Advanced Encryption Standard, Informtion Security and Cryptography,<br />
Springer, 2002.<br />
[16] G. Vernam, ―Cipher printing telegraph systems for secret wire and radio<br />
telegraphic communications,‖ Journal of the American Institute of<br />
Electrical Engineers,1926, vol. 45, pp. 109-115.<br />
[17] P. Ekdahl and T. Johansson, ―A new version of the stream cipher SNOW,‖<br />
in Selected Areas in Cryptography (SAC ‘02), Springer, 2002, vol. 2595,<br />
pp. 47–61.<br />
[18] R. Rivest, A. Shamir, and L. Adleman, ―Amethod for obtaining digital<br />
signatures and public-key cryptosystems,‖ Communications of the ACM,<br />
1978, vol. 21, no. 2, pp. 120–126.<br />
[19] T. ElGamal, ―A prublic key cryptosystem and a signature scheme based on<br />
discrete logarithms,‖ in Advances in Cryptology (CRYPTO ‘84), Springer,<br />
1985, vol. 196, pp. 10–18.<br />
[20] C. Shannon, ―Communication theory of secrecy systems,‖ Bell System<br />
Technical Journal, 1949, vol. 28, pp. 656–715.<br />
[21] M. Ajtai and C. Dwork, ―A public key cryptosystem with worstcase/average-case<br />
equivalence,‖ in Proceedings of the 29th ACM<br />
Symposium on Theory of Computing, 1997, pp. 284–293.<br />
[22] P. Nguyen and J. Stern, ―Cryptanalysis of the Ajtai- Dwork cryptosystem,‖<br />
in Advances in Cryptology (CRYPTO ‘98), Springer, 1999, vol. 1462 , pp.<br />
223–242.<br />
[23] R. Canetti, O. Goldreich, and S. Halevi, ―The random oracle model,<br />
revisited,‖ in Proceedings of the 30th ACM Symposium on Theory of<br />
Computing, 1998, pp. 209–218.<br />
[24] P. Paillier, ―Impossibility proofs for RSA signatures in the standard model,‖<br />
in Proceedings of the RSA Conference, 2007, vol. 4377, pp. 31–48.<br />
[25] W. Diffie and M. Hellman, ―New directions in cryptography,‖ IEEE<br />
Transactions on Information Theory, 1976, vol. 22, no. 6, pp. 644–654.<br />
[26] Coumou, D.J.; Sharma, G,‖ Insertion, Deletion Codes With Feature-Based<br />
Embedding: A New Paradigm for Watermark Synchronization with<br />
Applications to Speech Watermarking‖, 2008, vol. 3, No.2, pp: 153 – 165.<br />
[27] Hofbauer, K.; Kubin, G.; Kleijn, W.B.,‖Speech Watermarking for Analog<br />
Flat-Fading Bandpass Channels‖, IEEE Transactions on Audio, Speech,<br />
and Language Processing, 2009,vol.17, no.8, pp: 1624 – 1637.<br />
[28] Chen, N.; Zhu, J., ―Robust speech watermarking algorithm‖, Electronics<br />
Letters,2007, vol. 3,no. 24, pp: 1393- 1395.<br />
[29] Chen, O.T.-C.; Chia-Hsiung Liu,‖ Content-Dependent Watermarking<br />
Scheme in Compressed Speech With Identifying Manner and Location of<br />
Attacks‖, IEEE Transactions on Audio, Speech, and Language Processing,<br />
2007,vol. 15, no.5, pp: 1605 – 1616.<br />
[30] Laurent Girin; Mohammad Firouzmand; Sylvain Marchand,‖ Perceptual<br />
Long-Term Variable-Rate Sinusoidal Modeling of Speech‖, IEEE<br />
Transactions on Audio, Speech, and Language Processing, 2007, vol.15,<br />
no.3, pp: 851 – 861.<br />
[31] Stankovic, S.; Orovic, I.; Zaric, N, ― An Application of Multidimensional<br />
Time-Frequency Analysis as a Base for the Unified Watermarking<br />
Approach‖, IEEE Transactions on Image Processing, 2010, vol.19, no.3, pp:<br />
736 – 745.<br />
[32] Larbi, S.D.; Jaidane-Saidane, M, ―Audio watermarking: a way to<br />
stationnarize audio signals‖, IEEE Transactions on Signal Processing, 2005,<br />
vol. 53, no.2, pp: 816 – 823.<br />
[33] Parvaix, M.; Girin, L.; Brossier, J.-M, ―A Watermarking-Based Method for<br />
Informed Source Separation of Audio Signals With a Single Sensor‖, IEEE<br />
Transactions on Audio, Speech, and Language Processing, 2010, vol.18,<br />
no.6, pp: 1464 – 1475.<br />
[34] Xiangyang Wang; Wei Qi; Panpan Niu, ―A New Adaptive Digital Audio<br />
Watermarking Based on Support Vector Regression‖, IEEE Transactions on<br />
Audio, Speech, and Language Processing,2007, vol.15, no.8, pp: 2270 –<br />
2277.<br />
[35] Chen, O.T.-C.; Wen-Chih Wu, ―Highly Robust, Secure, and Perceptual-<br />
Quality Echo Hiding Scheme‖, IEEE Transactions on Audio, Speech, and<br />
Language Processing, 2008 vol.16, no.3, pp: 629 – 638.<br />
[36] Satti, M.; Kak, S, ―Multilevel Indexed Quasigroup Encryption for Data and<br />
Speech‖, IEEE Transactions on Broadcasting, 2009, vol.55, no.2, pp: 270 –<br />
281.<br />
[37] Malik, H.M.A.; Ansari, R.; Khokhar, A.A, ―Robust Data Hiding in Audio<br />
Using Allpass Filters‖, IEEE Transactions on Audio, Speech, and Language<br />
Processing, 2007, vol.15, no.4, pp: 1296 – 1304.<br />
[38] Kalantari, N.K.; Akhaee, M.A.; Ahadi, S.M.; Amindavar, H, ―Robust<br />
Multiplicative Patchwork Method for Audio Watermarking‖, IEEE<br />
Transactions on Audio, Speech, and Language Processing, 2009, vol. 17,<br />
no. 6, pp; 1133 – 1141.<br />
[39] Baras, C.; Moreau, N.; Dymarski, P, ―Controlling the inaudibility and<br />
maximizing the robustness in an audio annotation watermarking system ―,<br />
IEEE Transactions on Audio, Speech, and Language Processing, 2006,<br />
vol.14, no.5, pp: 1772 – 1782.<br />
[40] In-Kwon Yeo; Hyoung Joong Kim, ―Modified patchwork algorithm: a<br />
novel audio watermarking scheme‖, IEEE Transactions on Speech and<br />
Audio Processing, 2003, vol.11, no.4, pp: 381 – 386.<br />
[41] Sridharan, S.; Dawson, E.; Goldburg, B, ―Fast Fourier transform based<br />
speech encryption system‖, IEEE Communications, Speech and Vision,<br />
1991, vol.138, no.3, pp: 215 – 223.<br />
[42] Servetti, A.; De Martin, J.C., ―Perception-based partial encryption of<br />
compressed speech‖, IEEE Transactions on Speech and Audio Processing,<br />
2002, vol.10, no.8, pp: 637 – 643.<br />
[43] Goldburg, B.; Sridharan, S.; Dawson, E., ―Design and cryptanalysis of<br />
transform-based analog speech scramblers,‖, IEEE Journal on Selected<br />
Areas in Communications, 1993,vol.11, no.5, pp: 735 – 744.<br />
[44] Dawson, E. ―Design of a discrete cosine transform based speech<br />
scrambler‖, Electronics Letters , 1991, vol. 27, no.7, pp: 613 – 614.<br />
[45] Goldburg, B.; Sridharan, S.; Dawson, E.;, ―Cryptanalysis of frequency<br />
domain analogue speech scramblers‖, in Proceedings IEE Communications,<br />
Speech and Vision, 1993, vol.140, no.4, pp: 235 – 239.<br />
[46] Li, K.; Soh, Y.C.; Li, Z.G., ―Chaotic cryptosystem with high sensitivity to<br />
parameter mismatch‖, IEEE Transactions on Circuits and Systems I:<br />
Fundamental Theory and Applications, 2003, vol. 50, no.4, pp: 579 – 583.<br />
[47] Chung-Ping Wu; Kuo, C.-C.J., ―Design of integrated multimedia<br />
compression and encryption systems‖, IEEE Transactions on Multimedia,<br />
2005, vol.7, no.5, pp: 828 – 839.<br />
[48] Shahreza, S.S.; Shalmani, M.T.M., ―High capacity error free wavelet<br />
Domain Speech Steganography‖, IEEE International Conference on<br />
Acoustics, Speech and Signal Processing, 2008, pp: 1729 – 1732.<br />
[49] Tingting Xu; Zhen Yang;, ―Simple and effective speech steganography in<br />
G.723.1 low-rate codes‖, International Conference on Wireless<br />
Communications & Signal Processing, 2009, pp: 1 – 4.<br />
[50] Shirali-Shahreza, M.H.; Shirali-Shahreza, S., ―Real-time and MPEG-1 layer<br />
III compression resistant steganography in speech‖, IET Information<br />
Security, 2010, vol.4, no.1, pp: 1 – 7.<br />
[51] Aoki, N, ―A Semi-lossless Steganography Technique for G.711 Telephony<br />
Speech‖, International Conference on Intelligent Information Hiding and<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 273<br />
ISSN 2250-3153<br />
Multimedia Signal Processing (IIH-MSP), 2010, pp: 534 – 537.<br />
[52] Chai Peiqi; Liu Jingyong; Pei Dingyu; Yang Zhiqiang, ―LPC Prediction<br />
Error Combined with LSB Steganography for Blind Speech<br />
Authentication‖, IEEE 7th Workshop on Multimedia Signal Processing,<br />
2005, pp: 1 – 4.<br />
[53] Djebbar, F.; Hamam, H.; Abed-Meraim, K.; Guerchi, D., ―Controlled<br />
Distortion for High Capacity Data-in-Speech Spectrum Steganography‖,<br />
Sixth International Conference on Intelligent Information Hiding and<br />
Multimedia Signal Processing , 2010, pp: 212 – 215.<br />
[54] Yong Feng Huang; Shanyu Tang; Jian Yuan; ―Steganography in Inactive<br />
Frames of VoIP Streams Encoded by Source Codec‖ IEEE Transactions on<br />
Information Forensics and Security, 2011, vol.6, no.2, pp: 296 – 306.<br />
[55] Hui Tian; Ke Zhou; Hong Jiang; Jin Liu; Yongfeng Huang; Dan Feng; ―An<br />
M-Sequence Based Steganography Model for Voice over IP‖, IEEE<br />
International Conference on Communications, 2009, pp: 1 – 5.<br />
[56] Zhi-jun Wu; Wei Yang; Yi-xian Yang; ―ABS-based speech information<br />
hiding approach‖, Electronics Letters, 2003, vol.39, no.22, pp: 1617 – 1619.<br />
[57] Rui Miao; Yongfeng Huang; ―An Approach of Covert Communication<br />
Based on the Adaptive Steganography Scheme on Voice over IP‖, IEEE<br />
International Conference on Communications, 2011, pp: 1 – 5.<br />
[58] Huang, Y.; Tang, S.; Bao, C.; Yip, Y.J.; ―Steganalysis of compressed<br />
speech to detect covert voice over Internet protocol channels‖, IET<br />
Information Security, 2011, vol.5, no.1, pp: 26 – 32.<br />
[59] Wu Zhi-jun; Niu Xin-Xin; Yang Yi-xian; ―Design of speech information<br />
hiding telephone‖, in Proceedings IEEE Region 10 Conference on<br />
Computers, Communications, Control and Power Engineering, 2002, vol.1,<br />
pp: 113 – 116.<br />
[60] Hui Tian; Ke Zhou; Yongfeng Huang; Dan Feng; Jin Liu; ―A Covert<br />
Communication Model Based on Least Significant Bits Steganography in<br />
Voice over IP‖, The 9th International Conference on Young Computer<br />
Scientists, 2008, pp: 647 – 652.<br />
[61] Skopin, D.E.; El-Emary, I.M.M.; Rasras, R.J.; Diab, R.S.; ―Advanced<br />
algorithms in audio steganography for hiding human speech signal‖, 2nd<br />
International Conference on Advanced Computer Control, 2010, vol.3, pp:<br />
29 – 32.<br />
[62] Aoki, N.; ―Potential of Value-Added Speech Communications by Using<br />
Steganography‖, Third International Conference on Intelligent Information<br />
Hiding and Multimedia Signal Processing, 2007, vol.2, pp: 251 – 254.<br />
[63] Sinha, T.S.; Sanyal, G.; ―Neuro-Genetic based Speech Processing for<br />
Promoting Global Cyber Security using Steganography technique‖, Annual<br />
IEEE India Conference, pp: 1 – 6.<br />
First Author– S.Rajanarayanan, CA, MPhil, ME, (Ph.D),<br />
Assistant Professor, Selvam College of Technology, Department<br />
of Computer Science and Engineering, Namakkal, Tamil Nadu,<br />
India.E-mail: srnarayanan_slm@yahoo.co.in<br />
Second Author – Dr. A. Pushparaghavan BE, MBA, M.Tech,<br />
Ph.D is the Principal and Professor of Electronics and<br />
Communication Engineering in Selvam College of Technology,<br />
Namakkal from April 2011. He worked in different capacity<br />
from Lecturer to Professor and Dean in various leading<br />
institutions like Bannari Amman Institute of Technology, PB<br />
College of Engineering and PSR Engineering College. He is<br />
having around 20 Years of experience in teaching including<br />
academic research.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 274<br />
ISSN 2250-3153<br />
Impact of Seasonal and Habitat variation on composition<br />
of Total Lipid content in Muscle and Liver of Labeo<br />
gonius (Ham)<br />
Abstract- Fish lipid is regarded as quality lipid being rich in<br />
cholesterol, triglyceride and essential fatty acids. The changes in<br />
habitat and seasonal variation have a significant impact on the<br />
quality and quantity of different components of lipid profile. The<br />
present paper reports on the seasonal differences in the<br />
quantitative compositions of total lipid of Labeo gonius in lotic<br />
and lentic habitats. These nutrients were determined in muscle<br />
and liver tissues in four different seasons of the year (premonsoon,<br />
monsoon, retreating monsoon and winter). In lotic<br />
habitat the highest amount of total lipid (301.00 ± 2.73mg/g) was<br />
observed in retreating monsoon in the muscle tissue . Similarly<br />
in liver tissue the highest amount of total lipid was observed in<br />
winter (208.50 ± 1.84mg/g). Though apparently similar trend<br />
was observed in lentic habitat, but some amount of differences<br />
with higher values were observed in muscle tissue. The present<br />
study with comparative analysis of total lipid components reveals<br />
a significant impact of habitat and seasonal variation on the<br />
nutritional quality of lipid in Labeo gonius.<br />
F<br />
Index Terms- Labeo gonius, lotic, lentic, nutrients, lipid<br />
I. INTRODUCTION<br />
ish is one of the main sources of protein and fat and has<br />
become a healthier alternative to meat for the last fifty years.<br />
It stores the lipids in various organs particularly in muscle and<br />
liver. The lipids in fish muscle have received much attention as<br />
source of EPA and DHA fatty acids in human diets. Lipid and<br />
fatty acid composition of many marine fish and shell fish as well<br />
as the effect of different diets and factors on lipid compositions<br />
of various species have been investigated (Ackman and<br />
Takeuchi, 1986 ; Viswanathan and Gopakumar, 1984; Halver,<br />
1980); Suzuki et al. (1986); Viola et al. (1988); Bieniarz et al.<br />
(2000) and observed some of the factors causing changes in the<br />
composition of fatty acids in various species.<br />
The lipid in fish muscle can influence product quality through<br />
interaction with other components. Lipid composition of fish is<br />
of practical importance, particularly in relation to the effects of<br />
lipid components on deterioration during frozen storage and<br />
consumer acceptance. Information about lipid components and<br />
their fatty acid constituents is needed to prevent the oxidative or<br />
hydrolytic factors affecting the quality of fish. Buckley et al.,<br />
(1989) also studied the lipid composition of Heterotis niloticus,<br />
Brycenus nurse, Gnathonemus cyprinoids and Sarotherodon<br />
B.K. Deka*, R. Mahanta* and U.C. Goswami**<br />
*Associate Professor, P.G. Dept. Of Zoology, Cotton College,<br />
** Professor, Dept. of Zoology, Gauhati University, India<br />
galilaeus and reported the common neutral fats as cholesterol,<br />
free fatty acids and cholesterol esters and also diphosphatidyl<br />
glycerol, phosphatidyl glycerol and phosphatidyl ethanolamine<br />
as the most predominant phospholipids.<br />
Takama et al. (1985) reported seasonal variation in fat<br />
deposition in Mackeral and Capelin with tissue variation.<br />
Stansby and Hall (1967) reported approximately 70% of fatty<br />
acids with four, five or six double bonds in lipids from<br />
freshwater fishes which is slightly lower than that of the marine<br />
fish (approximately 88%). Fish oils with polyunsaturated fatty<br />
acids are ―essential‖ to prevent skin diseases and have<br />
neurological benefits in growing children. Recently<br />
Eicosapentaenoic acid has shown great importance because of its<br />
preventive role in arteriosclerosis. Simopoulos et al. (1991)<br />
reported that eicosapen-taenoic acid in the blood is an extremely<br />
potent antithrombotic factor. Some researchers reported the role<br />
of n-3 fatty acids in cancer treatment like breast tumours (El-<br />
Sayed et al., 1994). Lack of these essential fatty acids causes<br />
symptoms of slow growth, deformation of tail fin, faded and fatty<br />
liver, skin pigmentation and stress-shocked (Ackman and Eaton,<br />
1976).<br />
The freshwater fishes provide a great amount of nutrient food<br />
source for human. Presently, a large part of these fish species are<br />
in cultivated forms. Therefore, information about the chemical<br />
composition of various species and their nutritional properties,<br />
biochemical structure and habitat condition is greatly needed.<br />
Impact of seasonal variations on the lipids and the lipid amount<br />
of the fish for its economical importance is of utmost necessary.<br />
However, little is known about the variations in the lipid profile<br />
in local fish fauna. Therefore, the present study was aimed to<br />
investigate the impact of both the seasonal and habitat variations<br />
in the amount of total lipid in muscle and liver of Labeo gonius.<br />
II. MATERIALS AND METHODS<br />
The fishes were collected in Guwahati (Assam, India) from<br />
river Brahmaputra and nearby Lentic Habitat in different seasons<br />
of the year and were anaesthetised by applying diethyl-ether and<br />
then dissected to collect the muscle and liver tissue. The tissues<br />
were dried over a filter paper and immediately weighed and<br />
recorded. .<br />
PREPARATION OF TISSUE SAMPLE<br />
Little amount of propanol (0.5 ml) was added to the tissue and<br />
macerated to make the homogenate. The mixture was centrifuged<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 275<br />
ISSN 2250-3153<br />
for 10 minutes. Supernatant was taken and then made the<br />
requisite volume as 10mg/ml.<br />
The total lipid was estimated following the method of Frings and<br />
Dunn‘s modification for determination of tissue-total-lipid based<br />
on sulfophosphovanilline reaction.<br />
TABLE I: Total Lipid (mg/g of tissue) content of Muscle & Liver tissues of Labeo gonius in different seasons under Lotic & Lentic<br />
habitats.<br />
Total<br />
Lipid (mg/g<br />
of tissue)<br />
Premonsoon Monsoon Retreating<br />
Monsoon<br />
Winter<br />
Muscle Lotic Mean 126.77 294.77 301.00 103.17<br />
SD± 20.19 49.69 12.22 5.15<br />
SEM± 4.52 11.12 2.73 1.52<br />
Lentic Mean 97.5 146.3 82.6 43.2<br />
SD± 9.06 20.62 11.04 8.68<br />
SEM± 2.03 4.61 2.47 1.94<br />
Liver Lotic Mean 127.5 74.51 63.23 208.50<br />
SD± 20.12 5.47 13.25 8.21<br />
SEM± 4.50 1.22 2.96 1.84<br />
Lentic Mean 103.01 76.65 81.39 24.82<br />
SD± 11.43 8.10 8.72 3.37<br />
SEM± 2.56 1.81 1.95 0.75<br />
TABLE II: Showing the significance of variation of total lipid in muscle and liver tissues of Labeo gonius in different seasons under<br />
two habitats (Lotic and Lentic).<br />
Significance of<br />
Variation<br />
t-between Premonsoon<br />
and Monsoon<br />
t-between Premonsoon<br />
and Retreating Monsoon<br />
t-between Premonsoon<br />
and Winter<br />
t-between Monsoon and<br />
Retreating Monsoon<br />
t-between Monsoon and<br />
Winter<br />
t-between Retreating<br />
Monsoon and Winter.<br />
TISSUES HABITATS Total Lipid<br />
t p<br />
Muscle Lotic 13.99
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 276<br />
ISSN 2250-3153<br />
Table III: Showing the significance of variation of total lipid between lotic and lentic habitats in muscle and liver tissues of Labeo<br />
gonius in different seasons.<br />
Tissue t<br />
P<br />
df<br />
Premonsoon Monsoon Retreating<br />
monsoon<br />
Winter<br />
Muscle t 5.91 12.34 59.34 24.37<br />
p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 277<br />
ISSN 2250-3153<br />
III. RESULTS AND DISCUSSION<br />
Fishes show a marked seasonal variation in chemical<br />
composition. The lipid fraction is the component showing the<br />
greatest variation. West African shad (Ethmalosa dorsalis) shows<br />
a range in fat content of 2-7% (wet weight) over the year with a<br />
maximum in July (Watts, 1957). Corvina (Micropogon furnieri)<br />
and pescada-foguete (Marodon ancylodon) have a fat content<br />
range of 0.2-8.7% and 0.1-5.4% respectively (Ito and Watanabe,<br />
1968). It has also been reported that the oil content of these<br />
species varies with size. Watanabe (1971) examined freshwater<br />
fish from Zambia and found a variation from 0.1-5.0% in oil<br />
content of four species including both pelagics and demersals.<br />
Two to three folds of higher lipid content was reported in some<br />
cultured marine fishes than wild types (Cakli, 1994; Aoki et al.<br />
1991; Funuyama et al. 1991; Nakagawa et al. 1991; Hatae et al.<br />
1989). Kunisaki et al. (1986) showed 10-12 fold higher fat<br />
content in cultured horse mackerel than wild type. Dikel (1999)<br />
showed higher lipid content in fish grown in salt water (1.45%)<br />
than in freshwater (0.96%).<br />
In the present study the amount of total lipid from Labeo<br />
gonius in four different seasons of the year under two habitat<br />
conditions was investigated and it was observed that the values<br />
of all the three components of lipid profile were significantly<br />
higher in the lotic habitat (p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 278<br />
ISSN 2250-3153<br />
[12] Freeman DW and Heamsberger JO (1993). An instrumental method for<br />
determining rancidity in frozen catfish fillets. J. Aquat. Food Prod.<br />
Technol.2, 35-50.<br />
[13] Funuyama K, Ushio F and Tomomatsu T (1991). Comparison of nutritive<br />
component between cultured and wild striped jack. Ann. Rep. Tokyo Mettr.<br />
Res. Lab. P . H., 42:185-190.<br />
[14] Halver JE (1980). Lipids and FA. In fish Feed Technology United Nation<br />
Development Programs, p41, Food and Agriculture Organisation of the<br />
United Nations, Rome.<br />
[15] Hatae K, Lee KH, Tsuchiya T and Shimada A (1989). Textual properties of<br />
cultured and wild fish meat. Nippon suisan gakk. Published by Japanese<br />
Soc. Fish. Sci., 55 (2): 363-368.<br />
[16] Ito Y and Watanabe K (1968). Variations in chemical composition in fillet<br />
of corvina and ‗pescada-foguete‘. Contrib. Inst. Oceanogr. Univ. Sao Paolo<br />
(Ser. Technol.), 5, 1-6.<br />
[17] Kunisaki N, Takada K. and Matsuura H (1986). On the study of lipid<br />
contents, muscle hardness and fatty acid compositions of wild and cultured<br />
horse mackerel. Bull. Japan. Soci. Sci. Fish., 52 (2): 333-336.<br />
[18] Nakagawa H, Nishino H, Nematipour GH, Ohya S, Sheimizu T, Horikawa<br />
Y and Yamomoto S (1991). Effects of water velocities on lipid rezerves in<br />
ayu. Nippon suisan gakk. Published by Japanese Soc. Fish. Sci., 57 (9):<br />
1737-1741.<br />
[19] Simopoulos AP, Kifer RR, Martin RE and Barlow SW (1991). Health<br />
Effects of w3 polyunsaturatedfatty acids in seafoods. Karger, Basel.<br />
[20] Stansby ME and Hall AS (1967). Chemical composition of commercially<br />
important fish of the USA. Fish. Ind. Res., 3, 29-34.<br />
[21] Suzuki H, Okazaki K, Hayakawa S, Wadw S and Tamura S (1986).<br />
Influence of commercial dietary FA on PUFA of cultured freshwater fish<br />
and comparison with those of wild fish of the same species. J. Agric. Food<br />
Chem 34:58-60.<br />
[22] Takama K, Love RM and Smith GL (1985). Selectivity in mobilisation of<br />
stored fatty acids by maturing cod, Gadus morhua. L. Comp. Biochem.<br />
Physiol. SOB, 713-718.<br />
[23] Viola S, Mokady S, Behar D and Cogan U (1988). Effects of PUFA in feeds<br />
of tilapia and carp I. Body composition and FA profiles at different<br />
environmental temperatures. Aquaculture 75:127-137.<br />
[24] Viswanathan PG and Gopakumar K (1984). Lipid and FA composition of<br />
fish and shell fish. J. Food Sci. Technol. 21:389.<br />
[25] Watanabe KO (1971). Physical characteristics and chemical composition of<br />
fresh bream, mud sucker, tiger fish and barb from Lake Kariba. Fish.<br />
Res.Bull., 5, 153-173.<br />
[26] Watts JCD (1957). The chemical composition of West African fish. 2. The<br />
West African shad (Ethmalosa dorsalis) from the Sierra Leone river<br />
estuary. Bull. Inst. Fondam. Afr. Noire (A Sci. Nat.), 19, 539-547.<br />
AUTHORS<br />
First Author: Binoy Kumar Deka,<br />
Associate Professor, P.G. Dept. Of Zoology,<br />
Cotton College, Guwahati-1<br />
Emai: bk.deka@rediffmail.com<br />
Second Author: Dr. Rita Mahanta<br />
Associate Professor, P.G. Dept. Of Zoology,<br />
Cotton College, Guwahati-1<br />
Email: ritamahanta@yahoo.co.in<br />
Third Author: Umesh C. Goswami<br />
Dept. Of Zoology,<br />
Fish Biology and Fishery Science.<br />
DST-FIST (Govt. of India) & UGC-SAP<br />
Sponsored Department,<br />
Gauhati University,<br />
Assam, India.<br />
Email: ucgoswami@rediffmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 279<br />
ISSN 2250-3153<br />
Retrieving Stream of Video Frames Using Query<br />
Processing<br />
Ramancha Sandhyarani 1 , Shiramshetty Gouthami 2 and Baggani Ratna 3<br />
Abstract- This paper presents a graph transformation and<br />
matching approach to identify the stream of video frames<br />
using query processing. With query processing algorithm to<br />
retrieve similar frames, the mapping relationship between<br />
the query and database video is first represented by a<br />
bipartite graph. The densely matched parts along the long<br />
sequence are then extracted, followed by a filter-andrefine<br />
search strategy to prune some irrelevant subsequences.<br />
During the filtering stage, Maximum Size Matching is<br />
deployed for each sub graph constructed by the query<br />
and candidate subsequence to obtain a smaller set of<br />
candidates. During the refinement stage, Sub-Maximum<br />
Similarity Matching is applied to identify the subsequence<br />
with the highest aggregate score from all candidates,<br />
according to a robust video similarity model that includes<br />
visual content, temporal order, and frame alignment<br />
information. In the filter-and-refine phase, some non similar<br />
segments are first filtered; several relevant segments are then<br />
processed to quickly identify the most suitable segments.<br />
Index Terms- query processing, video frames, network<br />
packets segments.<br />
T<br />
I. INTRODUCTION<br />
he project aims at building an effective video-information<br />
representation and harnessing system. The representation<br />
scheme should be applicable to most videos and be rich<br />
enough to allow for various kind of video information<br />
encoding and access. The system should extract video objects<br />
and other semantic features from video sequences, characterize<br />
object interactions, scene activity and events, with minimum<br />
possible human intervention, using both visual and aural<br />
information. A novel representation modality of the video<br />
sequences in terms of these descriptors will be evolved which<br />
will permit a variety of useful operations like generation of<br />
video summaries, application driven semantic transcoding of<br />
video content and hyper-linking of video segments exhibiting<br />
similarity of content or other semantic relation(s),which are<br />
quintessential to content guided video browsing in a hyperlinked<br />
organization of a video collection. For universal interpretation<br />
and use of the semantic concepts in video information there is a<br />
need for associated domain ontology. This will make possible<br />
integration of the system with the Semantic Web and allow it to<br />
interact with other knowledge based information systems in the<br />
distributed environment. The proposed system will also provide<br />
1 sandhya_guptha_r@yahoo.co.in,<br />
2 gouthami.shiramshetty@gmail.com<br />
3 ratna_075@yahoo.co.in<br />
for ontology driven access mechanism to the video based<br />
information. Many investigations have been made on contentbased<br />
video retrieval. However, despite the importance, video<br />
subsequence identification, which is to find the similar content to<br />
a short query clip from a long video sequence, has not been well<br />
addressed. This paper has presented an effective and efficient<br />
query processing strategy for temporal localization of similar<br />
content from a long un segmented video stream, considering<br />
target subsequence may be approximate occurrence of potentially<br />
different ordering or length with query clip.<br />
II. PREVIOUS WORK<br />
The project aims at building an effective video-information<br />
representation and harnessing system. The representation<br />
scheme should be applicable to most videos and be rich<br />
enough to allow for various kind of video information<br />
encoding and access. The system should extract video objects<br />
and other semantic features from video sequences, characterize<br />
object interactions, scene activity and events, with minimum<br />
possible human intervention, using both visual and aural<br />
information. A novel representation modality of the video<br />
sequences in terms of these descriptors will be evolved which<br />
will permit a variety of useful operations like generation of<br />
video summaries, application driven semantic transcoding of<br />
video content and hyper-linking of video segments exhibiting<br />
similarity of content or other semantic relation(s),which are<br />
quintessential to content guided video browsing in a hyperlinked<br />
organization of a video collection. For universal interpretation<br />
and use of the semantic concepts in video information there is a<br />
need for associated domain ontology. This will make possible<br />
integration of the system with the Semantic Web and allow it to<br />
interact with other knowledge based information systems in the<br />
distributed environment. The proposed system will also provide<br />
for ontology driven access mechanism to the video based<br />
information.<br />
III. PRESENT WORK<br />
With the demand for visual information of rich content,<br />
effective and efficient manipulations of large video databases<br />
are increasingly desired. Many investigations have been made on<br />
content-based video retrieval. However, despite the importance,<br />
video subsequence identification, which is to find the similar<br />
content to a short query clip from a long video sequence, has not<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 280<br />
ISSN 2250-3153<br />
been well addressed. It is often undesirable to manually check<br />
whether a video is part of a long stream by browsing its entire<br />
length.<br />
IV. MODULES<br />
In this application we have mainly two systems they are<br />
Video Copy Detection<br />
Video Similarity Search<br />
The modules in these two systems are explained briefly.<br />
Video Copy Detection<br />
Target system should have servers like FTP,HTTP,SSH<br />
etc.,<br />
This server software should accept incoming connections<br />
from the remote<br />
Detection System design<br />
Detection System module<br />
User Interface module<br />
Detection System modules<br />
i. Packet Capturing Module<br />
ii. Field Extraction Module<br />
iii. Field Information Storing<br />
iv. PCF for SYN-Flood<br />
v. PCF for Port-Scan<br />
Packet Capturing Module<br />
Packet capture is the act of capturing data packets crossing a<br />
network. Deep packet capture (DPC) is the act of capturing<br />
complete network packets crossing a network. In this module we<br />
capture data packets in the scalable network using packet<br />
capturing tools.<br />
Field Extraction Module<br />
Field Extraction Refers both to the process by which fields are<br />
extracted from event data, and the results of that process, also<br />
referred to as extracted fields. Field extraction can take place<br />
either before events are indexed or after event indexing. In this<br />
module we extract all the fields present in the network.<br />
Field Information Storing<br />
In this module we store all the details of the data fields.<br />
PCF for SYN-Flood<br />
Partial Completion Filter (PCF) consists of parallel stages each<br />
containing hash buckets that are incremented for a SYN and<br />
decremented for a FIN. In this module we use PCF for<br />
identifying the SYN packets in the network.<br />
PCF for Port-Scan<br />
A port scan or port-scan is an attack that sends client requests to<br />
a range of server port addresses on a host, with the goal of<br />
finding an active port and exploiting a known vulnerability of<br />
that service. In this module we use PCF for identifying the portscan<br />
in the network<br />
Main objectives of this project were to develop<br />
A scheme for construction and extraction of semantic<br />
features involving video objects and frame based<br />
characteristics for describing content of the video in<br />
terms of both aural and visual features<br />
An ontological specification for video information for<br />
enabling inter-operable conceptual access<br />
A representational scheme for video documents for<br />
efficient video information browsing, semantic<br />
transcoding, querying and semantics driven delivery.<br />
Fig.1. Home Page<br />
V. EXPERIMENTAL INVESTIGATIONS<br />
The above screen page displays the main features of the<br />
project and also browse option. When we click on browse of the<br />
input video we enter into the login page of the project. In this<br />
project we can view the image of the input video and also the<br />
image of the database video one of the main features. The<br />
Subsequence Identification button helps to compare the video of<br />
the input video to the video of the database video and helps in<br />
retrieving the similar frames of both the image<br />
Figure 2: Login Page<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 281<br />
ISSN 2250-3153<br />
The above screen page displays the main features of the<br />
project and also the browse option. After clicking on the browse<br />
option first the image on the database video is displayed. The<br />
data base searching for the retrieval of the similar frames go on<br />
the input video the two videos .After comparing two images it<br />
retrieves the similar subsequent frames of the video<br />
Fig.3 Retrieval of Frames<br />
The above screen page displays the main features of the<br />
project and also the browse option. After clicking on the<br />
browse option first the image on the database video is displayed.<br />
The data base searching for the retrieval of the similar frames go<br />
on the input video the two videos. After comparing two images it<br />
retrieves the similar subsequent frames of the video<br />
Fig.4. Log Viewer<br />
The above screen shows the segments of the video<br />
subsequence frames. The segments of the input video is<br />
compared to the segment of database video for identification<br />
of similar frames. the segments identification is done till the<br />
retrieval other similar frames on both the input video and the<br />
database video.<br />
. Figure 5: Log Viewer<br />
The above screen shows the segments of the video<br />
subsequence frames. The segments of the input video is<br />
compared to the database video with the subsequence<br />
identification the segments are mapped until a match is found<br />
between this two videos and the relevant frames are<br />
displayed. The above screen also displays the final execution of<br />
the project.<br />
VI. CONCLUSIONS AND FUTURE WORK<br />
This paper has presented a query processing method for<br />
retrieving stream of video frames. A video query processor<br />
should support video-based operations for search by content and<br />
streaming, new video query types, and the incorporation of video<br />
methods and operators in generating, optimizing and executing<br />
query plans. In the preliminary phase, the similar frames of query<br />
clip are retrieved by a batch query algorithm. Then, a bipartite<br />
graph is constructed to exploit the opportunity of spatial pruning.<br />
The high-dimensional query and database video sequence can be<br />
transformed to two sides of a bipartite graph. Only the dense<br />
segments are roughly obtained as possibly similar subsequences.<br />
In the filter-and-refine phase, some non similar segments are first<br />
filtered; several relevant segments are then processed. During<br />
the filtering stage, Maximum Size Matching is deployed for<br />
each sub graph constructed by the query and candidate<br />
subsequence to obtain a smaller set of candidates. During<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 282<br />
ISSN 2250-3153<br />
the refinement stage, Sub-Maximum Similarity Matching is<br />
applied to identify the subsequence with the highest aggregate<br />
score from all candidates, according to a robust video<br />
similarity model that includes visual content, temporal order,<br />
and frame alignment information.<br />
ACKNOWLEDGMENT<br />
We extremely thank our Principal and the management for<br />
their continuous support in Research and Development.<br />
We are also very grateful to our faculty members for their<br />
valuable suggestions and their ever ending support.<br />
Especially, we thank our college Principal and management<br />
for their financial support for receiving the sponsorship.<br />
REFERENCES<br />
[1] A.W.M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain,<br />
―Content-Based Image Retrieval at the End of the Early Years, ‖IEEE<br />
Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 12,pp. 1349-<br />
1380, Dec. 1994.<br />
[2] C. Faloutsos, M. Ranganathan, and Y. Manolopoulos, ―Fast Subsequence<br />
Matching in Time-Series Databases,‖ Proc. ACM SIGMOD ‘94, pp. 419-<br />
429, 1995.<br />
[3] H. Wang, A. Divakaran, A. Vetro, S.-F. Chang, and H. Sun, ―Survey of<br />
Compressed-Domain Features Used in Audio-Visual Indexing and<br />
Analysis,‖ J. Visual Comm. and Image Representation, vol. 14, no. 2, pp.<br />
150-183, 1998.<br />
[4] R. Mohan, ―Video Sequence Matching,‖ Proc. IEEE Int‘l Conf. Acoustics,<br />
Speech, and Signal Processing (ICASSP ‘98), pp. 3697-3700, 2000.<br />
[5] C. Kim and B. Vasudev, ―Spatiotemporal Sequence Matching for Efficient<br />
Video Copy Detection,‖ IEEE Trans. Circuits and Systems for Video<br />
Technology, vol. 15, no. 1, pp. 127-132, 2004.<br />
[6] X.-S. Hua, X. Chen, and H. Zhang, ―Robust Video Signature Based on<br />
Ordinal Measure,‖ Proc. IEEE Int‘l Conf. Image Processing (ICIP ‘04), pp.<br />
685-688, 2005.<br />
[7] C.-Y. Chiu, C.-H. Li, H.-A. Wang, C.-S. Chen, and L.-F. Chien, ―A Time<br />
Warping Based Approach for Video Copy Detection,‖ Proc. 18th Int'l Conf.<br />
Pattern Recognition (ICPR '06),vol.3,pp.228-231,2006.<br />
[8] M.R. Naphade, M.M. Yeung, and B.-L. Yeo, ―A Novel Scheme for Fast and<br />
Efficient Video Sequence Matching Using Compact Signatures,‖ Proc.<br />
Storage and Retrieval for Image 2000.<br />
[9] K.M. Pua, J.M. Gauch, S. Gauch, and J.Z. Miadowicz, ―Real Time<br />
Repeated Video Sequence Identification,‖ Computer Vision and Image<br />
Understanding, vol. 93, no. 3, pp. 310-327,2004.<br />
[10] A. Hampapur, K. Hyun, and R. M. Bolle, ―Comparison of sequence<br />
matching techniques for video copy detection,‖ in Storage and Retrieval for<br />
Media Databases, 2002, pp. 194–201.<br />
[11] J. Xu, Z. Zhang, A. K. H. Tung, and G. Yu, ―Efficient and effective<br />
similarity search over probabilistic data based on earth mover‘s<br />
distance,‖PVLDB, vol. 3, no. 1, pp. 758–769, 2010.<br />
[12] A. Joly, O. Buisson, and C. Fr´elicot, ―Statistical similarity search applied<br />
to content-based video copy detection,‖ in BDA, 2005.<br />
AUTHORS<br />
First Author: Ramancha Sandhyarani Worked in Jayamukhi<br />
Institute of Technological Sciences, Warangal as Assistant<br />
Professor for the year 2006-2011.She received her M.Tech<br />
Degree from JNTU Hyderabad,(A.P,India) .<br />
Second Author: Shiramshetty Gouthami is presently working as<br />
Asst.Prof in Computer Science Engineering Department at<br />
Jayamukhi Institute of Technological Sciences; Warangal for the<br />
past 5 years.She received her M.Tech Degree from JNTU<br />
Hyderabad,( A.P, India).<br />
Third Author: Baggani Ratna Worked in DRK Collage of<br />
Engineering and Techonology as Assistant Professor for the year<br />
2008-2011. She received her M.Tech Degree from JNTU<br />
Hyderabad,(A.P,India)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 283<br />
ISSN 2250-3153<br />
Screening of phaseolus vulgaris Cultivars Growing in<br />
Various Areas of Jammu and Kashmir for Anthracnose<br />
Resistance<br />
Balbir Kour, Gurmeet Kour, Sanjana Kaul, Manoj K. Dhar<br />
Abstract- Phaseolus vulgaris is an economically important<br />
crop. The most important disease which hampers its production<br />
is anthracnose which is found in almost every bean growing<br />
region of the world. Anthracnose in beans is caused by a<br />
hemibiotrophic fungus, namely Colletotrichum lindemuthianum.<br />
Use of resistant genotypes will provide a long lasting solution to<br />
the economic losses caused by anthracnose as this method is<br />
biologically safe as well as cost effective. For the present<br />
investigation, nearly ten C. lindemuthianum isolates collected<br />
from Baramulla, Kashmir were used. Inoculum of each isolate<br />
was produced by inoculating bean extract medium with a<br />
monosporic culture of C. lindemuthianum, incubated at 25ºC for<br />
seven days, the spore suspension culture filtered through double<br />
layered muslin cloth and inoculum load was adjusted to 1.2 X<br />
10 6 spores per milliliter with the help of a haemocytometer. Seed<br />
dip method was used for the inoculation of the test plant. The<br />
inoculated seeds were sown in sand and were kept at 25ºC for the<br />
period of one month. The disease reaction was scored after<br />
twelve days of inoculation following 0-5 scale where 0 = no<br />
disease; 1 = pin point lesion; 2 = small lesion; 4 = large deep<br />
lesion and 5 = sunken lesions with rotten apex. Two broad<br />
categories of the accessions emerged; infected (infection rate<br />
high or mild) or non-infected. Based on the presence or absence<br />
of infected plants accessions were labeled as susceptible or<br />
resistant.<br />
A<br />
Plant Genomics Laboratory, School of Biotechnology, University of Jammu,<br />
Jammu (J & K), 180006, India<br />
I. INTRODUCTION<br />
mong grain crops, pulses (food legumes) rank third after<br />
cereals and oilseeds in terms of total world production.<br />
Pulses are rich in proteins and represent an important source of<br />
dietary protein for humans and animals. The proteins are<br />
generally composed of high amount of lysine, while the amount<br />
of methionine and cysteine is less. However, consumption of<br />
legumes and cereals results in a balanced diet of energy and<br />
protein. Legumes are also an important source of some essential<br />
minerals (1) . The legumes have been observed to reduce blood<br />
cholesterol levels (2) . Among major food legumes, common bean<br />
(Phaseolus vulgaris L.) is third in importance, has broadest<br />
genetic base and is grown and consumed in almost every part of<br />
the world (3,4) . Common bean (Phaseolus vulgaris L.) is<br />
important food grain legume crop, cultivated in almost every part<br />
of the world. This species is a diploid with 2n=2X=22, it is<br />
predominantly a self crossing species with only exception of<br />
about 3%. (5)<br />
Although, beans are cultivated throughout India, Himalayas<br />
hold the richest diversity of common bean. Common bean<br />
production is influenced by both biotic and abiotic stresses;<br />
biotic factors are responsible for major losses. Six major diseases<br />
(anthracnose, rust, angular leaf spot, common bacterial blight,<br />
Bean Golden Mosaic Virus and Bean Common Mosaic Virus)<br />
are known to hamper common bean production. However, the<br />
most important among these is anthracnose which is found in<br />
almost every bean growing region of the world (6) . It is<br />
considered as one of the most destructive disease (7) . Anthracnose<br />
is caused by a hemibiotrophic fungus, namely Colletotrichum<br />
lindemuthianum. This disease is known to cause total loss of the<br />
crop. Disease generally occurs by contaminated seeds or infected<br />
plant debris (8) . This disease may lead to major or total crop loss,<br />
particularly in case a susceptible variety is sown (9,10) . The<br />
anthracnose genetics has been studied for a long time (11) . This<br />
host-pathogen interaction was the first report of race-cultivar<br />
specificity (12) . The chemical control method has been used to<br />
check the disease, however, it is very expensive and causes<br />
severe threat to the health and environment. Use of resistant<br />
genotypes will provide a long lasting solution, as this method is<br />
biologically safe as well as cost effective. Therefore the present<br />
study was aimed to characterize the Common bean accessions<br />
growing in J&K state for resistance and susceptibility.<br />
II. METHODOLOGY<br />
For the present study forty four common bean accessions<br />
growing in various areas of Jammu and Kashmir were collected.<br />
Screening for disease resistance in these accessions was achieved<br />
by challenging the plants with the pathogen. The inoculums of<br />
Colletotricum lindemuthianum were applied to all the accessions<br />
and disease incidence and infection rate were determined by<br />
visual rating. The plants were classified as susceptible and<br />
resistant. Infected pods of various accessions of beans were<br />
collected from different areas of Baramulla district in Kashmir<br />
valley at regular time intervals. After collection, the infected<br />
pods were placed in between the folds of newspapers for drying.<br />
Efforts were made to remove as much moisture as possible, in<br />
order to avoid cross contamination by other fungi. The samples<br />
were kept in the paper bags marked with different accession<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 284<br />
ISSN 2250-3153<br />
numbers. The bags were wrapped in polythene and kept at 4ºC to<br />
minimize the degradation and to prevent the contamination.<br />
Potato dextrose agar medium (PDA), the basic medium for<br />
culturing of many fungi, was successfully used for<br />
Colletotrichum isolates collected from various bean accessions.<br />
The antibiotic, chloramphenicol (50μg/ml) was added to the<br />
medium to avoid bacterial contamination. In addition bean pod<br />
extract medium was also used. Infected pods were washed with<br />
distilled water, treated with disinfectant to eliminate the bacterial<br />
and other contaminants from the pod surface. Small pieces of the<br />
infected pods were inoculated on PDA and kept at 25ºC. The<br />
fungus started growing after a week of inoculation and thereafter,<br />
its growth was monitored every week. The fungus isolated from<br />
infected pods was again sub-cultured on PDA to obtain the pure<br />
cultures. For preparing a pure culture, the spores were picked<br />
from the petriplates and sub-cultured on fresh PDA plate until<br />
pure culture was obtained. Using this technique five isolates of<br />
C. lindemuthianum were obtained. Pure cultures of C.<br />
lindemuthianum were stored at 4ºC. These were maintained as<br />
mother cultures for further study. For long term storage, glycerol<br />
cultures were raised. Spores were mixed in 70% glycerol in<br />
storage vials and were stored at -80ºC. In addition to PDA<br />
medium, bean extract medium was also used for the sporulation<br />
of the fungus. For preparation of bean extract medium, young<br />
bean pods were surface sterilized and boiled in water. The extract<br />
was then filtered through double layered muslin cloth, and to the<br />
filtrate 2% dextrose was added. The pH of the medium was<br />
adjusted to 7.0 and 2% agar was added prior to autoclaving. For<br />
the present investigation, three C. lindemuthianum isolates<br />
collected from Baramulla, Kashmir were used. Inoculum of each<br />
isolate was produced by inoculating bean extract medium with a<br />
monosporic culture of C. lindemuthianum. After inoculation, the<br />
plates were incubated at 25ºC for seven days. The surface of the<br />
culture was scraped with a sterilized glass rod, and the spore<br />
suspension was prepared in sterilized water from seven day old<br />
sporulating cultures of all the three isolates. The spore<br />
suspension culture was filtered through double layered muslin<br />
cloth and inoculum load was adjusted to 1.2 X 10 6 spores per<br />
milliliter with the help of a haemocytometer. Seed dip method<br />
was used for the inoculation of the test plant. Five surface<br />
sterilized seeds of each accession were germinated on sterilized<br />
filter paper under aseptic conditions. The seeds were surface<br />
sterilized by dipping in 70% ethanol for 5min, followed by<br />
treatment with 0.1% mercuric chloride for 10min and finally 2X<br />
wash with double distilled water. Five day old germinating seeds<br />
of each accession (5 seeds) were dip inoculated in the spore<br />
suspension for 5min after removal of the seed coat. The<br />
inoculated seeds were sown in sand and were kept at 25ºC for<br />
one month. The disease reaction was scored after twelve days of<br />
inoculation following 0-5 scale (13) , where 0 = no disease; 1 = pin<br />
point lesion; 2 = small lesion; 3 & 4 = large deep lesion and 5 =<br />
sunken lesions with rotten apex.<br />
III. RESULTS AND DISCUSSION<br />
The present study being first of its kind, for the screening of<br />
resistant common bean accessions growing in Jammu and<br />
Kashmir state, is based upon the forty seven common bean<br />
accessions collected from various areas (Table 1). During present<br />
study the common bean accessions were challenged with C.<br />
lindemuthianum cultures to screen the resistant and susceptible<br />
cultivars. The isolates of C. lindemuthianum were collected from<br />
infected pods of different cultivars growing in various areas of<br />
Kashmir valley. A total of ten fungal isolates were cultured and<br />
maintained while in the present study the results with one C.<br />
lindemuthianum isolate on common bean accessions has been<br />
given. Based on the response, the plants were classified as<br />
susceptible and resistant (Table 2). This method of screening the<br />
bean germplasm for disease resistance is an established one and<br />
has been used by many workers including (14) . The latter workers<br />
reported that after one week of treatment, the susceptible<br />
cultivars showed severe infection on the cotyledons and the<br />
hypocotyls resulting in death. Although, slightly susceptible<br />
cultivars survived, however, these developed distinct stem and<br />
leaf necrosis (Fig 1, 2). On the other hand the resistant cultivars<br />
did not show any symptoms of the disease (Fig. 3, 4). Similar<br />
results were obtained in the present investigation. The<br />
susceptible cultivars showed formation of large lesions with<br />
sunken cankers on cotyledons and dead apex, the mild infected<br />
plants showed slight infection on cotyledons, while resistant<br />
plants were healthy and without any disease symptoms. This<br />
method of screening varieties has been used by many other<br />
workers in common bean and found to be the most suitable one<br />
(15-17) . Therefore, the present study, being the first of its kind to<br />
scan the bean germplasm for resistance to anthracnose from<br />
various areas of Kashmir region, these resistant varieties can be<br />
used for the development of better varieties of beans.<br />
IV. CONCLUSION<br />
From the present study we concluded that the beans<br />
germplasm growing in various areas of Jammu and Kashmir hold<br />
the richest repository of anthracnose resistant cultivars. These<br />
cultivars can be studied in detail to isolate the resistant genes<br />
present in them and can be used for the breeding studies so as to<br />
develop a cultivar which can withstand the threat of this deadly<br />
disease.<br />
ACKNOWLEDGMENT<br />
Authors are thankful to the Department of Biotechnology,<br />
Govt. of India for financial support.<br />
REFERENCES<br />
[1] Grusak MA. Enhancing mineral content in plant food products. J Am Coll<br />
Nutr 2002; 21:178S-183S.<br />
[2] Andersen JW, Story L, Sieling B, Chen WJ, Petro MS, Story J.<br />
Hypocholesterolemic effects of oat-bran or bean intake for<br />
hypercholesterolemic men. Am J Clin Nutr 1984; 40:1146-1155.<br />
[3] Singh SP. Integrated genetic improvement. In Common bean improvement<br />
in the twenty-first century. S.P. Singh ed. (Kluwer, Dordrecht, the<br />
Netherlands. 1999 pp. 133-165.<br />
[4] Broughton WI, Hernandez G, Blain M, Beebe S, Gepts P, Vanderleyden J.<br />
Beans (Phaseolus spp.) model food legumes. Plant Soil 2003; 252: 55-128.<br />
[5] Ibarra-Perez F, Ehdaie B, Waines G. Estimation of outcrossing rate in<br />
common bean. Crop Sci 1997; 37:60-65.<br />
[6] [Kelly JD, Afanador L, Cameron LS. New races of Colletotrichum<br />
lindemuthianum in Michigan and implications in dry bean resistance<br />
breeding. Plant Dis 1994; 78:892-894.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 285<br />
ISSN 2250-3153<br />
[7] Pastor-Corrales MA Tu JC. Anthracnose. In Bean production problems in<br />
the tropics. H.F. Schwartz and M.A. Pastor-Corrales eds. (CIAT, Cali,<br />
Colombia), 1989 pp. 77-104.<br />
[8] Dillard HR, Cobb AC. Survival of Colletotrichum lindemuthianum in bean<br />
debris in New York State. Plant Dis 1993; 77:1233-1238.<br />
[9] Fernandez MT, Fernandez M, Centeno ML, Canal MJ, Rodriguez R.<br />
Reaction of common bean callus to culture filtrate of Colletotrichum<br />
lindemuthianum: Differences in the composition and toxic activity of fungal<br />
culture filtrates. Plant Cell Tiss Organ cult 2000; 61:41-49.<br />
[10] Sharma PN, Kaur M,Sharma OP, Sharma P, Pathania A. Morphological,<br />
pathological and molecular variability in Colletotrichum capsici, the cause<br />
of fruit rot of chillies in the subtropical region of north-western India.<br />
Phytopathology 2005; 153:232-237.<br />
[11] McRostie GP. Inheritance of anthracnose resistance as indicated by a cross<br />
between a resistant and a susceptible bean. Phytopathology 1919; 9:141-<br />
148.<br />
[12] Barrus MF. Variation of cultivars of beans in their susceptibility to<br />
anthracnose. Phytopathology 1911; 1:190-195.<br />
[13] Drijfhout E, Davis HJC. Selection of a new set of homogeneously reacting<br />
bean (Phaseolus vulgaris) differential to differentiate races of common<br />
bean. Plant Pathol 1986; 38: 391-396.<br />
[14] Kruger J, Hoffmann GM, Hubbling N. The kappa race of Colletotrichum<br />
lindemuthianum and sources of resistance to anthracnose in Phaseolus<br />
beans. Euphytica 1977; 26:23-25.<br />
[15] Pathania A, Sharma PN, Sharma OP, Chahota RK, Bilal Ahmad Sharma P.<br />
Evaluation of resistance sources and inheritance of resistance in kidney<br />
bean to Indian virulences of Colletotrichum lindemuthianum: Evaluation of<br />
resistance in bean to anthracnose. Euphytica 2006; 149:97-103.<br />
[16] Genchev D, Christova P, Kiryakov I, Beleva M, Batchvarova R Breeding of<br />
common bean for resistance to the physiological races of Anthracnose<br />
identified in Bulgaria. Biotechnol Biotechnol Eq 2010; 24:1814-1823.<br />
AUTHORS<br />
First Author – Balbir Kour, Senoir Research Fellow, Plant<br />
Genomics Laboratory, School of Biotechnology, University of<br />
Jammu, Jammu (J & K), 180006, Email:<br />
balbirbalio2@yahoo.co.in<br />
Second Author – Gurmeet Kour, Research Associate, Plant<br />
Genomics Laboratory, School of Biotechnology, University of<br />
Jammu, Jammu (J & K), 180006<br />
Third Author – Sanjana Kaul, Senoor Assistant Professor, Plant<br />
Genomics Laboratory, School of Biotechnology, University of<br />
Jammu, Jammu (J & K), 180006<br />
Fourth Author – Prof. Manoj K. Dhar, Director & Head , Plant<br />
Genomics Laboratory, School of Biotechnology, University of<br />
Jammu, Jammu (J & K), 180006<br />
Correspondence Author – Balbir Kour, Email:<br />
balbirbalio2@yahoo.co.in<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 286<br />
ISSN 2250-3153<br />
Table 1: Bean germplasm and its characterization<br />
S. No. Accession Number Colour of Seeds Shape of<br />
Seeds<br />
Type of Seeds<br />
1 JUBG50 Pink Small Snap<br />
2 JUBG51 Pink Small Dry<br />
3 JUBG52 Mottled Small Snap<br />
4 JUBG53 Red Small Dry<br />
5 JUBG54 Black Small Dry<br />
6 JUBG55 Mottled Big Dry<br />
7 JUBG56 Brown Big Snap<br />
8 JUBG57 Mottled Big Dry<br />
9 JUBG58 Red Big Snap<br />
10 JUBG59 Brown Small Dry<br />
11 JUBG60 Mottled Small Snap<br />
12 JUBG61 Mottled Small Dry<br />
13 JUBG62 Brown Big Snap<br />
14 JUBG63 Brown Big Snap<br />
15 JUBG64 White Small Snap<br />
16 JUBG65 Light brown Medium Dry<br />
17 JUBG66 White Small Dry<br />
18 JUBG67 Pink Medium Dry<br />
19 JUBG68 Pink Big Snap<br />
20 JUBG69 White Medium Dry<br />
21 JUBG70 Red Small Dry<br />
22 JUBG71 Blackish brown Small Snap<br />
23 JUBG72 Mottled Big Snap<br />
24 JUBG73 Pink Small Dry<br />
25 JUBG74 Pink Small Snap<br />
26 JUBG75 Red Big Dry<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 287<br />
ISSN 2250-3153<br />
S.<br />
No<br />
27 JUBG76 White Small Dry<br />
28 JUBG77 Mottled Medium Dry<br />
29 JUBG78 Mottled Small Dry<br />
30 JUBG79 Pink Big Dry<br />
31 JUBG80 Pink Small Snap<br />
32 JUBG81 Brown Big Dry<br />
33 JUBG49 Mottled Big Dry<br />
34 JUBG82 Red Medium Dry<br />
35 JUBG83 Mottled Medium Dry<br />
36 JUBG18 Red Small Dry<br />
37 JUBG84 Red Small Dry<br />
38 JUBG85 Red Small Snap<br />
39 JUBG86 Brown Big Snap<br />
40 JUBG87 Brown Big Snap<br />
41 JUBG88 Mottled Medium Snap<br />
42 JUBG89 Mottled Big Snap<br />
43 JUBG90 Red Medium Snap<br />
44 JUBG92 Red Medium Snap<br />
Accession Observations after 1 st<br />
Table 2: Response of different bean accessions to C. lindemuthianum<br />
week<br />
1 JUBG18 Infection on cotyledons,<br />
no germination<br />
2 JUBG49 Infection on cotyledons,<br />
very slow germination<br />
3 JUBG50 Infection on cotyledons,<br />
very slow germination<br />
Observations after 2 nd<br />
week<br />
Highly infected<br />
cotyledons, slow growth<br />
rate<br />
Highly infected<br />
cotyledons, slow growth<br />
rate<br />
Highly infected<br />
cotyledons, slow growth<br />
rate<br />
Observations after 3 rd week resistant Susceptible<br />
Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
Infection on stem and lower<br />
sides of leaves<br />
Infection on stem and leaves.<br />
Plants very slow growing<br />
- +<br />
- +<br />
- +<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 288<br />
ISSN 2250-3153<br />
4 JUBG51 Slight infection on<br />
cotyledons, fast<br />
germination<br />
Healthy plants, growth<br />
rate high<br />
Healthy plants + -<br />
5 JUBG52 Highly infected cotyledons No germination No plant formation - +<br />
6 JUBG53 Highly infected cotyledons Germination very slow Shoot apex dead - +<br />
7 JUBG54 Slight infection on<br />
cotyledons, fast<br />
germination<br />
8 JUBG55 No infection on<br />
cotyledons, fast<br />
germination<br />
9 JUBG56 No infection on<br />
cotyledons, fast<br />
germination<br />
10 JUBG57 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
11 JUBG58 Slight infection on<br />
cotyledons germination<br />
rate good<br />
12 JUBG59 No infection on<br />
cotyledons, fast<br />
germination<br />
13 JUBG60 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
14 JUBG61 No infection on<br />
cotyledons, fast<br />
germination<br />
15 JUBG62 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
16 JUBG63 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
16 JUBG63 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Infection on cotyledons,<br />
growth rate moderate<br />
No infection on stem and<br />
leaves<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
+ -<br />
17 JUBG64 Highly infected cotyledons Germination very slow Shoot apex dead - +<br />
18 JUBG65 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
+ -<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 289<br />
ISSN 2250-3153<br />
19 JUBG66 Slight infection on<br />
cotyledons germination<br />
rate good<br />
20 JUBG67 No infection on<br />
cotyledons, fast<br />
germination.<br />
21 JUBG68 Highly infected<br />
cotyledons, no<br />
germination<br />
22 JUBG69 No infection on<br />
cotyledons, fast<br />
germination<br />
23 JUBG70 Slight infection on<br />
cotyledons germination<br />
rate good<br />
24 JUBG71 Highly infected<br />
cotyledons, no<br />
germination<br />
25 JUBG72 No infection on<br />
cotyledons, fast<br />
germination<br />
26 JUBG73 No infection on<br />
cotyledons, fast<br />
germination<br />
27 JUBG74 No infection on<br />
cotyledons, fast<br />
germination<br />
28 JUBG75 Infection on cotyledons,<br />
no germination<br />
Infection on cotyledons,<br />
growth rate moderate<br />
No infection on stem and<br />
leaves, but first two leaves<br />
curled.<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Germination very slow Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Infection on cotyledons,<br />
growth rate moderate<br />
+ -<br />
+ -<br />
- +<br />
+ -<br />
Healthy plants + -<br />
Germination very slow. Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Highly infected<br />
cotyledons, slow growth<br />
rate<br />
Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
29 JUBG76 Highly infected cotyledons Germination very slow Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
30 JUBG77 Slight infection on<br />
cotyledons, seed<br />
germinated<br />
31 JUBG78 Slight infection on<br />
cotyledons germination<br />
rate good<br />
32 JUBG79 No infection on<br />
cotyledons, fast<br />
germination<br />
Infection on cotyledons,<br />
plant formation<br />
Infection on cotyledons,<br />
growth rate moderate<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
- +<br />
+ -<br />
+ -<br />
+ -<br />
- +<br />
- +<br />
Healthy plants. + -<br />
Healthy plants + -<br />
+ -<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 290<br />
ISSN 2250-3153<br />
33 JUBG80 Highly infected cotyledons Germination very slow Shoot apex dead - +<br />
34 JUBG81 No infection on<br />
cotyledons, fast<br />
germination<br />
35 JUBG82 Slight infection on<br />
cotyledons germination<br />
rate good<br />
36 JUBG83 Slight infection on<br />
cotyledons germination<br />
rate good<br />
37 JUBG84 Highly infected<br />
cotyledons, no<br />
germination<br />
38 JUBG85 No infection on<br />
cotyledons, fast<br />
germination<br />
39 JUBG86 Slight infection on<br />
cotyledons, germination<br />
rate moderate<br />
40 JUBG87 Highly infected<br />
cotyledons, no<br />
germination<br />
41 JUBG88 Slight infection on<br />
cotyledons germination<br />
rate good<br />
42 JUBG89 Slight infection on<br />
cotyledons germination<br />
rate good<br />
43 JUBG90 Slight infection on<br />
cotyledons, moderate<br />
germination<br />
44 JUBG92 No infection on<br />
cotyledons, fast<br />
germination<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptom.<br />
Infection on cotyledons,<br />
growth rate moderate<br />
Infection on cotyledons,<br />
growth rate moderate<br />
+ -<br />
Healthy plants + -<br />
Healthy plants + -<br />
Germination very slow Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Cotyledons slightly<br />
infected, growth rate<br />
moderate<br />
Plant healthy with no<br />
symptoms of infection on<br />
leaves and stem<br />
Germination very slow Shoot apex dead, infection on<br />
stem and lower side of leaves<br />
Infection on cotyledons,<br />
growth rate moderate<br />
Infection on cotyledons,<br />
growth rate fast<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
Healthy plant formation Growth rate fast, leaves and<br />
stem devoid of any disease<br />
symptoms<br />
- +<br />
+ -<br />
+ -<br />
- +<br />
Healthy plants - +<br />
Healthy plants + -<br />
+ -<br />
+ -<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 291<br />
ISSN 2250-3153<br />
Love, Desire, and Theological Issues in Indo-Iranian<br />
Myths: A Comparative Introduction<br />
Abbas Saeedipour<br />
Dept. of Persian, Faculty of Humanities& Languages, J.M.I, the Central University, New Delhi, India<br />
The Mythic Drama of Yama and Yami in the Rig Veda<br />
Abstract- In the world of myths anything can happen illogically,<br />
or sometime logically. In the tragedy of Prometheus Bound<br />
written by Aeschylus, the Greek Prometheus there can steal fire<br />
from heavenly gods and give it to the earthly mortal creatures.<br />
Tiresias the blind soothsayer, descended from Oudaeus, in the<br />
Sophocles' tragedy of Oedipus the King, can predict the future<br />
fate of Thebes happening to the people there. Cerci the whore, in<br />
the Homer's, can bewitch the bravest and the most powerful<br />
Greek heroes. One set of potential human couple Mashya and<br />
Mashyana grows like a set of plants out of forty years of<br />
processing being under the air, the sun, and the soil. They are<br />
metamorphosed and clutched together. There is apparently no<br />
specific limit or any fixed and distinguished laws or regulations.<br />
Nonetheless, myths have their own logic, seeds, and cluster. The<br />
personification of things and forces, of phenomena, as well as<br />
abstractions are widely and repeatedly allowed and the<br />
composers have freedom and poetic license to manipulate and<br />
manufacture their imaginatively made- narratives. Myths have<br />
got their own logic, initiation, making process structural<br />
mythemes and those of subjectivists' features space- timelessness<br />
and settingless danglings.<br />
Index Terms- mythic drama, love, sin, tradition. Yama, Yami,<br />
Mashya, Mashyana, metaphorical setting, ethical issue<br />
O<br />
I. INTRODUCTION<br />
ne of the first and also the best dramatic narratives and<br />
representations of the mentality of man in the earliest stages<br />
of his fictive creation that is still remained in the Rig Veda,<br />
Mandala X, hymn 10, is the drama of Yama and Yami: the first<br />
Aryan tribal couple, the first parents of men.<br />
The parallel of the Rig Veda's couple is the Iranian mythic<br />
couple of Mashya and Mashyana. It is more developed and<br />
dramatized( Wendy Doniger,1974,1994 Hindu Myths,p.64)<br />
Nevertheless, the plot and the story in its dramatic context, of<br />
course, more extended and connected to later and the whole<br />
future generations of the races of man in Iranian version of the<br />
Avestan Scriptures..These are the most ancient dramatic mythic<br />
literature of the world.<br />
II. YAMA [MALE] AND YAMI [FEMALE] IN THE RIG VEDA<br />
However, both the interior and exterior formation and<br />
configuration of the two versions of the dramatic myth of the<br />
first Aryan couple from which many future generations bear<br />
different human races on the earth are beautifully and<br />
imaginatively concrete. The credibility of the characters, of<br />
design, and of the plot together make up the process of<br />
development exportable and persuasive. It is like a full and<br />
modern drama. The Iranian version of this dramatic myth of the<br />
earliest literature of man is, particularly, extended and<br />
profounded in length, depth, and horizon. In other word, the<br />
Iranian version of this drama of the first Aryan couple of the<br />
Indo-Aryan genealogy is well designed, structured and processed<br />
horizontally and vertically. The drama tracks and is hunted down<br />
to progenitor: Gaymart and his determination with Ahura Maza,<br />
victory over devils and darkness, and succession .It also gets<br />
going to the future.<br />
III. THE DRAMA OF YAMA AND YAMI: THE DIALOGUE<br />
Yama to Yami: ………….." Surya ………… is our father and<br />
his wife Saranyu is our mother. We are brother and sister." Why<br />
should you desire something deviating?<br />
Yami to Yama: "In this lonely and abandoned Island, I feel<br />
attracted to you ……….. You have been with me since I was in<br />
mother's womb. "<br />
"I seek your companionship ……."……." She has a biological<br />
appetite to physically communicate with a male (his brother)<br />
Yama to Yami: "I, Yama, your brother do not agree with you.<br />
I do not want such companionship. Being my sister, it is not<br />
right for us to have such relation. The deities … who reside in<br />
heaven, are watching us."This is a religious argument and<br />
theological reasoning. This portion of dramatic dialogue<br />
represents a sense of spiritual as well as moral transcendence that<br />
is assumedly lead from certain belief available and held by the<br />
vedic society. It is not ritual, it is the set of codes of behavior<br />
Some scholars and writers who look into Indo-Iranian<br />
mythology, especially those modern Europeans may see this<br />
loving dialogue between the female and the male as a break of<br />
law and tradition. Because the dramatic dialogue does contains<br />
such potentialities in itself. It seems that tradition, responsibility,<br />
and honour resist against desire in the context of the drama at the<br />
time. It appears that ancient Aryans in two – three thousand years<br />
before Jesus Christ had indeed the criteria of behavior and held<br />
conventions of men or God and observed moral regulations.<br />
Yama and Yami, as many researchers emphasized, were not the<br />
ancestors of human race.<br />
The hymn of the tenth Mandala (book) of the Rig Veda is a<br />
sort of dramatic exposition of Yama and Yami. It is a modern<br />
point of view of a dramatic setting as if you were reading one of<br />
those lovely plays of Shakespeare. Nevertheless, in the hymn<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 292<br />
ISSN 2250-3153<br />
there is the self-exposition of siblings with the parents named<br />
Surya as father, and Saranya as mother of the two. The tenth the<br />
hymn of the tenth Mandala of the Rig-Veda represents a desirous<br />
dialogue with romantic tone and sensual appeal contains fourteen<br />
verses of considerable suggestive lines and erotic words but<br />
completely in a metaphoric setting.<br />
It represents a moral discourse with its own philosophical and<br />
ethical standards. Distinguishing between right deed and wrong<br />
act is significantly theological: " we have never done such a thing<br />
before. We should not follow the path dishonor. We should be<br />
truthful and stay away from falsehood … we are brother and<br />
sister."(RV. 10.4) That is not only a self-proclaim criterion. It is<br />
interesting that the suggestion is emphatically from Yami<br />
(female) side and she justifies her lusty desire and sensual<br />
appeal: "such a relationship is banned for mortals, but we are not<br />
mortals." Disallowance is "for mortals" is a self- pronouncement<br />
decree arousing from an emotional trend and biological desire.<br />
On the other hand Yama is well aware and theoretically<br />
confident that this sort of behavior has never been taken place<br />
before.<br />
The issue indeed is something beyond the will and desire of<br />
Yama, the individual persona: "these … deities… neither stop<br />
nor ever close their eyes to anything." Yama not only argues that<br />
the deed itself is not right but also emphasizes that there has been<br />
no any trace of this relationship in his line and stock of ancestors<br />
available. The new reason is an additional prohibiting ban. The<br />
viewers, spies, and live spectators are present and watching us.<br />
"A person who commits intercourse with his own sister is<br />
considered to be a great sinner."<br />
[Note the following text translated by Griffith, Ralph T.H: The<br />
Rig Veda,book X, hymh 10,pp.422-24].<br />
The Dramatic Dialogue of Yama and Yami in the Rig veda<br />
1. FAIN would I win my friend to kindly friendship. So<br />
may the Sage, come through the air's wide ocean,<br />
Remembering the earth and days to follow, obtain a son,<br />
the issue of his father.<br />
2. Thy friend loves not the friendship which considers her<br />
who is near in kindred as stranger. Sons of the mighty<br />
Asura, the Heroes, supporters of the heavens, see far<br />
around them.<br />
3. Yea, this the Immortals seek of thee with longing,<br />
progeny of the sole existing mortal. Then let thy soul<br />
and mine be knit together, and as a loving husband take<br />
thy consort.<br />
4. Shall we do now what we ne'er did aforetime? we who<br />
spake righteously now talk impurely? Gandharva in the<br />
floods, the Dame of Waters-such is our bond, such our<br />
most lofty kinship.<br />
5. Even in the womb God Tvastar, Vivifier, shaping all<br />
forms, Creator, made us consorts. None violates his<br />
holy ordinances: that we are his heavens and earth<br />
acknowledge.<br />
6. Who knows that earliest day whereof thou speakest?<br />
Who hath beheld it? Who can here declare it? Great is<br />
the Law of Varuna and Mitra. What, wanton! Wilt thou<br />
say to men to tempt them?<br />
7. I, Yami, am possessed by love of Yama that I may rest<br />
on the same couch beside him. I as a wife would yield<br />
me to my husband. Like car-wheels let us speed to meet<br />
each other.<br />
8. They stand not still; they never close their eyelids, those<br />
sentinels of Gods who wander round us. Not me-go<br />
quickly, wantons, with another, and hastens like a<br />
chariot wheel to meet him.<br />
9. May Surya's eye with days and nights endow him, and<br />
ever may his light spread out before him. In heaven and<br />
earth the kindred Pair commingle. On Yam! be the<br />
unbrotherly act of Yama.<br />
10. Sure there will come succeeding times when brothers<br />
and sisters will do acts unmeet for kinsfolk. Not me, O<br />
fair one,-seek another husband, and make thine arm a<br />
pillow for thy consort.<br />
11. Is he a brother when no lord is left her? Is she a sister<br />
when Destruction cometh? Forced by my love these<br />
many words I utter. Come near, and hold me in thy<br />
close embraces.<br />
12. I will not fold mine arms about thy body: they call it sin<br />
when one comes near his sister. Not me,-prepare thy<br />
pleasures with another: thy brother seeks not this from<br />
thee, O fair one.<br />
13. Alas! thou art indeed a weakling, Yama we find in thee<br />
no trace of heart or spirit. As round the tree the<br />
woodbine clings, another will cling albout thee girt as<br />
with a girdle.<br />
14. Embrace another, Yami; let another, even as the<br />
woodbine rings the tree, enfold thee. Win thou his heart<br />
and let him win thy fancy, and he shall form with thee a<br />
blest alliance.<br />
IV. MASHYE, MASHYANE, AND THE RACES OF MAN<br />
Mobad Rostam Shahzadi the Iranian writer in his Dictionary<br />
of Pazand (2007) also defines Mashya and Mashyani, or Mashya<br />
and Mashyane as follow: " Mashya is the first Aryan man of the<br />
sperms of Kayomarth (=Gayomart) and Mashyani is the first<br />
Aryan woman from the seed Kayomarth (=Gayomart). These<br />
man and woman are born of a Rivas=Rhubarb" ( See Shahzadi,<br />
Rostam(ed. by Shahzadi, Mehrangiz, published by Farvahar,<br />
Tehran, 2007, P.302)<br />
In the mythic narrative there might be considerable number<br />
of parallel myths of mythical couples in different versions and<br />
transformations. The first human couple in the Avestan tures and<br />
Iranian mythology there are various pair name of the same stock:<br />
Mash-Mashan, Mishi, Mishan, Mishah-Mishani, Mahla-Mahlina,<br />
Meshah-Meshyanah. These variations of the first human pair (the<br />
Aryan pair) are originally from the back bone of Gayomart.<br />
Arthur Emanual Chritensen( 1845-75), one of the youngest<br />
western Iranologists and scholars, and one of the good Danish<br />
friends of Iran, amongst other fair orientalists ,has also spent<br />
several pages of the first volume of his ' the First Man and the<br />
First King' on Mashya and Mashyana, and there he refers to<br />
different concerned sources of classic and original authorities,<br />
such as the Avesta, the Avestan Scriptures, Ibn Athir, Alberuni,<br />
Shahrestani, Tabari, Ferdoussi'Shahnameh and so on.<br />
When the death time of Gayomart approaches he falls down in<br />
his left side and his sperms pour on the earth and the process of<br />
their purification under the sun's warmth take place.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 293<br />
ISSN 2250-3153<br />
It is after forty years of being in the soil of the earth that the<br />
Gayomart's semen bear the pair in the form of Rivas plant<br />
(Rhubarb) with fifteen leaves. They were interwoven together in<br />
such a way that from their shoulders, hands and back were<br />
attached and connected with each on the earth.<br />
This dramatic and the mythical story of Gayomort, Mashya<br />
and Mashyana( Mashyag, Mashyang) has been repeatedly<br />
recorded, narrated, and confirmed. Sometime it is commented by<br />
different Iranian writers both Muslim and Zoaroathurian:<br />
Alberuni in his Remained, Tabari in his History, Bala'ami in his<br />
King and Prophets. Yashts and Persian poetic works, like<br />
Shahnameh are also the most famous.<br />
Gayomart is indeed the first mythical man-like creature<br />
made on earth to assist Ahura Mazda. Gayomart from whom the<br />
Aryan race is developed. He is genuinely and meaningfully is<br />
immortal mortal. This is a paradox that should be explained in<br />
itertainlys own contextual realm.<br />
All Pahlavi documents, relevant texts and the Avestan<br />
scriptures have narrated this mythical narrative of the pair who<br />
are from rhubarb-Rivas-plant. (Christensen, Arthur, Les types du<br />
premier homme et du premier roi dans l'histoir legendaire des<br />
Iraniens 2 vols, Persian trans. P. 67)<br />
Ahura Mazda to this first human couple says: "you are men I<br />
created you. You are the predecessors of the human being of<br />
twor yourselves, I made you complete and the best in the best<br />
way of this king:<br />
Good thought, Good Deed, Good Word: Thou Do Not Pray<br />
Devils [Deevs]:<br />
Note the following scripture about Mashya and Mashyana quoted<br />
from a translation of the Farsi Avestan texts into English:<br />
Bundahishn 23, scriptures of Zoroastrianism , http:/ www. Hindu website. Com /<br />
sacred scripts/ zoroscripts/ Bundahishm. chapter X to XV.[ See also the English<br />
versions of the Sacred Books of the Easthapter,Oxford University Press, chapter<br />
XV.<br />
Mashya and Mashyana in the Bundahishn<br />
1. On the nature of men it says in revelation, that<br />
Gayomard, in passing away, gave forth seed; that seed<br />
was thoroughly purified by the motion of the light of the<br />
sun, and Neryosang kept charge of two portions, and<br />
Spandarmad received one portion.<br />
2. And in forty years, with the shape of a one-stemmed<br />
Rivas-plant, and the fifteen years of its fifteen leaves,<br />
Matro [Mashye] and Matroyao [Mashyane] grew up<br />
from the earth in such a manner that their arms rested,<br />
behind on their shoulders (dosh), and one joined to the<br />
other they were connected together and both alike.<br />
3. And the waists of both of them were brought close and<br />
so connected together that it was not clear which is the<br />
male and which the female, and which is the one whose<br />
living soul (nismo) of Ohrmazd is not away.<br />
4. As it is said thus: Which is created before, the soul<br />
(nismo) or the body? And Ohrmazd said that the soul is<br />
created before, and the body after, for him who was<br />
created; it is given into the body that it may produce<br />
activity, and the body is created only for activity;' hence<br />
the conclusion is this, that the soul (rhubarb) is created<br />
before and the body after.<br />
5. And both of them changed from the shape of a plant<br />
into the shape of man, and the breath (nismo) went<br />
spiritually into them, which is the soul (rhubarb); and<br />
now, moreover, in that similitude a tree had grown up<br />
whose fruit was the ten varieties of man.<br />
6. Orrmazd spoke to Mashye and Mashyane thus: 'You are<br />
man, you are the ancestry of the world, and you are<br />
created perfect in devotion by me; perform devotedly<br />
the duty of the law, think good thoughts, speak good<br />
words, do good deeds, and worship no demons!'<br />
7. Both of them first thought this, that one of them should<br />
please the other, as he is a man for him; and the first<br />
deed done by them was this, when they went out they<br />
washed themselves thoroughly; and the first words<br />
spoken by them were these, that Ormazd created the<br />
water and earth, plants and animals, the stars, moon, and<br />
sun, and all prosperity whose origin and effect are from<br />
the manifestation of righteousness.<br />
8. And, afterwards, antagonism rushed into their minds,<br />
and their minds were thoroughly corrupted, and they<br />
exclaimed that the evil spirit created the water and earth,<br />
plants and animals, and the other things as aforesaid.<br />
9. That false speech was spoken through the will of the<br />
demons, and the evil spirit possessed himself of this first<br />
enjoyment from them; through that false speech they<br />
both became wicked, and their souls are in hell until the<br />
future existence.<br />
10. And they had gone thirty days without food, covered<br />
with clothing of herbage (giyah); and after the thirty<br />
days they went forth into the wilderness, came to a<br />
white-haired goat, and milked the milk from the udder<br />
with their mouths.<br />
11. When they had devoured the milk Mashye said to<br />
Mashyane thus: 'My delight was owing to it when I had<br />
not devoured the milk, and my delight is more delightful<br />
now when it is devoured by my vile body.'<br />
12. That second false speech enhanced the power of the<br />
demons, and the taste of the food was taken away by<br />
them, so that out of a hundred parts one part remained.<br />
13. Afterwards, in another thirty days and nights they came<br />
to a sheep, fat and white-jawed, and they slaughtered it;<br />
and fire was extracted by them out of the wood of the<br />
lote-plum and box-tree, through the guidance of the<br />
heavenly angels, since both woods were most<br />
productive of fire for them; and the fire was stimulated<br />
by their mouths; and the first fuel kindled by them was<br />
dry grass, kendar, lotos, date palm leaves, and myrtle;<br />
and they made a roast of the sheep.<br />
14. And they dropped three handfuls of the meat into the<br />
fire, and said: 'This is the share of the fire.' One piece of<br />
the rest they tossed to the sky, and said: 'This is the<br />
share of the angels.' A bird, the vulture, advanced and<br />
carried some of it away from before them, as a dog ate<br />
the first meat.<br />
15. And, first, a clothing of skins covered them; afterwards,<br />
it is said, woven garments were prepared from a cloth<br />
woven in the wilderness.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 294<br />
ISSN 2250-3153<br />
16. And they dug out a pit in the earth, and iron was<br />
obtained by them and beaten out with a stone, and<br />
without a forge they beat out a cutting edge from it; and<br />
they cut wood with it, and prepared a wooden shelter<br />
from the sun (pesh-khur).<br />
17. Owing to the gracelessness which they practiced, the<br />
demons became more oppressive, and they themselves<br />
carried on unnatural malice between themselves; they<br />
advanced one against the other, and smote and tore their<br />
hair and cheeks.<br />
18. Then the demons shouted out of the darkness thus: 'You<br />
are man; worship the demon! so that your demon of<br />
malice may repose.'<br />
19. Mashye went forth and milked a cow's milk, and poured<br />
it out towards the northern quarter; through that the<br />
demons became more powerful, and owing to them they<br />
both became so dry-backed that in fifty winters they had<br />
no desire for intercourse, and though they had had<br />
intercourse they would have had no children.<br />
20. And on the completion of fifty years the source of desire<br />
arose, first in Mashye and then in Mashyane, for<br />
Mashye said to Mashyane thus: 'When I see thy shame<br />
my desires arise.' Then Mashyane spoke thus: 'Brother<br />
Mashye! when I see thy great desire I am also agitated.'<br />
21. Afterwards, it became their mutual wish that the<br />
satisfaction of their desires should be accomplished, as<br />
they reflected thus: 'Our duty even for those fifty years<br />
was this.'<br />
22. From them was born in nine months a pair, male and<br />
female; and owing to tenderness for offspring the<br />
mother devoured one, and the father one.<br />
23. And, afterwards, Ormazd took tenderness for offspring<br />
away from them, so that one may nourish a child, and<br />
the child may remain.<br />
24. And from them arose seven pairs, male and female, and<br />
each was a brother and sister-wife; and from every one<br />
of them, in fifty years, children were born, and they<br />
themselves died in a hundred years.<br />
25. Of those seven pairs one was Siyamak, the name of the<br />
man, and Nasak of the woman; and from them a pair<br />
was born, whose names were Fravak of the man and<br />
Fravakain of the woman.<br />
26. From them fifteen pairs were born, every single pair of<br />
whom became a race (sardak); and from them the<br />
constant continuance of the generations of the world<br />
arose.<br />
27. Owing to the increase (zayishn) of the whole fifteen<br />
races, nine races proceeded on the back of the ox<br />
Sarsaok, through the wide-formed ocean, to the other<br />
six regions (karshwar), and stayed there; and six races<br />
of men remained in Xwaniratha.<br />
28. went to the plain of the Tazhikan (Arabs); and of one<br />
pair Hooshang was the name of the man and Guzhak of<br />
the woman, and from them arose the Airanakan<br />
(Iranians); and from one pair the Mazendarans have<br />
arisen.<br />
29. Among the number (pavan ae mar) were those who are<br />
in the countries of Surak, those who are in the country<br />
of Aner, those who are in the countries of Tur, those<br />
who are in the country of Salm which is Arum, those<br />
who are in the country of Seni, that which is Chinistan,<br />
those who are in the country of Dai, and those who are<br />
in the country of Sind.<br />
30. Those, indeed, throughout the seven regions are all from<br />
the lineage of Fravak, son of Siyamak, son of Mashye.<br />
31. As there were ten varieties of man, and fifteen races<br />
from Fravak, there were twenty-five races all from the<br />
seed of Gayomard; the varieties are such as those of the<br />
earth, of the water, the breast-eared, the breast-eyed, the<br />
one-legged, those also who have wings like a bat, those<br />
of the forest, with tails, and who have hair on the body.<br />
The Issue of Love Offspring in the Myth of Yama and Yami:<br />
The view of incest in the Mashya and Mashayana dramatic<br />
story of Mashyana and Mashya, in the Avestan scriptures, and in<br />
the dialogue of Yama and Yami, in the Rig Veda, is not fully<br />
enough considered. The cores of the texts do not accept the<br />
incest opinion. That means the myths do not substantiate and do<br />
not furnish the opinions and judgments about themselves the do<br />
not assess and do not see the whole play on the stage.<br />
The direct and clear response of Yama to Yami denies and<br />
refutes the oppinion of incest in the Rig Veda (Appendix, Yama<br />
and Yami). The actual words and statements avoid immorality<br />
and illegitimacy. The complete drama rejects the belief of men<br />
being bastard or love offspring of illegal intercourse. The climax<br />
of the play in its falling action resolves the conflict in the benefit<br />
and the release of man that found not guilty.<br />
The question of the story in the Avestan scriptures is<br />
different. The characters are completely and substantially<br />
metamorphosed. The characters of the drama of the first couple<br />
of the world are metaphorically transformed to something<br />
freakish. It becomes somehow incredible and grotesque. The<br />
contents and elements of the Avestan drama is not like that of the<br />
Rig Veda. (Appendix: Mashya and Mashyana). It does not seem<br />
to be the one that is established. So, the approach and plot<br />
appears to require different touch and criticism.<br />
Characterization, substance, nature and features of all ingredient<br />
mythemes (Strauss‘s terminology) are incompatible with that of<br />
dramatic scene of Yama and Yami in the Rig Veda.<br />
REFERENCES<br />
[1] The Rig Veda<br />
[2] The Avesta<br />
[3] Avestan Scriptures: Yashts, Yasnas,…<br />
[4] Mallory , J. P. and D, Q. Indo-European Culture, An Encyclopedia of; and<br />
The Encyclopedia Iranica under Iran , Indo-Iranian religion.<br />
[5] Bundahihn 23, scriptures of Zoroastrianism , http:/ www. Hindu website.<br />
Com / sacred scripts/ zoroscripts/ Bundahishm. chapter X-XV<br />
[6] Ibid. chapter V.I<br />
[7] Ibid. chap. XIII. 15<br />
[8] Radhakrishna, S., Eastern Religions and Western Thought, OUP.( date?)<br />
[9] Oldenbreg, Hermann, The Religion of the Veda, trans. shotri, Shrlhar, B.,<br />
MBP., New Delhi, 2004<br />
[10] Bibhu and Minakshi Padhi, Indian Philosophy and Religion, <strong>Print</strong>world<br />
(Ltd), New Delhi, 1998,<br />
Also check The Rig Veda. .X.X. 1-16 , and Mandala X, hymn 10, 1-<br />
14,translated by Griffith, Ralph T.H: The Rig Veda,book X, hymh 10,pp.422-24].<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 295<br />
ISSN 2250-3153<br />
[11] The Rig Veda,trans.Dr.Sharma, Ganga Sahai, Vishv Books, New Delhi, 9<br />
dat?)Mandal X, hymn 10.1-14, pp.909-911<br />
[12] Nappert, Jan, Indian Mythology, Indus, New Delhi, 1993<br />
[13] Kumar Dash, Narander, Dict. Of Indian culture, AG kalap. N.Delhi, 1991<br />
[14] Encyclopedia of Rreligion (15 vols.) Vol. 8 , Thomas Gale, U.S.A, 2005<br />
[15] Zend Avesta, Yasht III, 87<br />
[16] Bundahishn, XV, 1.31<br />
[17] Yasnas,,Khorde Avesta<br />
[18] Doniger, Wendy, The Rig Veda: An Anthology<br />
[19] Griswold, H.D., The Religion of the Rig Veda, MBP,Delhi, 1999.<br />
AUTHORS<br />
Abbas Saeedipour, M.A( Kent University, U.K), Scholar and<br />
the Candidate of the PhD in Indo-Iranian Comparative<br />
Mythology at Dept. of Persian, Faculty of Humanities&<br />
Languages, J. M.I, the Central University, New Delhi, India,<br />
Email: asaeedipour@yahoo.ca<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 296<br />
ISSN 2250-3153<br />
Performance Evaluation of DHT Based multi-path<br />
Routing Protocol for MANETs<br />
Abstract- Mobile Adhoc Networks (MANETs) creates a<br />
temporary network of mobile nodes. Routing is a major issue in<br />
MANETs. Distributed Hash Tables (DHTs) has recently proven<br />
to be a novel and efficient way for developing scalable routing<br />
protocols in MANETs. With the increase in applications of<br />
MANETS, the networks have become very complex which leads<br />
to channel impairments. Moreover multipath protocols provide<br />
fault tolerance against node and link failures. In this paper, we<br />
have analyzed the performance of M-DART[4], which is DHT<br />
based Multipath protocol against Ad hoc On-Demand Multipath<br />
Distance Vector Routing Protocol(AOMDV)[7] ,which is a<br />
reactive Multipath protocol. We have conducted various<br />
simulation experiments to evaluate its performance in terms of<br />
throughput, packet delivery ratio, end to end delay and energy<br />
consumption. We have analyzed that M-DART protocol<br />
consumes less energy (8.2% than AOMDV. Simulation results<br />
also show M-DART has better throughput and Packet Delivery<br />
ratio than AOMDV by more than 1.6 times.<br />
Index Terms- AOMDV, M-DART, Multipath Protocols, adhoc<br />
Network, MANET.<br />
M<br />
I. INTRODUCTION<br />
obile Ad hoc network represents complex distributed<br />
systems comprised by wireless nodes which can freely and<br />
dynamically self-organize themselves into temporary (ad hoc)<br />
network topologies. In this way MANETs allow communications<br />
in areas with no pre-existing infrastructure. The ad hoc network<br />
paradigm has been proposed several years ago mainly for tactical<br />
networks. Recently, the introduction of enabling technologies,<br />
such as Bluetooth and Wi-Fi, has led to the deployment of<br />
commercial ad hoc networks outside the military domain,<br />
generating so a new and growing interest in the research and<br />
development of such networks. Researchers visualize MANETs<br />
to be an integral part of 4G architecture and in the next<br />
generation networks [1]. MANETs consist of rapidly changing<br />
network topology as nodes move in a random manner. They can<br />
work either standalone or may be connected to a larger internet.<br />
Because of the absence of fixed infrastructure, nodes setup routes<br />
among themselves autonomously. Nodes in a MANET (laptops,<br />
PDAs, and so on) move arbitrarily and communicate directly<br />
with other nodes sharing the identical media (radio, infrared, etc.)<br />
within their radio transmission range. Outside this range,<br />
message transfer occurs through hop-by-hop communication.<br />
Routing packets between pair of nodes becomes a challenging<br />
task due to random motion of nodes within the network. A route<br />
Gurmukh Singh, Dr. Savita Gupta, Sukhvir Singh<br />
Panjab University, Chandigarh, India<br />
that is believed to be optimal at a given point in time might not<br />
work at all a few moments later.<br />
Table Driven routing protocols [2],[3],[4] as shown in Figure 1<br />
also called proactive protocols maintain table containing routes<br />
to all nodes. They react to any change in the topology even if no<br />
traffic is affected by the change, and they transfer periodic<br />
control messages to maintain routes to every node in the<br />
network. As mobility increases, proactive protocols require more<br />
scarce resources, such as bandwidth and power.<br />
Figure 1: Types of Routing Protocols<br />
Reactive routing protocols [5], [6], [7] determine the route<br />
only when they need to route packets, thus avoiding nodes from<br />
periodical transfer of route update in the network.<br />
The behaviour of routing protocols depends on the link capacity,<br />
network size, and node mobility. The topological instability (link<br />
and node failures) due to node mobility and/or changes in<br />
wireless transmission conditions can frequently give rise to<br />
disconnected routes. An attractive approach to gain tolerance<br />
against unreliable wireless links and node mobility is based on<br />
multi-path routing. Multipath routing protocols [4],[7] discover<br />
multiple routes from source to destination.<br />
The most popular on-demand routing protocol, Ad-hoc Ondemand<br />
Multipath Distance Vector (AOMDV) routing protocol<br />
[7] is an improvement of Ad-hoc On-demand Routing Protocol<br />
(AODV). AOMDV discovers multiple paths between a source<br />
and destination to provide efficient fault tolerance by providing<br />
quicker and more efficient recovery from route failures in a<br />
dynamic network. As AOMDV discovering multiple paths in a<br />
single route discovery attempt, new route needs to be discovered<br />
only when all paths fail. This reduces not merely the route<br />
discovery latency but the routing overheads also.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 297<br />
ISSN 2250-3153<br />
Most of the protocols, regardless of the belonging class (reactive<br />
or proactive, single-path or multi-path), do not have scalability to<br />
work efficiently when the number of nodes grows mainly<br />
because they have been proposed for wired networks and<br />
modified to work in ad hoc scenarios [8]. More specifically, they<br />
use static addressing in which the node identity equals routing<br />
address. Static addressing is not very valid in ad hoc scenarios. In<br />
recent times, some routing protocols [11], [13], [14], [15], [16]<br />
have exploited the idea of decoupling node identification from its<br />
location by using DHT services, which are used to distribute the<br />
location information of node throughout the network. But these<br />
protocols are single path so they are not tolerant against channel<br />
impairments (node and link failures.<br />
A multipath enhancement to DART [11] was proposed in [12]<br />
called Augmented Tree based Routing (ATR), but in ATR the<br />
DHT system is replaced by a global lookup table which is<br />
available to all the nodes, which results in a great impact on the<br />
address discovery, which is a key process of the whole routing<br />
protocol. Among the DHT based Routing Protocols, M-DART is<br />
an enhancement of shortest path routing protocol known as<br />
Dynamic Address Routing (DART) [11]. M-DART discovers<br />
and stores multiple paths to the destination in the routing table.<br />
The remainder of this paper is organized as follows. Section II<br />
discusses Dynamic Addressing and Dynamic Hash Table (DHT).<br />
Section III discusses M-DART and AOMDV routing protocols.<br />
Section IV discusses the simulation results of the two routing<br />
protocols with different parameters. Finally, we summarize and<br />
conclude our paper in section V.<br />
II. DYNAMIC ADDRESSING AND DHT – OVERVIEW<br />
Dynamic Addressing [9] separates the routing address and the<br />
identity of a node. The routing address of a node is dynamic and<br />
changes with movement of the node to reflect the node's location<br />
in the network topology. The identifier is a globally unique<br />
number that stays the same during the lifetime of the node. Now<br />
the problem arises how to provide mapping between node<br />
identity and routing address. In fixed networks, location<br />
information can be easily embedded into the topologicaldependent<br />
node address, which also uniquely identifies the node<br />
in the network. But in self-organizing networks, however, there<br />
is no permanent relationship between the location of the node<br />
and the node‘s identifier as a consequence of the spontaneity and<br />
adaptability of the network. So, this requires a dynamic<br />
association between identification and location of a node, and the<br />
specification of a mechanism to manage this association.<br />
In response to these needs, DHTs [10] have been adopted as a<br />
scalable substrate to provide many functionalities including<br />
distribution of information, location service, and locationindependent<br />
identity upon which a range of self-organizing<br />
systems have been built. The functionality of decoupling<br />
identification from location, and of providing a general mapping<br />
between them, has made the DHT as an interesting principle to<br />
be incorporated in network-level routing protocols. The key idea<br />
of DHT is to use a hash function to distribute Node‘s location<br />
information among rendezvous points throughout the network.<br />
This hash function is also used by a source to identify the point<br />
that stores a destination‘s location information.<br />
III. OVERVIEW OF M-DART AND AOMDV ROUTING<br />
PROTOCOLS<br />
A. M-DART Routing Protocol<br />
M-DART protocol is based upon dynamic addressing paradigm.<br />
By means of dynamic addressing, DHT based algorithm is able<br />
to implement hierarchical routing in a feasible way, reducing so<br />
considerably the routing state information maintained by each<br />
node. Since the whole routing process is based on the transient<br />
network addresses, they have to be efficiently distributed across<br />
the network. The mapping between node identities and network<br />
addresses is provided by a Distributed Hash Table (DHT) [10].<br />
The DHT based multi-path routing protocol proactively<br />
discovers all the available routes between a source and a<br />
destination. Key Features of M-DART are:<br />
1) Address Space: - The network addresses are strings of l<br />
Figure 2: Address Space<br />
bits, thus the address-space structure can be represented as a<br />
complete binary tree of l + 1 levels, that is a binary tree in which<br />
every vertex has zero or two children and all leaves are at the<br />
same level (Figure 2). In the tree structure each leaf is associated<br />
with a network address, and a inner vertex of level k, namely a<br />
level-k subtree, represents a set of leaves (that is a set of network<br />
addresses) sharing an address prefix of l – k bits. For example,<br />
with reference to Figure 2 the vertex with the label 01x is a level-<br />
1 subtree and represents the leaves 010 and 011. Let us define as<br />
level-k sibling of a leaf as the level-k subtree which shares the<br />
same parent with the level-k subtree the leaf belongs to.<br />
Therefore, each address has l siblings at all and each other<br />
address belongs to one and only one of these siblings. Referring<br />
to the previous example, the vertex with the label 1xx is the<br />
level-2 sibling of the address 000, and the address 100 belongs<br />
only to this sibling.<br />
In Fig. 3, the address space is alternatively represented as an<br />
overlay network built upon the underlying physical topology.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 298<br />
ISSN 2250-3153<br />
Figure 3: Relationship between address space and physical<br />
topology<br />
Its tree-based structure offers simple and manageable procedures<br />
for address allocation, avoiding relying on inefficient<br />
mechanisms like flooding.<br />
2) Route Discovery and Packet Forwarding: -Each node<br />
maintains a routing table composed by l sections, one for each<br />
sibling, and the k-th section stores the path toward a node<br />
belonging to the level k sibling. Each section stores five fields:<br />
the sibling to whom the entry refers to, the next hop, the cost<br />
Table 1<br />
Routing table for Node 001<br />
Sibling Next Route cost Net_id Route log<br />
id hop<br />
000 000 C(001,000) MIN_ID(n) 000<br />
n in 001<br />
01x 000<br />
C(001,000)+ MIN_ID(n) 010<br />
MIN_C(000,n) n in 01x<br />
n in 01x<br />
011 C(001,011) MIN_ID(n) 010<br />
n in 01x<br />
1xx 000<br />
C(001,000)+ MIN_ID(n) 100<br />
MIN_C(000,n) n in 1xx<br />
n in 1xx<br />
011<br />
C(001,011)+ MIN_ID(n) 100<br />
MIN_C(011,n) n in 1xx<br />
n in 1xx<br />
needed to reach a node belonging to that sibling using the next<br />
hop as forwarder, the network id used for address validation and<br />
the route log used by the loop avoidance mechanism. Table 1<br />
show the routing table of node 000 for the network depicted in<br />
Fig. 3. The table has three sections: the first stores all the routes<br />
toward the node 000, the second toward a node belonging to the<br />
sibling 01x and the last toward nodes belonging to the sibling<br />
1xx. The routing state information maintained by each node is<br />
kept consistent through the network by means of periodic routing<br />
updates exchanged by neighbor nodes. Each routing update<br />
stores l entry and each entry is composed by four fields: the<br />
sibling id, the cost, the network id and the route log. The packet<br />
forwarding process exploits a hop-by hop routing based on the<br />
network addresses. To route a packet, a node compares its<br />
network address with the destination one, one bit at time starting<br />
with the most significant (left side) bit, say the l-th. If the i-th bit<br />
is different, the node forwards the packet towards one the route<br />
stored in the i-th section. With reference to the previous example,<br />
if the node 001 has to send a packet to the node with the address<br />
101, then it will forward the packet to the next hop stored in the<br />
third section (i.e the node 011).<br />
B. AOMDV Routing Protocol<br />
AOMDV was developed mainly for highly dynamic ad hoc<br />
networks where link failures and route breakages occur very<br />
frequently. It discovers multiple routes to destination in active<br />
communication. AOMDV uses sequence numbers to determine<br />
the freshness of routing information to avoid routing loops. It is a<br />
timer-based protocol and provides a way for mobile nodes to<br />
react to link breaks and topology changes.<br />
Table 2<br />
Routing Table of AOMDV<br />
Destination<br />
Sequence Number<br />
Advertised hop Count<br />
Next hop<br />
{(next hop 1, hop count 1),<br />
(next hop 2, hop count 2),…..}<br />
Expiration time out<br />
AOMDV uses three types of control message: route error<br />
(RRER), route request (RREQ), and route reply (RREP) to<br />
discover routes, that are sent to port 654 using User Datagram<br />
Protocol (UDP). If a node needs a route to send data packets, it<br />
broadcasts RREQ throughout the network. When a node receives<br />
a RREQ packet, then it checks the destination address field of<br />
RREQ. If it has information about a destination or it is<br />
destination itself, it uses RREP packet to unicast to the source<br />
node. If it does not have a route to destination and its multiple<br />
alternative paths are not available, it sends RRER message back<br />
to the upstream node. AOMDV has 5 fields in the routing table<br />
as shown in Table 2.<br />
AOMDV uses the advertised hop count field for multiple route<br />
entries. It uses next hop lists in the routing table, to define<br />
multiple next hops with relevant hop counts A node updates its<br />
advertised hop count for a destination whenever it sends a route<br />
advertisement for the destination [7].<br />
IV. SIMULATION RESULT<br />
We use network simulator ns2 to analyze M-DART and<br />
AOMDV routing protocols. We compare the results of M-DART<br />
routing protocol with AOMDV protocol by using the following<br />
parameters:<br />
Average Throughput:- Average rate of successful packet<br />
delivery. It will be measured in kilo bits per second<br />
(kbps).<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 299<br />
ISSN 2250-3153<br />
Packet Delivery Ratio (PDR):- The ratio of data packets<br />
delivered to the destination to those sent by the sender.<br />
Average End to end delay:- an end-to-end transmission<br />
delay of data packets that are delivered to the intended<br />
destination successfully.<br />
Average energy consumption:- average energy<br />
consumption per node.<br />
We will analyze average throughput, PDR, and Average End to<br />
End delay by varying the number of nodes between 50 to 400.<br />
This is done to show the Scalability of M-DART for large<br />
number of nodes. Average energy consumption will be analyzed<br />
by varying the simulation time between 100 to 800 seconds. This<br />
is done to show the durability of the routing protocols. A 802.11<br />
(IEEE wireless standard) network is used for the simulation of<br />
M-DART and AOMDV protocols. The mobility parameters have<br />
been set to simulate low mobility, because the transmission range<br />
requires lower speed values in order to allow the routing<br />
protocols to build reliable paths. More specifically, the speed is<br />
taken in the [0.5m/s; 1.5m/s] range.<br />
A. Average Throughput<br />
As shown in Figure 4, for small number of nodes ( 300) the<br />
throughput of M-DART becomes about 1.8 times that of<br />
AOMDV.<br />
B. Packet Delivery Ratio (PDR)<br />
Many protocols in MANETs use packet delivery ratio (PDR)<br />
as a metric to select the best route, transmission rate or power. As<br />
shown in Figure 5, at 50 nodes, AOMDV has better PDR than<br />
M-DART.As the number of nodes increases, M-DART shows<br />
better PDR than AOMDV. Same as with throughput, for large<br />
number of nodes (>300) MDART has about 1.8 times PDR than<br />
that of AOMDV.<br />
Figure 5: Packet Delivery Ratio over number of nodes.<br />
C. Average End to end delay<br />
As shown in Figure 6, for small number of nodes, AOMDV and<br />
M-DART shows approximately same End to End Delay. As the<br />
number of nodes increases, End to End Delay of M-DART grows<br />
linearly, whereas AOMDV shows exponential growth. For large<br />
number of nodes, End to End Delay of AOMDV is more than 5<br />
times than that of M-DART. The delay of AOMDV increases<br />
dramatically because, the nodes queue packets while they select a<br />
different route when the primary route fails due to congestion.<br />
Reactive protocols must first determine the route, which may<br />
result in considerable delay if the information is not available in<br />
caches.<br />
Figure 6: Average End to End Delay over number of nodes<br />
D. Average Energy Consumption<br />
Because of DHT paradigm in M-DART energy required is less as<br />
compared to protocols which are based on On-Demand<br />
paradigm. As shown in Figure 7 energy consumed in M-DART<br />
is less as compared to AOMDV especially when the simulation<br />
time is increased beyond 500 seconds.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 300<br />
ISSN 2250-3153<br />
Figure 7: Average energy consumption over simulation time.<br />
V. CONCLUSION<br />
DHT based multipath routing supports scalability in various<br />
wireless networks. M-DART is an efficient protocol which gives<br />
improved performance in large networks. We have analyzed that<br />
the average energy consumption of M-DART is lower than<br />
AOMDV by 8.2%. We have also found that when number of<br />
nodes grows, the performance of other multipath routing<br />
protocols like AOMDV is not appropriate while M-DART is<br />
performing better in terms of Throughput (1.6 times), PDR (1.7<br />
times), End to End Delay (5 times). Because of better routing<br />
paradigm in M-DART scalability is achieved as the number of<br />
entries in DHT are less i.e. log(n).<br />
REFERENCES<br />
1. S. Basagni, ―Mobile ad hoc networking‖ 2004, Hoboken, NJ: John Wiley.<br />
xvi, 461.<br />
2. C.E. Perkins, and T.J. Watson, ―Highly dynamic destination sequenced<br />
distance vector routing (DSDV) for mobile computers,‖ Proc. ACM<br />
Communications, Architectures, Protocols and Applications, vol. 24, pp.<br />
234-244, 1994.<br />
3. T. Clausen and P. Jacquet ―Optimized Link State Routing Protocol<br />
(OLSR).‖ RFC 3626, IETF Network Working Group, October 2003.<br />
4. M. Caleffi and L. Paura, ―M-DART: Multi-path Dynamic Address<br />
RouTing‖ , Wirel. Commun. Mob. Comput. pp: 1–20, 2010.<br />
5. C. E. Perkins, E. M. Royer, and S. Das, "Ad hoc On-Demand Distance<br />
Vector (AODV) Routing,‖ RFC 3561, (2003) IETF.<br />
6. D. Johnson, Y. Hu, and D. Maltz, ―The Dynamic Source Routing Protocol<br />
(DSR) for Mobile Ad Hoc Networks for IPv4,‖ RFC 4728, 2007.<br />
7. M. Z. Oo , M. Othman , ―Performance Comparisons of AOMDV and OLSR<br />
Routing Protocols for Mobile Ad Hoc Network‖, Second International<br />
Conference on Computer Engineering and Applications, 2010.<br />
8. I. Chlamtac, M. Conti, J. Liu, Mobile ad hoc networking: imperatives and<br />
challenges. Ad Hoc Networks July 2003; 1(1):13–64.<br />
9. J. Eriksson, M. Faloutsos, S. V. Krishnamurthy, ―Scalable ad hoc routing:<br />
the case for dynamic addressing‖, IEEE, pp: 1108-1119, 2004.<br />
10. A.C. Viana, M. D. de Amorim, S. Fdida, J.F. de Rezende, ―Self<br />
organization in spontaneous networks: the approach of dht based routing<br />
protocols‖. Ad Hoc Networks, September 2005; 3(5):589–606.<br />
11. J. Eriksson, M. Faloutsos and S. Krishnamurthy. ―DART: Dynamic Address<br />
RouTing for Scalable Ad Hoc and Mesh Networks‖. in IEEE- ACM<br />
Transactions on Networking, vol. 15, no. 1, April 2007, pp. 119-132.<br />
12. Caleffi, M., Ferraiuolo, G., and Paura, L., ―Augmented Tree based Routing<br />
Protocol for Scalable Ad Hoc Networks‖, in MHWMN '07: Proceedings of<br />
the Third IEEE International Workshop on Heterogeneous Multi-Hop<br />
Wireless and Mobile Networks, 2007.<br />
13. M. Caesar, M. Castro, E. B. Nightingale, G. O'Shea and A. Rowstron.<br />
―Virtual ring routing: network routing inspired by DHTs‖. In Proc. Of<br />
SIGCOMM, 2007.<br />
14. C. Marcello, ―Mobile Ad Hoc Networks: the DHT paradigm‖ ,IEEE, 2009.<br />
15. Z. Bo, W. Yingyou, Z. Hong, ―KDSR: An Efficient DHT-based Routing<br />
Protocol for Mobile Ad Hoc Networks‖, Ninth International Conference on<br />
Hybrid Intelligent Systems, 2009.<br />
16. S. Du, A. Khan, C.S. Pal, A. Post, A.K. Saha, P. Druschel, D.B. Johnson, R.<br />
Riedi, ―:Safari: A self-organizing, hierarchical architecture for scalable ad<br />
hoc networking‖. Ad Hoc Network 2008; pp. 485–507.<br />
AUTHORS<br />
First Author – Gurmukh Singh, M.E.(I.T.), Panjab University,<br />
Chandigarh. gurmukh86@gmail.com.<br />
Second Author – Dr. SavitaGupta, PhD, Panjab University,<br />
Chandigarh. savita2k8@yahoo.com.<br />
Third Author – Sukhvir Singh, M.E.(I.T.), Panjab University,<br />
Chandigarh. sukhvirpu@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 301<br />
ISSN 2250-3153<br />
Secure Data Hiding Algorithm Using Encrypted Secret<br />
message<br />
Abstract- In any communication, security is the most<br />
important issue in today‘s world. Lots of data security and data<br />
hiding algorithms have been developed in the last decade, which<br />
worked as motivation for the research. This project is a<br />
combination of steganography and cryptography, which provides<br />
a strong backbone for its security. The scenario of present day of<br />
information security system includes confidentiality,<br />
authenticity, integrity, non-repudiation. This present work focus<br />
is enlightening the technique to secure data or message with<br />
authenticity and integrity.In this project work, the secret message<br />
is encrypted before the actual embedding process starts. The<br />
entire work has done in MATLAB. The hidden message is<br />
encrypted using a simple encryption algorithm using secret key<br />
and hence it will be almost impossible for the intruder to unhide<br />
the actual secret message from the embedded cover file without<br />
knowing secret key.Only receiver and sender know the secret<br />
key.N-bit LSB substitution technique is used as embedding and<br />
extraction method . We propose that this method could be most<br />
appropriate for hiding any secret message (text,image<br />
,audio,video) in any standard cover media such as image, audio,<br />
video files.<br />
S<br />
I. INTRODUCTION<br />
teganography is the art of passing information through<br />
original files in a manner that the existence of the message is<br />
unknown.The term steganography is arrived from Greek word<br />
means, ―Covered Writing‖. The innocent files can be referred to<br />
as cover text, cover image, or cover audio as appropriate. After<br />
embedding the secret message it is referred to as stego-medium.<br />
A stego-key is used to control the hiding process so as to restrict<br />
detection and/or recovery of the embedded data. While<br />
cryptography is about protecting the content of messages (their<br />
meaning), steganography is about hiding the message so that<br />
intermediate persons cannot see the message. Steganography<br />
refers to information or a file that has been concealed inside a<br />
digital Picture, Video or Audio file[1].<br />
II. LITERATURE REVIEW<br />
A. The Scope Of Steganography<br />
With the boost in computer power, the internet and with the<br />
development of digital signal processing (DSP), information<br />
theory and coding theory, steganography has gone ‗‗digital‘‘. In<br />
the realm of this digital world, steganography has created an<br />
atmosphere of corporate vigilance that has spawned various<br />
interesting applications, thus its continuing evolution is<br />
guaranteed.Cyber-crime is believed to benefit from this digital<br />
revolution. Hence an immediate concernis to find out best<br />
possible attacks to carry out steganalysis, and simultaneously,<br />
Harshitha K M, Dr. P. A. Vijaya<br />
finding out techniques to strengthen existing stegnography<br />
techniques against popular attacks like steganalysis[2]<br />
B. Cryptography<br />
Cryptography encodes information in such a way that nobody<br />
can read it, except the person who holds the key. More advanced<br />
cryptotechniques ensure that the information being transmitted<br />
has not been modified in transit.There is some difference in<br />
cryptography and steganography, in cryptography the hidden<br />
message is always visible, because information is in plain text<br />
form but in steganography hidden message is invisible.<br />
III. THE PROPOSED SYSTEM<br />
Data hiding techniques have been widely used to transmission<br />
of hiding secret message for long time. Ensuring data security is<br />
a big challenge for computer users. Businessmen, professionals,<br />
and home users all have some important data that they want to<br />
secure from others. In this proposed system we have the software<br />
for data encryption and then embed the cipher text in an cover<br />
medium.This system combines the effect of these two methods to<br />
enhance the security of the data.<br />
The proposed system encrypts the data with a crypto algorithm<br />
and then embeds the encrypted data in an cover file. This system<br />
improves the security of the data by embedding the encrypted<br />
data and not the plain data in cover file.the block diagram of<br />
proposed system is as shown in fig1<br />
Fig. 1: Block diagram of proposed system<br />
To embed a secret message file in the cover file used two distinct<br />
methods:<br />
(1) encrypt the secret message<br />
(2) The encrypted secret message is embed in the cover media by<br />
using LSB substitution technique.<br />
Let us now describe proposed encryption method and then the<br />
steganography algorithm.<br />
A. Encryption algorithm<br />
In this project the secret message is encrypted before<br />
embedding .the secret message is randomly permuted using the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 302<br />
ISSN 2250-3153<br />
secret key. The random permutation is carried out by using<br />
matlab functions rand and randperm.<br />
rand('twister',key)<br />
p = randperm(length(N))<br />
rand function randomly generates numbers using state ‖twister‖<br />
and key. p stores the randomized positions of the length of the<br />
secret message i.e length(N).then secret message is randomized<br />
accordingly.<br />
This encryptiom method is simple and efficient and is of<br />
symmetric type where only receiver and sender knows secret<br />
key. The Secret key length is variable and is of range double<br />
precision. At the receiver side during extraction process the<br />
decryption ,that is the reverse process of encryption is carried out<br />
using the same key to obtain the secret message from stego<br />
medium. In a nutshell, the reason that we encrypt the message is :<br />
Cryptography + Steganography = Secure Steganography<br />
B. Least Significant Bit (LSB) substitution method<br />
Least Significant Bit (LSB) substitution method is a very<br />
popular way of embedding secret messages with simplicity.The<br />
fundamental idea here is to insert the secret message in the least<br />
significant bits of the images. This actually works because the<br />
human visual system is not sensitive enough to pick out changes<br />
in color where as changes in luminance are much better picked<br />
out. A basic algorithm for LSB substitution is to take the first N<br />
cover pixels where N is the total length of the secret message that<br />
is to be embedded in bits. After that every pixel's last bit will be<br />
replaced by one of the message bits.<br />
Least significant bit (LSB) insertion is a common, simple<br />
approach for embedding information in a cover image. The LSB<br />
or in other words 8-th bit of some or all the bytes inside an image<br />
is changed to a bit of the secret message. Let us consider a cover<br />
image contains the following bit patterns:<br />
Byte-1 Byte-2 Byte-3 Byte-4<br />
00101101 00011100 11011100 10100110<br />
Byte-5 Byte-6 Byte-7 Byte-8<br />
11000100 00001100 11010010 10101101<br />
Suppose a number 200 is to embed in the above bit pattern. Now<br />
the binary representation of 200 is 11001000. To embed this<br />
information at least 8 bytes in cover file is needed. hence taken 8<br />
bytes in the cover file. Now modify the LSB of each byte of the<br />
cover file by each of the bit of embed text 11001000.Now<br />
Table3.2 shows what happens to cover file text after embedding<br />
11001000 in the LSB of all 8 bytes.<br />
Table 3.1 Illustration of LSB technique<br />
Here out of 8 bytes only 3 bytes get changed only at the LSB<br />
position. Since changing the LSB hence either changing the<br />
corresponding character in forward direction or in backward<br />
direction by only one unit and depending on the situation there<br />
may not be any change also as seen in the above example. As our<br />
eye is not very sensitive so therefore after embedding a secret<br />
message in a cover file our eye may not be able to find the<br />
difference between the original message and the message after<br />
inserting some secret text or message on to it.<br />
C. Description of Proposed Work<br />
When the system is executed GUI is displayed for embedding<br />
process. The Embed window provides option for selecting<br />
secret message file.the secret message file may be text,image<br />
,audio,video.there is also provision for choosing cover<br />
medium(video,audio,image). enter the key and press encrypt<br />
button to encrypt the secret message. And choose the no of LSB<br />
bits (1,2,3,4,5,6,7,8) which are replaced by secret message in<br />
cover file.As we go on increasing no of LSB bits the size of<br />
secret message to be hide also increases.press embed message<br />
button to embed the message in cover file to get stegomedium<br />
and the press save button to save the stegomedium.embed<br />
window also displays time taken in embedding ,Utilization factor<br />
and PSNR value.press message extraction button to extract the<br />
secret message from stegomedium or press exit button to get out<br />
of the Embed window.<br />
Fig. 2: Snapshot of Embed Window<br />
In extract window browse any stegomedium file, enter thecorrect<br />
key and then press extract button to extract the secret message<br />
from the stegomedium.if the incorrect key is entered it is not<br />
possible to extract message. The decryption is performed along<br />
with extraction when extract button is pressed. The advantage of<br />
this extract window is that it can extract any kind of<br />
stegomedium(image,audio,video) with secret key known<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 303<br />
ISSN 2250-3153<br />
Fig. 3: Snapshot of Extract Window<br />
IV. RESULTS AND DISCUSSION<br />
In steganography following factor are considerered after<br />
embedding secret message in the cover medium.<br />
A. Utilization factor<br />
The utilization factor denotes the amount of cover image that<br />
has been utilized to embed the secret message into it. And it is<br />
given by<br />
Utilization factor = ecret message size(bits)/ cover medium<br />
size(bits)*100 (1)<br />
B. PSNR value<br />
PSNR is the ratio between the maximum possible power of a<br />
signal and the power of corrupting noise that affects the fidelity<br />
of its representation. Because many signals have a very wide<br />
dynamic range, PSNR is usually expressed in terms of a<br />
logarithmic decibel scale.A higher PSNR value indicates that the<br />
reconstruction is of higher quality..PSNR is most commonly used<br />
as a measure of quality of reconstruction of lossy compression<br />
codes. The signal in this case is the original data, and the noise is<br />
the error due to hiding. The PSNR value is calculated by Eqn. (2)<br />
(2)<br />
Where MSE: Mean-Square error Mean Square Error (MSE): It is<br />
the measure used to quantify the difference between the initial<br />
and the distorted or noisy image.and is given by Eqn.3.<br />
Where x: width of image.<br />
y: height.<br />
x*y: number of pixels<br />
We applied our present method on different cover files and secret<br />
message files and the results are given below:<br />
(3)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 304<br />
ISSN 2250-3153<br />
V. CONCLUSION<br />
Until recently, information hiding techniques received very<br />
much less attention from the research community and from<br />
industry than cryptography.Steganography has its place in<br />
security.It is not intended to replace cryptography but<br />
supplement it. In this paper we give an idea to enhance the<br />
security of system by combining the two techniques. It can<br />
enhance confidentiality of information and provides a means of<br />
communicating privately. Here message is first encrypted and<br />
then embed in cover file with help of steganographic system.<br />
LSB algorithm is applicable for all kind of cover medium(image,<br />
audio,video).LSB algorithm is used for both embedding and<br />
extraction process.the entire work is done in MATLAB There are<br />
infinite number ofsteganography applications for digital image<br />
including copyright protection,feature tagging, and secret<br />
communication. This paper explores a tiny fraction of the art of<br />
steganography. The steganography method may be further<br />
secured if we compress the secret message first and then encrypt<br />
it and then finally embed inside the cover file.<br />
REFERENCES<br />
[1] Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar ―Cryptography of<br />
Video InformationIn Modem communica-tion‖, Electronics And<br />
Energefics, vol. 11, pp. 115-125, 1998<br />
[2] Stinsown,D.―Cryptography:Theory and practice‖<br />
[3] C. Cachin, ―An Information-theoretic Model for steganography‖, in<br />
proceeding 2nd Information Hiding Workshop, vol.1525, pp.306-<br />
318,1998<br />
[4] Neil F. Johnson, Zoran uric,Sushil. Jajodia, ‖ Information Hiding:<br />
steganography and Watermarking – Attacks and Countermeasures‖,<br />
Kluwer Academic Press, Norwrll, MA,New York, 2000<br />
[5] R A Isbell, ―Steganography: Hidden Menace or Hidden Saviour‖,<br />
steganography White Paper,IO May 2002<br />
[6] J. Zollner, H. Federrath, H. Klimant,et al.,―Modeling the Security of<br />
Systems‖, Steganographic in 2 nd Workshop on Informafion Hiding,<br />
Portland, April 1998, pp. 345-355. proceeding of IEEE, pp. 1062-<br />
1078, July1999.<br />
[7] W. Bender, D. Gruhl, N. Morimoto and A.Lu, ―Techniques for Data<br />
Hiding‖, Sysfems Journal, vol. 35, 1996<br />
[8] M. M Amin, M. Salleh, S. Ibrahim, M .R. Katmin, and M. Z. I.<br />
Shamsuddin,― Information Hiding using Steganography‖, IEEE 0-<br />
7803-7773-March 7,2003<br />
[9] N. Provos, P. Honeyman, ―DetectingSteganography Content on the<br />
Internet‖.Transformation‖, ZEICE Tram.<br />
[10] Advanced Steganography Algorithm usingencrypted secret message,<br />
Joyshree Nath and Asoke Nath, International Journal of Advanced<br />
Computer Science and Application (IJACSA) Vol-2 No.3, Page19-<br />
24,March(2011).<br />
AUTHORS<br />
First Author - Harshitha K M, USN:4MC10LDS10,<br />
Mtech(DE&CS), MCE,Hassan-573202<br />
Email id - harshimce022@gmail.com<br />
Second Author - Dr. P. A. VIJAYA BE., M.E., PhD, Professor and<br />
Head, Dept. of E&C Engg. MCE, Hassan-573202<br />
Email id - pavmkv@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 305<br />
ISSN 2250-3153<br />
Biodiesel Production and Process Optimization<br />
Rajarshi Kar, Oindrila Gupta, Mukundu Kumar Das<br />
Chemical Engineering Department, Heritage Institute of Technology, Kolkata, India<br />
Abstract- ―In any case, they make it certain that motor-power<br />
can still be produced from the heat of the sun, which is always<br />
available for agricultural purposes, even when all our natural<br />
stores of solid and liquid fuels are exhausted..‖<br />
Rudolf Diesel.<br />
In this project we have intended to prepare biodiesel from waste<br />
mustard oil. To make it economically feasible, a proper balance<br />
have to be struck between the raw material cost & the selling<br />
price of biodiesel as well as that of the byproduct glycerin. The<br />
variables affecting the yield and characteristics of the biodiesel<br />
produced from used frying oil were studied, the achieved results<br />
were analyzed and a set of recommendations were proposed.<br />
Objective of the work:<br />
To study the production of biodiesel from waste mustard oil and<br />
its process optimization<br />
B<br />
I. INTRODUCTION<br />
iodiesel refers to a vegetable oil- or animal fat-based diesel<br />
fuel consisting of long-chain alkyl (methyl, propyl or ethyl)<br />
esters. Biodiesel is typically made by chemically reacting lipids<br />
(e.g., vegetable oil, animal fat (tallow)) with an alcohol.<br />
Biodiesel is meant to be used in standard diesel engines and<br />
is thus distinct from the vegetable and waste oils used to fuel<br />
converted diesel engines. Biodiesel can be used alone, or blended<br />
with petro-diesel. Biodiesel can also be used as a low carbon<br />
alternative to heating oil.<br />
Biodiesel is liquid which varies in color between golden and<br />
dark brown depending upon the production feedstock. It is<br />
immiscible with water, has a high boiling point and low vapor<br />
pressure. Typical ethyl ester biodiesel has a flash point of about<br />
130ºC, biodiesel has a density of about 0.88 gm/cm^3, less than<br />
that of water. A biodegradable transportation fuel that contributes<br />
no net carbon di oxide or sulfur emission to the atmosphere and<br />
is low in particulate emission. Ultra Low Sulfur Diesel<br />
fuel(ULSD) fuel, which is advantageous because it has virtually<br />
no sulfur content. Biodiesel has very good lubricating properties,<br />
significantly better than standard diesel which can prolong<br />
engine's life. As a result, Biodiesel can now compete with other<br />
alternative fuels and clean-air options for urban transit fleets and<br />
government vehicles across the country. It is safe, biodegradable<br />
and reduces air pollutants such as particulates, carbon monoxide<br />
and hydrocarbon. A variation in biodiesel energy density is more<br />
dependent on feedstock used than the production process.<br />
II. REACTION INVOLVED<br />
Esterification Reaction: The basic process of converting waste<br />
oil to biodiesel is called Esterification. Carboxylic act reacts<br />
readily with alcohols in the presence of catalytic amount of<br />
mineral acids to yield compounds called esters. The process is<br />
called esterification.<br />
The esterification reaction is both slow and reversible. The<br />
equation for the reaction between an acid RCOOH and an<br />
alcohol R'OH (where R and R' can be the same or different) is:<br />
Transesterification<br />
Triglycerides (1) are reacted with an alcohol such as ethanol/<br />
methanol (2) to give ethyl/ methyl esters of fatty acids (3) and<br />
glycerol (4):<br />
Animal and plant fats and oils are typically made of<br />
triglycerides which are esters containing three free fatty acids<br />
and the trihydric alcohol, glycerol. In the transesterification<br />
process, the alcohol is deprotonated with a base to make it a<br />
stronger nucleophile. Commonly, ethanol or methanol is used.<br />
As can be seen, the reaction has no other inputs than the<br />
triglyceride and the alcohol.<br />
Normally, this reaction will precede either exceedingly<br />
slowly or not at all. Heat, as well as an acid or base are used to<br />
help the reaction proceed more quickly. It is important to note<br />
that the acid or base are not consumed by the transesterification<br />
reaction, thus they are not reactants but catalysts.<br />
Almost all biodiesel is produced from virgin vegetable oils<br />
using the base-catalyzed technique as it is the most economical<br />
process for treating virgin vegetable oils, requiring only low<br />
temperatures and pressures and producing over 98% conversion<br />
yield (provided the starting oil is low in moisture and free fatty<br />
acids). However, biodiesel produced from other sources or by<br />
other methods may require acid catalysis which is much slower.<br />
Since it is the predominant method for commercial-scale<br />
production, only the base-catalyzed transesterification process<br />
will be described below.<br />
An example of the transesterification reaction equation,<br />
shown in skeletal formulas:<br />
During the esterification process, the triglyceride is reacted<br />
with alcohol in the presence of a catalyst, usually a strong alkali<br />
(NaOH, KOH, or Alkoxides). The main reason for doing a<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 306<br />
ISSN 2250-3153<br />
titration to produce biodiesel, is to find out how much alkaline is<br />
needed to completely neutralize any free fatty acids present, thus<br />
ensuring a complete transesterification. Empirically 6.25 g / L<br />
NaOH produces a very usable fuel. One uses about 6 g NaOH<br />
when the WVO is light in color and about 7 g NaOH when it is<br />
dark in color.<br />
The alcohol reacts with the fatty acids to form the mono-alkyl<br />
ester (or biodiesel) and crude glycerol. The reaction between the<br />
biolipid (fat or oil) and the alcohol is a reversible reaction so the<br />
alcohol must be added in excess to drive the reaction towards the<br />
right and ensure<br />
Ester Hydrolysis<br />
Soap Forming Reaction<br />
Acid Catalyzed Pretreatment<br />
Special processes are required if the oil or fat contains<br />
significant amounts of FFAs. Used cooking oils typically contain<br />
2-7% FFAs and animal fats contain from 5-30% FFAs. Some<br />
very low quality feedstocks, such as trap grease, can approach<br />
100% FFAs. When an alkali catalyst is added to these feed<br />
stocks, the free fatty acids react with the catalyst to form<br />
Soap and water as shown in the reaction below:<br />
Fatty Acid Potassium Hydroxide Potassium soap Water<br />
Up to about 5% FFAs, the reaction can still be catalyzed<br />
with an alkali catalyst but additional catalyst must be added to<br />
compensate for that lost to soap. The soap created during the<br />
reaction is either removed with the glycerol or is washed out<br />
during the water wash. When the FFA level is above 5%, the<br />
soap inhibits separation of the glycerol from the methyl esters<br />
and contributes to emulsion formation during the water wash. For<br />
these cases, an acid catalyst such as sulfuric acid can be used to<br />
esterify the FFAs to methyl esters as shown in the following<br />
reaction:<br />
Fatty Acid Methanol Methyl ester Water<br />
This process can be used as a pretreatment to convert the<br />
FFAs to methyl esters and thereby reduce the FFA level. Then,<br />
the low FFA pretreated oil can be transesterified with an alkali<br />
catalyst to convert the triglycerides to methyl esters . As shown<br />
in the reaction, water is formed and, if it accumulates, it can stop<br />
the reaction well before completion. Removal of this alcohol also<br />
removes the water formed by the esterification reaction and<br />
allows for a second step of esterification or proceeding directly to<br />
alkali-catalyzed transesterification. Note that the methanol-water<br />
mixture will also contain some dissolved oil and FFAs that<br />
should be recovered and reprocessed.. Soapstock, a mixture of<br />
water, soaps, and oil, is dried, saponified, and then esterified with<br />
methanol or some other simple alcohol using an inorganic acid as<br />
a catalyst. The procedure relies on a large excess of alcohol and<br />
the cost of recovering this alcohol determines the feasibility of<br />
the process.<br />
When oils with free fatty acids are used, free fatty acids will<br />
be turned into soaps by the alkali catalyst. As a result, the yield<br />
of biodiesel is lowered for those oils, and the soap needs to be<br />
removed. The process used cleaning the biodiesel is known as<br />
―washing‖, in particular used for removing soaps. This process<br />
involves either bubbling water up through the biodiesel (after<br />
glycerin separation), or mixing water down on the top and letting<br />
it flow down through the biodiesel. Water pulls the soaps out of<br />
biodiesel as it passes through. The water eventually settles to<br />
bottom, and can be separated readily from the biodiesel.<br />
Process Details<br />
Feedstock: Waste Mustard Oil<br />
Chemicals Required: Sodium hydroxide as a catalyst<br />
for transesterification reaction, Ethanol as a reagent,<br />
distilled water.<br />
Equipments used: A batch reactor with condenser, a<br />
stirrer, clamp, a heater, Digital temperature indicator ( 0<br />
– 250 o C ),Thermometer ( 0 – 250 o C ) x 2 nose, Beaker<br />
( 1 L capacity ) x 2 nos, Cylinder ( 1 L capacity ) x 2<br />
nos, Conical flask ( 100 cm 3 ) x 2 nos, Flash distillation<br />
apparatus with mantel heater for 1 L flask, Separating<br />
funnel Iron stand with ring holder ( 2 nos. ),Rubber tube<br />
( ½ inch dia. ) x 1 roll ( 50m ),measuring cylinder.<br />
Pipette, glass rod, PET bottles for biodiesel storage, a<br />
batch distillation unit, PH strip, filter paper.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 307<br />
ISSN 2250-3153<br />
Making a small batch biodiesel using Waste Mustard<br />
Oil:<br />
Filter and dewater waste mustard oil by using filter<br />
paper since it may contain contaminants which oil<br />
acidic(rancid).<br />
Waste mustard Oil (3L) is heated to 50-60 °C for 10<br />
minutes and then cooled.<br />
Firstly, 30grms of sodium hydroxide is mixed slowly<br />
with alcohol in a three-necked round bottom flask,<br />
stirring continuously.<br />
Oil is poured slowly in the prepared Sodium ethoxide<br />
mixture with continuous stirring and then heated at<br />
50-60 °C for about 90 minutes.<br />
The alkalinity of the oil is measured by using pH strip<br />
during reaction. The color of the Ph strip shows the<br />
mixture is alkaline.<br />
Now the whole system should be cooled and the<br />
mixture allowed settling for at least 12 hours. But we<br />
kept it for three days.<br />
At the end of three days, the mixture separated to<br />
impure Biodiesel (upper layer) and impure Glycerin<br />
(lower layer) using a separating funnel.<br />
The separated layer of Biodiesel is then fed to a batch<br />
distillation unit for the recovery of ethanol and water.<br />
The temperature is maintained around 105 °C.<br />
The residue (biodiesel + soap) collected is taken in a<br />
beaker.<br />
The impure Biodiesel is washed with water. Two layers<br />
are formed, upper layer being Biodiesel and the lower<br />
layer being water.<br />
Now the Biodiesel is separated from the water by a<br />
separating funnel.<br />
This Biodiesel may contain a small percentage of water<br />
and so it is then dried by passing through silica gel.<br />
The impure Glycerin (colored) is treated with activated<br />
carbon and then filtered through a Buchner funnel.<br />
The amount of Biodiesel, Alcohol (recovered) and<br />
Glycerin are measured and noted.<br />
III. BIODIESEL FROM WASTE MUSTARD OIL:<br />
PROCESS STEPS<br />
Heating of Oil<br />
In order to speed up the reaction, the waste mustard must be<br />
heated. The ideal temperature range is 50º C to 60º C. Heating<br />
with electric elements is usually the easiest way to bring the oil<br />
up to temperature. Heat the oil first to remove any water content.<br />
Waste oil will probably contain water, which can slow down the<br />
reaction and cause saponification (soap formation). The less<br />
water in the oil the better. So waste mustard oil is heated to 50-<br />
60ºC for 10 minutes and then cooled.<br />
Proportion of Mustard oil, Sodium Hydroxide (alkali catalyst)<br />
and Ethanol taken are as follows:<br />
Mustard Oil: Volume (3 L) * Density (910 g/L) = 2730 g<br />
Sodium Hydroxide : 1% of Oil = 1% of 2730 g<br />
= 27.3 g<br />
~ 300 g<br />
Ethanol: 3 moles of 100% C2H5OH per mole of oil<br />
= (3 * 138) g<br />
= 414 g<br />
So, for 90% alcohol, amount taken = (414/.90) g<br />
= 460 g<br />
~ 500g<br />
Mixing of ethanol and catalyst<br />
The purpose of mixing ethanol and the catalyst (NaOH) is to<br />
react the two substances to form ethoxide. Firstly, NaOH is<br />
mixed slowly with alcohol in a three-necked round bottom flask,<br />
stirring continuously. NaOH does not readily dissolve into<br />
ethanol. It is best to turn on the mixer to begin agitating the<br />
ethanol and slowly pour the NaOH in. When particles of NaOH<br />
cannot be seen, the ethoxide is ready to be added to the oil. This<br />
can usually be achieved in 20 –30 minutes.<br />
Heating and mixing<br />
Oil is poured slowly in the prepared Sodium ethoxide<br />
mixture with continuous stirring and then heated at 50-60 °C for<br />
about 90 minutes. A full speed propeller coupled to an electric<br />
motor works fine as a mixer. Too much agitation causes<br />
splashing and bubbles through vortexing and reduces mix<br />
efficiency. There should be a vortex just appearing on the<br />
surface. Adjust the speed, or the pitch or size of the stirrer to get<br />
the right effect. The transesterification process separates the ethyl<br />
esters from the glycerin. Now the whole system should be cooled<br />
and the mixture allowed settling for at least 12 hours. But we<br />
kept it for three days.<br />
Settling and separation<br />
The ethyl esters (biodiesel) will be floating on top while the<br />
denser glycerin will have congealed on the bottom of the<br />
container forming a hard gelatinous mass. Then carefully decant<br />
the biodiesel. This can be done by draining the reactants out of<br />
the bottom of the container through a transparent hose. The semiliquid<br />
glycerin has a dark brown color and the biodiesel is honeycolored.<br />
Keep a watch on what flows through the sight tube.<br />
When the lighter-colored biodiesel appears divert it to a separate<br />
container. If any biodiesel stays with the glycerin it is easy to<br />
retrieve it later once the glycerin has solidified. If you left the<br />
mixture in the tank until the glycerin gelled, reheat the tank just<br />
enough to liquify the glycerin again.<br />
The separated layer of Biodiesel is then fed to a batch<br />
distillation unit for the recovery of ethanol and water. The<br />
temperature is maintained around 105 °C. The impure Biodiesel<br />
is washed with water. Two layers are formed, upper layer being<br />
Biodiesel and the lower layer being water.<br />
Now the Biodiesel is separated from the water by a<br />
separating funnel. This Biodiesel may contain a small percentage<br />
of water and so it is then dried by passing through silica gel.<br />
Draining of Glycerol<br />
After the transesterification reaction, one must wait for the<br />
glycerol to settle to the bottom of the container. This happens<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 308<br />
ISSN 2250-3153<br />
because Glycerol is heavier then biodiesel. The settling will<br />
begin immediately, but the mixture should be left a minimum of<br />
eight hours (preferably 12) to make sure all of the Glycerol has<br />
settled out. The Glycerol volume should be approximately 20%<br />
of the original oil volume. The impure Glycerin (colored) is<br />
treated with activated carbon and then filtered through a Buchner<br />
funnel. Volume of glycerin obtained near about 690ml.<br />
Soap residue:<br />
Suspended in the biodiesel will also be some soapy residues.<br />
These are the result of Na + ions from the NaOH reacting with<br />
water created when the ethanol bonds with the ester chains along<br />
with any other water that was suspended in the oil. If the reaction<br />
produces more than the usual amount of soap, this happens when<br />
NaOH comes into contact with water before it has a chance to<br />
react with the oil. In this case the excess water should have been<br />
boiledoff.<br />
The part of the process where it is vital to keep all water out<br />
of the reaction is when making the sodium ethoxide. Keep the<br />
vessels NaOH comes in contact with as dry as possible. The<br />
chances of a good clean splitting of ester from glycerin with little<br />
soap by-product are much better on a warm dry summer day than<br />
on a damp winter day.<br />
Washing Biodiesel<br />
The purpose is to wash out the remnants of the catalyst and<br />
other impurities. There are three main methods:<br />
Water wash only (a misting of water over the fuel,<br />
draining water off the bottom)<br />
Air bubble wash (slow bubbling of air through the<br />
fuel)<br />
Air/water bubble wash (with water in the bottom of<br />
the tank, bubbling air through water and then the<br />
fuel)<br />
Which method works the best is dependent on the quality of<br />
the fuel. Washing Biodiesel with water is the oldest and most<br />
common method of cleaning biodiesel. Raw unwashed biodiesel<br />
is about 3% ethanol. Ethanol is a solvent; it captures soap and<br />
other impurities and holds them dissolved in the biodiesel. Water<br />
soaks up that ethanol, releasing impurities to be washed away<br />
with water. Water washing is the most flexible way to purify<br />
biodiesel.<br />
The process of washing biodiesel involves mixing it with<br />
water. Water is heavier than biodiesel and absorbs the excess<br />
alcohol, sodium hydroxide, and soap suspended in it. After<br />
washing and settling, the water and impurities in the water can be<br />
drained from the bottom of the container. Several water cycles<br />
are generally needed. The first water drained off the bottom of<br />
the biodiesel will be milky, and the final wash water drained off<br />
will be clear. Excess sodium hydroxide in biodiesel will form<br />
soap when mixed with water, and it takes a while for the soap to<br />
settle out.<br />
Depending on the method use, it takes roughly as much as<br />
biodiesel for a wash cycle. Initial washing must involve gently<br />
mixing the formation of soap that will take time to settle out.<br />
However, you want the mixing to be through and for the water to<br />
be dispersed throughout the biodiesel oil. Mustard oil based will<br />
have better cold weather flow characteristics than from coconut<br />
oil or animal fat.<br />
IV. OBSERVATION AND RESULTS<br />
Amount of waste mustard oil taken = 3liter<br />
Mustard oil density = 910g/l=2730g<br />
Amount of catalyst (NaOH) taken = 30g<br />
Amount of ethanol = 500ml<br />
pH of mixture = 7(indicates alkalinity)<br />
Volume of impure biodiesel after reaction (V1) = 2800ml (94%)<br />
Amount of ethanol loss due to vaporization = 20ml<br />
After Flash distillation,<br />
Amount of ethanol recovered (V2) = 30ml<br />
Volume of unwashed biodiesel (V3) = 2800ml<br />
Volume of pure biodiesel = 2750ml<br />
Characteristics<br />
Color<br />
Density, kg/m3<br />
Flash point, ºC<br />
Fire point, ºC<br />
Viscosity,mm^2/s@40ºC<br />
Aniline Point, ºC<br />
Pour point, ºC (summer)<br />
Calorific Value, MJ/L<br />
Boiling Point, ºC<br />
Comparative Study:<br />
Diesel<br />
Biodiesel<br />
Golden Golden and dark<br />
brown<br />
0.84 0.88<br />
60 to 80 130<br />
78 138<br />
1.3-4.1 1.5-4.0<br />
42 54<br />
18 10<br />
38.3 36<br />
180 to 340 315 to 350<br />
Comparative study between diesel and biodiesel<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 309<br />
ISSN 2250-3153<br />
Figure: Process Flow Chart for Production of Biodiesel And<br />
By- product from waste Mustard Oil<br />
Properties<br />
Biodiesel: Physical Characteristics<br />
Values<br />
Color Golden &Dark Brown<br />
Specific Gravity 0.88<br />
Aniline Point ºC 54 ºC<br />
Diesel Index 43<br />
Cetane Number(CN) 40<br />
Flash Point ºC 130 ºC<br />
Fire Point ºC 138 ºC<br />
Kinematic Viscosity @40ºC 1.5 to 4.0<br />
Gross calorific value 10800<br />
American Petroleum Institute (API) gravity<br />
Diesel Index (DI) = (Aniline point ºF*degree API)/100<br />
Cetane Number =Diesel Index-3<br />
Gross Calorific Value=12400-2100* ρ^2<br />
where ρ is the density<br />
Suggestion for future work<br />
Biodiesel is not yet cost competitive with petroleum diesel.<br />
In order to become more competitive, it is crucial to lower the<br />
production costs associated with biodiesel. The cost of raw<br />
material consists of as much as 70-95% of the total production<br />
cost of biodiesel. The raw materials include oil, alcohol and a<br />
catalyst. In order to reduce the production cost, it is most<br />
beneficial to use waste cooking oil, as this is readily available<br />
and at a low price. Waste mustard oil presents problems in the<br />
form of excess water and free fatty acid composition of the oil<br />
The best catalyzed transesterification of waste mustard oil<br />
with ethanol is most economic decision. An alkali catalyzed<br />
reaction allows for a low temperature and pressure with high<br />
conversion. An alkali catalyzed reaction would require an<br />
esterification pretreatment step in order to reduce the<br />
concentration of free fatty acids and dewatering process in order<br />
to create biodiesel suitable for vehicle consumption.<br />
The problem of solidifying the biodiesel from waste<br />
vegetable oil in cold weather conditions should be rectified in<br />
future work by some kind of additives which are cheaply<br />
available in the market<br />
The Future of Biodiesel fuel<br />
BIO-DIESEL is diesel made from animate source (using<br />
plant oil and animal fats). Bio-diesel is basically comprised of<br />
short-alkyl esters, made from animal fats and plant seeds.<br />
With increase in the demand of petroleum products the<br />
prices of petrol & diesel are increasing world wide. This trend is<br />
expected in years to come as the resources are also depleting.<br />
Hence alternative sources of energy for running our generators,<br />
automobiles etc. are being considered world wide.<br />
The possibility of obtaining oil from plant resources has<br />
aroused a great interest and in several countries, vegetable oil<br />
after esterification being used as 'Biodiesel'.<br />
Biodiesel is a nontoxic, biodegradable replacement of the<br />
petroleum diesel. The vegetable oils are treated with alcohol<br />
ethanol or methanol and alkali. The products of the reaction are<br />
Biodiesel and glycerol. Chemically biodiesel is monoalkyl esters<br />
of long chain fatty acid and its properties are similar to petrodiesel.<br />
The biodiesel can be used as 20% blend with petro-diesel<br />
in existing engines without any modification. Both the edible and<br />
non edible vegetable oils can be used as the raw materials for the<br />
biodiesel. Considering the cost and demand of the edible oils the<br />
non edible oils may be preferred for the preparation of biodiesel<br />
in India.<br />
Biodiesel is a substance that preserves air quality. This<br />
type of fuel is designed to enhance the richness of a diesel<br />
automobile. Various organizations are setup to control air<br />
pollution and find new sources of fuels for vehicles. Not only<br />
does biodiesel help the environment, it also assists people is<br />
using a lower cost means of transportation. It is a more harmless<br />
method than the now used petroleum diesel. Biodiesel is created<br />
from nature oils and fats that can be gathered from anyone‘s<br />
gardens.<br />
The future of biodiesel is growing. More companies are<br />
offering this solution to the consumers. At this stage, only diesel<br />
powered automobiles can use the new fuel. This is expected to<br />
change in the upcoming years. The mounting concern of offshore<br />
oil as well as the environmental issues has groups in an<br />
uproar. Already there are several types of companies using<br />
biodiesel as their main source for transportation.<br />
Biodiesel fuel also has its own advantages and<br />
disadvantages. The biggest advantage of biodiesel is that it can<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 310<br />
ISSN 2250-3153<br />
play a significant role in reducing the harmful carbon dioxide<br />
emissions. However, there do exist some drawbacks of biodiesel<br />
which may become a hindrance in the introduction of biodiesel<br />
as an alternative to the harmful carbon emitting fossil fuels.<br />
Biggest advantage of biodiesel fuel is that it is non toxic and<br />
biodegradable, which makes it one of the most environment<br />
friendly alternative of power generation.<br />
After completion of our actual experiment in the biodiesel<br />
production, we have obtained our desired compatibility with<br />
petroleum diesel. The flash point, pour point, calorific value, fire<br />
point, kinematic viscosity, density etc has been satisfactory<br />
taking into consideration the possibility of errors here. So our<br />
observation is compatible within the limits of experimental errors<br />
REFERENCES<br />
[1] Biodiesel processing and production by Jon Van Gerpen.<br />
[2] Small Scale Biodiesel Production by Waste Management & Research<br />
Centre (WMRC)<br />
[3] Triglyceride Based Diesel Fuel by Anjana Srivastava and Ram Prasad<br />
[4] Biodiesel Production and Fuel Quantity J. Van Gerpen<br />
[5] http://en.wikipedia.org/wiki/Biodiesel<br />
[6] Fernando, S., Hal, C. and Jha S., ―NOx Reduction from Biodiesel Fuels‖,<br />
Energy & Fuels 2006, 20, pp. 376-382<br />
[7] Hancock, N., ―Global Biodiesel Market‖, Oilseeds WA, Biodiesel<br />
Workshop, August 2005<br />
[8] Biofuels refining and performance By Ahindra Nag<br />
[9] Dunn, R.O.; ―Cold-Flow Properties of Soybean Oil Fatty Acid Monoalkyl<br />
Ester Admixtures‖; Energy & Fuel; 2009.<br />
[10] Nitschke, W.R., Wilson, C.M.; ―Rudolf Diesel: Pioneer of the Age of<br />
Power‖; University of Oklahoma Press; 1965.<br />
[11] Boocock, D.G.B., Konar, S.K., Mao, V., Lee, C., Buligan, S.; ―Fast<br />
formation of high-purity methyl esters from vegetable oils‖; J. Am. Oil Soc.<br />
Chem.; 1998.<br />
[12] Srivastava, A., Prasad, R.; ―Triglycerides-based diesel fuels‖; Renewable<br />
and Sustainable Energy Reviews, 4th edition; 2000.<br />
[13] National Biodiesel Board www.biodiesl.org<br />
[14] www.eere.energy.gov/biomass/publications.html<br />
[15] www.landinstitute.org-Insights from Sunshine Farm<br />
[16] Performance and Emissions of Single CylinderCI Engine using Kusum<br />
Methyl Ester; International Journal of Computer Information Systems,Vol.<br />
4, No.1, <strong>2012</strong><br />
[17] journeytoforever.org/biodiesel_mike.html<br />
[18] http://www.svlele.com/biodiesel_process.htm<br />
[19] http://www.biotechpark.org.in/html/biodiesel/html/intro1.htm<br />
[20] http://www.biodieselathome.net/The_Future_of_Biodiesel.html<br />
[21] http://haydentech.edublogs.org/wiki/period9_group2/what-is-the-future-ofyour-fuel-source/<br />
AUTHORS<br />
First Author – Rajarshi Kar, Chemical Engineering Department,<br />
Heritage Institute of Technology, Kolkata, India, Email:<br />
rajarshi.kar6@gmail.com<br />
Second Author –Oindrila Gupta, Chemical Engineering<br />
Department, Heritage Institute of Technology, Kolkata, India, Email:<br />
oindrilaa.gupta@gmail.com<br />
Third Author – Mukundu Kumar Das, Chemical Engineering<br />
Department, Heritage Institute of Technology, Kolkata, India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 311<br />
ISSN 2250-3153<br />
A study of Intellectual Property Management in Industries<br />
& Academics & ways for collaboration in India<br />
First Author - Pankaj Prabhakar Borkar<br />
Assistant Controller of Patent & Designs, Patent office, Mumbai, India<br />
Second Author - Dr. Ashutosh A. Paturkar<br />
Professor, Dr Ambedkar Institute of Management & Research, Nagpur, India<br />
Abstract- Intellectual property (IP) has emerged as a key driver<br />
in knowledge economy. Firms view IP as a valuable corporate<br />
asset and a strategic business tool. The future focus of research<br />
will be on mutual relationship with academic<br />
institutions/university & industry cooperation. It will be how to<br />
bring together the disciplines of IP and management & to<br />
identify the communication gaps in academic & industries for<br />
technology sharing / mutual research etc. It will avoid<br />
duplication of research work & will introduce Basic IP<br />
education. In Indian contest, most companies and academic<br />
institutions under-utilize the IP system & its potential benefit due<br />
to lack of awareness of IP system. This is attributed due to<br />
complexity of IP system & lack of easily accessible teaching,<br />
training and/or professional assistance. The proposed Protection<br />
and Utilization of Public funded IP Bill pending before<br />
Parliament will imposes obligations & creates rights to optimize<br />
the potential of public funded R&D. It will further provide<br />
incentive to create IP and mechanism for its protection and<br />
utilization, simultaneously enhancing awareness, greater<br />
interaction among universities, academic and research<br />
institutions & their collaborations. This will pave the way in<br />
India like other developed countries to avoid duplication of<br />
research work & create immense resources through IP for social<br />
development.<br />
Index Terms- Intellectual Property, Universities, Academic,<br />
Education, Industry, research, technology transfer, collaboration,<br />
Protection and Utilization of Public funded IP Bill Intellectual<br />
Property.<br />
I. INTRODUCTION & SIGNIFICANCE OF<br />
INTELLECTUAL PROPERTY (IP)<br />
Intellectual property (IP) has emerged as a key driver<br />
in knowledge economy & the firms view IP as a valuable<br />
corporate asset and a strategic business tool. Recent research<br />
indicates that over 50% of the value of many business<br />
organizations or assets is attributed to IP. The purpose of IP<br />
system mostly, patents are to protect and promote the<br />
development of science & technology (S&T) and to promote the<br />
dissemination & use of S&T. Intellectual Property means the<br />
property represented by the product emanating from creativity of<br />
the human mind, human intellect and creative ideas i.e. creative<br />
ideas and expressions of the human mind (intellect) that creates<br />
commercial value. It can be an invention (Patents), Design,<br />
Trademarks, artistic creation etc. In earlier times, physical or<br />
tangible assets like movable and immovable properties fetched<br />
the maximum value and the owner had an exclusive right over it.<br />
The property right, pertaining to such intangible assets, is called<br />
as Intellectual Property. The IP is an asset and, as such, it can be<br />
bought, sold, mortgaged, licensed, exchanged or gratuitously<br />
given away like any other form of the property. IP facilitates<br />
exclusive right to make, use, exercise, sell or distribute an<br />
invented article or Process in India i.e. these rights can be shared,<br />
licensed or sold. Thus IP serves as an indicator of achievements<br />
in Research & Development institutions and ability of individual<br />
researcher.<br />
II. SIGNIFICANCE OF INTELLECTUAL PROPERTY<br />
MANAGEMENT (IPM) TO INDUSTRIES &<br />
ACADEMICS<br />
Intellectual Property management (IPM) has become as<br />
important as IP managers needs decision support information<br />
related to R&D, innovation technology, finance, industrial<br />
economics, business strategy litigation, technology analysis,<br />
portfolio maintenance, licensing, acquisition analysis, evaluation<br />
etc. For instance, a patent portfolio may contain a large number<br />
of patents of less quality / high quality and on other end, a<br />
smaller number of exceedingly high quality patents, hence IP<br />
evaluation, audit is required. In India, most companies and<br />
academic institutions under-utilize the IP system due to lack of<br />
awareness and its usefulness due to complexity & lack of easily<br />
accessible teaching, training and/or professional assistance.<br />
Modern IPM provides essential tools for managing intangible<br />
assets like Patents, Designs and Trademarks, etc. IPM allows to<br />
handling risks & an uncertainty related to R&D and it facilitates<br />
the interaction between the public & the private sector. Market<br />
value of any enterprise is determined by its portfolio and optimal<br />
use of IP assets. In this competitive world, creating, protecting<br />
and managing IP rights and avoiding infringement of IP rights by<br />
others are crucial task of any firm or organization. Hence the<br />
main goal of patent management is obtaining and maintaining<br />
patents.<br />
2.1 IPM identifies, precautions to be taken after inventing<br />
the technology<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 312<br />
ISSN 2250-3153<br />
not to publish the research work anywhere before filing<br />
of patent application,<br />
file provisional / complete specification in patent<br />
offices,<br />
check for technical/commercial viability of inventions<br />
after complete development of invention file request for<br />
examination (within 48 months),<br />
get patent & maintain the enforcement of patent by<br />
paying the renewal fee,<br />
commercialize the invention (make / sell / license /<br />
assign, etc.),<br />
field watch (regular search of patent / non-patent<br />
documents & watch on technological advancements)<br />
III. COLLABORATION OF INDUSTRIES &<br />
ACADEMICS FOR IP<br />
In competitive world, it is necessary for India to<br />
innovate & promote creativity which needs to protect and utilize<br />
the IP created out of public funded research and development<br />
(R&D), in which Government has invested large funds. The<br />
proposed Protection and Utilization of Public funded IP Bill,<br />
imposes obligations & creates rights to optimize the potential of<br />
public funded R&D & it provides incentive to create IP and<br />
mechanism for its protection and utilization. The above bill<br />
encourages innovation in small and medium enterprises,<br />
promotes collaboration between Government, private enterprises<br />
and non-Government organizations & commercialization of IP<br />
created out of public funded R&D and the culture of innovation<br />
in the country.<br />
At present, government funded Universities &<br />
autonomous research Institutions cannot commercialize the fruits<br />
of their research. However, after the approval of above bill by the<br />
Government would alter the existing IP rules by allowing<br />
academic institutions, rather than the government, to patent<br />
publicly funded research and would reward institutions and<br />
inventors with a share of the royalties i.e. around 30% and<br />
licensing fees generated from the commercial products to the<br />
inventor and commercialization of the invention. This bill will<br />
enhance awareness of IP in universities, academic and research<br />
institutions. It will also increase the responsibility of universities,<br />
academic and research institutions to encourage students, faculty<br />
and scientists to innovate. Such innovations can be utilized for<br />
raising financial resources of these establishments, through<br />
royalties or income. The income from IP will promote selfreliance<br />
and will minimize dependence of universities, academic<br />
and research institutions and other recipient organizations for<br />
Government funding. This bill would allow government funded<br />
academic institutions to patent their inventions & it should result<br />
in greater interaction between Industry, Academia and<br />
Government.<br />
3.1 Significance of proposed Protection and Utilization of<br />
Public funded IP Bill to Industries & Academics<br />
The above bill facilitate commercialization of IP generated<br />
out of Government funded R&D<br />
Innovations in private sector as well as in universities,<br />
academic and research institutions that receive grants from<br />
Government will be encouraged & increase the innovation<br />
culture in the country<br />
Collaboration between Government, non-governmental<br />
organizations and private sector will be promoted.<br />
This bill mandate to constitute an IPM Committee within the<br />
organization within 180 days of the receipt of public fund<br />
This bill give guidelines to share IP of Government<br />
agencies, like Defense, Space etc for civilian application and<br />
such a development could immensely benefit the industry<br />
and the society.<br />
Dependence of universities, academic and research<br />
institutions and other recipient organizations for funding on<br />
the Government will be minimized as the bill provides for<br />
utilization of a portion of royalties or income, generated out<br />
of the public funded IP, for research and educational<br />
purposes. The Bill provides for the utilization of public<br />
funded IP and sharing of income or royalty earned between<br />
the IP Creator and the recipient. Not less than 30% of the<br />
income or royalty has to be given to IP creator due to which<br />
it will give rise to number of IP‟s (patents) & increase the<br />
flow of knowledge to industry.<br />
The bill will also encourage research institutions to<br />
establish their own technology licensing offices and to adopt<br />
their own policies on IPM and technology transfer.<br />
IV. SCOPE OF RESEARCH<br />
The focus of research will be on, academic<br />
institutions/university & industry cooperation such as academic<br />
exchange agreements / joint research work. Also on, to identify<br />
the communication gaps in academic & industries for technology<br />
sharing / mutual research etc. to avoid the duplication of research<br />
work. In India, IP awareness is very less. Many scientists, highly<br />
educated persons don‘t know about patents, hence there is urgent<br />
need to increase the awareness of IP in academic & industries. In<br />
India there are huge research potentials, talented persons but<br />
comparatively Indian patent filing is very less hence there is need<br />
to find out the gaps & to identify the problems in academic &<br />
industries for filing IP‘s / Patents.<br />
V. METHODOLOGY & ANALYSIS OF<br />
COLLABORATION OF INDUSTRIES &<br />
ACADEMICS<br />
The expertise of central originations like<br />
CSIR/NRDC/TIFAC /NIIPM etc. to be made available for<br />
technology transfer to university/ Institutes & Industry for<br />
avoiding the risk of duplication of R&D and providing assistance<br />
during development of new products. Universities/Institutes &<br />
Industries collaborate with each other to promote the use of<br />
university research & sharing the data mutually.<br />
Hence, infrastructure shall be provided to University/<br />
academic Institutes for utilization of Patent Information.<br />
Secondly, link IP cell, technology transfer department, Patent<br />
Information, R&D etc. to academic Institutes & Industry. It is<br />
necessary to provide technical problem & information for<br />
research by industries to University/academic Institutes & carry<br />
out research on that & identifying solutions to technical problem<br />
from the universities / Institutions. Thereafter patenting the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 313<br />
ISSN 2250-3153<br />
inventions & prepare the agreements on technology transfer.<br />
After that, IP enforcement by licensing & publicly disclose will<br />
ideally avoid the duplication of research.<br />
IP is never given much importance in India, but after<br />
1995 i.e. end of GATT & 2005 (India signed international<br />
agreement like TRIPS / WTO, PCT / WIPO etc & allowed<br />
pharma product Patents after 2005, there is need in institutions &<br />
Industries to create an independent ―IP cell‖ to protect their IP‘s<br />
and increase IP awareness culture in organization. Effective IPM<br />
can allow research institutions to use their own research to<br />
benefit the public at large and to enter into public-private<br />
partnerships. With the joint research consignments to work<br />
together the benefits for Industries resulting from the universities<br />
/ academic institute are, availability of the extensive network of<br />
University / Academic Institutes , availability of University/<br />
Academic Institutes officials, network and knowledge for<br />
technological support.<br />
VI. STATISTICS<br />
Table 1: Filing of IP in last 5-6 years* in India:<br />
Patents<br />
applicati<br />
on<br />
received<br />
Designs<br />
applicati<br />
on<br />
received<br />
TM<br />
applicati<br />
on<br />
received<br />
GI<br />
applicati<br />
on<br />
received<br />
2004-05 17466 4017 78996 29<br />
2005-06 24505 4949 85699 16<br />
2006-07 28940 5521 103419 33<br />
2007-08 35218 6402 123514 37<br />
2008-09 36812 6557 140172 44<br />
2009-10 34287 6092 141943 40<br />
Table 2: Comparison of Patent filing in year 2008-09 by<br />
Indian Industries *<br />
Indian Industries No of patent filed<br />
Samsung India 205<br />
Council of scientific & 165<br />
Indusial Research<br />
Dr Reddy‘s Laboratories 147<br />
BHEL 119<br />
Rainbaxy Laboratories 101<br />
Infosys Technologies 81<br />
Avesthagen Ltd. 66<br />
Tata steel 65<br />
Cadila Healthcare Ltd. 57<br />
Matrix Laboratories Ltd. 54<br />
*Source from IPO website<br />
Table 3- Comparison of Patent filing in year 2008-09 by<br />
Indian Academics*<br />
Indian Academic university / No of patent<br />
Institutes<br />
filed<br />
Indian Institute of Technology 91<br />
Amity university 33<br />
Indian Institute of Science 21<br />
Central Institute for Research on<br />
cotton<br />
12<br />
National Institute of 8<br />
Pharmaceutical<br />
Research<br />
Education &<br />
National<br />
Immunology<br />
Institute of 7<br />
University of Delhi 7<br />
Table 4: Comparison of Patent filing in year 2009-10 by<br />
Indian Scientific & Research Development organizations *<br />
Scientific & Research Development No of patent<br />
organizations<br />
filed<br />
CSIR 162<br />
Defense Research & Development<br />
organization<br />
80<br />
ICAR 55<br />
Indian Space Research Origination 17<br />
Central Institute of Fishery 13<br />
Technology<br />
National Institute of Pharmaceutical<br />
Education & research<br />
10<br />
Centre for Development of Advance<br />
computing<br />
07<br />
National Institute of Immunology 07<br />
Indian Council of Medical Research 06<br />
SAMEER 06<br />
Table 5: Comparison of Patent filing in year 2009-10 by<br />
Institutes, Academics/university*<br />
Indian Academic Institutes / No of<br />
university<br />
patent filed<br />
Indian Institute of Technology 109<br />
Amity university 81<br />
Indian Institute of Science 45<br />
Serum Institute of India Limited 12<br />
The Energy & Resource institute 07<br />
Institute of Life Sciences 06<br />
Dalmia Institute of Scientific &<br />
industrial Research<br />
04<br />
Jadavpur University 04<br />
Krishna<br />
Science<br />
Institute of Medical 04<br />
Manipal Institute of Technology 04<br />
From the above tables it is observed that, due to<br />
collaborations between university-PRO there is increase in trend<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 314<br />
ISSN 2250-3153<br />
in obtaining the IP, also there is increase in Patent filing after<br />
2005. It is expected that the joint collaboration programs on IP<br />
amongst PRO & university will not only avoid duplication of<br />
research activities and wastage of time, resources but also will<br />
have a strong & enhanced IP regime. Hence there is need to<br />
manage these IP efficiently, so that technology will be fruitful &<br />
there will be effective use of academic research work for<br />
industries and duplication of research can be avoided. Hence IP<br />
management plays vital role in industries and academics & thus<br />
Collaboration between Government, non-governmental<br />
organizations and private sector, academic institutes, university<br />
shall be promoted.<br />
share<br />
0.04<br />
0.035<br />
0.03<br />
0.025<br />
0.02<br />
0.015<br />
0.01<br />
0.005<br />
0<br />
US research univ. patents % of all domestic-assignee US patents, 1963 - 99<br />
year<br />
Figure 1 - Internationally Patents granted to Research<br />
Institutions<br />
US research university patenting before & after passage of<br />
Bayh-Dole Act in 1980- 1999<br />
Figure 2 -Effects of Japanese Bayh-Dole Act passed in 1999<br />
Patents granted to Research Institutions<br />
As per the Figure 1 & 2 it is observed that in<br />
international scenario like USA, Japan after there is collaboration<br />
between the Academic & industries & Bayh-Dole Act came into<br />
force, and thus Patent filing has sharply increased.<br />
Figure 3- Percentage share of University & PRO Patenting<br />
1980 to 2010<br />
Figure 4- Percentage sharer of University & PRO Patenting<br />
in China & India in 2011<br />
As per figure 3, it is observed that there was increased<br />
in the percentage of share of total PCT application filed by<br />
University & PRO Patenting from 1980 to 2010. Thus<br />
university& PRO collaboration increased the Patent filing.<br />
As per figure 4, there was increase in university and<br />
PRO filings of the total patents obtained by Indian assignees<br />
during 2011, about 22% patents were jointly owned by industry,<br />
university or government sectors. Thus now a day‘s universities<br />
and PROs have also experienced growth in licensing revenue by<br />
way of mutual agreements.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 315<br />
ISSN 2250-3153<br />
VII. FINDINGS & CONCLUSION<br />
This study discusses the opportunities and challenges offered<br />
by IP to foster technology transfer from government funded<br />
research institutions. It is observed that from various originations<br />
that, there are strong scientific capabilities but there is no<br />
adequate Academic/university-Industry collaboration. There is a<br />
weak industry science linkage in the country hence, there is need<br />
to develop internal IP management capabilities, the formulation<br />
of comprehensive national IP policies, strengthening their IP<br />
court systems and IP offices, enforcement mechanisms, etc. The<br />
interactions shall be take place by the licensing of patents, R&D<br />
collaboration, scientific publishing & participation of<br />
conferences etc.<br />
In India, IP awareness is very low hence IP culture is<br />
required to an enabling environment. Many scientists, highly<br />
skilled & technocrats educated persons don‘t know about patents.<br />
Hence there is urgent need to increase the awareness of IP in<br />
academic & industries. Further basic IP education can be<br />
provided at school level and undergraduate level and form<br />
uniform IP course structure in India & increase the IP resources.<br />
Many universities do not having technology transfer policy, IP<br />
cell /department etc., guidelines for managing technology<br />
transfer activities. Hence there is need to allow academic<br />
institutions, rather than the government body, to patent publicly<br />
funded research and would reward institutions and inventors with<br />
a share of the royalties i.e. around 30% and licensing fees<br />
generated from the commercial products to the inventor and<br />
commercialization of the invention. Technology transfer offices<br />
between the university & Industry and mechanisms to enhance<br />
technology commercialization are required with financial support<br />
for which IP bill shall be approved by the Government. Further,<br />
it is highlighted that there may be special fee reduction for the<br />
university or students to boost the research activity.<br />
There are several difficulties the universities face in the<br />
implementation of patenting and patented technology<br />
commercialization. They do not have operative guidelines about<br />
disclosure and patenting. Increasing autonomy of institutions,<br />
decentralizing recruiting, providing performance based<br />
incentives and acknowledging technology transfer activities in<br />
researchers‘ career is essential. There is a need to redraft the<br />
university regulations on IP. Performance incentives for<br />
researches are needed for balancing entrepreneurial activity and<br />
scientific achievements.<br />
Patent plays an important role in fostering technology<br />
transfer as countries develop their research capabilities.<br />
Technology transfer by patent licensing, collaboration can entail<br />
cross-fertilization between academics and industry, synergies in<br />
research and new ideas for science, avoiding wasteful duplication<br />
of efforts, and create employment and new market opportunities<br />
for firms. Hence there is a need to have substantial private<br />
investment in developing such a strategy.<br />
ABBREVIATIONS<br />
IPO Intellectual Property office<br />
IP Intellectual Property<br />
IPM Intellectual Property Management<br />
TM Trademark<br />
GI Geographical Indications<br />
UN United Nation<br />
WIPO World Intellectual Property organization,<br />
WTO World Trade Organization<br />
TRIPS Trade Related Aspect of Intellectual Property Rights<br />
GATT General Agreement on Tariffs and Trade<br />
S&T Science & Technology<br />
NIIPM National Institute for Intellectual Property Management<br />
PRO Public research organizations<br />
PCT Patent Cooperation Treaty<br />
REFERENCE<br />
Internet sites:<br />
1. www.ipidnia.nic.in<br />
2. www.google.com<br />
3. www.indianpatents.org.in<br />
4. http://spicyipindia.blogspot.com<br />
5. www.wipo.int<br />
6. http://www.wipo.int/academy/en/<br />
7. http://en.wikipedia.org/<br />
Books & Publications:<br />
1. Patents, TrdeMarks, Copy Right Designs & Geographical Indications<br />
– B.L.Wadera<br />
2. Intellectual Property Law in India - P.S.Narayana<br />
3. WIPO Guide to Intellectual Property Worldwide<br />
4. WIPO Intellectual Property Handbook<br />
5. Indian patent office - Manual of Patent Practice & procedure<br />
6. NIIPM/ IPO, India training<br />
7. IPO, India - Annual report<br />
8. Original Bayh-Dole Bill<br />
9. Gearing Up For Patents - The Indian Scenario –<br />
Dr Prabuddha Ganguli<br />
10. Proposed Protection and Utilization of Public Funded IP Bill<br />
Presentation<br />
This paper is accepted by World Academic Industry Research<br />
Collaboration Organization (WAIRCO) & it will be presented by<br />
the Author in the International Conference on Engineering,<br />
Technology and Management - ICETM at September <strong>2012</strong> at<br />
Tirupati, India. The details are available at<br />
http://www.worldairco.org/ICETM%20Sep%20<strong>2012</strong>/Manageme<br />
nt.html<br />
AUTHORS<br />
First Author<br />
Pankaj Prabhakar Borkar ,<br />
Assistant Controller of Patent & Designs<br />
Patent Office, Mumbai, India pankajnagpur@rediffmail.com<br />
Second Author<br />
Dr. Ashutosh A. Paturkar ,<br />
Professor, Dr Ambedkar Institute of Management Studies &<br />
Research, Nagpur, India ashutosh_paturkar@rediffmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 316<br />
ISSN 2250-3153<br />
Prequalification Science Practical Activities for the<br />
Production of Effective Science Teachers: a Strategy for<br />
Sustainable National Development<br />
Jamil Mikhail Y.<br />
School of Educational Studies, Universiti Sains Malaysia, 11800 Pulau, Penang, Malaysia.<br />
Abstract- The future of science teaching is a function of the<br />
number of prequalified candidates willing to take science<br />
education at the tertiary level. This research was aimed at finding<br />
science practical activities as a motivating factor in simplifying<br />
science subjects, making the study of science harder as well as<br />
developing prequalified students‘ interest in becoming science<br />
teachers. Out of nearly 800 students in final year in Government<br />
Science Secondary Schools Bama, and Gombe, respectively in<br />
Borno and Gombe States, 400 hundred students were randomly<br />
selected as representative sample. Four research questions were<br />
answered using Prequalified Students Interest Questionnaire<br />
(PSIQ) as an instrument for data collection and simple<br />
percentage in analysis. The results showed that half of the<br />
responded agreed that they have been doing practical from junior<br />
secondary school and most of them agreed to doing it in the<br />
senior class. It was also found out that science practical activities<br />
makes understanding of the science subject simpler and<br />
candidates study harder the subject they prefer its practical most.<br />
Besides, it was discovered among others that practical activities<br />
have motivated one third of the respondents to take science<br />
education at higher institutions and become science teachers.<br />
Hence, it was concluded that the future of science teaching is<br />
bright.<br />
Index Terms- science practical, science teachers<br />
W<br />
I. INTRODUCTION<br />
hat cannot be over emphasised in national development is<br />
the role science can play. Myriad publications and<br />
speeches by distinguished authorities and great personalities<br />
indicated the importance of science in national development. In<br />
fact, no country can record any meaningful development without<br />
science playing the most important role. Therefore, it is not<br />
surprising if the then Head of State, General Gowon, said in an<br />
opening address of STAN conference, as far back as 1968, that<br />
no country can either survive or develop without due emphasis<br />
given to science and technology. Any country and its policy<br />
makers that decide to overlook this significant truism will never<br />
achieve any meaningful development and shall continue to spend<br />
much of its resources in the importation of products from<br />
developed countries (Neil, Adam and John, 2010; Ali, 2009;<br />
Bajah, 1982). To this end Rashidwan, (2009) and Akinmade,<br />
(1985) contended that the emphasis accorded science in the<br />
contemporary world seems very appropriate as ours in an age<br />
where science and technology are part and parcel of the world‘s<br />
culture. It is obvious that nowadays no one doubts the<br />
significance of science and technology for sustainable national<br />
development.<br />
The issue now at stake is how effective is science teaching at<br />
all levels of our education which is the most fundamental aspect<br />
of the future of science in Nigeria. Science, being an activity<br />
based subject, needs practical activities regularly at all level of<br />
education for the effective and efficient achievement of the goals<br />
of science and science education as outlined clearly in the<br />
National Policy on Education (NPE, 2004) in section 7,<br />
subsection 39 (a) and (b) as follows:<br />
a- Emphasis shall be given to the teaching and learning of<br />
science process and principles. This would lead to<br />
fundamental and applied research in the sciences at all<br />
level of Education.<br />
b- The goals of Science education shall be to:<br />
i. Cultivate inquiring, knowing and rational mind<br />
for the conduct of good life and democracy.<br />
ii. Produce scientists for national development.<br />
iii. Service studies in technology and the cause of<br />
technological development.<br />
iv. Provide knowledge and understanding of the<br />
complexity of the physical world, the forms<br />
and the conduct of life.<br />
These are indeed the goals of Science education as far as the<br />
Federal Government of Nigeria is concerned. However, in order<br />
to show that it is not oblivious of the significance of effective<br />
teaching and learning of science, it further stated its position<br />
again in subsection 39 (c) through (d) of the NPE (2004) thus:<br />
c- Special provision and incentives shall be made for the<br />
study of sciences at all levels of the national Education<br />
system. For this purpose, the government shall<br />
adequately support the functions of all agencies<br />
involved in the promotion of the study of sciences.<br />
d- Government shall popularise the study of sciences and<br />
the production of adequate number of scientists to<br />
inspire and support national development.<br />
Therefore, there must be a proper way and techniques for<br />
Science teaching at all levels of the Nigerian Education system in<br />
order to achieve the above stated goals. There is the need for<br />
competent Science Teachers who shall undergo training in<br />
university Faculties of Education, Colleges of Education and<br />
schools of Education in Mono/Polytechnics. These science<br />
teachers are responsible for making the scientists needed in such<br />
disciplines as medical sciences, engineering technology,<br />
communication technology, space sciences, mining technology<br />
and many more but to mention a few. All these are determinants<br />
of national development and the strength of any nation economy.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 317<br />
ISSN 2250-3153<br />
II. STATEMENT OF THE PROBLEM<br />
Nevertheless, science, being an activity based subject,<br />
effective teaching and learning cannot be feasible unless enriched<br />
with practical activities. Practical Activities must occupy greater<br />
part of the time allocated to science subjects than the chalk and<br />
talk method of teaching of the theoretical aspects. However,<br />
some schools and Science Teachers seem to abuse this<br />
fundamental aspect of teaching and learning sciences at our<br />
secondary schools despite the fact that the Science Teachers<br />
themselves know best the significance of practical activities in<br />
effective teaching and learning. To this end, what is the future of<br />
science education in Nigeria? What percentage of Nigerian<br />
prequalified candidates are willing to take science teaching as a<br />
career in future? All these and other unanswered question<br />
informed the need to carry out such a study.<br />
III. PURPOSE OF THE STUDY<br />
This research is purposely aimed at finding out whether the<br />
science practical activities are regularly carried out in Nigerian<br />
secondary schools. Moreover, it is also to find out whether or not<br />
the students have developed interest in studying sciences harder<br />
because of the science practical activities they are involved in<br />
and whether or not the science practical activities have made the<br />
study and understanding of sciences simpler. Finally, it is also to<br />
examine whether the science practical activities have motivated<br />
students to study sciences at tertiary institutions with emphasis to<br />
Science Education so that there is going to be a boost in the<br />
production of highly qualified and competent science teachers<br />
who can help in actualising the goals of the NPE (2004).<br />
IV. RESEARCH QUESTIONS<br />
To guide the conduct of this study with clear direction and or<br />
focus, the following four (4) research questions are going to be<br />
answered:<br />
1. Are science practical activities regularly being carried<br />
out in secondary schools for teaching and learning<br />
sciences?<br />
2. Have the science practical activities developed students‘<br />
willingness to study sciences harder?<br />
3. Have the science practical activities made the study and<br />
understanding of sciences simpler?<br />
4. Have the science practical activities motivated students<br />
to take science education at tertiary institutions and<br />
become qualified Science Teachers?<br />
V. METHODOLOGY<br />
Based on survey research design, the study investigated Senior<br />
Secondary III (SS III) students of Government Science<br />
Secondary schools Gombe and Bama in Gombe and Borno states<br />
respectively. The rationale behind the selection of this category<br />
of students is because at the moment they have undergone<br />
several science practical activities from Junior Secondary classes<br />
in Integrated Science and in SS I-III science classes. Any student<br />
outside this specification is out of the scope of this study. Four<br />
hundred (400) students were randomly selected from the senior<br />
classes (SS III) of the schools totalling close to 800. Due to time<br />
constraints as well as inability to use all the students, this number<br />
of students (50%) was simply selected randomly as<br />
representative sample of the population from which data were<br />
collected. Data were collected in November 2009 at Bama,<br />
Borno state and November 2011 at Gombe, Gombe state.<br />
A Prequalified Students Interest Questionnaire (PSIQ) was<br />
used in data collection which comprises of sections ‗A‘<br />
(Demographic data) and ‗B‘ the ten item questions. The<br />
questionnaire was subjected to experts in educational research:<br />
one Chief Lecturer and one Academic Doctor. All their<br />
observations, corrections and comments were taken into<br />
consideration and corrections made to that effect. The<br />
questionnaire was pilot tested on some 40 students of the target<br />
schools who were not part of the study sample. The questionnaire<br />
administration was successful with the permission of the school<br />
authorities. With the kind assistance of the schools‘ staff, the<br />
questionnaires were distributed to the students and 100%<br />
returned in few hours after responding to the items.<br />
VI. DISCUSSIONS<br />
Demographically, all respondents are males (table 1) and 50%<br />
are from Gombe, Gombe state and the other half from Bama,<br />
Borno state. They are all in SS III and so in their final year. They<br />
are youths in the age range of ≤ 19 years (80%) and ≥ 20 years<br />
(20%).<br />
Figure 1 indicates responses of the students on the<br />
performance of science practical activities in junior and senior<br />
secondary schools. While they positively agreed to doing it in<br />
senior classes (95%), the result proved otherwise in junior classes<br />
because more than half (52%) posted a negative response. This<br />
may not be unconnected with the reluctance of the teachers at the<br />
junior secondary level. In fact some of the teachers teaching<br />
science at such level are not even qualified science teachers<br />
(Abdullahi, 2010; Babatunde & Ali, 2009; Gombe SUBEB<br />
2011). It is just a mere feeling that it is only Integrated Science<br />
and so can be taught by any teacher.<br />
In the second figure, respondents have shown a greater<br />
positive response to interest and enjoyment of practical activities<br />
in sciences (88% and 74% respectively). This is true of scientific<br />
discovery of facts and involvement of learners in teaching and<br />
learning process. At any level of teaching and learning, learners<br />
enjoy all aspects that call for their active participation and also at<br />
the same time arrest their interest and readiness to the activities<br />
making them active rather than passive learners. Active<br />
participation and manipulation of apparatus or instructional<br />
materials help to a greater extent in illustrating and reinforcing a<br />
skill, fact or idea and relieve anxiety, fears or boredom since<br />
many teaching aids are like games (SIL international, 1999).<br />
Practical activities make learning more real than abstract, more<br />
enjoyable than boring and above all skills, ideas, knowledge and<br />
attitudes are easily acquired and readily put into practice. Hence,<br />
it is not surprising if the learners well responded positively to the<br />
questions that seek their opinion on the simplicity of the subject<br />
they enjoy its practical most and the tendency to study that<br />
subject harder. This is because 88% agreed that the subject they<br />
prefer is simpler and similarly 89% agreed that they study that<br />
subject harder (figures 3 and 4). Also on the preference of the<br />
subjects, 42% prefer Biology Practical most, 43% Chemistry<br />
practical and only 10% prefer Physics‘ while only 5% go for<br />
other subjects or are undecided (figure 3). Therefore, according<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 318<br />
ISSN 2250-3153<br />
to the findings of this study, science practical activities<br />
encourages students to study science harder, which translates in<br />
to the simplicity of the subjects to them attesting to the<br />
significance of science practical activities. This is in consistence<br />
with the findings of Shaibu and Usman (2001) who revealed that<br />
high positive relationship existed between students‘ performance<br />
in practical activities and their academic achievement in<br />
integrated science but contrary to what Babayi, (2005) asserted<br />
that most students perceived laboratory activities as compulsory<br />
for passing examination not for effective meaningful learning.<br />
Also in figure 4, 69% of the respondents indicated that they do<br />
not want to study science and become science teachers while<br />
29% agreed to take teaching science as a career with 2%<br />
undecided. Also in figure 5, more than half of the respondents<br />
(63%) agreed that despite the interesting nature of science<br />
practical activities, they do not wish to be science teachers but<br />
one third (33%) positively responded to taking teaching science<br />
as a career because of the practical involved in it. However,<br />
going by professional preference (figure 5), close to one third<br />
(29%) agreed that because of the practical involved, they want to<br />
study science so that they can become Engineers, more than half<br />
(55%) go for medical sciences as Doctors or Nurses (may be<br />
because of the attractive welfare being enjoyed there). Only very<br />
few (4%) prefer to be Laboratory technicians with one tenth<br />
(10%) for Architecture and the least (2%) decided other<br />
professions which were not specified. However, according to the<br />
results, it is encouraging to have one third of the respondents<br />
wishing to be science teachers. This showed that if practical<br />
activities are being carried out regularly in secondary schools,<br />
students‘ interest would be captured, they will study science<br />
harder and science education has a brighter future since a<br />
considerable percentage is willing to take science teaching as<br />
their profession because of the practical involved in it.<br />
VII. CONCLUSION<br />
The research questions that guided the conduct of this study on<br />
prequalified students were fully addressed. Results showed that<br />
teachers in junior secondary schools are not performing science<br />
practical activities as in the senior secondary school classes as<br />
found out from the results. The result showed that learners enjoy<br />
practical activities and as a result found the subject they prefer its<br />
practical most simpler and are at the same time pay more<br />
attention in studying the subject harder. Besides, despite interest<br />
and enjoyment of practical activities, most of the prequalified<br />
students do not aspire to be science teachers although those who<br />
willingly showed interest in science teaching because of the<br />
practical involve therein is encouraging. That is to say that the<br />
future of science teaching is ensured according to the findings.<br />
REFERENCES<br />
[1] Abdullahi, S. D. (2010). Practical activities and learners achievement<br />
in Integrated Science. Multidisciplinary Journal of Education. (10) 2.<br />
[2] Akinmade C.T.O. (1985). The National Policy on Education and the<br />
development of scientific and reflective thinking in primary school.<br />
Journal of Science Teachers Association of Nigeria. (23) 1&2, p 77-<br />
8.<br />
[3] Ali, M. T. (2009). The contribution of science in national<br />
development. Bangalore: Prime Press Ltd.<br />
[4] Babatunde, O. K. & Ali, P. W. (2009). Science practical for students<br />
learning. Accessed on December 20th, 2011, from:<br />
www.educscience_mtx12glm/dfedj<br />
[5] Babayi, A. A. (2005). The relationship between secondary school<br />
students attitudes towards laboratory practical and their academic<br />
achievement in chemistry. The Jos Journal of Education (7) 2: 46-51.<br />
[6] Bajah, S. T. (1982). Two decades of primary science in Nigeria. A<br />
critical evaluation. 23rd annual conference of Science Teachers<br />
Association of Nigeria. Paper presentation. August 22-28, 1982.<br />
[7] Gowon, Y. (1968). Opening address of the Head of State. Annual<br />
conference of Science Teachers Association of Nigeria. Journal of<br />
Science Teachers Association of Nigeria. Vol. 7 (3).<br />
[8] Neil, A. R., Adam, S. John, P. W. (2010). The significance of<br />
science and Technology. Human development perspective. Accessed<br />
on September 28th, 2011, from:<br />
http://www.sc/tech_human_dev_edu.html<br />
[9] Rashidwan, K. (2009). Technology in the contemporary world.<br />
Accessed on<br />
[10] September 28th, 2011, from:<br />
www.worldtechnology/issues.879tptht.htm<br />
[11] Shaibu, A. A. and Usman, I. A. (2001). The relationship between<br />
students‘ performance in practical activities and their academic<br />
achievement in Integrated Science using the Nigeria Integrated<br />
Science Teacher Education Project (NISTEP) mode of teaching. The<br />
Jos Journal of Education. 6 (1) 17-21<br />
[12] SIL International, (1999). The definition of evaluation. Accessed on<br />
October 25th, 2007 From:<br />
www.sil.org/lingualinks/literacy/ReferenceMaterials/GlossaryTerms.<br />
[13] The Federal Government of Nigeria, (2004). The National Policy on<br />
education (2004 edition). Abuja: Federal Government Press.<br />
APPENDICES<br />
Appendix 1 Prequalified Students’ Interest Questionnaire<br />
(PSIQ)<br />
Introduction - Please this questionnaire is designed to seek your<br />
opinion about science practical activities you have been<br />
performing since your JSS classes and in all science subjects you<br />
are currently offering. Your opinion is going to be of great<br />
contribution to the education sector and be sure that it is going to<br />
be used only for this research.<br />
Section A<br />
Personal Data<br />
School……………………………………………………………<br />
………<br />
Sex Male ( ) Female ( )<br />
Class………………………………………………………………<br />
………..<br />
Section B<br />
Instruction: tick as appropriate please after carefully having<br />
read the questions.<br />
(1) Do you performed practical in your Integrated<br />
Science in JSS class? (Yes) (No)<br />
(2) From your SS I to SS III do you perform practical<br />
activities in science subjects? (Yes) (No)<br />
(3) Do you enjoy the practical activities? (Yes)<br />
(No)<br />
(4) Apart from enjoying the practical are you interested<br />
in doing the practical activities regularly? (Yes)<br />
(No)<br />
(5) Which science subject do you enjoy its practical<br />
most?<br />
(Physics) (Chemistry) (Biology) (Others)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 319<br />
ISSN 2250-3153<br />
Appendix 2<br />
(6) Do you study the subject harder? (Yes) (No)<br />
(7) Has the subject proved simpler than other subjects?<br />
(Yes) (No)<br />
(8) Would you like to be a science teacher because you<br />
enjoy practical? (Yes) (No)<br />
(9) I enjoy practical but I do not wish to be a science<br />
teacher? (Yes) (No)<br />
(10) I enjoy practical and wish to be a scientist like:<br />
Table 1: Demographic features of the sample<br />
Figure 1: Performance of Practical Activities in JSS and SSS<br />
Classes (n = 400)<br />
Figure 2: Interest and enjoyment of practical activities (n = 400)<br />
Figure 3: Subject preference and simplicity of the subject<br />
preferred (n = 400)<br />
Figure 4: Harder study of preferred subject and interest in<br />
teaching science (n = 400)<br />
Figure 5: Profession preference (n = 400)<br />
AUTHORS<br />
Jamil Mikhail Y., School of Educational Studies, Universiti<br />
Sains Malaysia, 11800 Pulau, Penang, Malaysia.<br />
Email id - jamilgombe@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 320<br />
ISSN 2250-3153<br />
Education: A Solution to the Contemporary Challenges<br />
of a Common Woman in a typical Hausa-Fulani<br />
Dominated Society in Nigeria<br />
Jamil Mikhail Y<br />
School of Educational Studies, Universiti Sains Malaysia, 11800 Pulau Penang, Malaysia<br />
Abstract- The common woman of a typical Hausa-Fulani<br />
society in Northern Nigeria faces problems similar to what is<br />
obtainable in the dark ages of centuries ago. Many women were<br />
denied some of the legal and political rights accorded men. The<br />
paper review the challenges faced by the women in the said<br />
society namely: maturity, married life and education. A highlight<br />
was made on how these became a challenge to the common<br />
woman and conclusively singled out education which is a right as<br />
the way out.<br />
Index Terms- Education, common woman, Hausa-Fulani<br />
N<br />
I. BACKGROUND<br />
igeria, a multicultural, multi-ethnic and multi-religious most<br />
popular black nation of the world has women in very<br />
significant positions of every body‘s life. Until the end of the<br />
second half of the 20 th century, women in almost all localities of<br />
the nation were denied some of the legal and political rights<br />
accorded men. Throughout much of the history of Nigeria, deepseated<br />
cultural, traditional or religious beliefs allowed women<br />
only limited roles in the society chief among which are child<br />
bearing and homemaking rather than involvement in the public<br />
life of business or politics. Many societies agreed that women are<br />
best suited for the above mentioned. Some even wrongfully<br />
believe in the intellectual inferiority of women to men and thence<br />
women education is limited to domestic skills of homemaking. If<br />
this is not the case, then why men controlled most positions of<br />
employment and power/leadership in the Nigerian Society?<br />
Unfortunately, until the middle of 20 th century, this denial of<br />
equal rights to women met infinitesimal or no protests to draw<br />
the attention of most people. This prompted women, for quite a<br />
very long time, to accept their inferior status as the only option<br />
since they lacked the educational and economic resources that<br />
would enable them opportunity to challenge the prevailing social<br />
order.<br />
Fortunately, towards the end of the 20 th century, there<br />
emerged organized efforts by women to achieve greater rights,<br />
which gave birth to some women organization such as: Women<br />
Rights Advancement and Protection Agency (WRAPA);<br />
National Agency for the Prohibition of Traffic in Persons<br />
(NAPTIP); Women Trafficking and Child Labour Eradication<br />
Fund (WOTCLEF). There is also National Council for Women<br />
Societies (NCWS) and the Federation of Muslim Women<br />
Associations of Nigeria (FOMWAN) etc. The education sector<br />
has not stayed aloof, hence the emergence of Women in Colleges<br />
of Education (WICE) in all the Federal and State Colleges of<br />
Education. One of the activities of such an intellectual women<br />
organization is sensitizing the entire Nigerian Society the value<br />
of women through publications, seminars, and conferences. To<br />
contribute to the success of this noble objective prompted the<br />
need to write this paper to compliment the efforts of all women<br />
in Nigeria by exposing the challenges a common woman in our<br />
society.<br />
II. WHO IS A WOMAN?<br />
Simply put, a woman is a female adult of human being. A<br />
woman can always take the position of a wife, girlfriend, mother<br />
and grandmother. Whichever one is called or referred, what<br />
comes to our mind is certainly a woman must be that wife, must<br />
be that mother and so on. Nevertheless, what does it take to be a<br />
wife? What does it take to be a girlfriend, mother etc? All wives<br />
are women but not all women are wives! All mothers,<br />
grandmother and girlfriends are women but not all women are<br />
mothers and so on. One major aspect worthy of understanding<br />
here is that what are the functions or activities and qualities that<br />
qualify a woman to be referred to as a girlfriend, wife, mother<br />
and grandmother. Certainly, it can be unanimously agreed that<br />
there are certain tedious functions and activities that needs extra<br />
carefulness, cautions, concentration, time, dedication, honesty<br />
and transparency for every woman before she can be qualified as<br />
a girlfriend, wife, mother and so on.<br />
However, common woman in discharging her duties, as a<br />
wife etc is prone to so many challenges because of the current<br />
notion of her status in the society. Despite the fact that there is<br />
need for her exposure to religious and western education for a<br />
more efficient and effective discharge of such duties, concerned<br />
people and societies turned deaf ears and blind eyes to the<br />
challenges facing such a woman today. Although some of the<br />
challenges, as they are made to be believed, has to do with the<br />
protection of the society‘s (or family‘s) integrity and prestige.<br />
III. WHAT ARE THESE CONTEMPORARY CHALLENGES?<br />
Maturity<br />
Maturity is a biological state or quality of being fully-grown<br />
or developed. It is a state of adulthood after attaining the legal<br />
age. This resulted in to some physical changes of the female‘s<br />
body among which are the emergence of pubic and bodily hair,<br />
enlarged breast and broader hips. This stage of woman life is a<br />
very complex one because she faces many problems ranging<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 321<br />
ISSN 2250-3153<br />
from those within her family and other people outside including<br />
her friends, males and elders of the immediate society. However,<br />
her ability to tackle or solve such complex problems is a function<br />
of her accumulated learning and education (Jones and Mayer,<br />
Type of<br />
problem<br />
Family<br />
Her<br />
friends<br />
Boyfriends<br />
Married<br />
life<br />
2006). The problems, their complexity, description and what is<br />
needed to support her in solving them has been tabulated below:<br />
Table 1: showing a common woman’s problem at maturity and solutions<br />
DEGREE<br />
DESCRIPTION<br />
All members of the family superior to her keep<br />
OF<br />
COMPLEX<br />
ITY<br />
SUGGESTED SOLUTION<br />
an eye on her.<br />
Low<br />
She needs proper education to<br />
understand herself and others so<br />
Purpose: To protect her integrity and the<br />
that she can comply with all<br />
family‘s<br />
rules.<br />
Whether good or bad she may adopt some of<br />
their behaviours, activities and they can<br />
influence her much more than any body<br />
Purpose: To suit their friendship.<br />
Befriend her to find love. Some times there may<br />
be threat from some guys if she tries to resist<br />
Purpose: To marry her or to satisfy their lust<br />
Satisfying husband‘s lusts, children upbringing,<br />
domestic chores, husband‘s family interference<br />
etc<br />
From the above table, it is clearly shown that in all the problems<br />
a matured girl is bound to face, education and accumulated<br />
learning are very important for tackling and or solving them.<br />
This means that every woman needs good education and<br />
counselling so that she can better understand the problem and its<br />
degree of complexity, and subsequently design her own measures<br />
to overcome them. Yet, education itself is today a challenge to<br />
common woman, as can be seen shortly, despite the fact that<br />
there are efforts to make it free and compulsory by government<br />
of the federation. Her proximity to university has nothing to do<br />
with her continuing education.<br />
Very high<br />
Extremely<br />
high<br />
Very high<br />
Same as above<br />
Need proper education &<br />
counseling for choosing who to<br />
befriend, indulge in love affairs<br />
or not and subsequently marry to<br />
be husband & wife.<br />
Needs good education, active<br />
employment and good income<br />
here is highly recommended<br />
Education<br />
This is one of the most important challenges of a<br />
common woman today. Although as many girls as possible are<br />
attending school in the society, their parents are not willing to<br />
send them to the University after secondary education. The<br />
following is an extract from the results of face-to-face interview<br />
administered to twenty (20) school attending girls between the<br />
ages 16 and 18 in September 2011 to January <strong>2012</strong> from one<br />
school in Gombe metropolitan:<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 322<br />
ISSN 2250-3153<br />
Table 2: Responses of 20 school attending girls to oral interview in Gombe in September 2011 (n = 20).<br />
S/No<br />
1<br />
2<br />
3<br />
4<br />
5<br />
Questions<br />
Do you wish to gain<br />
admission a university<br />
some day?<br />
Are you sure, your parents<br />
will allow you?<br />
Do you wish to be<br />
employed?<br />
Are you sure of having it<br />
(i.e. the employment)?<br />
Can your parents listen to<br />
your plea?<br />
The above table was extracted from an unpublished<br />
document of a research on women empowerment advocacy. It<br />
indicated that out of the 20 girls playfully interviewed, all of<br />
them wish to continue their education to the University but none<br />
is sure of continuing. Of the reasons given by these girls among<br />
others are: they are going to be given out for marriage; their<br />
families would not allow it for fear of losing the family‘s prestige<br />
in case the girl join bad friends; that girls at such liberty could no<br />
longer be controlled by anybody.<br />
When they were asked whether their parents can listen and<br />
reason with them, only very few (20%) agreed that their parents<br />
can do that and out of these few some confessed that even when<br />
the parents hear their pleas, they would not agree and this is<br />
generally, as confessed, associated to ignorance or religious faith.<br />
However, very little could be done here because there is very<br />
limited or no amount of influence that can convince and change<br />
the minds of such parents especially in this part of Nigeria, the<br />
North.<br />
One important thing that all should remember is we cannot<br />
run away from accepting the fact that education is a right of<br />
every Nigerian child, girls inclusive. However, there is a flagrant<br />
denial of this right as shown in the table above. The main reason<br />
ranges from social to economic. The former has to do with the<br />
fear of the girl‘s interaction with different people who can<br />
influence her to be stubborn and not ready to listen to her elders.<br />
The latter being the economic status of the family where the<br />
males were given much attention in terms of financial assistance<br />
for higher education.<br />
The challenge here to the common woman is how can she<br />
overcome these challenges? Do we still believe that women‘s<br />
%<br />
Yes<br />
100<br />
00<br />
90<br />
NIL<br />
20<br />
%<br />
No<br />
00<br />
100<br />
10<br />
85<br />
80<br />
Remarks<br />
very<br />
encouraging<br />
very<br />
disappointing<br />
very<br />
disappointing<br />
very<br />
disappointing<br />
very<br />
disappointing<br />
Source: Women Empowerment Advocacy -- Provisional Document.<br />
education is a waste of time? In fact time has come when all<br />
should agree to the fact that woman be given the chance to<br />
actively participate in every endeavour of life with education as<br />
the backbone of her success. Credit to the new Zealand‘s labourled<br />
government who in 2004 launched a five year plan of action<br />
to ensure women‘s full participation in the work place and that<br />
their employment opportunity and rewards are not affected by<br />
gender. This was not only to help women get recognition in the<br />
jobs they carry out but will assist in participation in wider range<br />
of higher level jobs. Did a common woman not deserve this? If<br />
given the chance to study further Laban, (2007) contended that it<br />
would mean women have access to a wider range of jobs and are<br />
able to move between compatible positions. Both men and<br />
women will have greater choice around caring and working<br />
responsibilities without gender predetermining their choice. In<br />
her speech in the World Conference of Women in Beijing, 1995,<br />
the then U.S first lady Hillary Clinton delivered that Women‘s<br />
Rights are also Human Rights therefore must be protected at all<br />
cost.<br />
The case of a common woman is not the government, but the<br />
society and the socioeconomic status of the family. The society is<br />
the type in which the majority of members see nothing good in<br />
woman except the barbaric and degrading belief that she should<br />
only be given out for marriage. If married, how many husbands<br />
are willing to allow their wives to continue their education or<br />
actively and profitably gain employment whether in the public or<br />
the private sectors? How many husbands (and parents) are<br />
willing to assist their wives (and daughters) with active self-<br />
employment? Indeed very few, that is the simple answer. To hit<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 323<br />
ISSN 2250-3153<br />
the nail on the head, we shall never progress with this belief in<br />
mind.<br />
Married life<br />
Let us start by quoting Francis Bacon, an English<br />
Philosopher, statesman and a lawyer who lived in 1561–1626,<br />
who once said ‗Wives are young men‘s mistresses, companions<br />
for middle age and old men‘s nurses‘, a practical truth. For a<br />
woman in to act practically, indeed effectively, and efficiently as<br />
young men‘s mistress, companion for middle ages as well as a<br />
nurse for old men is a very challenging task. Once again,<br />
education is a sin-qua-non to successful execution of these tasks.<br />
Yet married life to many women in Nigeria, is a vehicle of<br />
frustrations, uncertainties, harassment and insecurity instead of<br />
happy, secured and life full of hopes, progresses and appreciation<br />
as can be found in some homes.<br />
The common woman is frustrated once if what she was told<br />
or is expecting to find in her home are fairy tales. Moreover, if<br />
the one she trusted betrayed her because she is now his own<br />
―property‖ and would decide to ―operate‖ her the way he likes<br />
regardless of her value and the love she has towards him, resulted<br />
to nothing other than frustration. Besides, if she were married to<br />
somebody who she does not love, her life would be a miserable<br />
one, to cut it short.<br />
Uncertainties happen to every woman‘s married life if she<br />
can no longer trust her husband based on clear and genuine<br />
reasons. That is for instance, his affairs with other women<br />
illegally, his way of income and system of catering for the<br />
family. Failure to reason with her is total rejection of the fact that<br />
all men and women are borne free and equally entitled to certain<br />
inalienable rights among which are life, some liberty and<br />
happiness. However, very little do some husbands realize the<br />
obloquy this cast in their married life. In fact, some husbands‘<br />
grosser insult offered to women is the insinuation that she is<br />
honest and virtuous only because her parents ruled that, or she is<br />
aiming at something lucrative or it is the traditional law.<br />
In such a married life, how can a woman find liberty and<br />
happiness? A question that need to be answered here is can man<br />
live successfully without woman? Can therefore be a<br />
development in a society or a nation at large without women‘s<br />
influence? Definitely the response to these interrogations is NO.<br />
Harper, (2006) helps us with an answer in his speech delivered at<br />
the Columbian Exposition of the 1893 World‘s fair.<br />
If before sin had cast its deepest shadows or sorrow had<br />
distilled its bitterest tears, it was true that it was not good for man<br />
to be alone, it is no less true, since the shadows have deepened<br />
and life‘s sorrows have increased, that the world has need of all<br />
the spiritual aid that a woman can give for the social<br />
advancement and moral development of the human race. The<br />
tendency of the present age with its restlessness, religious<br />
upheavals, failures, blunders, and crimes is towards broader<br />
freedom, an increase of knowledge, the emancipation of thought,<br />
and recognition of the brotherhood of man; in this movement<br />
woman, as the companion of man must be a sharer. So close is<br />
the bond between man and woman that you cannot raise one<br />
without lifting the other. The world cannot move without<br />
woman‘s sharing in the movement, and to help give a right<br />
impetus to that movement is woman‘s highest privilege.<br />
If All Could Understand<br />
If both men and women could understand the value of a<br />
woman, we shall witness tremendous changes in our lives and in<br />
the pace of our national development. What keeps on lingering in<br />
a typical Hausa-Fulani society today is somewhat indifferent<br />
from that of five thousand years ago as far as women‘s value is<br />
concerned, which depended solely on the benefit she could<br />
provide men, either as pleasurable sexual object or as a vehicle<br />
for procreation and servitude. This has put aside the values of her<br />
personhood, talents and unique contribution to humanity and<br />
economic development. Many damages have been done to these<br />
since the belief in her sole value is based on her procreative<br />
abilities and sexual attractiveness; hence, the focus of her life is<br />
inevitably her ability to attract a man. Some questions that need<br />
concrete answers here are critical; when shall the society value<br />
women for their unique contribution to the world‘s economy?<br />
When will men value woman regardless of her attractiveness?<br />
When will woman see herself as incredible human being<br />
regardless of how sexually valuable she is to men? (Jones and<br />
Meyer, 2006)<br />
The way out would be appreciated<br />
Conclusively, to every problem, there is a solution but<br />
sometimes the approach to solving a problem can also be a<br />
problem. However, the following has been suggested as the ways<br />
out of some or all of the contemporary challenges facing the<br />
common woman.<br />
Education: - All members of the society ought to understand<br />
that education is a fundamental girls‘ right and therefore under<br />
no circumstances a girl be denied her right. This will help her<br />
understand her worth, respect her superiors, be actively<br />
employed (self or otherwise) for contribution to the household‘s<br />
economy, create liberty and happy life for herself and her family<br />
but to mention a few. In order to achieve the above stated,<br />
governments at all levels should declare free and compulsory<br />
girl-child education in all categories of learning since doing that<br />
would contribute in no small amount to nation‘s economic<br />
development.<br />
Value Reorientation: - The woman must understand herself and<br />
her importance in the society. She must admit that she is that part<br />
of human life, happiness, and progress without which nothing<br />
could be possible. A lot of work here is needed of women to<br />
sensitize themselves. Men on the other hand, must recognize the<br />
value of woman far beyond lust satisfaction rather, a companion<br />
without whom their existence could not be possible. Many men<br />
suffered the consequence of their deeds and mischief if only they<br />
listen to simple advice of their wives, and many a man rejoices<br />
their successes having listened to some simple advices of their<br />
wives. A good example of this is the success of Patrick J.<br />
O‘Haire, who suffered from inferiority and discouraged as a sales<br />
man received an invitation to attend a course in public speaking.<br />
He did not want to attend but listened to the simple advice of his<br />
wife and attended. The results made him advanced in sales<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 324<br />
ISSN 2250-3153<br />
department and valued and much liked member of his company<br />
(Carnegie, 1981: 297-298). Therefore, men, women, media,<br />
leaders, adults, parents, teachers, community members,<br />
producers and consumers must collectively stop emphasizing the<br />
need for girls and women to be attractive to men in order to feel<br />
valuable. We must stop emphasizing female‘s sexuality above<br />
her unique self.<br />
Girls must be supported at all costs to find their unique<br />
talents, gifts and interests for effective economic development of<br />
the society and the nation at large. If they find ways to express<br />
themselves in positive, up lifting and productive ways, the less<br />
they will feel their value is exclusive to their form. Hence, the<br />
better they feel about their individuality and the less need they<br />
will feel for sexual validation (Jones, 2006).<br />
By so doing, we can bring a new sense of appreciation and<br />
respect for all women and we must all understand that valuing<br />
woman as human beings is essential to making change in our<br />
nation and the world at large.<br />
REFERENCES<br />
[1] Carnegie, D. (1981). How to Win Friends and Influence People. Revised<br />
edition. Benin city: C. C. publication.<br />
[2] Harper, F.E.W. (2006) Woman‘s political future. The Norton Anthology of<br />
African: American literature. Gates, Henry Louis Jr., and Nevie Y. McKay,<br />
Eds. New York. WW. Norton Company.<br />
[3] Jones, F.A & Meyer, W.J. (2006) Adolescence. Microsoft Encarta 2006<br />
(CD). Redmond, WA: Microsoft Corporation.<br />
[4] Jones, J. (2006). The sexual value of women. Retrieved July 20th, 07 From:<br />
www.associatedcontentcom/article/98053/the-sexual-value of-women.html<br />
[5] Laban, L.W. (2007) Woman‘s Rights in Aotearoa and the pacific Speech:<br />
New Zealand Government<br />
AUTHORS<br />
First Author – Jamil Mikhail Y, School of Educational Studies,<br />
Universiti Sains Malaysia, 11800 Pulau Penang, Malaysia,<br />
Email: jamilgombe@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 325<br />
ISSN 2250-3153<br />
Circular Disk Monopole Antenna for Broadband<br />
Applications<br />
B.Saidaiah #1 , A.Sudhakar *2 , K. Padma Raju #3<br />
#1 Professor, Department of ECE, Chebrolu Engineering College, Guntur Dt, AP, India<br />
*2 Professor, Department of ECE,RVR&JC College of Engineering, Guntur Dt, AP, India<br />
#3 Professor, Department of ECE, JNTU Kakinada, East Godavari Dt, AP, India<br />
Abstract- This paper describes design of circular disk<br />
monopole antenna for operating frequency 3.0GHz-20.0GHz.<br />
This proposed antenna giving superior performance over<br />
conventional antennas with high gain 17 dB, high directivity and<br />
symmetrical E-plane and H-plane characteristics which makes<br />
this antenna suitable for ultra wideband (UWB) and broad band<br />
applications. This paper presents the return loss, input<br />
impedance, radiation patterns, VSWR, E-field, H-field and<br />
current distributions using CST software.<br />
Index Terms- UWB, VSWR, CST<br />
M<br />
I. INTRODUCTION<br />
odern and future wireless systems are placing greater<br />
demands on antenna designs. Many systems now<br />
operate in two or more frequency bands, requiring dual or<br />
triple band operation of fundamentally narrow band antennas.<br />
These include, satellite navigation systems, cellular systems,<br />
wireless LAN and combination of these systems. One of the most<br />
popular antennas employed in mobile communication<br />
systems is the Monopole antenna and its family [1]-[3]. The<br />
term broadband refers to a telecommunications signal or device<br />
of greater bandwidth, in some sense, than another standard or<br />
usual signal or device [4].<br />
Some of the Broad Band antennas are much more complex<br />
than other existing single band, dual band and multi band<br />
antennas [5]-[6]. In this paper we investigate Broad Band<br />
antenna, which is basically a printed micro strip antenna with<br />
etched ground plane. The printed circular micro strip antenna is<br />
advanced antennas over conventional rectangular micro strip<br />
antennas in terms of the complexity. This Broad Band antenna<br />
has slightly high BW than previous existed one and also it has<br />
high efficiency and reduced size.<br />
II. SUBSTRATE MATERIAL SELECTION<br />
The choice of dielectric substrate will play an important role in<br />
the design and simulation of the micro strip antennas. The<br />
substrate choice depends upon permittivity, dielectric loss<br />
tangent, thermal expansion and conductivity, cost and<br />
manufacturability. In this present work we used Roger RT-duroid<br />
as substrate material for simulation of micro strip antennas.<br />
III. DESIGN SPECIFICATION<br />
The radiation mechanism of planar circular disc monopoles is<br />
an involved topic and has been investigated by many UWB<br />
antenna researchers [5], [6]. One method for analysing such<br />
structures can be in the frequency domain where wide band<br />
monopole operation is explained by the overlapping of closely<br />
distributed minimums in the reflection coefficient, sometimes<br />
referred to as resonances [7]. The design specifications and<br />
structure of proposed antenna on Rogers RT-6010 substrate<br />
material with relative dielectric constant 10.2, thickness of<br />
0.83mm. The real part of antenna impedance is 50Ω at 9.5GHZ,<br />
10.5GHz, 11.5GHz and 12.5GHz where the imaginary part of the<br />
antenna impedance equals zero, the final dimensions and<br />
structure of Broad Band antenna after doing an extensive<br />
simulation study as shown below table and figures.<br />
Table-1 Dimensions of the Circular Disc Monopole antenna<br />
Dimensions Millimetres [mm]<br />
Width of the Substrate W 30<br />
Length of the Substrate L 35<br />
Width of the 50-Ω Feed line Wf 1.8<br />
Length of the 50-Ω Feed line Lf 8<br />
Width of the First Micro strip Line W1 1.4<br />
Length of the First Micro strip Line L1<br />
Width of the Second Micro strip Line W2 1<br />
Length of the Second Micro strip Line L2 3.5<br />
Radius of the <strong>Print</strong>ed Disc R 7.5<br />
Length of the Partial Ground Plane Lg 15.1<br />
Width of the Partial Ground Plane Wg 30<br />
Substrate Thickness Hsub 0.83<br />
5<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 326<br />
ISSN 2250-3153<br />
Figure 1: Compact Disc Monopole antenna<br />
IV. RESULTS AND DISCUSSION<br />
Figure 1 shows the CST model of Broad Band Compact Disc<br />
Monopole Antenna. Figure 2 shows the return loss of the<br />
proposed antenna.<br />
Figure 2: Frequency vs. Return loss<br />
Figure 3: VSWR curve<br />
Figure 2 shows Frequency Vs. Return loss curve for simulated<br />
values. Return loss of less than -2 dB is obtained in entire<br />
frequency range. Figure 3 shows VSWR curve.<br />
As the antenna gets excited the travelling wave gets travelled and<br />
the radiation pattern is obtained when impedance of the micro<br />
strip gets matched with the free space impedance. Symmetric<br />
radiation is obtained with low side lobes. Figure 4 shows the<br />
radiation pattern for the proposed antenna at different canter<br />
frequencies in between 3GHz to 20GHz.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 327<br />
ISSN 2250-3153<br />
(a)<br />
(b)<br />
(c)<br />
(d)<br />
Figure 4.Circular Disc Monopole antenna:2-D Far field radiation<br />
pattern at (a) 12.5GHz (b) 11.5GHz (c) 10.5GHz (d) 9.5GHz<br />
Figure 4 shows the 2-D radiation patterns at different<br />
frequencies 12.5 GHz, 11.5GHz, 10.5GHz and 9.5GHz .<br />
Maximum Gain of approximately 18 dB occurred at 12.5GHz<br />
and gain margin is 15.65dB is obtained from the simulated<br />
results.<br />
The simulation time and accuracy will be influenced by the<br />
mesh. Fig.5 and Fig.6 shows the E-field, H-field current<br />
distribution generation for the proposed antenna. Average current<br />
distribution of the cross section will give the information about<br />
S-parameters.<br />
Figure 5: E-Field distribution<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 328<br />
ISSN 2250-3153<br />
Figure 6: H-Field distribution<br />
V. CONCLUSION<br />
This paper mainly presents the design and detailed results of<br />
the Compact Disc Monopole Antenna for Broad Band<br />
Applications with Roger RT-6010 substrate material. This<br />
antenna is showing remarkable performance over the entire<br />
frequency range between 3-20GHz with high gain of 18 dB and<br />
high directivity. This proposed model is giving the confidence to<br />
use design of Broad Band antennas for the phased array<br />
applications.<br />
REFERENCES<br />
[1] Naffall Herscovici and Christos Christo-douloc, ―Wideband<br />
monopole antennas for Antennas and Propagation Magazine, Vol.45,<br />
No.2, April 2003.<br />
[2] S. T. Fang and K. L. Wong, ―A dual frequency equilateral-<br />
triangular micro-strip antenna with a pair of narrow slots,‖<br />
Microwave Opt.Tech. Lett.23, 82–84, Oct. 20, 1999.<br />
[3] K. P. Yang, Studies of compact dual frequency micro strip<br />
antennas, Ph.D. dissertation, depart. of Electrical Engineering,<br />
National Sun Yat sen University, Kaohsiung, Taiwan, 1999.<br />
[4] J.H.Lu and K.L.Wong,―Compact dual frequency Circular micro<br />
strip antenna with an offset circular slot,‖ Microwave Opt. Tech.<br />
Lett.22, 254 –256, Aug. 20, 1999.<br />
[5] G.S.Row, S.H.Yeh, and K.L.Wong, ―Compact dual-polarized<br />
microstrip antennas,‖ Microwave Opt. Technol.Lett. 27, 284–287,<br />
Nov. 20, 2000.<br />
[6] T.W.Chiou and K.L.Wong,―Designs of compact micro strip<br />
antennas with a slotted ground plane‖ in 2001IEEE Antennas<br />
Propagate.Soc.Int.Symp Dig., pp. 732–735<br />
[7] Garish Kumar and K.P.Ray, Broadband Micro- strip antennas,<br />
Norwood: Artech House 2003.<br />
AUTHORS<br />
First Author – B.Saidaiah, Professor, Department of ECE,<br />
Chebrolu Engineering College, Guntur Dt, AP, India<br />
Email id - saidaiahbandi@gmail.com<br />
Second Author - A.Sudhakar, Professor, Department of<br />
ECE,RVR&JC College of Engineering, Guntur Dt, AP, India<br />
Email id – alapati_sudhakar@yahoo.com<br />
Third Author - K. Padma Raju, Professor, Department of ECE,<br />
JNTU Kakinada, East Godavari Dt, AP, India<br />
Email id - padmaraju_k@yahoo.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 329<br />
ISSN 2250-3153<br />
Implementation Scheme for <strong>Online</strong> Medical Diagnosis<br />
System Using Multi Agent System with JADE<br />
Mr.Shibakali Gupta, Arindam Sarkar, Indrani Pramanik, Banani Mukherjee<br />
Computer Science & Engg. , University Institute of technology, Burdwan University, Golapbag, Burdwan (W.B)<br />
Abstract- In this proposed methodology we are building agent<br />
based information services for internet users. In our work we are<br />
considering the use of agents that will provide Medical Care<br />
related services. In this paper we report the design and<br />
construction of a Multi-Agent System (MAS) that is composed<br />
of agents that provide medical services. The implemented system<br />
contains agents developed using JADE that allow the user to<br />
search for medical centres satisfying a given set of symptoms, to<br />
access his/her medical record or to make an appointment to be<br />
visited by a particular kind of doctor in his/her location. He/She<br />
can also chat or mail to a doctor. And can get various tips about<br />
health care and diseases.<br />
Index Terms- Multi Agent System, JADE, Health Care, Agents.<br />
A<br />
I. INTRODUCTION<br />
s an initial problem in the domain of Health care service [1]<br />
and diagnosis, we choose online medical service system<br />
.Now a days internet has expanded in everywhere .And this<br />
proposed methodology is concerned about the online treatment<br />
and creating a Medical Diagnosis System [2] consisting of agents<br />
developed using JADE [8][9] constituting a Multi Agent System.<br />
Imagine that a user is going for a tour in an unknown city. It is<br />
the first time that he goes to that city, so he only knows the<br />
location of the airport, the hotel and the tour sites. After visiting a<br />
few sites and having a heavy dinner in the night he doesn't feel<br />
very well, for two hours. The user is a diabetic patient, so he is<br />
quite worried about this condition. Fortunately, the user carries<br />
his laptop with him. He now opens the site <strong>Online</strong>Docs.com. He<br />
enters his symptoms in the site and in a few seconds he have on<br />
the laptop's screen the details of the closest and best hospital,<br />
nursing home, clinics and the doctor‘s details. Then, the site<br />
provides information about the timetables of the doctors of that<br />
medical centre that are diabetic specialists and with a list of three<br />
doctors; one of them performs examinations on the afternoon,<br />
and another one on the evening (the third one is on holidays). He<br />
confirms to book a visit to one of the two available doctors as<br />
soon as possible. <strong>Online</strong>Docs tries to book a visit to the first<br />
doctor by contacting the doctor agent, but he is told that the<br />
doctor has a full schedule. However, it manages to book a visit to<br />
the second doctor at 18:00. Then, he can see in the laptop‘s<br />
screen a confirmation of the booking. At 18:00 he goes to the<br />
hospital .After explaining the problem to the doctor. And then the<br />
doctor logins as an administrator to our site and asks the site to<br />
retrieve his medical record (which can be done with his medical<br />
ID code and a password that he introduce in the computer‘s<br />
keyboard). In a few seconds he can see the previous health<br />
conditions of user, the treatments and operations he might have<br />
had in the past, the medicines to which he is allergic, etc. After a<br />
detailed examination, the doctor concludes that the problem is<br />
very serious, as the user‘s sugar level has increased very much<br />
due to excessive sugar consumption and so he gives the patient<br />
medicines and asks him to take some rest. He also adds the<br />
information gathered in this examination to the user‘s medical<br />
record, so that it can be taken into account in the future. And<br />
after that the site will give him information about where the<br />
prescribed medicines by the doctor are available in that city.<br />
Now after taking medicines for few days he can also report his<br />
progress to the doctor through the chatting and mailing<br />
functionalities of the website.<br />
Now suppose there are a large number of medical records<br />
of users which have cases of malaria then the system will<br />
generate an epidemic alert to the media and government agent.<br />
This scenario is not as far-fetched and futuristic as it may seem at<br />
first glance. If agent technology delivers the results it is<br />
promising, the facts depicted in this example could indeed<br />
happen in a real setting. The challenges involved are many and<br />
come from five main areas:<br />
1. Communication between services - e.g. sharing ontology<br />
and semantics which could be heterogeneous even within the<br />
health care domain.<br />
2. Security/Authorization-accessing/editing sensitive medical<br />
data, such as the medical records of the patients.<br />
3. Creating an environment where agents can discover one<br />
another and access one another's services.<br />
4. Communication between users and agents -e.g. graphical user<br />
interfaces to communicate with personal assistants.<br />
5. Co-ordination between distributed services, i.e. making<br />
complex distributed decisions (for instance, the medical centers<br />
could get in touch with one another so that patients are evenly<br />
distributed between them).<br />
The work reported in this paper is a first step towards these<br />
future scenarios, with contributions to primarily the first four<br />
challenges. The final aim of the project is to design and<br />
implement a system which could be run in an environment such<br />
as the Agent Cities network, which is attempting to create a<br />
technical environment in which some of the above topics may be<br />
studied. In this paper we describe the design and<br />
implementation of a MAS that offers some of the services<br />
which have been requested in the previous paragraph. Main<br />
agent of the system can provide information about the medical<br />
centers that are available in a given city. The MAS also contains<br />
an Doctors agent for each medical centre in town; these agents<br />
may be asked about the doctors working in that hospital, or may<br />
be requested to perform a booking in the schedule of a<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 330<br />
ISSN 2250-3153<br />
specific doctor and can also access a database in which the<br />
medical records of the users are stored. The developed system<br />
also contains Medicine agents for each drug centre in the city<br />
which provides information about the medicines available.<br />
Therefore, when agent (and telecommunication) technology is a<br />
little bit more mature, we will hopefully be able to access much<br />
useful health- related information and facilities all around the<br />
world.<br />
The rest of the paper is organized as follows. First of all, the<br />
Agent Cities project, which is the framework in which this work<br />
has been made, is briefly introduced, and we argue why multiagent<br />
systems offer an appropriate platform for developing<br />
health-related applications. After that, a detailed description of<br />
the MAS that has been designed and implementation scheme is<br />
given. We explain the architecture of the MAS, the services<br />
offered by the different types of agents and the ontology<br />
used in this work. The paper finishes with a discussion of the<br />
work done and an outline of some potential future lines of<br />
research.<br />
II. BACKGROUND<br />
The Foundation for Intelligent Physical Agents (FIPA) [10] is<br />
an organization that defines standards for agent interoperation.<br />
Agent Cities [11] is an ambitious project whose main aim is the<br />
construction of a worldwide, publicly accessible network of<br />
FIPA-based agent platforms. Each platform will support agents<br />
that offer services similar to those that can be found in a real city<br />
(e.g. facilities, amenities, attractions, information and<br />
commercial services). The agents that are planned to be initially<br />
deployed in this network will focus on information and booking<br />
services in domains such as cinemas and theatres, restaurants,<br />
hotels, taxis, magazines, tourist information, weather information<br />
and a meeting scheduling service. It is expected that, once these<br />
initial services have been deployed, it will be possible to<br />
implement intelligent complex compound services (e.g. agents<br />
that are able to help a user to plan a weekend away, including<br />
tasks such as booking air tickets, selecting and booking a room in<br />
an appropriate hotel, buying tickets for the theatre and reserving<br />
a table in a restaurant that is near the theatre and offers the user's<br />
favourite meal). Our group has been working in the last twelve<br />
months in the application of AI techniques (especially agentbased<br />
technology) to the medical domain [5]. When the Agent<br />
Cities initiative was made public, we immediately imagined the<br />
potential development of agents that could offer not the usual<br />
leisure-oriented services but health-care related services.<br />
Therefore, we decided to design and construct a multi-agent<br />
system with the following characteristics:<br />
The user may request information about all the medical<br />
centres available in a particular city by giving his/her<br />
symptoms.<br />
If the user is aware of a specific medical centre in the<br />
area, he/she may request information about the medical<br />
services and doctors in that centre.<br />
It is possible to book a visit to a doctor.<br />
The user may access his/her medical record.<br />
The user can also find medical stores in the city.<br />
The user can chat or mail to the doctors.<br />
Media and Government user will get a possible<br />
epidemic alert.<br />
The decision of using a Multi-Agent System in this medical<br />
setting (and not other more traditional AI techniques such<br />
as an expert system or a decision support system) is motivated by<br />
the following reasons:<br />
• The information that must be dealt with is geographically<br />
distributed, because each hospital or medical centre will keep its<br />
own data, each doctor will have his/her personal information<br />
(e.g. an up-to-date daily schedule) in a personal computer, the<br />
medical records of the potential users of the system may be<br />
located in different databases, etc. Therefore, a distributed AI<br />
approach (such as the one offered by multi-agent systems) seems<br />
suitable in this case.<br />
• There must be a fluent communication between the user and the<br />
medical centres. For instance, the user's agent should be able to<br />
ask for a booking with a certain doctor, and be able to react<br />
quickly if the doctor's schedule is full (so another doctor has to<br />
be chosen). Agents are not only reactive but also<br />
endowed with social abilities, so they are able to communicate<br />
with other agents in order to negotiate and co-ordinate their<br />
activities.<br />
• Existing systems (such as databases containing medical<br />
records) may be easily included in a multi- agent system. The<br />
standard way of agentifying a database is to put a wrapper<br />
around it. A wrapper is an agent that receives the queries to be<br />
made to the database in a standard agent communication<br />
language (such as FIPA-ACL or KQML) and is able to translate<br />
these requests into queries in SQL to the database. After<br />
receiving the reply from the database, the wrapper may translate<br />
the answer to the common agent communication language and<br />
send it to the requesting agent.<br />
• Health-oriented agents could perform pro-active tasks in order<br />
to have ready all the information that the user may need at a<br />
particular time. For instance, the user's agent might keep, in the<br />
user‘s health profile, the information that he/she has had heart<br />
conditions in the past. When the user travels to a foreign city,<br />
the personal assistant could immediately (without an explicit<br />
demand from the user) search all those medical centres in which<br />
there are heart specialists, and have this information ready in<br />
case the user needs it. This property has not been implemented in<br />
the agents described in this paper, though.<br />
• The user should be able to access his/her medical record from<br />
anywhere. For instance, the user may be on holiday in a rural<br />
area, far away from medical centres, and need to be examined by<br />
a local doctor. If the user may access his/her medical record from<br />
a mobile phone or a personal computer connected to the Internet,<br />
the doctor may take it into account in order to make a more<br />
precise diagnosis.<br />
• Finally, perhaps the most important reason for capturing<br />
services as agents in this way is to enable the individual medical<br />
services to interact with each other at a high enough level to<br />
ensure that they can all interoperate. Agent communication<br />
languages (such as FIPA-ACL), content languages (such as SL)<br />
and formal ontologies are very useful in describing<br />
communication between different services at the application<br />
level – i.e. in a way which relates to the domain of discourse<br />
rather than to any single implementation. Without formal<br />
specifications for domain ontologies it would be almost<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 331<br />
ISSN 2250-3153<br />
impossible for diverse medical systems to interact with each<br />
other correctly.<br />
III. ARCHITECTURE OF THE MASS AND IMPLEMENTATION<br />
This section describes the Multi-Agent System [3] [4] which<br />
have been developed. The primary design objectives of the work<br />
were the following:<br />
• To provide a decomposition of the problem that matched<br />
agents to entities which could be realistic players in such a<br />
domain (e.g. Medical centres, personal agents, etc.) And to take<br />
care in who had access to which information.<br />
• To provide an ontology for the domain (a detail often ignored<br />
in demonstrations).<br />
• To make the developed agent services as reusable as possible<br />
by using standard languages- in this case FIPA-ACL for<br />
communication and FIPA-SL for content - and providing<br />
detailed service models to describe the individual functioning<br />
and objective of each agent including descriptions of actions,<br />
protocols used and example messages.<br />
These points are particularly important since the aim is to<br />
make re-usable service components which could be used in many<br />
applications (not all of them necessarily medical). The aim of the<br />
multi-agent system is to provide access to the basic health-care<br />
services in a given city to the users. The basic architecture of the<br />
MAS which has been developed in this work is shown in figure<br />
1.<br />
This multi-agent system contains six different types of agents:<br />
the main agent (MA), the user agent (UA), the medical store<br />
agent (MSA), a database wrapper (DW) and some doctor agents<br />
(DA), media and govt. agent (MGA).<br />
User Agent:<br />
• User agent enters his/her symptoms and gets the list of<br />
available doctors in clinic, hospital, nursing homes in<br />
the city.<br />
• The user agent can chat or mail to the doctors.<br />
• The user agent can view his/her health profile.<br />
Main Agent:<br />
• The main agent searches the best available doctors in<br />
the city.<br />
• The main agent fixes appointment to the doctors.<br />
• The main agent searches the medicines available in the<br />
different medical stores in the city through medical store<br />
agent.<br />
• The main agent send alert about possible epidemic<br />
situation to the media and government agent in the city.<br />
Doctor Agent:<br />
• The doctor agent prescribes the medicine.<br />
• The doctor agent updates the medical records.<br />
Media and Government Agent:<br />
• The media and government agent can view the alert<br />
about the possible epidemic situation in the city.<br />
Database Wrapper:<br />
Database wrapper stores the data and performs analysis on the<br />
data to generate the required result.<br />
Fig.1 Architecture of the MAS<br />
A. FIPA Agent Platform<br />
The standard model of an agent platform, as defined by FIPA,<br />
is represented in the following figure 2,<br />
Agent Management System<br />
The Agent Management System (AMS) is the agent who exerts<br />
supervisory control over access to and use of the Agent Platform.<br />
Only one AMS will exist in a single platform. The AMS provides<br />
white-page and life-cycle service, maintaining a directory of<br />
agent identifiers (AID) and agent state. Each agent must register<br />
with an AMS in order to get a valid AID. The Directory<br />
Facilitator (DF) is the agent who provides the default yellow<br />
page service in the platform.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 332<br />
ISSN 2250-3153<br />
Fig.2 Reference of FIPA Agent Platform.<br />
Agent Communication Channel<br />
The Message Transport System, also called Agent<br />
Communication Channel (ACC), is the software component<br />
controlling all the exchange of messages within the platform,<br />
including messages to/from remote platforms. JADE fully<br />
complies with this reference architecture and when a JADE<br />
platform is launched, the AMS and DF are immediately created<br />
and the ACC module is set to allow message communication.<br />
The agent platform can be split on several hosts. Only one Java<br />
application, and therefore only one Java Virtual Machine (JVM),<br />
is executed on each host. Each JVM is a basic container of agents<br />
that provides a complete run time environment for agent<br />
execution and allows several agents to concurrently execute on<br />
the same host.<br />
The main-container, or front-end, is the agent container<br />
where the AMS and DF lives and where the RMI registry, that is<br />
used internally by JADE, is created. The other agent containers,<br />
instead, connect to the main container and provide a complete<br />
run- time environment for the execution of any set of JADE<br />
agents. According to the FIPA specifications, DF and AMS<br />
agents communicate by using the FIPA-SL content language<br />
and the FIPA-agent-management ontology, and the FIPA-request<br />
interaction protocol. JADE provides compliant implementations<br />
for all these components. The following messages are used by<br />
agents to communicate with other agents:<br />
a. Accept Proposal - One Agent accepts the proposal of another<br />
agent<br />
b. Agree - The process of mutual agreement between agents for<br />
request and response<br />
c. Inform - One agent informs to the agent about the process<br />
d. Failure - The communication failure is send as the response<br />
e. Propose - One agent submits some task to the other agent<br />
f. Refuse - The process of denying some task<br />
g. Request - Request for some action to be performed<br />
B. Experimental Design and Implementation of Software<br />
Architecture<br />
The user is authenticated, and he/she has been taken into<br />
website user part. The user may now give his/her symptoms to<br />
the User agent (UA). After that expert advice i.e., recommended<br />
doctors or appropriate medicine stores are provided of the city by<br />
the Main agent (MA).Once the expert advice has been selected<br />
by the User agent (UA) a XML file through the J2EE parser is<br />
created and is sent to the Main agent (MA).<br />
The specific requirement of XML file is that, in near future<br />
JADE [6] may be moved to some other server. It gives<br />
flexibility to transfer the data from one server to another server.<br />
The XML file is parsed using J2EE Parser and data is transferred<br />
to JADE agents. Intern it is forwarded to Main agent (MA). Main<br />
agent (MA) is connected with Decision Support System and the<br />
MYSQL database. Main agent by communicates with the Doctor<br />
Agent (DA) and make intelligent analysis and returns the best<br />
doctors and best medicine centres available in the city. The<br />
above steps are carried out in backward direction and Media and<br />
Govt. Agents gets a possible alert in case of an outbreak. The<br />
software architecture is shown in figure 3,<br />
Fig.3 Software Architectural design for the System.<br />
C. Experimental Result Screenshots<br />
The different sections of the above proposed system is shown<br />
in the figure below,<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 333<br />
ISSN 2250-3153<br />
Fig. 4 User Interface (Webpage) for the Medical Diagnosis<br />
System developed using JSP and HTML.<br />
Fig. 5 A JADE platform starter Agent System which will start the<br />
Agents on clicking a link on the user homepage.<br />
Fig. 6 A JADE platform containing the Main Agent, User Agent<br />
and Doctor Agent<br />
.<br />
Fig. 7 The User Agent taking the symptoms fever as given by the<br />
user as an input and give it to the Main Agent.<br />
Fig. 8 The Main Agent searching for the symptoms fever given<br />
by the User Agent and fixing the appointment to the best doctor<br />
available in the city.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 334<br />
ISSN 2250-3153<br />
Fig. 9 The Doctor Agent is uploading the User prescription to the<br />
database and then the medicine agent working in the background<br />
find those medicines and give it to the User Agent.<br />
IV. CONCLUSION & FUTURE WORK<br />
The proposed implemented version of Medical Diagnosis<br />
System (MDS) can take care of every stage of patients such as<br />
initial checkup, treatment and report for the patients. We believe<br />
that the implemented scheme can bring a revolution in our<br />
Medical Diagnosis System mainly for Indian environment. In<br />
future correspondence the incorporation of KQML (Knowledge<br />
Query Manipulation Language) [7] can be done to have more<br />
efficient data mining or knowledge mining.<br />
REFERENCES<br />
[1] Pricewater House Coopers, Emerging Market Report: Health in<br />
India 2007,2007<br />
[2] Shibakali Gupta, Shiladitya Pujari, A multi agent system (MAS)<br />
based scheme for health care and medical diagnosis system, IAMA<br />
09, ieeexplore, ISBN 978-1-4244-4710-7,2009<br />
[3] Michael Wooldridge, ‖An Introduction to Multi agent Systems‖,<br />
Department of Computer Science, University of Liverpool, Uk JOHN<br />
WILEY AND SONS, LTD.<br />
[4] Katia P Sycara Multiagent Systems, AI magazine Volume 19,<br />
No.2 Intelligent Agents Summer 1998.<br />
[5] Antonio Moreno, Medical Applications of Multi Agent Systems,<br />
Computer Science and Mathematics Department, Universitat Rovira,<br />
Virgili, ETSE. Campus Sescelades.Av.delsPasosCatalans, 26, 43007-<br />
Tarragona Spain.<br />
[6] Developing Multi-agent Systems with JADE,Fabio Bellifemine1,<br />
Agostino Poggi2, and Giovanni Rimassa21,CSELT S.p.A.,Via G.<br />
Reiss Romoli, 274, 10148, Torino, Italy,Dipartimento di Ingegneria<br />
dell‘Informazione, University of Parma Parco Area delle Scienze,<br />
181A, 43100, Parma, Italy.<br />
[7] KQML as an agent communication language Tim Finin, Yannis<br />
Labrou, and James Mayfield, in Jeff Bradshaw (Ed.), ―Software<br />
Agents‖, MIT Press, Cambridge, to appear, (1997)<br />
[8] JADE:Java FrameWork For Agent Development,<br />
http://sharon.cselt.it/projects/jade<br />
[9] JADE:Java framework for Agent<br />
Development,http://www.jade.tilab.com<br />
[10] FIPA:Foundation for Intelligent Physical Agent,http://www.fipa.org<br />
[11] Agent Cities: http://www.agentcities.org.<br />
AUTHORS<br />
First Author – Mr.Shibakali Gupta,<br />
Computer Science & Engg. ,<br />
University Institute of technology, Burdwan University,<br />
Golapbag, Burdwan (W.B). Email id - skgupta.81@gmail.com<br />
Second Author - Arindam Sarkar, Computer Science & Engg.,<br />
University Institute of technology, Burdwan University,<br />
Golapbag, Burdwan (W.B). Email id – arsoftech@gmail.com<br />
Third Author - Indrani Pramanik, Computer Science & Engg.,<br />
University Institute of technology, Burdwan University,<br />
Golapbag, Burdwan (W.B).<br />
Email id - pramanikindrani@gmail.com<br />
Fourth Author-Banani Mukherjee, Computer Science & Engg.,<br />
University Institute of technology, Burdwan University,<br />
Golapbag, Burdwan (W.B). Email id – rajtukun@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 335<br />
ISSN 2250-3153<br />
Multicarrier modulation with OFDM for 4G networks<br />
Abstract- This paper presents a new approach based on<br />
multicarrier modulation (MCM) with OFDM, to accomplish the<br />
goals of 4G. MCM [1] is a form of multicarrier system and a<br />
derivative of frequency-division multiplexing. MCM is a<br />
baseband process that uses parallel equal bandwidth sub channels<br />
to transmit information. Normally implemented with Fast Fourier<br />
transform (FFT) techniques, MCM's advantages include better<br />
performance in the inter symbol interference (ISI) environment,<br />
and avoidance of single-frequency interferers.<br />
Index Terms- MCM, OFDM, transceiver, ISI.<br />
A<br />
I. INTRODUCTION<br />
third-generation (3G) cellular service provides to different<br />
access technologies. The voice, video, multimedia, and<br />
broadband data services are becoming integrated into the same<br />
network. It is apparent that 3G systems, while maintaining the<br />
possible 2-Mbps data rate in the standard, will realistically<br />
achieve 384-kbps rates. To achieve the goals of true broadband<br />
cellular service, the systems have to make use of fourthgeneration<br />
(4G) network.4G is intended to provide high speed,<br />
high capacity, low cost per bit, IP based services.<br />
A. Multicarrier modulation<br />
The basic idea of multi carrier modulation [2] is to divide the<br />
transmitted bit stream into many different sub streams and send<br />
these over many different sub channels. Typically the sub<br />
channels are orthogonal under ideal propagation conditions. The<br />
data rate on each of the sub channels is much less than the total<br />
data rate, and the corresponding sub channel bandwidth is much<br />
less than the total system bandwidth. The number of sub streams<br />
is chosen to ensure that each sub channel has a bandwidth less<br />
than the coherence bandwidth of the channel, so the sub channels<br />
experience relatively flat fading. Thus, the inter symbol<br />
interference on each sub channel is small. The sub channels in<br />
multicarrier modulation need not be contiguous, so a large<br />
continuous block of spectrum is not needed for high rate<br />
multicarrier communications. Moreover, multicarrier modulation<br />
is efficiently implemented digitally.<br />
B. OFDM<br />
In this discrete implementation, called orthogonal frequency<br />
division multiplexing (OFDM) the ISI can be completely<br />
eliminated through the use of a cyclic prefix. The simplest form<br />
of multicarrier modulation divides the data stream into multiple<br />
sub streams to be transmitted over different orthogonal sub<br />
channels centered at different subcarrier frequencies. The number<br />
of sub streams is chosen to make the symbol time on each Sub<br />
stream much greater than the delay spread of the channel or,<br />
equivalently, to make the sub stream bandwidth less than the<br />
M.Gopu*, Dr. Ritesh Khanna**<br />
*Research scholar, CMJ University, India<br />
**CMJ University, India<br />
channel coherence bandwidth. This ensures that the sub streams<br />
will not experience significant ISI.<br />
The rest of the paper is organized as follows section 2<br />
describes the implementation of 4G using MCM, chapter.<br />
Section 3 explains information processing in 4G. Section 4,<br />
section 5 explains MCM/OFDM transmitter and receiver. Section<br />
6 concludes the paper.<br />
II. IMPLEMENTATION OF MCM FOR 4G<br />
Two different types of MCM are useful for 4G. These include<br />
multicarrier code division multiple access (MC-CDMA) and<br />
orthogonal frequency division multiplexing (OFDM) using time<br />
division multiple access (TDMA). Note: MC-CDMA is actually<br />
OFDM with a CDMA overlay.<br />
Similar to single-carrier CDMA systems, the users are<br />
multiplexed with orthogonal codes to distinguish users in MC-<br />
CDMA [3]. However, in MC-CDMA, each user can be allocated<br />
several codes, where the data is spread in time or frequency.<br />
Either way, multiple users access the system simultaneously.<br />
In OFDM with TDMA, the users are allocated time intervals<br />
to transmit and receive data. As with 3G systems, 4G systems<br />
have to deal with issues of multiple access interference and<br />
timing. Differences between OFDM with TDMA and MC-<br />
CDMA can also be seen in the types of modulation used in each<br />
subcarrier. Typically, MC-CDMA uses quadrature phase-shift<br />
keying (QPSK), while OFDM with TDMA could use more highlevel<br />
modulations (HLM), such as, multilevel quadrature<br />
amplitude modulation (M-QAM) (where M = 4 to 256). However,<br />
to optimize overall system performance, adaptive<br />
modulation can be used; where the level of QAM for all<br />
subcarriers is chosen based on measured parameters.<br />
III. PROCESSING 4G INFORMATION<br />
As 4G is based on a multicarrier technique, key baseband<br />
components for the transmitter and receiver are the FFT and its<br />
inverse (IFFT). In the transmit path the data is generated, coded,<br />
modulated, transformed, cyclically extended, and then passed to<br />
the RF/IF section. In the receive path the cyclic extension is<br />
removed, the data is transformed, detected, and decoded. If the<br />
data is voice, it goes to a vocoder. The baseband subsystem will<br />
be implemented with a number of ICs, including digital signal<br />
processors (DSPs), microcontrollers, and ASICs. Software, an<br />
important part of the transceiver, implements the different<br />
algorithms, coding, and overall state machine of the transceiver.<br />
The base station could have numerous DSPs. For example, if<br />
smart antennas are used, each user needs access to a DSP to<br />
perform the needed adjustments to the antenna beam.<br />
A. 4G Transceiver structure<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 336<br />
ISSN 2250-3153<br />
The structure of a 4G transceiver is similar to any other<br />
wideband wireless transceiver. Variances from a typical<br />
transceiver are mainly in the baseband processing. Base stations<br />
and mobiles are distinguished in that base stations transmit and<br />
receive/ decode more than one mobile, while a mobile is for a<br />
single user. A mobile may be a cell phone, a computer, or other<br />
personal communication device.<br />
The line between RF and baseband will be closer for a 4G<br />
system. Data will be converted from analog to digital or vice<br />
versa at high data rates to increase the flexibility of the system.<br />
Also, typical RF components such as power amplifiers and<br />
antennas will require sophisticated signal processing techniques<br />
Fig 1 gives the transmitter section of MCM/CDMA [4].The<br />
purpose of the transmitter is to generate and send information. As<br />
the data rate for 4G increases, the need for a clean signal also<br />
increases. One way to increase capacity is to increase frequency<br />
reuse. As the cell size gets smaller to accommodate more<br />
frequency reuse, smaller base stations are required. Smaller cell<br />
sizes need less transmit power to reach the edge of the cell,<br />
though better system engineering is required to reduce intra-cell<br />
interference.<br />
One critical issue to consider is spurious noise. The regulatory<br />
agencies have stringent requirements on the amount of unwanted<br />
noise that can be sent out of the range of the spectrum allocated.<br />
In addition, excess noise in the system can seriously diminish the<br />
system's capacity.<br />
With the wider bandwidth system associated with 4G, it will<br />
be difficult to achieve good performance without help of linearity<br />
techniques. To effectively accomplish this task, feedback<br />
between the RF and baseband is required. The algorithm to<br />
perform the feedback is done in the DSP, which is part of the<br />
baseband data processing.<br />
to create the capabilities needed for broadband high data rate<br />
signals.<br />
In the transmit path in phase and quadrature (I&Q) signals are<br />
up converted to an IF, and then converted to RF and amplified<br />
for transmission. In the receive path the data is taken from the<br />
antenna at RF, filtered, amplified, and down converted for<br />
baseband processing. The transceiver provides power control,<br />
timing and synchronization, and frequency information. When<br />
multicarrier modulation is used, frequency information is crucial.<br />
If the data is not synchronized properly the transceiver will not<br />
be able to decode it.<br />
IV. TRANSMITTING SECTION<br />
V. RECEIVER SECTION<br />
Fig 2 shows the receiver model of MCM/CDMA. For 3G,<br />
using the 2-Mbps data rate in a 5-MHz bandwidth, the SNR is<br />
only 1.2 dB. In 4G, approximately 12-dB SNR is required for a<br />
20-Mbps data rate in a 5-MHz bandwidth[5]. This shows that for<br />
the increased data rates of 4G, the transceiver system must<br />
perform significantly better than 3G. With any receiver, the main<br />
issues for efficiency and sensitivity are noise figure, gain, group<br />
delay, bandwidth, sensitivity, spurious rejection, and power<br />
consumption. For a 4G receiver using a 5-MHz RF bandwidth,<br />
16 QAM modulation, the receiver sensitivity is -87 dBm. For 3G,<br />
the receiver sensitivity needs to be -122 dBm; the difference is<br />
due to the modulation.<br />
The other configuration has one down conversion, as in a<br />
homodyne (zero IF or ZIF) receiver, where the data is converted<br />
directly to baseband. The challenge in the receiver design is to<br />
achieve the required sensitivity, inter modulation, and spurious<br />
rejection, while operating at low power.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 337<br />
ISSN 2250-3153<br />
The down converter section of the receiver will have to achieve<br />
good linearity and noise figure while consuming minimal power.<br />
The error correction coding of 4G has not yet been proposed,<br />
however, it is known that 4G will provide different levels of<br />
QoS, including data rates and bit error rates. It is likely that a<br />
form of concatenated coding will also be used, and this could be<br />
a turbo code as used in 3G, or a combination of a block code and<br />
a convolution code. This increases the complexity of the<br />
baseband processing in the receive section.4G baseband signalprocessing<br />
components will include ASICs, DSPs,<br />
microcontrollers, and FPGAs. The receiver will take the data<br />
from the ADC, and then use it to detect the proper signals.<br />
Baseband processing techniques such as smart antennas and<br />
multi-user detection will be required to reduce interference.<br />
The goal is to improve the signal by adjusting the beam pattern<br />
of the antennas. The number of DSPs needed to implement an<br />
smart antenna depends on the type of algorithm used. The two<br />
basic types of smart antenna are switched-beam antennas and<br />
adaptive arrays. The former selects a beam pattern from a set of<br />
predetermined patterns, while the latter dynamically steers<br />
narrow beams toward multiple users. Generally speaking, SA is<br />
more likely be used in a base station than a mobile, due to size<br />
and power restrictions.<br />
B. Multi-user detection (MUD)<br />
Multi-user detection (MUD) is used to eliminate the multiple<br />
access interference (MAI) present in CDMA systems. Based on<br />
the known spreading waveform for each user, MUD determines<br />
the signal from other users and can eliminate this from the<br />
desired signal. Mobile devices do not normally contain the<br />
spreading codes of the other users in the cell, so MUD will likely<br />
be implemented only in base stations, where it can improve the<br />
capacity of the reverse (mobile-to-base) link.<br />
C. Power control<br />
Power control will also be important in 4G to help achieve the<br />
desired performance; this helps in controlling high PAVR -<br />
different services need different levels of power due to the<br />
different rates and QoS [7]levels required. Therefore, power<br />
control needs to be a very tight, closed loop. Baseband<br />
processing is just as critical whether dealing with the receiver or<br />
transmitter sections. As we've seed, RF and baseband work in<br />
tandem to produce 4G signals. The baseband processing of a 4G<br />
transmitter will obviously be more complicated than in a 3G<br />
design. The digital-to-analog converter (DAC) is an important<br />
piece of the transmit chain. It requires a high slew rate to<br />
minimize distortion, especially with the high PAVR of the MCM<br />
signals. Generally, data is oversampled 2.5 to 4 times; by<br />
increasing the oversampling ratio of the DAC, the step size<br />
between samples decreases. This minimizes distortion.<br />
D. Increasing the capacity<br />
In the baseband processing section of the transmit chain, the<br />
signal is encoded, modulated, transformed using an IFFT, and<br />
then a cyclic extension is added. Dynamic packet assignment or<br />
dynamic frequency selection are techniques which can increase<br />
the capacity of the system. Feedback from the mobile is needed<br />
to accomplish these techniques. The baseband processing will<br />
have to be fast to support the high data rates.<br />
VI. CONCLUSION<br />
The proposed MCM and OFDM-based technologies will<br />
provide large amounts of bandwidth for broadcast and broadband<br />
applications. With Higher bandwidth MCM/ OFDM<br />
technologies also offer economic benefits additional features and<br />
wider coverage. In most instances MCM/CDMA will remain the<br />
leading and most economical platform for the delivery of mobile<br />
broadband services. Mass adoption of these wide-bandwidth<br />
OFDM-based solutions will surely cater the needs of 4G<br />
networks.<br />
REFERENCES<br />
[1] R. Ziemer, W. Tranter, ―Principles of Communications: Systems,<br />
Modulation and Noise‖ (5th Edition, John Wiley & Sons, 2002)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 338<br />
ISSN 2250-3153<br />
[2] A. Bahai, B. R. Saltzberg, ―Multi-Carrier Digital Communications – Theory<br />
& Applications of OFDM‖ (Klumer Academic / Plenum Publishers, 1999)<br />
[3] H. Matsutani, M. Nakagawa, ―Multi-Carrier DS-CDMA Using Frequency<br />
Spread Coding‖, IEICE Trans. Fundamentals, vol.E82-A, no.12, pp.2634-<br />
2642, Dec 1999.<br />
[4] C. Y. Li, S. Roy, ―Performance of Frequency-Time MMSE Equalizer for<br />
MC-CDMA over Multi-path Fading Channel‖, Dept. of Elec. Eng., Uni. Of<br />
Washington, USA, April 2002.<br />
[5] S. Abeta, H. Atarashi, M. Sawahashi, F. Adachi, ―Performance of Coherent<br />
Multi-Carrier/DS-CDMA and MC-CDMA for Broadband Packet Wireless<br />
Access‖, ICICE Trans. Comm., vol.E84-B, no.3, pp.406-414, March 2002.<br />
[6] S. Hara, R. Prasad, ―Design and Performance of Multi-carrier CDMA<br />
System in Frequency Selective Rayleigh Fading Channels‖, IEEE Trans on<br />
Vehicular Tech., vol.48, no.5, pp1584-1595, Sep 2002.<br />
[7] A. Harada, S. Abeta, M. Sawahashi, ―Adaptive Radio Parameter Control<br />
Considering QoS for Forward Link OFCDM Wireless Access‖, IEEE VTC<br />
2002, pp.1175-1179.<br />
AUTHORS<br />
First Author – M.Gopu, Research scholar, CMJ University,<br />
India. Email id - gopumano@gmail.com,<br />
Second Author – Dr. Ritesh Khanna, rkhanna23@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 339<br />
ISSN 2250-3153<br />
Study and Comparison Performance of On-demand<br />
AODV and DSR, along with the traditional proactive<br />
DSDV Routing Protocols for MANET<br />
Vijendra Rai*, Jaishree Jain**<br />
Computer Science and Engineering Departments, College of Engineering & Rural Technology, Meerut, UP, India<br />
** Technology Departments, Bharat Institute of Technology, Meerut, UP, India<br />
Abstract- In wireless research area, efficient routing<br />
algorithms can provide remarkable benefits in Ad-hoc networks,<br />
including higher throughput, lower average end-to-end delay,<br />
less number of dropped data packets and generally an<br />
ameliorated network performance. Many routing protocols for<br />
such networks have been proposed so far. My research work, an<br />
attempt has been made to compare the performance of three<br />
prominent on-demand reactive routing protocols for mobile ad<br />
hoc networks: DSR and AODV, along with the traditional<br />
proactive DSDV protocol. A simulation analysis with MAC and<br />
physical layer models is used to study interlayer communication<br />
and their performance implications. Experimental results<br />
obtained, showed that the On-demand protocols, AODV and<br />
DSR perform much better than the table-driven DSDV protocol.<br />
Although DSR and AODV share similar On-demand behavior,<br />
the differences in the protocol mechanics can lead to significant<br />
performance differentials. For a variety of scenarios, as<br />
characterized by mobility, load and size of the ad-hoc network<br />
were simulated. The performance differentials are analyzed using<br />
varying network load, mobility pattern, and Network size.<br />
Index Terms- Ad Hoc Network, AODV, DSDV, DSR, NS2.<br />
I. INTRODUCTION<br />
In ad hoc networks, each mobile node operates not only as a<br />
host but also as a router, forwarding packets for other mobile<br />
nodes in the network that may not be within direct wireless<br />
transmission range of each other. Each node participates in an ad<br />
hoc routing protocol that allows it to discover ―multi-hop‖ paths<br />
through the network to any other node. The idea of ad hoc<br />
networking is sometimes also called infrastructure less<br />
networking, since the mobile nodes in the network dynamically<br />
establish routing among themselves to form their own network<br />
―on the fly.‖<br />
A. Mobile Ad-Hoc Network<br />
An ad-hoc network is a collection of wireless mobile hosts<br />
forming a temporary network without the aid of any standalone<br />
infrastructure or centralized administration [13]. Mobile Ad-hoc<br />
networks are self-organizing and self-configuring multihop<br />
wireless networks where, the structure of the network changes<br />
dynamically. This is mainly due to the mobility of the nodes<br />
[12]. Nodes in these networks utilize the same random access<br />
wireless channel, cooperating in a friendly manner to engaging<br />
themselves in multihop forwarding. The nodes in the network not<br />
only act as hosts but also as routers that route data to/from other<br />
nodes in network [10]. In mobile ad-hoc networks where there is<br />
no infrastructure support as is the case with wireless networks,<br />
and since a destination node might be out of range of a source<br />
node transmitting packets; a routing procedure is always needed<br />
to find a path so as to forward the packets appropriately between<br />
the source and the destination. Within a cell, a base station can<br />
reach all mobile nodes without routing via broadcast in common<br />
wireless networks. In the case of ad-hoc networks, each node<br />
must be able to forward data for other nodes. This creates<br />
additional problems along with the problems of dynamic<br />
topology which is unpredictable connectivity changes [11, 14].<br />
B. Infrastructure Networks<br />
Infrastructure network consists of a network with fixed and<br />
wired gateways. A mobile host communicates with a bridge in<br />
the network (called base station) within its communication<br />
radius. The mobile unit can move geographically while it is<br />
communicating. When it goes out of range of one base station, it<br />
connects with new base station and starts communicating through<br />
it. This is called handoff. In this approach the base stations are<br />
fixed.<br />
C. Infrastructure less (Ad hoc) Networks<br />
In ad-hoc networks [5] all nodes are mobile and can be<br />
connected dynamically in an arbitrary manner. As the range of<br />
each host‘s wireless transmission is limited, so to communicate<br />
with hosts outside its transmission range, a host needs to enlist<br />
the aid of its nearby hosts in forwarding packets to the<br />
destination. So all nodes of these networks behave as routers and<br />
take part in discovery and maintenance of routes to other nodes<br />
in the network. Ad hoc Networks are very useful in emergency<br />
search-and rescue operations, meetings or conventions in which<br />
persons wish to quickly share information, and data acquisition<br />
operations in inhospitable terrain. This ad-hoc routing protocols<br />
can be divided into two categories:<br />
1. Table-Driven Routing Protocols: In table driven routing<br />
protocols, consistent and up-t o-date routing information to all<br />
nodes is maintained at each n ode.<br />
2. On-Demand Routing Protocols: In On-Demand routing<br />
protocols, the routes are created as and when required. When a<br />
source wants to send to a destination, it invokes the route<br />
discovery mechanisms to find the path to the destination.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 340<br />
ISSN 2250-3153<br />
D. Some of the differences between proactive (Tabledriven)<br />
and reactive (On-demand) routing protocols are:<br />
Parameters Proactive-table Reactive-on<br />
driven<br />
demand<br />
Overhead High Low<br />
Memory<br />
requirement<br />
High Low<br />
Delay Low High<br />
Routing<br />
philosophy<br />
Flat Flat<br />
Availability of Always available Available when<br />
routing regardless of need it<br />
information need<br />
Coping with Inform other Use localized<br />
mobility nodes to achieve<br />
a consistent<br />
routing table<br />
route discovery<br />
Quality of Mainly shortest Few can support<br />
service(QoS) path as the QoS QoS, although<br />
support<br />
metric most support<br />
shortest path<br />
Signaling traffic Greater than that Grows with<br />
generated in on-demand increasing<br />
routing mobility of<br />
active routes<br />
E. Destination Sequenced Distance VECTOR (DSDV)<br />
The Destination-Sequenced Distance-Vector (DSDV)<br />
Routing Algorithm is based on the idea of the classical Bellman-<br />
Ford Routing Algorithm with certain improvements. Every<br />
mobile station maintains a routing table that lists all available<br />
destinations, the number of hops to reach the destination and the<br />
sequence number assigned by the destination node. The sequence<br />
number is used to distinguish stale routes from new ones and<br />
thus avoid the formation of loops. The stations periodically<br />
transmit their routing tables to their immediate neighbors. A<br />
station also transmits its routing table if a significant change has<br />
occurred in its table from the last update sent. So, the update is<br />
both time-driven and event-driven.<br />
Advantages of DSDV<br />
a. DSDV protocol guarantees loop free paths [9].<br />
b. Count to infinity problem is reduced in DSDV<br />
[9].<br />
c. We can avoid extra traffic with incremental<br />
updates instead of full dump updates.<br />
d. Path Selection: DSDV maintains only the best<br />
path instead of maintaining multiple paths to<br />
every destination. With this, the amount of<br />
space in routing table is reduced.<br />
Limitations of DSDV<br />
a. Wastage of bandwidth due to unnecessary advertising of<br />
routing information even if there is no change in the<br />
network topology [7].<br />
b. DSDV doesn‘t support Multi path Routing.<br />
c. It is difficult to determine a time delay for the<br />
advertisement of routes [3].<br />
d. It is difficult to maintain the routing table‘s<br />
advertisement for larger network. Each and every host<br />
in the network should maintain a routing table for<br />
advertising. But for larger network this would lead to<br />
overhead, which consumes more bandwidth.<br />
F. Ad Hoc On-Demand Distance Vector Routing (AODV)<br />
Ad-hoc On-demand Distance Vector is essentially a<br />
combination of both DSR and DSDV. It borrows the basic ondemand<br />
mechanism of Route Discovery and Route Maintenance<br />
from DSR, plus the use of hop-by-hop routing, sequence<br />
numbers, and periodic beacons from DSDV. It uses destination<br />
sequence numbers to ensure loop freedom at all times and by<br />
avoiding the Bellman-Ford count-to-infinity problem offers<br />
quick convergence when the ad hoc network topology changes.<br />
In this research paper we attempt to present an overview of two<br />
main categories of mobile ad-hoc routing protocols and<br />
performance comparison of both the protocols by simulation of<br />
two routing protocols(DSDV and AODV) focusing on the<br />
differences in their dynamic behavior that can lead to<br />
performance differences.<br />
Advanced uses of AODV<br />
a. Because of its reactive nature, AODV can handle highly<br />
dynamic behavior of Vehicle Ad-hoc networks [2].<br />
b. Used for both unicasts and multicasts using the ‘J‘ (Join<br />
multicast group) flag in the packets [4].<br />
Limitations/Disadvantages of AODV<br />
a. Requirement on broadcast medium: The algorithm<br />
expects/requires that the nodes in the broadcast medium<br />
can detect each others‘ broadcasts.<br />
b. No reuse of routing info: AODV lacks an efficient route<br />
maintenance technique.<br />
c. The routing info is always obtained on demand,<br />
including for common case traffic [8].<br />
d. It is vulnerable to misuse: The messages can be misused<br />
for insider attacks including route disruption, route<br />
invasion, node isolation, and resource consumption [6].<br />
e. AODV lacks support for high throughput routing<br />
metrics: AODV is designed to support the shortest hop<br />
count metric. This metric favors long, low bandwidth<br />
links over short, high-bandwidth links [8].<br />
f. High route discovery latency: AODV is a reactive<br />
routing protocol. This means that AODV does not<br />
discover a route until a flow is initiated. This route<br />
discovery latency result can be high in large-scale mesh<br />
networks<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 341<br />
ISSN 2250-3153<br />
G. Dynamic Source Routing (DSR)<br />
The key distinguishing feature of DSR is the use of source<br />
routing. Dynamic Source Routing (DSR) is a reactive protocol<br />
i.e. it doesn‘t use periodic advertisements. It computes the routes<br />
when necessary and then maintains them. Source routing is a<br />
routing technique in which the sender of a packet determines the<br />
complete sequence of nodes through which the packet has to<br />
pass; the sender explicitly lists this route in the packet‘s header,<br />
identifying each forwarding hop by the address of the next node<br />
to which to transmit the packet on its way to the destination host.<br />
H. NS2 TOOLS DETAILS:<br />
1. Ns2: Tool for virtual presentation of Network.<br />
2. Simulations: The artificial flow of virtual network<br />
3. Working: Nodes created by coding in TCL and given<br />
motion as in real network.<br />
Ns-2 Simulation Process Flow:<br />
I. EXPERIMENTS AND RESULTS:<br />
1. Throughput: The packet delivered per unit time.<br />
2. Delay: The time of delivery<br />
3. Packet delivery: The volume and information sent<br />
network.<br />
II. PERFORMANCE ANALYSIS<br />
A. Simulation Environment<br />
The simulation experiment is carried out in LINUX (Ubuntu<br />
9.04). The detailed simulation model is based on network<br />
simulator-2 (ver-2.33), is used in the evaluation. The NS<br />
instructions can be used to define the topology structure of the<br />
network and the motion mode of the nodes, to configure the<br />
service source and the receiver, to create the statistical data track<br />
file and so on.<br />
B. Traffic Model<br />
Continuous bit rate (CBR) traffic sources are used. The<br />
source-destination pairs are spread randomly over the network.<br />
Only 512-byte data packets are used. The number of sourcedestination<br />
pairs is varied to change the offered load in the<br />
network. The protocols maintain a send buffer of 64 packets. It<br />
contains all data packets waiting for a route, such as packets for<br />
which route discovery has started, but no reply has arrived yet.<br />
To prevent buffering of packets indefinitely, packets are dropped<br />
if they wait in the send buffer for more than 30 s. All packets<br />
(both data and routing) sent by the routing layer are queued at the<br />
interface queue until the MAC layer can transmit them. The<br />
interface queue has a maximum size of 50 packets and is<br />
maintained as a priority queue with two priorities each served in<br />
FIFO order. Routing packets get higher priority than data<br />
packets.<br />
III. PERFORMANCE METRICS<br />
The performance of the protocols depends on various interrelating<br />
adhered metrics. The most important parameters End to<br />
End Delay, Packet Loss and Throughput have been considered<br />
herein to draw an analytical observation.<br />
A. Average END to End Delay<br />
Average end to end delay includes all possible delays caused<br />
by buffering during route discovery latency, queuing at the<br />
interface queue, retransmission delays at the MAC, and<br />
propagation and transfer times of data packets.<br />
B. Packet Loss<br />
The protocols maintain a send buffer of 64 packets. It<br />
contains all data packets waiting for a route, such as packets for<br />
which route discovery has started, but no reply has arrived yet.<br />
To prevent buffering of packets indefinitely, packets are dropped<br />
if they wait in the send buffer for more than 30 s. All packets<br />
(both data and routing) sent by the routing layer are queued at the<br />
interface queue until the MAC layer can transmit them. The<br />
interface queue has a maximum size of 100 packets and is<br />
maintained as a priority queue with two priorities each served in<br />
FIFO order. Routing packets get higher priority than data<br />
packets.<br />
C. Throughput<br />
Also called packet delivery ratio, this is the ratio of the<br />
number packets received by the CBR sink to the number of<br />
packets sent by the CBR source, both at the application layer.<br />
Packets that are sent but not received are lost in the network due<br />
to malicious drops, route failures, congestion, and wireless<br />
channel losses. A higher throughput will directly impact the<br />
user‘s perception of the quality of service (QOS).<br />
IV. PERFORMANCE RESULTS<br />
A. Throughput vs. Node:<br />
DSR performed poorly in our metrics (PDR and Throughput)<br />
in these ―stressful‖ situations (higher mobility, more network<br />
load). The reason of these phenomena is the aggressive use of<br />
route caching in DSR. In our observation, such caching provides<br />
a significant benefit up to a certain extent. With higher loads the<br />
extent of caching is deemed too large to benefit performance.<br />
Often, stale routes are chosen since route length (and not any<br />
freshness criterion) is the only metric used to pick routes from<br />
the cache when faced with multiple choices. DSDV shows higher<br />
throughput than the DSR and AODV since its routing overhead<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 342<br />
ISSN 2250-3153<br />
is less than others. The rate of packet received for AODV is<br />
better than the DSDV.<br />
Fig. 1: THROUGHPUT Agent 1, Sink 1 DSDV<br />
Fig. 2: THROUGHPUT Agent 1, Sink1 AODV<br />
Fig. 3: THROUGHPUT Agent 1, Sink1 DSR<br />
B. Packet Dropped vs. Nod:<br />
Mainly Packet drop occurs due to the end of TTL (Time to<br />
Live). If a protocol takes much time to decide destination path,<br />
then the packets having short life time, fall into victim to drop.<br />
Efficient protocols can wisely find out routing direction thus<br />
packets dropping rate reduces for them. The dropped packet for<br />
DSR is less than that of DSDV; AODV has no periodic updates<br />
exist in DSR.<br />
Fig. 4: PACKET LOSS Agent 1, Sink 1 DSDV<br />
Fig. 5: PACKET LOSS Agent 1, Sink 1 AODV<br />
Fig. 6: PACKET LOSS Agent 1, Sink 1 DSR<br />
C. END to End Delay<br />
DSDV which is a table driven proactive routing protocol<br />
completely wins over the on demand reactive routing protocols<br />
AODV and DSR .Since DSDV proactively keeps the routes to all<br />
destination in its table it does not have to initiate the route<br />
request process as frequently as in AODV and DSR while<br />
sending packets. Hence on average DSDV clearly has less delay.<br />
Now we can easily observe that DSR is the worst protocol in<br />
terms of delay. At high mobility and more networks load (512<br />
byte packets at 3 packets/sec) aggressive route caching strategy<br />
of DSR fails. In these stressful condition links break very often<br />
leading to invalidation of routes cached.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 343<br />
ISSN 2250-3153<br />
Fig. 7: DELAY Agent 1, Sink 1 DSDV<br />
Fig. 8: DELAY Agent 1, Sink 1 AODV<br />
Fig. 9: DELAY Agent 1, Sink 1 DSR<br />
1. Comparison for 20 and 30 NODES (DSDV):<br />
2. Comparison for 20 and 30 NODES (AODV):<br />
3. Comparison For 20 and 30 NODES (DSR):<br />
4. Comparison based on QOS Parameters 20 nodes:<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 344<br />
ISSN 2250-3153<br />
5. Comparison based on QOS Parameters 30 nodes:<br />
V. CONCLUSION<br />
The study reveals that, DSDV shows higher throughput than<br />
the DSR and AODV since its routing overhead is less than<br />
others. The rate of packet received for AODV is better than the<br />
DSDV. The dropped packet for DSR is less than that of DSDV;<br />
AODV has no periodic updates exist in DSR. DSDV routing<br />
protocol consumes more bandwidth, because of the frequent<br />
broadcasting of routing updates. While the AODV is better than<br />
DSDV as it doesn‘t maintain any routing tables at nodes which<br />
results in less overhead and more bandwidth. It can be assumed<br />
that DSDV routing protocols works better for smaller networks<br />
but not for larger networks. In END to End Delay, DSDV which<br />
is a table driven proactive routing protocol completely wins over<br />
the on demand reactive routing protocols AODV and DSR .Since<br />
DSDV proactively keeps the routes to all destination in its table<br />
it does not have to initiate the route request process as frequently<br />
as in AODV and DSR while sending packets. Hence on average<br />
DSDV clearly has less delay. It can be observed that DSR is the<br />
worst protocol in terms of delay.<br />
So, my conclusion is that, a combination of DSR and DSDV<br />
would result in a protocol with better performance than either of<br />
the two.<br />
VI. FUTURE SCOPE<br />
In the future, extensive complex simulations could be carried<br />
out using the project code, in order to gain a more in-depth<br />
performance analysis of the ad hoc routing protocols. Other new<br />
protocol performance could be studied too.<br />
REFERENCES<br />
1. NS-2, The ns Manual (formally known as NSDocumentation)<br />
available at http: //www. isi.edu/nsnam/ns/doc.<br />
2. Christian Schwingenschlogl and Timo Kosch. “Geocast<br />
enhancements of aodv for vehicular networks.” Technical report,<br />
Institute of Communication Networks, Munich University of<br />
Technology. and BMW Research,Munich, Germany. 12 Nov 2009<br />
3. Guoyou He. “Destination-sequenced distance vector (DSDV)<br />
protocol.” Technical report, Helsinki University of Technology,<br />
Finland. 2 Dec 2003<br />
4. Krishna Ramachandran. “Aodv.” Technical report, University of<br />
California, Santa Barbara, USA. July 2004<br />
5. Magnus Frodigh, Per Johansson and Peter Larsson. Wirelessad hoc<br />
networking—The art of networking without a network.<br />
6. Ning.P. and Sun.K. “How to misuse aodv: a case study of insider<br />
attacks against mobile ad-hoc routing protocols.” Technical report,<br />
Comput. Sci. Dept., North Carolina State Univ., Raleigh, NC, USA,<br />
2003.<br />
7. Danny D. Patel. “Energy in ad-hoc networking for the pico radio.”<br />
Technical report. 15 Jun 2006<br />
8. Krishna Ramachandran. “Aodv-st.” Technical report, University of<br />
California, Santa Barbara, USA. July 2004<br />
9. Dr. Uwe Roth. “Highly dynamic destination-sequenced distancevector<br />
routing.” June 15, 2006<br />
10. Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dutkiewicz. “A<br />
review of routing protocols for mobile ad hoc networks. Technical<br />
report,” Telecommunication and Information Research Institute,<br />
University of Wollongong, Wollongong, NSW 2522; Motorola<br />
Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia,<br />
2003.<br />
11. Laura Marie Feeney. “A taxonomy for routing protocols in mobile ad<br />
hoc networks.” Technical report, Swedish Institute of Computer<br />
Science, Sweden, 1999.<br />
12. Xiaoyan Hong, Kaixin Xu, and Mario Gerla. ―Scalable routing<br />
protocols for mobile ad hoc networks”. 2002.<br />
13. David B. Johnson and David A. Maltz. ―Dynamic source routing in ad<br />
hoc wireless networks.” Technical report, Carnegie Mellon<br />
University, 1996.<br />
14. Jochen Schiller. “Mobile Communications.” Addison- Wesley, 2000.<br />
First Author – Vijendra Rai, M.Tech (Information Technology)<br />
from GGSIPU Delhi INDIA and email address is<br />
vijendrarai1@gmail.com.<br />
Second Author – Jaishree Jain, M.Tech (Software Engineering)<br />
from MNNIT Allahabad and email address is<br />
raijaishree@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 345<br />
ISSN 2250-3153<br />
“Automated Innovation Analysis & Human Resource<br />
Management System”<br />
Prashik Nagkirti, Sagar Kunjir, Ganesh Rajput, Swapnil Patil<br />
Department of Information Technology<br />
Marathwada Mitra Mandal‘s College of Engineering, Pune, Maharashtra, India.<br />
Abstract- ―Automated Innovation Analysis & Human<br />
Resource Management System‖, is a formal mechanism, which<br />
encourages employees of an organisation to contribute<br />
constructive, innovative innovations for improving productivity,<br />
efficiency and effectiveness in an organization. This system will<br />
elicit various innovations from employees, classify them, and<br />
dispatch them to experts for evaluation. After this, the posted<br />
innovation might be adopted, in which case the Originator of that<br />
innovation (i.e. an employee from the organization) may well be<br />
rewarded. With this system all employees are completely aware<br />
of recently posted, awarded, screened, evaluated, rejected<br />
innovations & view statistics with statistic module. Advance<br />
search module helps to search any innovation post & their status<br />
with just putting keyword to module. Authenticate the user with<br />
username (Employee ID/Employee Email ID) and the password<br />
(encrypted password). This system being deployed on the web,<br />
the system automatically reduces the mechanical work involved,<br />
such as manual transmission of innovations and paperwork,<br />
which can impede performance, thus leading to improved<br />
efficiency. Through this system we aim to capture the entire<br />
innovation life cycle and ease the processing of requests. In<br />
IT enterprises, management occupies a central position in the<br />
multiple functional managements of the corporate management.<br />
The key to rise and fall of IT enterprises is how to find out<br />
talents, take in talents, cultivate talents and conserve<br />
talents and how to stimulate enthusiasm, innovation and<br />
cooperative spirit of employees. This article analyzes<br />
characteristics of IT enterprises, and brings the ways to<br />
implement the effective management in IT enterprises. In this<br />
system we use RFID facility to keep track of employees. We<br />
provide the leave management facility using mobile application.<br />
Index Terms- Employee, Human Resource, Innovation, Mobile,<br />
RFID.<br />
T<br />
I. INTRODUCTION<br />
his project is build up for developing online system which<br />
encourages employees of organization to get online any time<br />
and share their ideas or innovations. This system also helps to<br />
improve communication among employees and associates.<br />
Use of RFID Technology:<br />
RFID stands for Radio Frequency Identification. A typical RFID<br />
system consists of a tag, a reader, and some sort of data<br />
processing equipment, such as a computer. The reader sends a<br />
request for identification information to the tag. The tag responds<br />
with the respective information, which the reader then forwards<br />
to the data processing device. The tag and reader communicate<br />
with one another over an RF channel. In some systems, the link<br />
between the reader and the computer is wireless.<br />
Radio frequency identification (RFID) is an emerging technology<br />
and process this can helps to keep track of employee details.<br />
This system is also aimed at developing an online leave<br />
management system that is of importance to the organization.<br />
This system can be used to automate the workflow of leave<br />
applications and their approvals. The periodic crediting of leave<br />
is also automated. There are features like, cancellation of leave,<br />
approval of leave, report generation, email notification etc in this<br />
system.<br />
II. LITERATURE REVIEW<br />
A. Automated Innovation Analysis<br />
Existing System is completely manual having mechanical<br />
works involving manual transmission of innovations and paper<br />
work which can impede performance. System does not let<br />
employees keep track on life cycle of innovations posted.<br />
Employees being unaware of the status of their post.<br />
Existing system does not have notification facility among<br />
employees. As it is manual system it is very tedious job to store,<br />
maintain, retrieve and evaluate huge information related to<br />
employees & their respective inputs. Employees cannot update<br />
their posts any time. Each time for new post one employee has to<br />
undergone whole long procedures and formalities. Existing<br />
System provide less security and also employee cannot<br />
personalize their accounts. Core team & Technical team has<br />
difficulties in co-coordinating & maintaining records of pending,<br />
evaluated, screened innovations in innovation cycle. The world is<br />
facing the next major transition: this will mean opportunity for<br />
some and extinction for other.<br />
B. Human Resource Management System<br />
The current Leave management process of the organization is<br />
very simple. The main processes involved are, registering the<br />
information of any new Employee, Department, and Leave<br />
Policy etc in a Register. Employees apply for leave manually by<br />
filling a leave application form. The superior employees<br />
approve/reject the leave applications of their subordinates by<br />
making such a note on the application. The employees enquire in<br />
the Human Resource Department about their leave balance. The<br />
superior also get information about the employees on leave from<br />
Human Resource Department. Administrator can manage Leave.<br />
Leave allocation to employee.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 346<br />
ISSN 2250-3153<br />
III. NEED FOR PROJECT<br />
System lets employees keep track on life cycle of innovations<br />
posted. Employees being unaware of the status of their post<br />
therefore we provide notification facility among employees.<br />
Through this system it is easy to maintain, retrieve and evaluate<br />
huge information related to employees & their respective inputs.<br />
Employees can update their posts anytime anywhere. This<br />
System provides more security and also employee can<br />
personalize their account. It is easy for Core team & Technical<br />
team members for co-coordinating & maintaining records of<br />
pending, evaluated, screened innovations in innovation cycle.<br />
This system is concerned with saving, editing, deleting the<br />
master information about the employee, department, designation,<br />
leave policy and leave allotment per designation.<br />
This management system allows the employees to apply for<br />
leave online. The employees can select the leave type they want<br />
to apply for. Accordingly they will get the information about the<br />
total number of that specific leave types allotted to them and how<br />
many leaves they have used, and how many are remaining.<br />
Accordingly the employee can decide for number of days leaves<br />
he requires and then proceed further. Also the employee can state<br />
the reason for applying for leave. The superior employee i.e. the<br />
head can view all the leave applications he has received from his<br />
subordinates. Also the head can see the leave details about the<br />
subordinate employees and accordingly accept/reject the<br />
applications. He can also state the reason for approval/rejection<br />
of application. In this system the employee can get the reply<br />
details of the specific leave application he has applied for. This<br />
will contain the information about who accepted rejected the<br />
application, for what reason and when. In this system, the<br />
employee can withdraw the leave application which has not been<br />
yet sanctioned by the head, without disturbing the head.<br />
IV. CONCEPT<br />
―Automated Innovation Analysis & Human Resource<br />
Management System‖ is build up for developing online system in<br />
which encourages employees of organization to get online any<br />
time and share their ideas or innovations. This system also helps<br />
to improve communication among employees from various areas<br />
with help notification module integrated in the system.<br />
―Automated Innovation Analysis & Human Resource<br />
Management System‖ is web application which provides<br />
multiuser environment. ―Automated Innovation Analysis &<br />
Human Resource Management System‖ is client-server<br />
architecture which is deployed in LAN (Local Area Network) of<br />
organization where multiple clients PCs connected to one server<br />
for accessing system.<br />
―Automated Innovation Analysis & Human Resource<br />
Management System‖ provides database which is relevant to<br />
store & maintain updated information. Database management<br />
helps to work many users at a time.<br />
With this system all employees are completely aware of<br />
recently posted, awarded, screened, evaluated, rejected<br />
innovations & view statistics with statistic module. Advance<br />
search module helps to search any innovation post & their status<br />
with just putting keyword to module. Authenticate the user with<br />
username (Employee ID) and the password (encrypted<br />
password).<br />
In Human Resource management system leave management<br />
facility helps employees to apply for leaves and keep track of all<br />
their leaves. Also employees can apply and manage their leaves<br />
at anytime anywhere using mobile application created for<br />
particular system.<br />
V. IMPLEMETATION<br />
User requirement is the first and fore most important for<br />
starting the development of the system software. A system is<br />
known as functionally correct if all the user requirements are<br />
fulfilled.<br />
For the ―Leave Management system‖ following are the user<br />
requirements:<br />
1) An employee should be able to:<br />
Login to the system through the first page of the application.<br />
Change the password after logging into the system. See his/her<br />
eligibility details (like how many days of leave he/she is eligible<br />
for etc). Query the leave balance. See his/her leave history since<br />
the time he/she joined the company.<br />
Apply for leave, specifying the form and to dates, reason for<br />
taking leave. See his/her current leave applications and the leave<br />
applications that are submitted to him/her for approval or<br />
cancellation. Approve/reject the leave applications that are<br />
submitted to him/her. Withdraw his/her leave application (which<br />
has not been approved yet). Cancel his/her leave (which has been<br />
already approved). This will need to be approved by his/her<br />
Superior. Get help about the leave system on how to use the<br />
different features of the system. The number of days of leave (as<br />
per the assumed leave policy) should be automatically credited to<br />
everybody and a notification regarding the same be sent to them<br />
automatically<br />
A summary report of the leave application details should be<br />
generated.<br />
System Requirement and Specification:-<br />
Description of Technology:<br />
Front End: ASP.NET, C#.NET,<br />
Back End: MS-SQL Server 2005<br />
VI. FEATURES<br />
Give rise to fully automated system for improving<br />
productivity, efficiency and effectiveness in an<br />
organization.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 347<br />
ISSN 2250-3153<br />
―Automated Innovation Analysis & Human Resource<br />
Management System‖ allows users to update their information or<br />
post any time.<br />
To provide automated notification employed with<br />
mailing so as to improve communication among<br />
employees & keep them updated.<br />
Proper life cycle of innovations is maintained like<br />
originator-technical team-core team-acceptance or<br />
rejection-awards that‘s why there is no confusion &<br />
conflicts among employees & teams.<br />
The proposed system is online so work can be done<br />
faster. Employee can apply for leave through internet<br />
even if he is at home.<br />
Since the system is online there is facility for login and<br />
password. Only authorized employees can use the<br />
system.<br />
System gives all the detailed leave information about<br />
subordinate employee.<br />
VII. CONCLUSION<br />
Project build on ―Automated Innovation Analysis & Human<br />
Resource Management System‖ is relevant and very useful to<br />
organization wherein it provides platform for employees to share<br />
their innovative ideas in different eras like technical,<br />
infrastructure, facilities, demands, business etc. Technically<br />
database management system becomes useful to manage huge<br />
data & maintaining records. Notifications also raise<br />
communication between employees which may clear doubts<br />
coordinating them in certain work. This helps organization to<br />
improve their productivity, efficiency and efficacy. This system<br />
is generally helpful for newly established companies which are<br />
on their way to grow and develop. This system also helps to keep<br />
information about employees in Human Resource management<br />
by using RFID and mobile application facility.<br />
REFERENCES<br />
[1] Ali Mostafavi, Student Member, IEEE, Dulcy M. Abraham, Daniel<br />
DeLaurentis, Member, IEEE, and Joseph Sinfield, ―A System of Systems<br />
Framework‖. <strong>JUNE</strong> 2011<br />
[2] RFID Essentials - by Bill Glover, Himanshu Bhatt.<br />
[3] http://www.rediff.com/money/2007/feb/14guest.htm.(literature survey).<br />
AUTHORS<br />
Prashik Nagkirti, Sagar Kunjir, Ganesh Rajput, Swapnil Patil are<br />
pursuing their Bachelor of Engineering Degree in Information<br />
Technology from Marathwada Mitra Mandal‘s College of<br />
Engineering, Pune, Maharashtra, India.<br />
They are implementing project based on this idea.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 348<br />
ISSN 2250-3153<br />
X-Ray Satellites in the Lα1 Region of 4d Transition<br />
Element<br />
Dr. Sameer Sinha *, Ajay Vikram Singh**, Kedar Nath Singh***<br />
*Reader, Ganpat Sahai Post Graduate College, Sultanpur, U.P. India<br />
**Associate Professor, Rajarshi Rananjay Sinh Institute of Management &Technology, Amethi , CSJ Nagar, U.P. , India<br />
***Lecturer, S.B.I.C., Badlapur , Jaunpur<br />
Abstract- We have used Plasmon theory [13,14] to explain<br />
Energy Satellites and relative intensity of high energy X-ray<br />
satellites Lα3 , Lα4 & Lα5 with respect to Lα1 parent line in 4d<br />
Transition Metal ( Zr , Nb , Mo , Ru , Rh , Pd , Ag and Cd) and<br />
estimated values are in agreement with the calculated values of<br />
Surendra Poornia and S.N.Soni[15].<br />
Index Terms- Surface Plasmon Satellites , Relative Intensity<br />
& Energy Sepration<br />
I<br />
I. INTRODUCTION<br />
n the characteristic X-ray Spectra, Diagram as well as non<br />
Diagram lines are present. Those lines which fit in the<br />
conventional energy level diagram are called Diagram lines. &<br />
those lines which do not fit in the conventional energy level<br />
diagram are called non diagram lines. It is also known as<br />
―Satellites or Second order lines‖. Satellites are generally of<br />
weak intensity lines & are found close to more intense parent<br />
line. The satellites which are observed on higher energy side are<br />
called high energy satellites (HES) whereas those are observed<br />
on lower energy side are called lower energy satellites (LES).<br />
First Siegbahn & Stenstroem observed these satellites in the K-<br />
Spectra of element from Cr to Ge while coster theraeus &<br />
Richtmyer in the L-Spectra of element from Cu to Sb & Hajlmar,<br />
Hindberg & Hirsch in the M-Spectra of elements from Yb to U.<br />
Several theories were proposed from time to time to explain the<br />
origin of these satellites. Out of these theories the plasmon theory<br />
is found to be the most suitable theory especially for those<br />
satellites.<br />
Plasmon theory was first proposed by Bohm & pines which<br />
are extended by Housten, Ferrel, Noziers & Pines. According to<br />
this theory the low energy plasmon satellites are emitted when<br />
valence electron excites a plasmon during the annihilation of<br />
core hole conversely if Plasmon pre exists, its energy add up to<br />
the energy of diagram line.<br />
The radiation less reorganization of electronic shell of an<br />
atom is known as Auger effect. Auger satellites have also been<br />
observed by Korbar and Mehlhorn [1] Haynes et at. [2] Edward<br />
and Rudd [3]. Theoretical explanation for K series Auger<br />
spectrum was given by Burhop and Asaad [4] using intermediate<br />
coupling. Later on more refined theory, using relativistic and<br />
configuration interaction has been used by Listengarter [5] and<br />
Asaad [6]<br />
In Auger primary spectra, one can also observe secondary<br />
electron peaks close to the primary peaks are produced by<br />
incident electrons which have undergone well energy losses. The<br />
most common source of such energy loss in the excitation of<br />
collective plasma oscillations of the electrons in the solid. This<br />
gives rise to a series of plasma peaks of decreasing magnitude<br />
spaced by energy ħp where p is the frequency of plasma<br />
oscillation.<br />
Auger peaks are also broadened by small energy losses<br />
suffered by the escaping electrons. This gives rise to a satellite on<br />
the low energy of the Auger peak. Energy loss peaks have well<br />
defined energy with to primary energy.<br />
The involvement of Plasmon oscillation in the X-ray emission<br />
or absorption spectra of solids has been widely studied during the<br />
last few decades and has been recognized that the electron –<br />
electron interaction has played an important role.<br />
This Paper is devoted to Plasmon theory [13,14] to explain<br />
the Energy Satellites and relative intensity of high energy X-ray<br />
satellites Lα3 , Lα4 & Lα5 with respect to Lα1 parent line in<br />
4d Transition Metal ( Zr , Nb , Mo , Ru , Rh , Pd , Ag and<br />
Cd) and estimated values are in agreement with the calculated<br />
values of Surendra Poornia and S.N.Soni[15].<br />
According to Plasmon theory, if the valence electron, before<br />
filling the core vacancy, also excites a Plasmon, then the energy<br />
ħωp needed for the excitation of Plasmon oscillation is taken<br />
from the transiting valence electron so that the emitted radiation<br />
will be derived off an energy ħωp and a low energy satellites will<br />
emitted whose sepration from the main X-ray line will<br />
correspond to ħωp . On the other hand if the Plasmon pre exists,<br />
during the X-ray emission process, then, on its decay it can give<br />
its energy to the transiting valence electron before it annihilates<br />
the core vacancy. Thus the energy of emitted X-ray photon will<br />
be higher than the main emission line and by an amount ħωp<br />
giving rise to high energy satellite.<br />
Surendra Poornia and S.N.Soni have observed low and high<br />
energy satellite peaks in 4d Transition Metal ( Zr , Nb , Mo , Ru<br />
, Rh , Pd , Ag and Cd ) A close approximation of their tables<br />
shows that some satellites are at a distance of ħωp (Plasmon<br />
energy ) from the main emission line . This observation forced<br />
us to think that these might be due to Plasmons emission and<br />
absorption.<br />
II. MATHEMATICAL CALCULATION<br />
In order to confirm the involvement of Plasmon in the<br />
emission of X-ray satellites the relative intensity of single<br />
Plasmon satellites must be calculated. In this process first we<br />
deal with mathematical details of canonical transformation<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 349<br />
ISSN 2250-3153<br />
carried out over the model Hamiltonian of the system . Thus the<br />
energy separation ∆E of the low and high energy Plasmon<br />
satellite from the corresponding main line should be equal to the<br />
quantum of Plasmon energy ħωp which is given by [13]<br />
ev 1<br />
Where Z = No.of unpaired electrons taking part in plasma<br />
oscillation<br />
= Specific gravity<br />
= Molecular Weight<br />
This equation can be derived as given below.<br />
From the classical consideration, we get the frequency of<br />
Plasmon oscillation as<br />
Hence the amount of energy given to Plasmon becomes<br />
Ep = ħωp = ħ<br />
In this equation we can write n =<br />
, Z and W are defined above and L is the Avogadro number .By<br />
putting the numerical value of constant, we get the Plasmon<br />
energy as<br />
2<br />
ev 3<br />
Our calculated values of ∆E have been compared with the<br />
Scrocco‘s experimental value. And We have also calculated the<br />
relative intensity of plasmon satellites, which is different in<br />
different processes. If the excitation of plasmon occurs during the<br />
transport of the electron through the solid, it is known as<br />
extrinsic process of plasmon excitation. The plasmon can also be<br />
excited by another method known as intrinsic process. In this<br />
process, excitation of plasmon takes place simultaneously with<br />
creation of a hole. Bradshaw et al have further divided core hole<br />
excitation into two classes<br />
1. Where the number of slow electrons are conserved.<br />
2. Where the number of slow electrons are not conserved<br />
The Author has calculated relative intensity in both the cases<br />
with new modification in the light of Bradshaw [12] and<br />
Lengreth [13] work, which explains that not only intrinsic<br />
process but extrinsic process and their relative contribution may<br />
also contribute in relative intensities. The combined effect of<br />
intrinsic and extrinsic plasmon excitation intensity variation was<br />
suggested by Lengreth as:<br />
I= Is / Im = α n 4<br />
The value of β is taken as β = 0.12rs which is purely intrinsic,<br />
rs = (47.11/ ħws) 2/3 is dimensionless parameter and α = 0.47 rs 1/2<br />
in the place of α = (1+l/L) -1 used by Pardee et. al.(14) . The<br />
equation (3) contains a series of terms. The first term of the<br />
equation is purely extrinsic, while second term is purely intrinsic.<br />
The other terms are containing the relative contributions of both<br />
extrinsic and intrinsic. The specialty of this formula is that each<br />
term alone or simultaneously with other terms is able to give the<br />
relative intensity. This formula also includes both the categories<br />
mentioned by Bradshaw and gives better results as compared<br />
than traditional methods for calculation of the relative intensity.<br />
Using the values of α, β and rs in equation (4)<br />
Using the equation (4), the author has for the first time,<br />
calculated the relative intensity of high energy X-ray satellites<br />
Lα3 , Lα4 & Lα5 with respect to Lα1 parent line in 4d<br />
Transition Metal ( Zr , Nb , Mo , Ru , Rh , Pd , Ag and Cd)<br />
metals. Our calculated and estimated values are in agreement<br />
with the calculated values of Surendra Poonia and S.N.Soni(11).<br />
REFERENCES<br />
[1] Haynes S.K. & Velinsky, M & Velinsky L.J. ; Nucl. Phys. A99 (1967), 537.<br />
[2] Rudd M.E. & Edward & Volz, D.J. ; Phys Rev. 151, (1966), 28.<br />
[3] Asaad, W.N. & Burhop E.H.S. ; Proc. Phys. Soc., London 71, (1958), 369.<br />
[4] Listengarten, M.A. ; Bull Acad. Sci. U.S.S.R., Phys. Ser. 26 (1962), 182.<br />
[5] Asaad, W.N. ; Nucl. Phy. 66, (1965b), 494.<br />
[6] M.Scrocco in photoemission spectra of Pb.(II) halide; Phys. Rev. B25<br />
(1982) 1535-1540 .<br />
[7] M.Scrocco , Satellites in X-ray Photo electron spectroscopy of insulator I 32<br />
(1985) 1301-1306<br />
[8] M.Scrocco , Satellite in X-ray Photo electron spectroscopy of insulators II<br />
32 (1985) 1307-1310<br />
[9] L.Marton , L.B.Lader and H. Mendlowitz; Adv. Electronic and Electro<br />
Physics; edited by L.M arton Academic , New York 7 (1955) , 225 .<br />
[10] Surendra poonia and S.N.Soni , Indian journal of pure and applied physics ,<br />
vol.45, feb.2007 pp-119-126<br />
[11] A. M. Bradshaw, Cederbaurn S.L, Domeke W. & Krause Jour. Phys C:<br />
Solid StatePhys. 7, 4503, 1974<br />
[12] D. C. Lengreth, Phys. Rev. Letter, 26, 1229, 1971<br />
[13] K. S. Srivastava , S. P. Singh and R.L. Srivastava ; Phys. Rev. B13 ( 1976 )<br />
, 3213<br />
[14] W. J. Pardee, G.D. Mahan, D. E. Eastman R.A. Pollak, L. Ley, F.R.<br />
McFeely, S.P.Kowalczky and D.A. Shirely, Phys. Rev. B, 11, 3614, 1975.<br />
[15] Surendra poonia and S.N.Soni , Indian J. Phys. 83 (3), 325-337 (2009)<br />
AUTHORS<br />
First Author – Dr. Sameer Sinha, Reader , Ganpat Sahai Post<br />
Graduate College , Sultanpur ,U.P. India<br />
Second Author – Ajay Vikram Singh, Associate Professor,<br />
Rajarshi Rananjay Sinh Institute of Management &Technology,<br />
Amethi , CSJ Nagar, U.P. , India<br />
Third Author – Kedar Nath Singh, Lecturer , S.B.I.C. ,<br />
Badlapur , Jaunpur<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 350<br />
ISSN 2250-3153<br />
Correspondence Author – Ajay Vikram Singh, Associate<br />
Professor, Rajarshi Rananjay Sinh Institute of Management<br />
&Technology, Amethi , CSJ Nagar, U.P. , India, Email:<br />
ajay_gspgcs@rediffmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 351<br />
ISSN 2250-3153<br />
Energy sepration ΔE at Lα1 satellite of 4-d Transistion element<br />
S.No. SYMBOL Z W Sp.Gravity<br />
Exper. Value<br />
[Ref. 15]<br />
Author Value<br />
Satell.<br />
Name<br />
1<br />
6.54 5.44 Lα3<br />
Zr(40) 1 91.224 6.51<br />
2 10.64 10.88 Lα5<br />
3<br />
6.51 6.19 Lα3<br />
Nb(41) 1 92.906 8.58<br />
4 10.61 12.38 Lα5<br />
5<br />
6.54 6.67 Lα4<br />
Mo(42) 1 95.94 10.28<br />
6 8.84<br />
9.43<br />
Lα5<br />
7<br />
6.85 7.15 Lα3<br />
8 Ru(44) 1 101.07 12.45<br />
9.55 10.11 Lα4<br />
9 11.95 14.30 Lα5<br />
10<br />
7.36 7.07 Lα3<br />
11 Rh(45) 1 102.91 12.41<br />
9.96 10.00 Lα4<br />
12 12.66 14.14 Lα5<br />
13<br />
7.59 6.84 Lα3<br />
14 Pd(46) 1 106.42 12.02<br />
10.39 9.68 Lα4<br />
15 13.49 13.68 Lα5<br />
16<br />
17<br />
Ag(47)<br />
2 107.87 10.5 8.09 8.99 Lα3<br />
10.69 12.71 Lα4<br />
18 13.99 17.98 Lα5<br />
19<br />
8.77 7.98 Lα3<br />
20 Cd(48) 2 112.41 8.64<br />
11.47 11.29 Lα4<br />
21 14.77 15.96 Lα5<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 352<br />
ISSN 2250-3153<br />
S.No. SYMBOL<br />
Relative Intensity of Lα1 satellite of 4-d Transition element<br />
Surface<br />
Energy<br />
Bulk<br />
Energy<br />
Rs Alpha beta<br />
Author<br />
intensity<br />
Exp.<br />
Intensity<br />
[Ref.15]<br />
Satell.<br />
Name<br />
1<br />
0.76180 0.7840591 Lα3<br />
Zr(40) 5.44 7.69 4.22 0.97 0.5060<br />
2 0.50600 0.4177052 Lα5<br />
3<br />
0.70000 0.7780185 Lα3<br />
Nb(41) 6.19 8.75 3.87 0.92 0.4644<br />
4 0.46440 0.4153178 Lα5<br />
5<br />
0.66780 0.7214661 Lα4<br />
Mo(42) 6.67 9.43 3.68 0.90 0.4419<br />
7 0.44190 0.4019253 Lα5<br />
9<br />
0.84370 0.7837573 Lα3<br />
10 Ru(44) 7.15 10.11 3.52 0.88 0.4218 0.63890 0.6746709 Lα4<br />
11 0.42180 0.3891727 Lα5<br />
13<br />
0.84970 0.8655837 Lα3<br />
14 Rh(45) 7.07 10.00 3.54 0.88 0.4248 0.64320 0.7143737 Lα4<br />
15 0.42480 0.3976648 Lα5<br />
17<br />
0.86844 0.8624479 Lα3<br />
18 Pd(46) 6.84 9.68 3.62 0.89 0.4342 0.65670 0.6916922 Lα4<br />
19 0.43420 0.4220774 Lα5<br />
21<br />
0.88480 0.8580864 Lα3<br />
22 Ag(47) 8.99 12.71 3.02 0.82 0.3622 0.72432 0.6724729 Lα4<br />
23 0.44240 0.4252396 Lα5<br />
25<br />
0.78365 0.8258238 Lα3<br />
26 Cd(48) 7.98 11.29 3.27 0.85 0.3918 0.59610 0.6572864 Lα4<br />
27 0.39180 0.4305464 Lα5<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 353<br />
ISSN 2250-3153<br />
Characterization of Sulphamic Acid Single Crystal by<br />
Optical Techniques<br />
Dr. Rita A. Gharde, Divakar T. Chunarkar<br />
* Department of Physics, Mumbai University, Kalina (Santacruz), Mumbai – 400 008 India<br />
Abstract- The formation of crystal in nature, like snowflakes<br />
and minerals, as well as the preparation of the crystal in<br />
laboratories and factories made for technical application is called<br />
crystal growth. The most frequently used and most important<br />
method of producing single crystals of a given material is by<br />
solidification of its own melt called ‗crystal growth from the<br />
melt‘ or just ‗melt growth‘. Its technical and economic<br />
importance is due to the fact that large single crystals can be<br />
grown very effectively and with a high yield at a relatively high<br />
growth rate. This growth rate is not limited by the transport of<br />
crystal species but only by the removal of the heat of<br />
crystallization. In the last decade single crystalline subject of<br />
increasing interest, because of their remarkable characteristics.<br />
Due to the large length-to-diameter ratio composed with perfect<br />
single crystal structure and chemical homogeneity, the<br />
mechanical properties approach theoretical value.<br />
In this work we are interested in growing single crystal for<br />
nonlinear optical applications. Beside this, we are trying to<br />
develop new materials that have specific thermo-mechanical<br />
properties to be used as a suspension for the mirror in advance<br />
gravitational waves detector in order to decrease low thermal<br />
noise.<br />
A monocrystal known as single crystal of sulphamic acid<br />
(H2NSO3H) is an inorganic nonlinear optical material was<br />
grown by slow evaporation solution growth technique. We have<br />
performed studies characterization of Sulphamic acid single<br />
crystal by X-ray diffraction and FTIR studies. The crystals are<br />
extremely good of the orthorhombic structure. We also study the<br />
other properties like viscosity, dielectric constant, melting point,<br />
PH scale and surface tension etc.<br />
Index Terms- Growth from solution, coefficient of viscosity,<br />
dielectric constant, melting point, PH scale and surface tension,<br />
inorganic compound.<br />
I. INTRODUCTION<br />
.<br />
ulphamic acid (H2NSO3H) is an important Industrial<br />
S<br />
chemical compound, which is strongly soluble in water. The<br />
molecular weight of this compound is 97.09. The growth of the<br />
single crystal in both science and technology important<br />
application of such crystal. The growth and size of any crystal<br />
depends on the condition of its formation. Temperature,<br />
pressure, presence of impurities etc will affect the size perfection<br />
of crystal.. In the recent years, several studies dealing with<br />
organic, inorganic and semi organic molecules and materials for<br />
non linear optics (NLO) reported, due to the increasing need for<br />
cheap and easily process able material. Crystals take variety of<br />
shapes, depending on the internal factors. Both internal and<br />
external factors influence the growth rates, and therefore, they<br />
modified the crystal morphology. Crystal grown from<br />
conventional solution growth method was used as a seed. The<br />
plane which has fast growth rate has chosen for this study. The<br />
growth of the face depends on the external factors such as<br />
temperature and pressure. The concentration of solution<br />
increases. In crystal growth literature, the recently discovered<br />
uniaxially solutions – crystallization method of Shankar Narayan<br />
– Ramasamy (SR) is a suitable method. To effectively control the<br />
orientation of molecule during the bulk crystal growth from<br />
solution at room temperature with 100% solute – crystal<br />
conversion efficiency. Non-linear optical (NLO) single crystal<br />
are used in the area of fiber optics, communication, optical<br />
frequency conversion, optical data storage etc. In the present<br />
investigation sulphamic acid single crystal or monocrystal grown<br />
by three distinct methods are as follows:<br />
1. Growth from solution<br />
2. Growth from melt<br />
3. Growth from vapor<br />
II. EXPERIMENTAL DETAILS<br />
We are using the growth from solution method to grow the<br />
crystal .We prepared 26 % solution of sulphamic acid at about<br />
30 0 to 45 0 temperature. Growth of sulphamic acid crystal was<br />
carried out by S. R. method by slow evaporation. In this method<br />
of growth assembly used ‗L‘ bend ampoule made by borosilicate<br />
glass with seed mounting pad which is parallel to that used by S.<br />
R. method. The selection of the solvent is an important step in<br />
the bulk growth of crystal from solution by slow evaporation<br />
method. The size of the crystal depends on the amount of<br />
material available in the solution, which in turn is decided by the<br />
solubility of the material in that solvent. Seed crystal were<br />
harvested within 2 to 4 days.<br />
As shown in fig. 1 consist of glass ampoule with seed<br />
mounting pad. A resistive ring heater (80W) of diameter 10 mm<br />
provides the necessary temperature around the growth ampoule<br />
for solvent evaporation. A ring heater positioned at the top of the<br />
growth ampoule was connected to the solvent of evaporation. In<br />
this experiment, the temperature around the growth region is<br />
mentioned at 65 0 C with ± 0.05 0 C accuracy depending on the<br />
evaporation rate of the growth crystal. The most important<br />
requirement for the growth of crystal from the vapor is<br />
sufficiently high saturated pressure P of the source to obtained an<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 354<br />
ISSN 2250-3153<br />
acceptable growth rate. The rate of the crystal growth from the<br />
vapor method is 1 mm per day = 1.16 X 10ˉ 6<br />
D = Glass Ampoule<br />
T = Sulphamic Acid Saturated<br />
Solution<br />
C = Water Bath<br />
E = Thermometer<br />
F = Seed Crystal of S.A.<br />
G = Fixed Stand<br />
L = L bend tube<br />
Fig.1: Schematic Diagram of the experimental setup S. A. Crystal<br />
Viscosity:-We used Ostwald Viscometer. The viscosities of<br />
two liquid, or the same liquid a different temperature, may be<br />
compared with the help of simple apparatus known as Ostwald<br />
Viscometer. As shown in fig.2 viscometer consists of U shape<br />
tube with two bulb A & B. A capillary position CDE a side tube<br />
T, fitted with a Tap S, & with three marks engraved on it, at M,<br />
N, & Q respectively. Prepare the saturated solution at a normal<br />
temperature of 1% sample in 100 ml distilled water.<br />
This solution has been taken in four different concentration i<br />
e 0.4%, 0.6%, 0.8% & 1.0%. From this solution fill 10 ml in<br />
Ostwald Viscometer apparatus and measure time in different<br />
position of the liquid. If the flow of liquid increase to increase<br />
the specific coefficient of viscosity. The temperature of liquid<br />
increases to decrease the viscosity of the given liquid.<br />
Fig. 2: Ostwal Viscometer Apparatus Fig. 3: Coefficient of Viscosity Graph<br />
Dielectric constant:- To study the dielectric constant we<br />
made a very simple technique in the laboratory. The single<br />
crystal of Sulphamic Acid crushed into powder form. In this<br />
method the capacitance of a capacitor increases when it is filled<br />
with an insulating medium. The increasing capacitance depends<br />
on the property of the medium, called dielectric constant.<br />
Dielectric constant method which we set up in the lab as shown<br />
in fig 4 .Both stripping copper plate varnished. Fine powder of<br />
this sample kept between two plate & packed with the rubber<br />
band.. At that time do not pass the air into the plate through the<br />
rubber band. After that to measure the capacitance of this sample<br />
with the help of millimeter & calculate the dielectric constant..<br />
The maximum dielectric constant response revealed may be of<br />
great interest in application. The sulphamic acid (H2NSO3H)<br />
Material with high dielectric constant values are quite good.<br />
Which can be used in the thin film transistor tunneling devices,<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 355<br />
ISSN 2250-3153<br />
insulator, fabricating capacitors and other electric field devices.<br />
Sulphamic acid crystal is an insulating material it gets higher<br />
Melting Point:- We study the capillary melting method by<br />
using the one side open capillary tube and to measure the melting<br />
point of the sample by using least capillary melting method.<br />
Crushed the SA crystal sample and fill the capillary tube and<br />
used the melting point instrument by measuring the melting point<br />
with the help of thermometer. The melting point of the crystal<br />
growth of sulphamic acid is 206˚C. The high melting point of the<br />
material contains strong bond and get the more energy of heat.<br />
Such type of material are used in the fire retardants for paper &<br />
other cellulosic‘s, stabilizing agent, for chlorine and<br />
hypochloride in swimming pool closed hydrogen system,<br />
bleaching paper pulp and textile catalyst for urea formaldehyde –<br />
resins.<br />
PH Meter:- PH Scale should be clear that every acquire<br />
solution whether acidic, alkaline & neutral contain both<br />
hydrogen (H + ) and hydroxyl (OH - ) ions. There product always<br />
constant and equal to 1 x 10 -14 at normal temperature at about<br />
25˚C. The solution are acidic or alkaline depends upon the two<br />
ions is present in greater concentration then the other. The<br />
sulphamic acid growth crystal is an acidic medium and its PH<br />
value of preparing 1% of solution is 1.14 by using model CL-46,<br />
Sr. No.4944, Power 230 v ac PH meter about 25˚C normal<br />
temperature This sulphamic acid are used in the operation of to<br />
remove the excess nitrus Acid from the preparing diazo in the<br />
dyes plant. The sulphamic acid is less PH i.e. more acidic than<br />
the formic and phosphoric acid and acitic acid. Such type of<br />
material are used in metal and ceramic cleaning and nitrite<br />
removal in azodize operation.<br />
Surface Tension :- To determine the surface tension ,we<br />
use capillary rise method. This method is based on the rise of<br />
liquid in a capillary tube. Consider a capillary tube lowered in a<br />
liquid that wets its surface. The contact angle between the glass<br />
& liquid is now‖ 0‖ the rising position of the liquid high depends<br />
upon the surface tension and density. The column of the liquid in<br />
the capillary is evidently being by the supported by the force<br />
acting along the surface of water, is known as force of surface<br />
tension. Measure the height through which the liquid rise and<br />
radius of capillary tube in centimeter. The height is measure by<br />
0.25<br />
0.2<br />
0.15<br />
0.1<br />
0.05<br />
energy and higher dielectric constant.<br />
y<br />
0<br />
0 0.5 1 1.5<br />
cathetometer and radius of the capillary tube measure by the<br />
traveling microscope. The rise or fall of a liquid in a capillary<br />
can be better understood by involving the concept of cohesion<br />
and adhesion position. In this method the liquid solution is<br />
depressed in the capillary tube. We found surface tension of the<br />
growth crystal of sulphamic acid is 116.41d cm-1.<br />
III. RESULT & DISCUSSION<br />
From study of study FTIR and X-ray diffraction it is<br />
confirmed that vibration frequency of sulphamic acid. We found<br />
the dielectric constant value much higher, those reported by<br />
earlier workers. It is observed sulphamic acid is more acidic. The<br />
coefficient of viscosity is found to be 0.022dyne.sec.cm -2 . which<br />
is very less .and the Surface tension of sulphamic acid is more.<br />
We have observed that crystals are extremely good of<br />
orthorhombic structure. We introduced a new method to study<br />
dielectric constant. Further study on the crystal growth shows<br />
that it is more acidic, and coefficient of viscosity is found to be<br />
0.022 d sec /cm which is very less.<br />
IV. ACKNOWLEDGEMENT<br />
I am thankful to Dr. A. D. Yadav Head of the Department of<br />
Physics, University of Mumbai. I am indebted to Dr. Rewatkar<br />
(Lecturer in Physics Dr. Ambedkar M. dikshabhumi Nagpur). I<br />
am also grateful to thanks all the staff members of R & D,<br />
mechanical, production, QC Dept. of Formokem India<br />
Corporation Kashigaon (Bhayandar). I am extremely grateful to<br />
Dr. S. B. Singh (Principal) of S. N. College Bhayandar (East).<br />
REFERENCES<br />
[1] K. Nassu, J Nassu, Bell Laboratories, Murray Hill, N. J. 079074 U.S.A.<br />
(Berlin Heidelberg New York)<br />
[2] E. Schonherr, Bernardsville N. J. 07924, U.S.A.<br />
(Berlin Heidelberg New York)<br />
[3] D. E. Ovsienko, G. A. Alfintsev, Bernardsville N. J. 07924, U.S.A.<br />
Series 1<br />
x<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 356<br />
ISSN 2250-3153<br />
(Berlin Heidelberg New York)<br />
[4] A. H. Monish, Bernardsville N. J. 07924, U.S.A.<br />
(Berlin Heidelberg New York)<br />
[5] Dr. Puri, Physical Chemistry, 2005<br />
(Punjab University Chandigarh)<br />
[6] Dr. Sharma, Physical Chemistry, 2005<br />
(Punjab University Chandigarh)<br />
[7] Dr. Pathania, Physical Chemistry, 2005<br />
(Punjab University Chandigarh)<br />
[8] Dr. D. S. Mathur, 2006<br />
(S. & Chand Co.)<br />
[9] R. Ueda,<br />
Waseda universita, Tokyo, Japan (1992- 93)<br />
[10] J. B. Mullin<br />
(Royal Radar Establishment, great Malvern, England May, 1996)<br />
[11] Arthur Beiser<br />
(Tata MC Graw – Hill Publishing Co. Ltd. New Dehli Fifth Edition, 1953)<br />
[12] E. H. Lewit<br />
(Imperical Science & Technology College, South Kensington, 4th & 5th<br />
Edition, 1973)<br />
[13] K. Shankar Narayan, P. Ramasamy, J. Crystal Growth (2005)<br />
(Imperical Science & Technology College, South Kensington, 4th & 5th<br />
Edition, 1973)<br />
AUTHORS<br />
First Author – Dr. Rita A. Gharde, Divakar, Department of<br />
Physics, Mumbai University, Kalina (Santacruz), Mumbai – 400<br />
008 India, Email: gharde .rita@gmail.com<br />
Second Author – Divakar T. Chunarkar, Department of Physics,<br />
Mumbai University, Kalina (Santacruz), Mumbai – 400 008<br />
India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 357<br />
ISSN 2250-3153<br />
Design of a 32 DOF Andro Humanoid Robot using<br />
Cascaded Computational Intelligence<br />
Abstract- This paper focuses on the design of a 32 DOF andro<br />
humanoid robot using cascaded computational intelligence. The<br />
robot consists of hip, neck, Lip, shoulder, elbow, and wrist and<br />
finger joints. The robot secures itself from hacking and power<br />
problems. The intelligence of the robot is a combination of<br />
human intelligence, computational intelligence and sensor fusion<br />
unit data.<br />
Index Terms- Robot, Kinematics, Inverse kinematics, Andro<br />
Humanoid, DOF, Cascaded computational intelligence, sensor<br />
fusion unit.<br />
R<br />
I. INTRODUCTION<br />
obot is a machine to execute different task repeatedly with<br />
high precision. Thereby many functions like collecting<br />
information and studies about the hazardous sites which is too<br />
risky to send human inside. Robots are used to reduce the human<br />
interference nearly 50 percent. Robots are used in different types<br />
like fire fighting robot, metal detecting robot, etc. Humanoids are<br />
robots which resembles human joints. Humanoids are nowadays<br />
used in industrial purpose, military, research etc.<br />
This paper focuses on designing a 32 DOF andro humanoid<br />
robot. The robot uses cascaded computational intelligence and<br />
hence it has a self securing feature. The robot is controlled by a<br />
human master and a local master controller which is connected to<br />
a sensor fusion network.<br />
II. HARDWARE CONCEPT<br />
A. Mechanical Part<br />
The humanoid consists of a hip, neck, Lip, shoulder, elbow,<br />
and wrist and finger joints. The humanoid has 32 degrees of<br />
freedom.<br />
The humanoid has a platform on which it is mounted. The<br />
platform helps the humanoid to move around in a plane surface.<br />
The platform consists of four wheels each of which is connected<br />
to dc geared motors. The hip joint of the humanoid has one<br />
degree of freedom and allows the upper body of the humanoid to<br />
rotate in horizontal direction. The neck joint helps to rotate the<br />
head in horizontal direction. A web camera is mounted in the<br />
eyes of the humanoid.<br />
S Shyam.R.Nair, Prof. Manjula Pramod<br />
Dept. of EIE, Hindustan University, Chennai<br />
The humanoid has shoulder, elbow, wrist and finger joints on<br />
both hands. The shoulder has 2 DOF, elbow has 3DOF, wrist has<br />
4 DOF and the finger unit has 5 DOF. The hip and neck has one<br />
DOF and the lip has 2 DOF. All these togather makes 32 DOF<br />
andro humanoid.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 358<br />
ISSN 2250-3153<br />
Figure 2. Schematic of motor arrangement<br />
B. Torque Calculations<br />
There are 14 motors with 10 rpm each including the four in the<br />
platform which are connected to the wheels.<br />
Neck motor:<br />
The motor is placed at neck which will make the head rotate in<br />
the horizontal plane.<br />
Weight of the head including the web camera is 0.5 Kg.<br />
The distance from the shaft of the motor is 25 cm.<br />
Hence torque required to make proper movement is 0.5*6 = 3<br />
Kgcm<br />
Required power = 2*π*N*T/60<br />
= 3.12 Watts<br />
Where N is rpm of the motor and T is torque<br />
Hip motor:<br />
The motor is placed at hip which will make the upper body rotate<br />
in the horizontal plane.<br />
Weight of the upper body is 5.5 Kg.<br />
The distance from the shaft of the motor is 30 cm.<br />
Hence torque required to make proper movement is 5.5*30 = 165<br />
Kgcm<br />
the required torque is 50% of the calculated torque due to the<br />
symmetry of the upper body.<br />
Hence actual torque = 82.5 Kgcm.<br />
Required power = 2*π*N*T/60<br />
= 85.8 Watts.<br />
Shoulder motor:<br />
The motor is placed at the shoulder which will make the hand<br />
rotate in the vertical plane.<br />
Weight of the hand is 1.5 Kg.<br />
The distance from the shaft of the motor is 70 cm.<br />
Hence torque required to make proper movement is<br />
1.5*70 = 105 Kgcm<br />
the required torque is 50% of the calculated torque as one of the<br />
end is hinged which supports the rotation.<br />
Hence actual torque = 52.5 Kgcm.<br />
Required power = 2*π*N*T/60<br />
= 54.95 Watts.<br />
Elbow motor:<br />
The motor is placed at elbow which will make the arm rotate in<br />
the horizontal plane.<br />
Weight of the arm is 0.6 Kg.<br />
The distance from the shaft of the motor is 20 cm.<br />
Hence torque required to make proper movement is<br />
0.6*20 = 12 Kgcm<br />
the required torque is 50% of the calculated torque as one of the<br />
end is hinged which supports the rotation.<br />
Hence actual torque = 6 Kgcm.<br />
Required power = 2*π*N*T/60<br />
= 6.24 Watts.<br />
Wrist motor:<br />
The motor is placed at the wrist which will make the palm yoke.<br />
Weight of the palm is 0.3Kg.<br />
The distance from the shaft of the motor is 20 cm.<br />
Hence torque required to make proper movement is<br />
0.3*20 = 6 Kgcm<br />
Required power = 2*π*N*T/60<br />
= 6.24 Watts.<br />
Finger motor:<br />
The motor is placed at the finger which will make the finger<br />
grasp.<br />
Weight of the finger unit is 0.05Kg.<br />
The distance from the shaft of the motor is 10 cm.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 359<br />
ISSN 2250-3153<br />
Hence torque required to make proper movement is<br />
0.05*10 = 0.5 Kgcm<br />
Required power = 2*π*N*T/60<br />
= 0.52 Watts.<br />
Wheels motor:<br />
The motors are coupled to the wheels of the platform for free<br />
movement in a plane surface.<br />
The weight of the body is equally distributed to four wheels.<br />
Thus each wheel will bear a load of 10Kg.<br />
Distance of the wheel from axis of the motor= 2cm.<br />
Hence torque required for 1 wheel is 10*2 = 20Kgcm.<br />
Required power = 2*π*N*T/60<br />
= 20.8 Watts.<br />
C. Inverse Kinematics<br />
Figure 3. Arm Schematic<br />
O is the point to be reached.<br />
‗c‘ and ‗a‘ are lengths of first and second link respectively.<br />
From figure3 and figure 4;<br />
θ1 = θ<br />
θ2 = A<br />
θ3 = B<br />
By Pythagoras theorem,<br />
b² = x²+y²+ z² (1)<br />
θ = tan‾¹(y/x) (2)<br />
Ø = tan‾¹(z/ x²+y²) (3)<br />
We know that area of a triangle is given by;<br />
Area = (s*(s-a)*(s-b)*(s-c))½ (4)<br />
Where, s = (a+b+c)/2 (5)<br />
Here, c and a are arm length of link one and two respectively.<br />
We also know that the area of a triangle is given by;<br />
Area = ½*base*altitude (6)<br />
From figure (4);<br />
Area = ½*b*h (7)<br />
But h = c*sinA (8)<br />
Now, by substituting (8) in (7), we get;<br />
Area = ½*b*c*sinA (9)<br />
As we know values of a, b and c, the area is calculated as per<br />
equations (4) and (5)<br />
Hence, from equation (9);<br />
sinA = 2*Area/ (b*c)<br />
Or<br />
A = sin‾¹ (2*Area/(b*c)) (10)<br />
Similarly,<br />
B = sin‾¹ (2*Area/ (a*c)) (11)<br />
Figure 4. Schematic of working environment<br />
D. Kinematics<br />
From figure (4),<br />
X coordinates are decided by the arm lengths c, a, angles A, C, θ,<br />
Ø.<br />
As the effective length decreases with increase in angles, A and<br />
C, it has a cosine relationship with the x coordinate.<br />
The effective length decreases with increase in the values of θ<br />
and Ø.<br />
Hence, the x coordinate can be written as;<br />
X = (cCosA+aCosC) Cos θ Cos Ø<br />
Similarly,<br />
Y coordinates are decided by the arm lengths c, a, angles A, C, θ,<br />
Ø.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 360<br />
ISSN 2250-3153<br />
As the effective length increases with increase in angles, A and<br />
C, it has a sine relationship with the y coordinate.<br />
The effective length decreases with increase in the values of θ<br />
and Ø.<br />
Hence, the y coordinate can be written as;<br />
Y = (cCosA+aCosC) Sin θ Cos Ø<br />
Similarly,<br />
Z coordinates are decided by the arm lengths c, a, angles A, C, θ,<br />
Ø.<br />
As the effective length increases with increase in angles, A and<br />
C, it has a sine relationship with the z coordinate.<br />
The effective length increases with increase in the value of Ø.<br />
There is no relation for z with respect to θ.<br />
Hence, the z coordinate can be written as;<br />
Z = (cSinA+aSinB) Sin Ø<br />
Hence the kinematic equations for the robotic arm are;<br />
X = (cCosA+aCosC) Cos θ Cos Ø<br />
Y = (cCosA+aCosC) Sin θ Cos Ø<br />
Z = (cSinA+aSinC) Sin Ø<br />
Matrix Transformation;<br />
* =<br />
E. Motor Rotation<br />
From equations (2), (9) and (10), the values of θ, A and B are<br />
obtained.<br />
Θ is the angle of rotation for the base motor. A is the angle of<br />
rotation for the motor connecting the first link and B is the angle<br />
of rotation for the motor connecting the second link.<br />
Here, we consider that all motors are of 10rpm. And hence, all<br />
the motors cover 60° in one second.<br />
To improve accuracy, the motor is turned on only for 1ms in one<br />
on loop in the program.<br />
Hence the motor covers an angle of 0.06° in one on loop.<br />
Once the angles are calculated by using the inverse kinematics,<br />
the PIC microcontroller decides the number of on loops to be<br />
executed for each motor.<br />
For example, if the angle to be covered by the base motor is 24°,<br />
then the PIC microcontroller will execute the on loop 400 times.<br />
F. Transformation from initial to final point<br />
Once the robot gets the coordinate values, it computes the<br />
angles using the inverse kinematics and proper rotations are<br />
made by the motors. These angle values are stored in eeprom of<br />
the controller.<br />
When the next coordinates are obtained, again the robot<br />
calculates the angles, but this time it looks back to the values<br />
stored in eeprom and compares it with the newly computed angle<br />
values. Then the robot rotates the motors in such a way that the<br />
new angles are achieved. And the newly computed angles are<br />
overwritten on the previously stored values.<br />
For example;<br />
If the robot has rotated the motors in the following sequence;<br />
A with 15°<br />
B with 20°<br />
Θ with 10°<br />
Ø with 25°<br />
And if the newly calculated angles are<br />
A with 17°<br />
B with 19°<br />
Θ with 10°<br />
Ø with 27°<br />
Then the robot will make the following rotations;<br />
A with 2° positive rotation<br />
B with 1° negative rotation<br />
Θ with 0°<br />
Ø with 2° positive rotation<br />
Thus transformation is done from initial point to the final point.<br />
III. MODES OF OPERATION<br />
Manual<br />
In manual mode, the robot is controlled by the human master.<br />
The task that is to be executed is instructed by the human master<br />
as voice, finger gesture, eye ball movement, brain cap etc.<br />
The instruction is fed to the client PC as characters using<br />
appropriate human machine interface. These characters are fed<br />
serially to the server laptop using high speed internet. The server<br />
laptop receives these instructions through high speed internet and<br />
feeds it to the master PIC microcontroller.<br />
The visuals are obtained through the camera in the robot by<br />
using the Gmail video chat or Skype software. This also<br />
introduces a dual channel communication, ie, the instructions are<br />
given through one channel and the visuals are obtained through<br />
other channel. So if one of the channels is hacked we get access<br />
to the robot using the other channel.<br />
Suppose we lose the video signals, we can command the robot<br />
to come back to the source point. Otherwise if we lose the<br />
instruction channel, the video chat helps us to locate the robot.<br />
In this mode, the sensor fusion unit is not activated. This mode<br />
is usually used for training purpose.<br />
Automated<br />
In this mode, the robot does not get the instructions from the<br />
human master. Instead, it will use the data in eeprom to execute<br />
task or it will use neural scheme for executing task.<br />
In this mode, the sensor fusion unit is activated and it is used<br />
to analyze the environmental conditions.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 361<br />
ISSN 2250-3153<br />
Cascaded<br />
In certain places, we cannot expect the robot to execute task by<br />
itself and neither can we expect human commands enough to<br />
execute the task like surveying of an unknown area or in warfare.<br />
In such area, we use both human intelligence and sensors for<br />
executing a task. In such situations the cascaded mode will be of<br />
great use.<br />
In this mode the instructions from master is received in the<br />
client node as explained in manual mode.<br />
Once the instruction is received at the master controller it<br />
verifies the environmental conditions. This master controller is<br />
connected to sensor fusion unit which is used to observe the<br />
environmental conditions. The sensor fusion unit consists of ultra<br />
sonic sensors for identifying and locating obstacles, temperature<br />
sensor for analyzing the surrounding temperature, etc. The<br />
master controller verifies the environmental conditions and<br />
executes the task if and only if the conditions are ideal to be<br />
executed.<br />
In this mode the robot continuously verifies the<br />
communication system security. This is done by transmitting and<br />
receiving a peculiar code in a definite interval of time. If the code<br />
is not received in either of the ends at proper time then the robot<br />
disconnects all the communication channels and returns back to<br />
the source point by using the data stored in eeprom of the<br />
controller.<br />
In this mode the robot also verifies the battery level using a<br />
battery monitoring circuit. If the robot identifies a drain in<br />
battery charge, it automatically switches to the secondary power<br />
source. Once the robot switches to the last battery, it will stop all<br />
the task and returns back to the source point using the data in<br />
eeprom.<br />
IV. ELECTRONICS<br />
The platform is designed to fit a laptop, sensors, and four 12V<br />
7aH lead acid batteries. The platform also contains the<br />
electronics hardware including a relay based circuit for driving<br />
the dc geared motors, a pic microcontroller circuits, and<br />
ultrasonic sensors.<br />
The task to be executed is given as voice commands[14] by<br />
the human master at the client pc. A serial code is generated for<br />
each word and is transmitted to the laptop on the robot platform.<br />
For generating, transmitting and receiving the code software‘s<br />
known as Roboclient and Roboserver is used. Both these<br />
software‘s are developed in Microsoft Visual Studio. The client<br />
pc and the server laptop is connected to internet using high speed<br />
3G network. The serial code is transmitted from the laptop to the<br />
microcontroller circuit by a RS-232 cable. When the<br />
microcontroller receives this signal, it checks for the<br />
environmental conditions using the ultrasonic sensors. The<br />
environmental condition, here, refers to any obstacle for the task<br />
execution. Now if there are no obstacles, then, the robot executes<br />
the task. But if there is any obstacle, it sends the human master a<br />
serial code indicating its problem and waits for further<br />
instruction from human master. The human master can view the<br />
area under survey with the help of the camera mounted on the<br />
robot platform. This is made possible by using the Gmail video<br />
chat or the Skype software.<br />
The robot platform also contains a battery monitoring circuit.<br />
If this circuit identifies a power crisis, then, the circuit switches<br />
to the next power source. The number of power sources can be<br />
fixed according to the need and availability. If the last battery is<br />
switched, then, the robot closes all its applications and comes<br />
back to the source point by using the data in the eeprom. The<br />
robot also returns to the source point if it identifies a security<br />
issue in the communication link.<br />
A. Identification of a security issue in communication link<br />
The client pc and the server laptop continuously exchange a<br />
serial code. If the pic microcontroller does not receive this code<br />
in a specified delay, it comes to a conclusion that the<br />
communication link is lost or hacked. In that case, the robot<br />
closes all its communication links and other activities and returns<br />
back to the source point. By using the data stored in eeprom.<br />
B. Returning of robot to the source point using the data in<br />
eeprom<br />
The robot stores all the movement codes in the internal eeprom<br />
of the pic microcontroller. The first location contains the<br />
movement code and the next location contains the time delay for<br />
the code. This continues for all the movement codes. When the<br />
robot faces a security or power problem, the robot executes the<br />
data in eeprom in last in first out method. The controller swaps<br />
the forward and backward instructions. That is if there is a<br />
forward movement in the eeprom location, the robot moves<br />
backward and vice versa. The rest of the instructions remain the<br />
same. This helps robot from protecting itself from exploitation<br />
from unauthorized access.<br />
Figure 5. Block Schematic<br />
C. Visual sensor<br />
This part is the place to install sensors which are used for<br />
searching vital sign of the victims like camera [11]. The camera<br />
can be made to continuously rotate as per the command from<br />
human master. The visuals obtained by the camera are<br />
transmitted through the Gmail video chat or the Skype software.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 362<br />
ISSN 2250-3153<br />
D. Monitoring and navigation of robot<br />
The robot is monitored using the camera in the robot platform.<br />
The robot uses ultrasonic sensors for identifying any obstacle in<br />
the path of its motion. The sensors are connected to the controller<br />
circuit for making appropriate decision. When the robot<br />
navigates automatically, it uses the data in eeprom. For the<br />
patrol robot navigation several methods are used like sensing the<br />
paths, graphical user interface, map following algorithms and<br />
compass, other Kalman filtering methods[6][5][7][8][9]. All<br />
these approaches are somehow complex. This can be overcome<br />
by using the EEPROM of the microcontroller. PIC16F877A has<br />
256 bytes of EEPROM inside it. So memory can use it to store<br />
data that need on a permanent basis and we can read it back from<br />
it. There are two functions to accomplish the task. Eeprom_Read<br />
and Eeprom_Write.<br />
Eeprom_Read function returns an integer and takes a<br />
parameter of the address from which the data has to be fetched.<br />
Eeprom_Write takes two parameters the first one is the address<br />
and the second one is the data.<br />
unsigned short Eeprom_Read(unsigned int address);<br />
void Eeprom_Write(unsigned int address, unsigned short data);<br />
Most of the robot will navigate with different<br />
algorithm.[10][11][12][13] The robot will navigate with respect<br />
to the commands from the user (initially from A to B) as shown<br />
in fig.7. All the running commands are stored in the memory and<br />
also a counter is set to determine how long the commands are<br />
executed. Now the current position of the robot is at B.<br />
Whenever it needs to return, the last stored command will<br />
execute first (LIFO). If the last executed command is forward,<br />
that swaps it into backward command.<br />
Similarly,<br />
Backward ≈ Forward<br />
Figure 6. Path Schematic<br />
V. SOFTWARE<br />
Onboard software is mainly developed with micro C. This<br />
software interfaces between the operator station software and the<br />
robot by receiving operator‘s command to control all robot<br />
functions. Simulations have been executed both in Mat lab and<br />
PIC simulator. In Mat lab the approaches were implemented<br />
under ideal hypothesis, more realistic settings. The commands<br />
are send through serial communication with the help the software<br />
Roboclient developed in Microsoft Visual studio. The data is<br />
received using the software Roboserver developed in Microsoft<br />
Visual studio. Real time visuals can be captured and displayed on<br />
the window with the help of Gmail video chat or Skype software.<br />
Figure 7. Voice Control Panel<br />
VI. SAMPLE WORKING<br />
The required action is commanded by the human master as a<br />
specific word which is picked by the microphone and converted<br />
to a code alphabet by the client PC using Roboclient software.<br />
This alphabet is transmitted to the server laptop at the robot<br />
platform through high speed internet. At the reception end the<br />
alphabet is transmitted to the master controller from the server<br />
laptop through RS-232 cable. Now the master controller controls<br />
the slaves according to the program for the particular alphabet.<br />
For example, when a command ‗move‘ is said by the human<br />
master, a code alphabet ‗m‘ is transmitted and the<br />
microcontroller on receiving this ‗m‘, executes the internal loop<br />
program and waits for the next instruction.<br />
VII. CONCLUSION<br />
The 32 DOF andro humanoid robot was designed successfully<br />
and was found to have advantages of unbounded control with the<br />
use of high speed internet. The humanoid also has the advantage<br />
of self securing ability.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 363<br />
ISSN 2250-3153<br />
In future the humanoid can be made to walk by designing the<br />
legs for the robot. Additional sensors can be fused to improve<br />
efficiency of the humanoid.<br />
ACKNOWLEDGEMENT<br />
The research in this paper was carried out at Hindustan<br />
Institute of Technology and science, Chennai. This work was<br />
supported by the e-MEN Robotic Research Centre Palakkad.<br />
REFERENCES<br />
[1] Kenji KANEKO, Fumio KANCHIRO, Shuuji KAJITA, Hirohisa<br />
HIRUKAWA, Toshikazu KAWASAKI, Masaro HIRATA, Kazuhako<br />
AKACHI and Takakatsu ISOZUMI ―Humanoid robot HRP-2‖, proceedings<br />
of the 2004 IEEE International Conference on Robotics and Automation.<br />
[2] Kenji KANEKO, Fumio KANCHIRO, Shuuji KAJITA, Hirohisa<br />
HIRUKAWA, Toshikazu KAWASAKI, Kensuke HARADA, Kazuhako<br />
AKACHI and Takakatsu ISOZUMI ―First Humanoid Robot that has the<br />
Same Size as a Human and that can Lie Down and Get Up‖, proceedings of<br />
the 2003 IEEE International Conference on Robotics and Automation.<br />
[3] T.Asfour and R.Dillmann ―Human-Like Motion of a Humanoid Robot Arm<br />
based on a Closed-Form Solution of the Inverse Kinematics Problem‖,<br />
IEEE International Conference on Intelligent Robots and Systems.<br />
[4] Amon Tunwannarux and Supanunt Tunwannarux ―The CEO Mission II,<br />
Rescue Robot with Multi-Joint Mechanical Arm‖, Proceedings of World<br />
Academy of Science, Engineering and Technology 2007.<br />
[5] Mbaitiga Zacharie ―Intelligent OkiKOSenPBX Security Patrol Robot via<br />
Network and Map-Based Route Planning‖, Journal of Computer Science<br />
5(1);79-85,2009.<br />
[6] Fen Xu, Zheng Xi Li, Kui Yuan ―The design and implementation of an<br />
autonomous campus patrol robot‖ Proceedings of the 2008 IEEE<br />
International Conference on Robotics and Biomimetics.M. Young, The<br />
Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.<br />
[7] S. Ali A. Moosavian, Hesam Semsarilar, Arash Kalantari ―Design and<br />
manufacturing of a mobile rescue robot‖ international conference on<br />
intelligent robots and system oct 9-15-2006 IEEE<br />
[8] Robert W. Hogg, Arturo L. Rankin, Stergios I. Roumeliotis ―Algorithms<br />
and Sensors for Small Robot Path Following‖<br />
[9] Sebastian Thrun1, Maren Bennewitz2, Wolfram Burgard2‖MINERVA: A<br />
Second Generation Museum Tour-Guide Robot‖ Carnegie Mellon<br />
University.<br />
[10] Stephen J. Tobias, A. Antonio Arroyo ―Autonomous Path finding‖ 2000<br />
Florida Conference on Recent Advances in Robotics May 4-5, 2000,<br />
Florida Atlantic University.<br />
[11] Ali Sekmen, Sheldon Greene ―Vision-based Mobile Robot Learning and<br />
Navigation‖2005 IEEE International Workshop on Robots and Human<br />
Interactive Communication<br />
[12] Yongxing Hao, Benjamin Laxton ,Sunil K. Agrawal, Edward Lee , Eric<br />
Benson ―Planning and Control of UGV Formations in a Dynamic<br />
Environment: A Practical Framework with Experiments‖ Proceedings of the<br />
2003 IEEE International Conference on Robotics & Automation Taipei,<br />
Taiwan, September 14-19, 2003<br />
[13] Johann Borenstein+ and Yoram Koren ―MOTION CONTROL ANALYSIS<br />
OF A MOBILE ROBOT‖ Transactions of ASME, Journal of Dynamics,<br />
Measurement and Control, Vol. 109, No. 2, pp. 73-79. [20]<br />
[14] Brandi House, Jonathan Malkin, Jeff Bilmes ―The VoiceBot: A Voice<br />
Controlled Robot Arm‖ CHI 2009, April 4-9, 2009, Boston, Massachusetts,<br />
USA.<br />
[15] Shyam.R.Nair, ―Cascaded Computational Intelligence for Robotics‖,<br />
ICCVR <strong>2012</strong>.<br />
[16] Shyam.R.Nair, ―Design of a Robotic Arm for Picking and Placing an Object<br />
Controlled using LABView‖, <strong>IJSRP</strong>, May <strong>2012</strong>.<br />
First Author –<br />
AUTHORS<br />
Shyam.R.Nair, PG Scholar, Hindustan University, Chennai,<br />
shyamieee@gmail.com<br />
Second Author - Prof. Manjula Pramod, MS, HOD, Dept. of<br />
EIE, Hindustan University, Chennai.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 364<br />
ISSN 2250-3153<br />
Image Processing Operations for 3d Image<br />
Mrs. A. Padmapriya, S.Vigneshnarthi<br />
Department of Computer Science & Engineering, Alagappa University, Karaikudi – 630 003, India<br />
Abstract- Image processing and pattern recognition has<br />
become a powerful technique in many areas. This includes<br />
Engineering, Computer Science, Statistics, Information Science,<br />
Physics, Chemistry and Medicine. Anyone who wants to extract<br />
data from image or visual project, image processing is required.<br />
Most of the image processing software‘s are able to process two<br />
dimensional images alone. This paper implements three basic<br />
image processing operations namely enhancement, blur and<br />
segmentation. Each of the operation can be implemented using<br />
a variety of algorithms. The algorithms are implemented using<br />
and their performance are compared in this paper. The proposed<br />
work produces better result of 3D images also.<br />
Index Terms- Image processing, Enhancement, Blur,<br />
Segmentation, 3D Image<br />
I. INTRODUCTION<br />
Image Processing<br />
mage processing [3] is a form of signal processing for which<br />
I<br />
the input is an image, such as photographs; the output of image<br />
processing can be either an image or a set of characteristics or<br />
parameters related to the image. Most image-processing<br />
techniques involve treating the image as a two-dimensional<br />
signal and applying standard signal-processing techniques to it.<br />
This is done through the development and implementation of<br />
processing means necessary to operate on the image. Processing<br />
image using a digital computer provides the greatest flexibility<br />
and power for general image processing application, since the<br />
programming of a computer can be changed easily which allows<br />
operation to be modified quickly. Interest in image processing<br />
technique dates back to early 1920‘s when digitized pictures of<br />
world news events were first transmitted by submarine cable<br />
between New York and London.[4]. However, application of<br />
digital image processing concepts did not become widespread<br />
until the middle 1960‘s, when third-generation digital computers<br />
began to offer the speed and storage capabilities required for<br />
practical implementation of image processing algorithms. Since<br />
then, this area has experienced vigorous growth and has been<br />
subjected of study and research in various fields. Image<br />
processing and computer vision practitioners tend to concentrate<br />
on a particular area of specialization [5] research interests as<br />
―texture‖, ―surface mapping‖, ―video tracking‖, anthe like.<br />
Nevertheless, there is a strong need to appreciate the spectrum<br />
and hierarchy of processing levels.<br />
The paper is organised as follows: Section II briefly review<br />
the literature behind the proposed work. Section III elaborates the<br />
proposed work .Section IV discusses the implemented of the<br />
proposed work. Section V concludes the findings.<br />
II. LITERATURE SURVEY<br />
Motivation for a digital image processing course [1] arises<br />
mainly from two areas of applications, namely, a) an increase in<br />
the pictorial information available for human interpretation, and<br />
b) image processing for automatic and autonomous machine<br />
control. This is because vision is the most important human sense<br />
in terms of the amount of information it conveys and because of<br />
a good visualization is very important for the correct information<br />
converged in an image. Many image processing circuits require<br />
dedicated software to perform their tasks. These packages<br />
usually are highly priced and are not easily modified by the final<br />
user. In this paper the basis for the image processing is<br />
MATLAB [3], a software package now available almost<br />
anywhere for other uses and that is used as the engine for the<br />
image processing experiments. The software written for the<br />
image processing experiments is available from the users at no<br />
cost to interested users and instructors. Image processing<br />
applications include many topics, among which we can mention<br />
remote sensing, ultrasound images, meteorology, astronomy,<br />
inspection, radar, seismology, radiology, autonomous navigation,<br />
recognition, etc.<br />
III. PROPOSED WORK<br />
This paper deals with the implementation of three basic<br />
image processing operations namely image enhancement,<br />
segmentation and blur.<br />
A. Image Enhancement<br />
Image Enhancement of image means processing an image so<br />
that the results are more suitable for a particular application.<br />
Processing an image so that the result is more suitable for a<br />
particular application. (sharpening or deblurring an out of focus<br />
image, highlighting edges, improving image contrast, or<br />
brightening an image, removing noise)<br />
Enhancing Multispectral Color Composite Images<br />
Enhance multispectral radiance or reflectance data to create<br />
an image that is suitable for visual interpretation. Another way to<br />
enhance the true color composite is to use a decorrelation stretch,<br />
which enhances color separation across highly correlated<br />
channels. Use decorrstretch[6] to perform the decorrelation<br />
stretch. Again, surface features have become much more clearly<br />
visible, but in a different way. The spectral differences across the<br />
scene have been exaggerated.<br />
Enhance Color Images<br />
Contrast enhancement of color images is typically done by<br />
transforming an image to a color space that has image intensity<br />
as one of its components. One such color space is L*a*b*. Use<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 365<br />
ISSN 2250-3153<br />
color transform functions to convert the image from RGB to<br />
L*a*b* color space, and then work on the luminosity layer 'L*'<br />
of the image. Manipulating luminosity affects the intensity of the<br />
pixels, while preserving the original colors. Using the default<br />
settings, compare the effectiveness of the following three<br />
techniques:<br />
a) Imadjust<br />
b) Histeq<br />
c) Adaphisteq<br />
Imadjust<br />
It increases the contrast of the image by mapping the values<br />
of the input intensity image to new values such that, by default,<br />
1% of the data is saturated at low and high intensities of the input<br />
data.<br />
Histeq<br />
It performs histogram [8] equalization. It enhances the<br />
contrast of images by transforming the values in an intensity<br />
image so that the histogram of the output image approximately<br />
matches a specified histogram (uniform distribution by default).<br />
Adapthisteq<br />
It performs contrast-limited adaptive histogram equalization.<br />
Unlike histeq, it operates on small data regions (tiles) rather than<br />
the entire image. Each tile's contrast is enhanced so that the<br />
histogram of each output region approximately matches the<br />
specified histogram (uniform distribution by default). The<br />
contrast enhancement [7] can be limited in order to avoid<br />
amplifying the noise which might be present in the image. Notice<br />
that imadjust had little effect on the image of the tire, but it<br />
caused a drastic change in the case of pout. Plotting the<br />
histograms of pout.tif and tire.tif reveals that most of the pixels<br />
in the first image are concentrated in the center of the histogram,<br />
while in the case of tire.tif, the values are already spread out<br />
between the minimum of 0 and maximum of 255 thus preventing<br />
imadjust from being effective in adjusting the contrast of the<br />
image.<br />
Histogram equalization, on the other hand, substantially<br />
changes both images. Many of the previously hidden features are<br />
exposed, especially the debris particles on the tire. Unfortunately,<br />
at the same time, the enhancement over-saturates several areas of<br />
both images. Notice how the center of the tire, part of the child's<br />
face, and the jacket became washed out. Concentrating on the<br />
image of the tire, it would be preferable for the center of the<br />
wheel to stay at about the same brightness while enhancing the<br />
contrast in other areas of the image. In order for that to happen, a<br />
different transformation would have to be applied to different<br />
portions of the image. The Contrast-Limited Adaptive Histogram<br />
Equalization technique, implemented in adapthisteq, can<br />
accomplish this. The algorithm analyzes portions of the image<br />
and computes the appropriate transformations. A limit on the<br />
level of contrast enhancement can also be set, thus preventing the<br />
over-saturation caused by the basic histogram equalization<br />
method of histeq. This is the most sophisticated technique in this<br />
demonstration.<br />
B. Segmentation<br />
Segmentation is the process of partitioning a digital image into<br />
multiple segments. The goal of segmentation is to simplify<br />
and/or change the representation of an image into something that<br />
is more meaningful and easier to analyze. Image segmentation is<br />
typically used to locate objects and boundaries (lines, curves,<br />
etc.) in images. More precisely, image segmentation is the<br />
process of assigning a label to every pixel in an image such that<br />
pixels with the same label share certain visual characteristics.<br />
An object can be easily detected in an image if the object<br />
has sufficient contrast from the background. We use edge<br />
detection and basic morphology tools to detect a prostate cancer<br />
cell.<br />
The steps involves are below:<br />
Step 1: Detect Entire Cell<br />
Step 2: Fill Gaps<br />
Step 3: Dilate the Image<br />
Step 4: Fill Interior Gaps<br />
Step 5: Remove Connected Objects on Border<br />
Step 6: Smooth the Object<br />
Step 1: Detect Entire Cell<br />
Two cells are present in this image, but only one cell can be<br />
seen in its entirety. We will detect this cell. Another word for<br />
object detection is segmentation. The object to be segmented<br />
differs greatly in contrast from the background image. Changes<br />
in contrast can be detected by operators that calculate the<br />
gradient of an image. One way to calculate the gradient of an<br />
image is the Sobel operator, which creates a binary mask using a<br />
user-specified threshold value. We determine a threshold value<br />
using the graythresh function. To create the binary gradient<br />
mask, we use the edge function.<br />
Step 2: Fill Gaps<br />
The binary gradient mask shows lines of high contrast in the<br />
image. These lines do not quite delineate the outline of the object<br />
of interest. Compared to the original image, you can see gaps in<br />
the lines surrounding the object in the gradient mask. These<br />
linear gaps will disappear if the Sobel image is dilated using<br />
linear structuring elements.<br />
Step 3: Dilate the Image<br />
The binary gradient mask is dilated using the vertical<br />
structuring element followed by the horizontal structuring<br />
element.<br />
Step 4: Fill Interior Gaps<br />
The dilated gradient mask shows the outline of the cell<br />
quite nicely, but there are still holes in the interior of the cell.<br />
Step 5: Remove Connected Objects on Border<br />
The cell of interest has been successfully segmented, but it<br />
is not the only object that has been found. Any objects that are<br />
connected to the border of the image can be removed.<br />
Step 6: Smooth the Object<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 366<br />
ISSN 2250-3153<br />
Finally, in order to make the segmented object look<br />
natural, we smooth the object by eroding the image twice with<br />
a diamond structuring element. An alternate method for<br />
displaying the segmented object would be to place an outline<br />
around the segmented cell.<br />
C . Blur<br />
Blurring an image usually makes the image unfocused. It<br />
increased by increasing the pixel radius<br />
Blur Deconvolution<br />
The Blur Deconvolution Algorithm can be used effectively<br />
when no information about the distortion (blurring and noise) is<br />
known. The algorithm restores the image and the point-spread<br />
function (PSF) [9] simultaneously. What happens is that what<br />
should be seen as a sharp point gets smeared out, usually<br />
into a disc shape. In image terms this means that each pixel in<br />
the source image gets spread over and mixed into surrounding<br />
pixels. Another way to look at this is that each pixel in the<br />
destination image is made up out of a mixture of surrounding<br />
pixels from the source image<br />
IV. EXPERIMENT STUDY<br />
Image can be processed using any software programming<br />
language such as C language Matrix-X. Visual Basic. Java<br />
program and MATLAB program. Image applications frequently<br />
need to interactively manipulate an image by continuously<br />
changing a single parameter and multi-parameter. This paper<br />
briefly elaborates the image process operations for 3D images.<br />
Three major operation selected for implementation are<br />
enhancement, segmentation and blur.<br />
A. Enhancement<br />
In the papers [2,6], the Enhancement technique is used for<br />
2D colour images. Enhance multispectral radiance or reflectance<br />
data to create an image that is suitable for visual interpretation.<br />
Another way to enhance the true color composite is to use a<br />
decorrelation stretch, which enhances color separation across<br />
highly correlated channeonls. Use decorrstretch to perform the<br />
decorrelation stretch. Again, surface features have become much<br />
more clearly visible, but in a different way. The spectral<br />
differences across the scene have been exaggerated.<br />
In this paper, 3D images are used for Enhancement<br />
technique and three functions imadjust, histeq, and adapthisteq<br />
are used for contrast enhancement.<br />
ORIGINAL IMAGE<br />
IMADJUST<br />
HISTEQ<br />
IMADJUST<br />
ADAPTHISTEQ<br />
Image Composite after Decorrelation Stretch<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 367<br />
ISSN 2250-3153<br />
B.Segmentation<br />
In the papers [1-4] segmentation can be implemented for 2D<br />
method.<br />
In this proposed work, segmentation implemented for<br />
3Dmethod.<br />
BINARY GRADIENT MASK<br />
BINARY IMAGE FILLED WITH HOLES<br />
CLEARED BODER IMAGE<br />
ORIGINAL IMAGE<br />
SEGMENTED IMAGE<br />
B. Blur<br />
In the paper [9] Blind Blur Deconvolution Algorithm for 2D<br />
method can be used effectively when no information about the<br />
distortion (blurring and noise) is known. The algorithm restores<br />
the image and the simple blur algorithm simultaneously. What<br />
happens is that what should be seen as a sharp point gets smeared<br />
out, usually into a disc shape. In image terms this means that each<br />
pixel in the source image gets spread over and mixed into<br />
surrounding pixels. Another way to look at this is that each pixel<br />
in the destination image is made up out of a mixture of<br />
surrounding pixels from the source image.<br />
In this paper, Blur Deconvolution Algorithm for 3D method<br />
can be used effectively when no information about the distortion<br />
(blurring and noise) is known. The algorithm restoresthe image<br />
and the point-spread function (PSF) simultaneously. In image<br />
terms this means that each pixel in the source image gets spread<br />
over and mixed into surrounding pixels. Another way to look at<br />
this is that each pixel in the destination image is made up out of a<br />
mixture of surrounding pixels from the source image.<br />
BLURRED AND NOISY IMAGE<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 368<br />
ISSN 2250-3153<br />
Comparison histogram for enhancement for 2d and 3d<br />
images:<br />
Comparison histogram for segmentation for 2d and 3d<br />
images:<br />
Comparison histogram for segmentation for 2d and 3d<br />
images:<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 369<br />
ISSN 2250-3153<br />
Comparison histogram for blur for 2d and 3d images:<br />
V. CONCLUSION<br />
This paper briefly elaborates the image process operations for<br />
3D images. The three major operations selected for<br />
implementation are enhancement segmentation and blur. This<br />
paper briefly the software used for implementation is matlab. The<br />
outputs of the algorithms are compared. Previously there<br />
operations are done used 2D images only. The proposed work<br />
processes 3D images.<br />
REFERENCES<br />
[1] ABDUL HALIM BIN BABA. image processing learning tool-edge<br />
detection bachelor degree. university of technology malaysia 1996.<br />
[2] FIONN MURTAGH. Image Processing data analysis. The multi-scale<br />
approach. University of Ulster.<br />
[3] Fundamentals of image processing, hany.farid@dartmouth.edu<br />
.(http://www.cs.dartmouth.edu/~farid)<br />
[4] JEAN-LUC STARCK, centre d‘ etudes de Saclay, Fionn Murtagh. Image<br />
processing and data analysis the multiscale approach. University of<br />
Ulster.<br />
[5] LOUIS J.GALBIATI, JR. machine vision and digital image processing<br />
fundamentals. Prentice-Hall International Editions.<br />
[6] S. K. MITRA AND H. LI, ―a new class of nonlinear filters for image<br />
enhancement, ‖in Proc. IEEE int. Conf. Acoustics, Speech, Signal<br />
Processing, Toronto, Ont., Canada, may 14–17, 1991, pp. 2525–2528.<br />
[7] G. RAMPONI, N. STROBEL, S. K.<br />
MITRA, AND T. YU, ―nonlinear unsharp masking methods for image<br />
contrast enhancement,‖ J. Electron. Image, vol. 5, pp. 353–366, July 1996.<br />
[8] G. RAMPONI, ―A cubic unsharp masking technique for contrast<br />
enhancement,‖ Signal Process., vol. 67, pp. 211–222,June 1998.<br />
[9] Y. H. LEE AND S. Y. PARK, ―A study of convex/concave edges and edge<br />
enhancing operators based on the laplacian,‖ IEEE Trans. Circuits Syst.,<br />
vol. 37, pp. 940–946, July 1990.<br />
AUTHORS<br />
First Author – Mrs. A. Padmapriya, Assistant Professor,<br />
Department of Computer Science & Engineering, Alagappa<br />
University, Karaikudi – 630 003, Email :<br />
mailtopadhu@yahoo.co.in<br />
Mrs.A. Padmapriya is with Department of Computer Science and<br />
Engineering, Alagappa University, Karaikudi as Assistant<br />
professor. She is having 9 years of teaching experience and 5<br />
years of research experience. She has published 5 research<br />
Papers in National/International Journals and presented 9 papers<br />
in International/National Conferences. She research area includes<br />
Computer Networks and Data Mining. She is a reviewer for<br />
IEEE Conferences and Symposion and various International<br />
Jourals.<br />
Second Author – S.Vigneshnarthi, M. Phil Scholar, Department<br />
of Computer Science & Engineering, Alagappa University,<br />
Karaikudi – 630 003, Email : narthi86@gmail.com<br />
S.Vigneshnarthi received her B.sc degree in Computer Science<br />
from Alagappa University, Karaikudi, B.Ed degree Computer<br />
Science from Tamilnadu Teacher Education University, Chennai<br />
and M.sc in Computer Science from Alagappa University,<br />
Karaikudi. Currently she is pursuing her M.Phil in Computer<br />
Science under Alagappa University, Karaikudi.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 370<br />
ISSN 2250-3153<br />
Transient Analysis of Mac Protocol in Sensor Networks<br />
Mada Amarnadh, M. Venkata Dasu<br />
Abstract- In a Wireless Sensor network, whose node accesses<br />
the medium by using the unslotted MAC protocol and in our case<br />
we are not able to increase the packet delivery ratio when<br />
compared with others MAC protocols. In order to improve that<br />
we are going to compare the two different MAC protocols (like<br />
CSMA and advanced MAC scheduling) for the IEEE 802.15.4<br />
and IEEE 802.16 and for the high data rate apply the WIMAX<br />
technology. Which focus on the average throughput and delay<br />
analysis.<br />
Index Terms- IEEE 802.16 MAC; Single-hop; Multi-hop;<br />
WIMAX technology; Wireless sensor network<br />
W<br />
I. INTRODUCTION<br />
ireless Sensor Networks (WSNs) are one of the most<br />
promising solutions in the field of communication. A<br />
WSN consists of a number of tiny sensor nodes deployed over a<br />
sensing field. Each node is a low power device capable of<br />
sensing physical information from the surrounding environment<br />
(e.g., temperature, pressure and vibrations), processing the<br />
acquired data locally, and sending them to one or more collection<br />
points, referred to as sinks or base stations [1]. Hence, a WSN<br />
can be regarded as a distributed sensing system that may be<br />
adequate for many monitoring and control applications.<br />
In this paper, we focus on IEEE 802.15.4 WSNs [2] and<br />
show that they provide a very low reliability in terms of packet<br />
delivery ratio (i.e., the percentage of data packets correctly<br />
delivered to the sink node) when power management is enabled.<br />
We found that this behavior is caused by the 802.15.4 MAC<br />
protocol and therefore, throughout we will refer to it as the<br />
802.15.4 MAC [3] unreliability problem. Specifically, we found<br />
that this problem – which is originated by the CSMA/CA<br />
(Carrier Sense Multiple Access with Collision Avoidance)<br />
algorithm used for channel access – becomes critical when power<br />
management is enabled due to the default MAC parameters<br />
setting suggested by the standard.<br />
Indeed, the IEEE 802.16 standard allows some flexibility<br />
in choosing CSMA/CA parameters, as it defines a range of<br />
allowed values for each of them. Our results show that, with an<br />
appropriate parameters setting, it is possible to mitigate the MAC<br />
unreliability problem and increase the delivery ratio, up to 100%,<br />
at least in the scenarios considered in this paper. However, this is<br />
achieved at the cost of a significantly higher latency, which<br />
might not be acceptable for industrial applications with stringent<br />
timing requirements. In addition, in some scenarios, a high<br />
Department of ECE<br />
A.I.T.S Rajampet, A.P, India<br />
delivery ratio can only be obtained by using CSMA/CA [4]<br />
parameter values which are not compliant with the standard.<br />
We validated our simulation results through an extended<br />
experimental analysis carried out on a real WSN. The<br />
experimental measurements confirm the simulation results and<br />
show that the solution envisaged to mitigate the MAC<br />
unreliability problem is viable, at least in some application<br />
scenarios. To the best of our knowledge, this is the first paper<br />
investigating the sensitiveness of the 802.16 performance to the<br />
CSMA/CA parameters setting, by using both simulation and<br />
measurements on a real WSN.<br />
IEEE 802.16 is a standard for low-rate, low-power, and<br />
low-cost Personal Area Networks (PANs)[5]. A PAN is formed<br />
by one PAN coordinator which is in charge of managing the<br />
whole network, and, optionally, by one or more coordinators<br />
which are responsible for a subset of nodes in the network.<br />
Ordinary nodes must associate with a (PAN) coordinator in order<br />
to communicate. The supported network topologies are star<br />
(single-hop), cluster-tree and mesh (multi-hop).<br />
WiMAX is based on IEEE 802.16 specification and it is<br />
expected to deliver high quality broadband services.<br />
II. MODULE DESCRIPTION<br />
A. Design of Wireless Sensor Network<br />
The MAC layer provides an interface between the application<br />
layer and the PHY layer. The MAC layer provides services to the<br />
application layer through two groups: the MAC Management<br />
Service (called the MAC Layer Management Entity, or MLME)<br />
and the MAC Data Service [6] (called the MAC Common Part<br />
Layer, or MCPS). The MCPS provides data transport services<br />
between peer MACs. The MLME provides the service interfaces<br />
through which layer management functions may be invoked. The<br />
MLME is also responsible for maintaining a database of<br />
managed objects pertaining to the MAC layer. This database is<br />
referred to as the MAC layer PAN information base (PIB). The<br />
MLME also has access to MCPS services for data transport.<br />
B. Multiple sink with PAN coordinator<br />
(i) Generating network beacons if the device is a coordinator: A<br />
coordinator can determine whether to work in a beacon enabled<br />
mode, in which a superframe structure is used. The superframe<br />
is bounded by network beacons and divided into<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 371<br />
ISSN 2250-3153<br />
aNumSuperframeSlots (default value 16) equally sized slots. A<br />
coordinator sends out beacons periodically to synchronize the<br />
attached devices and for other purposes.<br />
(ii) Synchronizing to the beacons: A device attached to a<br />
coordinator operating in a beacon enabled mode can track the<br />
beacons to synchronize with the coordinator.<br />
(iii) Supporting personal area network (PAN) association and<br />
disassociation: To support selfconfiguration, 802.15.4 embeds<br />
association and disassociation functions in its MAC sublayer.<br />
This not only enables a star to be setup automatically, but also<br />
allows for the creation of a selfconfiguring, peer-to-peer<br />
network [7].<br />
(iv) Employing the carrier sense multiple access with collision<br />
avoidance (CSMA-CA) mechanism for channel access: Like<br />
most other protocols designed for wireless networks, 802.15.4<br />
uses CSMA-CA mechanism for channel access.<br />
C. Estimation of packet loss rate in IEEE 802.16<br />
The estimation of packet loss rate in IEEE 802.16 is as shown<br />
in Fig.1. Where two function call for the estimation of the packet<br />
loss rate [8].<br />
Function calls MAC functions have to be called from the<br />
application in order to initiate an action in the communication<br />
stack at the MAC level. MAC functions are prefixed with wpan_<br />
and suffixed with either _request or _response. A sample<br />
construct of a call to a MAC function is:<br />
wpan_mlme_associate_request.<br />
Callback functions When the MAC needs to invoke a function<br />
in the application, it calls a callback function. If the callback<br />
function is not implemented by the application, it will be<br />
replaced by an empty function from the library. Callback<br />
functions are prefixed with usr_ and suffixed with either<br />
_confirm or _indication. A sample construct of a callback to an<br />
application function is: usr_mlme_associate_indication.<br />
Fig1: Data Flow Diagram of communication stack at the MAC<br />
level<br />
III. USE CASE DIAGRAM<br />
The model representing the message transfer is shows in<br />
Fig.2. A network site is wireless sensor network; by using<br />
routing protocol wireless sensor node will select and get a signal<br />
from a PAN. PAN is device who will give the signal as well as<br />
there is any overlapping signals are there that can be reduced.<br />
Congestion occurs means according to the time it will select<br />
routing calls and event it will be calculating by using IEEE<br />
802.16. Radio propagation model is nothing but according to the<br />
radio signals ranges, what is the spreading from that will be<br />
select the destination. Each and every time it will check the radio<br />
propagation mode and justify the PAN.<br />
Fig.2: The model representating the message transfer from a<br />
sensor to central controller and destination<br />
IV. SIMULATION ENVIRONMENT<br />
It is assumed that 50 mobile nodes move over a square area of<br />
300 × 1500m2. Each simulation has been run for 900 seconds of<br />
simulation time. The propagation channel of two-ray ground<br />
reflection model is assumed with a data rate of 2 Mbps. The<br />
environment noise level of -83 or -90 dBm is modeled as a<br />
Gaussian random variable with the standard deviation of 1 dB.<br />
Noise level of -90 dBm is considered ignorable and interference<br />
from other transmitters dominates. On the other hand, noise level<br />
of -83 dBm is used to simulate a harsh communication<br />
environment.<br />
V. SIMULATION RESULTS<br />
In this section, we show and analyze the simulation results of<br />
Packet delivery ration, Average throughput [10], Traffic<br />
comparison, Packet transmission and Performance analysis of<br />
our system. Fig.3 shows the comparison of packet delivery ratio<br />
between first sink and second sink (i.e. between two<br />
destinations), at the first sink of 50 th node packet delivery ratio<br />
[9] can be 81 percent and the same time and node the second sink<br />
packet delivery ratio is 94 percent. Here packet delivery ratio can<br />
be increase from sink1 to sink 2. Fig.4 represents the data sent<br />
with average neighbor, this can be calculating between average<br />
neighbor and data (bytes per second). Here neighboring nodes<br />
can be improved from 2 to 10 corresponding data can transferred<br />
be increased from 10 to 23.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 372<br />
ISSN 2250-3153<br />
Fig.3: Comparison of packet delivary ratio<br />
Fig.4: Data sent with average neighbour<br />
Fig.5 gives mobility of the continuous packet transmission,<br />
where goes on increasing data with speed and it give the better<br />
mobility. Fig.6 gives the performance analysis [1] between<br />
packets, here analysis can done between received packets and<br />
dropped packets. In this analysis at one point only dropped<br />
packets are high (i.e.2ms) and average performance of received<br />
packets be high.<br />
Fig.5: continuous packet transmission<br />
Fig 6: Performance analysis<br />
Fig.7 shows the traffic comparison, in our case considered the<br />
three traffics like CBR, TCP and POISSION. This traffic can<br />
calculate by the number of packets transmission (throughput) per<br />
second. While in TCP the traffic is very high when compared to<br />
other types and the CBR traffic is very low compared other<br />
traffics. So the best type of traffic is CBR for our consideration<br />
network.<br />
Fig 7: Traffic comparison<br />
VI. CONCLUSION<br />
The Wireless PAN is an air interface specified in IEEE<br />
Standard 802.16 provides a platform for the development and<br />
deployment of standards based personal area networks providing<br />
broadband wireless access in many regulatory environments. The<br />
standard is intended to allow for multiple vendors to produce<br />
interoperable equipment. However, it also allows for extensive<br />
sink differentiation. For instance, the standard provides the base<br />
station with a set of tools to implement efficient scheduling.<br />
However, the scheduling algorithms that determine the overall<br />
efficiency will differ from sink to sink and may be optimized for<br />
specific traffic patterns. Likewise, the adaptive burst profile<br />
feature allows great control to optimize the efficiency of the PHY<br />
transport.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 373<br />
ISSN 2250-3153<br />
The publication of IEEE Standard 802.16 is a defining<br />
moment in which broadband wireless access moves to its second<br />
generation and begins its establishment as a mainstream<br />
alternative for broadband access. Through the dedicated service<br />
of many volunteers, the IEEE 802.16 Working Group succeeded<br />
in quickly designing and forging a standard based on forwardlooking<br />
technology. IEEE Standard 802.16 is the foundation of<br />
the wireless metropolitan area networks of the next few decades.<br />
REFERENCES<br />
[1] J. Zhang, G. Zhou, S. Son, J. Stankovic, and K. Whitehouse, ―Performance<br />
analysis of group based detection for sparse wireless sensor networks,"<br />
IEEE ICDCS, Beijing, China, 2008<br />
[2] J. Misiˇc, S. Shafi, and V. B. Misiˇc, ―Performance of a beacon enabled<br />
IEEE 802.15.4 cluster with downlink and uplink traffic," IEEE Trans.<br />
Parallel Distributed Syst., vol. 17, no. 4, pp. 367-376, 2006.<br />
[3] I. Ramachandran, A. K. Das, and S. Roy, ―Analysis of the contention access<br />
period of IEEE 802.15.4 MAC," ACM Trans. Sensor Netw., vol. 3, no. 1,<br />
2007.<br />
[4] C. Buratti and R. Verdone, ―Performance analysis of IEEE 802.15.4 non<br />
beacon-enabled mode," IEEE Trans. Veh. Technol., vol. 58, no. 7, pp.<br />
3480-3493, 2009.<br />
[5] L. Gu, et al., ―Lightweight detection and classification for wireless sensor<br />
networks in realistic environments," ACM Sensys, 2005<br />
[6] G. Bianchi, ―Performance analysis of the IEEE 802.11 distributed<br />
coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp.<br />
535-547, 2000.<br />
[7] T. A. Henzinger, ―The theory of hybrid automata," Verification Digital<br />
Hybrid Syst., vol. 170, pp. 265-292, 2000.<br />
[8] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava,<br />
―Coverage problems in wireless ad-hoc sensor networks," IEEE Infocom,<br />
Anchorage, AK, 2001.<br />
[9] M. Hefeeda and M. Bagheri, ―Randomized k-coverage algorithms for dense<br />
sensor networks," IEEE Infocom, Anchorage, AK, 2007.<br />
[10] O. Dousse, C. Tavoularis, and P. Thiran, ―Delay of intrusion detection in<br />
wireless sensor networks," ACM MobiHoc, Florence, Italy, 2006.<br />
First Author – Mr. Mada Amarnadh, M.Tech, AITS, Rajampet<br />
Email Id: amarnadh.ece@gmail.com.<br />
Second Author – Mr. M. Venkata Dasu, Assistant Professor,<br />
AITS, Rajampet . Email Id: dass_marri@yahoo.co.in.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 374<br />
ISSN 2250-3153<br />
Measures to combat tuberculosis in colonial Mysore<br />
Dr. Thriveni<br />
Abstract- The research article has made an attempt to focus on<br />
the challenges pertaining to the TB one of the prominent<br />
epidemic disease which bothered Princely mysore. There was a<br />
serious shortage of medical personal and facilities in the state, to<br />
provide more medical aid certain efforts were made for<br />
minimizing the spread of TB. The rulers of mysore had modern<br />
views in redressing public grievances and determined to protect<br />
their subjects.<br />
T<br />
I. INTRODUCTION<br />
he epidemic disease became frequent and widespread during<br />
the 19 th century in India as well in the Princely Mysore.<br />
Tuberculosis has killed more people than any disease in the<br />
history of the world and this became one of the greatest scourage<br />
of the early 20 th century. TB is a chronic bacterial infectious<br />
disease caused by mycobacterium tuberculosis, spread from<br />
person to person through airborne droplets. Both humans and<br />
cattle can transmit it and it can affect almost any tissue or organ<br />
of the human body. In 1993 the world health organization<br />
declared that TB a global emergency.<br />
There was widespread distress as well as loss of life<br />
throughout the State due to the disease of tuberculosis. A special<br />
hospital was constructed in the year 1907 & 08 as Tuberculosis<br />
Sanatorium. His Highness Nalwadi Krishnaraja Wodeyar III<br />
considered it necessary to organize an efficient Tuberculosis<br />
service in the State as it was causing considerable loss of life.<br />
II. ANTI TUBERCULOSIS MEASURES<br />
A. Special hospitals and clinics<br />
Princess Krishnajammanni Sanatorium, which was called<br />
after His Highness late sister at Mysore, who fell a victim of the<br />
disease along with her 3 daughters. A special building was<br />
constructed in 94 acres to combat tuberculosis in the state at<br />
mysore in this regard Princely State invited Mr. E. W. Frichley,<br />
Architect from Bombay visited Mysore for 5 days and prepared<br />
hospital design with approximate estimation of Rs.92, 599/ on<br />
2 nd June 1917. 22 In the year 1919, Rs.25, 370/ was sanctioned to<br />
built a big ward in the PKTB hospital at Mysore. 23 It was opened<br />
in the year 1921. The accommodation available in 1921 was for<br />
eight paying patients and 20 poor patients. As a memorial to the<br />
Golden Jubilee of his rule Nalwadi, a new 22 bedded emergency<br />
ward was constructed.<br />
In the year 1930 a Tuberculosis Sanatorium was established<br />
at Bangalore, similar to those at Mysore. To provide facilities for<br />
treatment of Bangalore patients those who were admitted to<br />
Epidemic diseases hospital for treatment so, the government<br />
22 Palace Maramath file no B-60 of 1917, p.242 Divisional Archives Mysore.<br />
23 Palace Maramath file no B-24 of 1920 p.349 Divisional Archives Mysore.<br />
Maharajas College, University of Mysore, Mysore, India<br />
decided to provide separate Tuberculosis sanatorium, a new<br />
building was constructed costing Rs. 3, 35000 at Bangalore. It<br />
also established dispensaries and clinics for the treatment of<br />
Tuberculosis for early detection of cases. 24 Tuberculosis<br />
dispensary was constructed in Bangalore city with generous<br />
contribution of Rs. 25000/ from Indian Red Cross society. 25<br />
The lady Willingdon anti Tuberculosis clinic was<br />
established in Bangalore in 1938 was an out-patient clinic where<br />
provision also made for six beds. A specialist was placed incharge<br />
of this clinic and arrangements were made for home visits<br />
of patient for diagnosis and both in-door and out-door patient<br />
were treated in the Tuberculosis Dispensary. 26 A tuberculosis<br />
Hospital was established at Davanagere, on 2 nd April 1939<br />
with generous contribution by Mr. Hanagavadi Murigappaiya. A<br />
specially trained Sub-Assistant Surgeon was in-charge of the<br />
Dispensary. E.T.C.M. Hospital Kolar and St. Theresa’s<br />
Sanatorium, Yeswanthpur also received grants. His Highness,<br />
generously donated Rs.10.-000 from his privy purse to the ―Anti-<br />
Tuberculosis Fund‖ which was started by Her Excellency Lady<br />
Linlithgow. 27 Steps were taken to establish Tuberculosis Clinics<br />
at the head Quarters of all districts. 28<br />
B. Investigation committee<br />
Princely State appointed Dr. P.S.Chandra Shekar., M.D.<br />
Madras, to conduct investigation of the conditions prevalent in<br />
the state regarding to Tuberculosis and survey of the state. Dr.<br />
P.S.Chandra Shekar, who toured all over the State and visited all<br />
districts, Municipal and epidemic hospitals to examine the<br />
conditions of the people and he considered that disease was not<br />
frequently occurring in the State, and the disease was fairly<br />
prevalent in towns and cities more frequently than rural parts.<br />
He collected 146 reports from medical officers of the state, most<br />
of them considered that the disease in towns and cities are more<br />
frequent than rural parts. 29<br />
C. Special Campaign<br />
A committee was constituted with 16 members for the<br />
campaign, they took steps in different methods of propaganda in<br />
bringing knowledge and creating awareness about the disease<br />
and its proper treatment to the notice of the public. Special<br />
Lectures were delivered on T B, Practical demonstration of case<br />
being conducted every year, popular instructions were given by<br />
means of colour posters, lantern slides and issued pamphlets. 30<br />
24 Letter no G C 158, Public Work Department files no 123 of 1945.<br />
25 Administration Report of Mysore, 1932, p. 51. Divisional Archives<br />
Mysore.<br />
26 Administration Report of Mysore, 1938, p. 151, Divisional Archives<br />
Mysore.<br />
27<br />
August, 1939, Mysore Information Bulletin.<br />
28<br />
Administration Report of Mysore, 1945, p. 151.<br />
29<br />
Mysore Health department Bulletin, no.2.1927. Karnataka State Archives<br />
Bangalore.<br />
30<br />
Palace Maramath file no B-138 of 1920 p.1-14, Divisional Archives Mysore<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 375<br />
ISSN 2250-3153<br />
D. Special Course<br />
Medical Department started a post graduation training course<br />
for medical officers in the treatment of T B for selected four<br />
assistant surgeons every year for a period of 3 months at Princess<br />
Krishnajammanni Tuberculosis Sanatorium Mysore with<br />
special allowance of Rs.20. 31 Special Lectures were also<br />
conducted at Bangalore for a week in every year to the MBBS<br />
students. 32<br />
E. Special Training<br />
A medical officer from the Gunamba maternity and child<br />
welfare trust Mysore was sent as the recipient of the Carlo<br />
Forlanini Institute scholarship of Rome for a course of study in<br />
the treatment and care of Tuberculosis. Princely mysore adopted<br />
Methods for organizing the Tuberculosis Services in the State,<br />
and Constituted an Anti – Tuberculosis Association at Mysore<br />
in the year 1927. 33<br />
F. Bureau of Health Education<br />
The bureau educates the public on health matters through<br />
propaganda, publicity and exhibitions. The Government Policy<br />
towards expansion of medical relief in the State, particularly in<br />
rural areas had led to a steady increase in the number of medical<br />
institutions in the State. In the year 1936, a Health trainingcum-Demonstration<br />
Centre was established in Ramanagaram<br />
near Bangalore with the financial and technical assistance of the<br />
Rockefeller Foundation. 34 The arrangement was made to the<br />
Public health department to have a motor vehicle Van<br />
working to create awareness among public and it covered 714<br />
miles in the year1940, by screening special cinema shows on<br />
health education. 35<br />
III. CONCLUSION<br />
The mortality rate was considerably reduced with the rapid<br />
implementation of welfare services in the state.<br />
AUTHORS<br />
Dr.Thriveni, Maharajas College, University of Mysore, Mysore,<br />
India. Email id - thriveniurs@gmail.com<br />
31 Mysore Health Department Bulletin, no.2.1927.<br />
32 Government order no G- 9151-68, 1929.<br />
12 Medical Department files no 43 of 1927 p. I-5, Karnataka State Archives,<br />
Bangalore.<br />
34 Kamath U Suryanatha Karnataka State Gazetteer Vol-II p.675<br />
35 Mysore Information Bulletin July 1940<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 376<br />
ISSN 2250-3153<br />
To study the prevalence of overweight and obesity<br />
among school children (13-17yrs) in relation to their<br />
socioeconomic status and Eating habits<br />
Garvita Jain 1 , Dr (smt) S.K Bharadwaj 2 , Dr (smt) Abhaya R. Joglekar 3<br />
1 Research scholar, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh<br />
2 Principal, Govt. D.T College, Utai, Durg, Chhattisgarh<br />
3 Professor, Department of Home science, Dr.R.B Govt Navin Kanya College, Raipur, Chhattisgarh<br />
Abstract- Overweight and obesity are important determinants<br />
of health leading to adverse metabolic change and increase the<br />
risk of non communicable diseases. The objective of this study<br />
was to assess the prevalence of overweight and obesity as<br />
defined by the CDC growth chart among school going children in<br />
Bhilai Nagar, Chhattisgarh correlated with their socioeconomic<br />
status and eating habits. The study was carried out in 500<br />
students of 13-17yrs of age having different SES. The obesity<br />
and overweight were considered using an updated BMI<br />
reference. SES and eating habits were determined using pretested<br />
questionnaire. The prevalence of overweight/obesity is a<br />
problem of affluent children going to various schools in Bhilai<br />
city. In the present study it is found that the magnitude of<br />
overweight (23.8%) and obesity (8.4%) is very high and<br />
alarming for both the sex. eating habits like junk food, chocolate,<br />
eating in front of TV etc remarkable effect on prevalence on<br />
overweight and obesity among low to high SES group. The study<br />
also suggested that under nutrition rates remain high (10.2%) in<br />
children. Therefore Special attention has to given for their overall<br />
nutrition.<br />
T<br />
I. INTRODUCTION<br />
hirty years ago, fundamental changes in social and economic<br />
situation occurred all over the world, thus leading to the<br />
presence of modern conveniences in homes as well as in the<br />
work place. These changes have shifted societies from<br />
communicable to non-communicable diseases (NCD) 1,2,3 .<br />
Overweight and obesity are a serious health problem, since they<br />
are associated with other diseases, and they contribute to ill<br />
health 4 .The world Health Organization (WHO) describes<br />
overweight and obesity as one of today‘s most important public<br />
health problems, which is escalating as a global epidemic 5 . It is<br />
also increasingly recognized as a significant problem in<br />
developing countries and countries undergoing economic<br />
transition 6 . The problem of overweight and obesity is confined<br />
not only to adults but also being reported among the children and<br />
adolescents of developed as well as developing countries. Since,<br />
adolescence is a period of transition from childhood to<br />
adulthood; it assumed critical position in the life cycle of human<br />
beings, characterized by an exceptionally rapid rate of growth 7 .<br />
The prevalence of overweight and obesity among children and<br />
adolescents has increased significantly in the developed countries<br />
during the past two decades 8,9 and similar trends are being<br />
observed even in the developing world 10 .In India the problem of<br />
obesity has been scantily explored even in the affluent population<br />
groups. Studies from metropolitan cities in India have reported a<br />
high prevalence of obesity among affluent school children 11,12 .<br />
On the other hand some studies reported a high prevalence of<br />
under nutrition among rural school children and children in urban<br />
slums 13,14,15,16 . 50-80% of obese children will grow up to become<br />
obese adults 17 and it is harder to treat obesity in adults than in<br />
children18 In children, the development of obesity is associated<br />
with the simultaneous deterioration in chronic diseases risk<br />
profiles. 19,20 . Excess weight in this age is the leading cause of<br />
pediatric hypertension, and overweight children are at a high risk<br />
for developing long-term chronic conditions, including adultonset<br />
diabetes mellitus, coronary heart disease, orthopedic<br />
disorders and respiratory diseases 19,21 .Therefore, it was proposed<br />
to carry out a study to asses and identify the prevalence and<br />
determinants of overweight and obesity among urban school<br />
going children covering statistically adequate sample in<br />
Chhattisgarh, Bhilai city which is one of the economically,<br />
industrially and culturally fast growing state. Obesity prevalence<br />
depended on many factors. During the scanning of relevant<br />
literature not a single study was found in impact of obesity in<br />
school children has been examined in Chhattisgarh.<br />
Our main objective was to examine the prevalence of<br />
overweight and obesity in school children using internationally<br />
based cutoff points and compare the relationship between SES<br />
factors and eating habits.<br />
II. MATERIALS AND METHODS<br />
This study was conducted from April 2009 to December 2010.<br />
From a list of all public and BSP schools in Bhilai Nagar were<br />
selected randomly using a random table. Permission of the school<br />
Principals was taken before conducting the study. Total of about<br />
500 children‘s, i.e. 100 children‘s each of 13-17 yr, about 125<br />
from each of the four selected schools studying in class standards<br />
7th to12th were included in the study. Classes were selected<br />
randomly from each of the four schools and all the children‘s<br />
present in the selected classes were asked to take part in the<br />
study. Their informed and written consent to the study was taken.<br />
Their exact ages were as ascertained from the school register.<br />
Data was collected in the form of general information. Semi<br />
non quantitative food frequency questions were asked in simple<br />
language to facilitate better results. Total 31 items were recorded<br />
as daily/more than once, once/day, 2-3 times /week, seldom and<br />
never; scoring was done accordingly as per the responses. Sociodemographic<br />
data were collected in the form of family income,<br />
parents‘ educational status, number of family members and<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 377<br />
ISSN 2250-3153<br />
working status of the parents. All the anthropometric<br />
measurement was taken in school premises with standard<br />
procedure. We have recorded body weight to the nearest 0.1 kg<br />
using a standard balance scale with subjects barefoot and<br />
wearing light indoor clothing. Body Height was measured by<br />
scale was used up to an accuracy of 1mm. Body mass index<br />
(BMI) was defined as the ratio of body weight to body height<br />
squared, expressed as kg/m 2 . Overweight and obesity was<br />
assessed by BMI for age (6). Student who had BMI for age >85th<br />
and < 95 th percentile of reference population were classified as<br />
overweight. Students who had BMI for age > 95 th percentile of<br />
reference population were classified as obese. We examined the<br />
prevalence of overweight and underweight in each gender by age<br />
group, sex and SES. Group comparisons were performed using<br />
ANOVA as appropriate.. A p value below or equal to 0.01 was<br />
considered to be statistically significant. Influence of various<br />
factors on prevalence of underweight, normal, overweight and<br />
obesity were expressed in form of percentage. The collected data<br />
was entered into the computer using software program MS Excel.<br />
III. RESULT<br />
A total number of 500 with age group between 13-17 years<br />
from different school were screened for their height, weight and<br />
body mass index. Out of 500 children 273 (%) were boys and<br />
227 (%) were girls. The BMI were little higher in girls than boys<br />
(table1). However, these differences were not significantly<br />
different with respect to gender. Among the 500 subjects,<br />
23.44% of the males were overweight, and 8.02% were obese,<br />
55.67% normal and 12.82% were underweight. While 24.22% of<br />
the female were overweight and 8.81% were obese, 59.91%<br />
normal and 7.04% were under weight (table1; figure1).<br />
The prevalence of overweight and obesity and its relationships<br />
with socioeconomic status are present in table2. The subjects<br />
belonging to high socioeconomic status would score significantly<br />
higher on body mass index than the subjects from low<br />
socioeconomic status group (figure2). The BMI of subjects<br />
consuming excessive food is significantly higher than the<br />
subjects who consume low calorie food beyond .01 level of<br />
significance (table 2). Vegetarian diet or non-vegetarian diet did<br />
not have any effect on prevalence of underweight, overweight<br />
and obesity, but junk food , beverages and eating meal pattern in<br />
front of T.V have more prevalence of obesity and overweight<br />
than underweight indicates that caloric intake is associated with<br />
increase in BMI.<br />
Table 1: Overweight /obesity of Subjects on the Basis of Gender and BMI Categories<br />
BMI Categories<br />
Gender<br />
Male<br />
(N=273)<br />
Female<br />
(N=227)<br />
Total<br />
(N=500)<br />
Underweight Normal Over Weight Obese<br />
N % N % N % N %<br />
35 12.82 152 55.67 64 23.44 22 8.02<br />
16 7.04 136 59.91 55 24.22 20 8.81<br />
51 10.2 288 57.6 119 23.8 42 8.4<br />
Figure1: Relationship of sex of school children with BMI<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
378<br />
ISSN 2250-3153<br />
Figure 2: Mean and SD of BMI (Kg/m 2 ) of subjects at their Socio-Economic Status Levels<br />
IV. DISCUSSION<br />
The present study showed that the prevalence of overweight<br />
was high among children, 23.44% boys, and 24.22% in girls. The<br />
relatively high prevalence of overweight (23.8%) is alarming.<br />
Overweight children often become overweight adult and<br />
overweight in adulthood is a health risk. The obesity was seen in<br />
8.05% of boys and 8.81% of girls. An important finding of this<br />
study is an ever burgeoning prevalence of obesity among the<br />
school going children when compared to previous survey in<br />
India. This study has shown higher figures which is suggestive of<br />
the obesity epidemic in 21 st century. The reason for higher<br />
prevalence of obesity among children‘s due to selection of the<br />
subjects from very affluent societies and few schools. The<br />
prevalence of overweight and obesity was significantly higher<br />
among girls in the present study, which is comparable with<br />
figures reported for other developing countries 22,23 .<br />
A clear socioeconomic gradient in the prevalence of<br />
overweight and obesity was observed in the present study, which<br />
is consistent with those earlier studies who reported that BMI is<br />
influenced by different SES backgrounds 22 . The finding of<br />
present study showed significantly positive correlation between<br />
BMI and excessive food consumption. This agrees with a study<br />
done by Thompson et al; 24 where they reported that the<br />
frequency of eating quick food was positively associated with<br />
BMI z-score in their longitudinal study among girls at<br />
Massachusetts institute of technology. Present study focused<br />
their analysis on type of diet (vegetarian, eggetarian and<br />
nonvegetarian), junk food, frequency of eating pattern and eating<br />
behavior in front of TV etc because that they have special role in<br />
obesity. The dietary indulgence in high fatty foods intake and<br />
sedentary life styles in the higher socioeconomic group are well<br />
known causes for overweight and obesity. This study has thus<br />
highlighted the need to not only improve the awareness on<br />
prevention of obesity among children but a need to motivate and<br />
reinforce them to practice healthy lifestyle is utmost essential<br />
V. CONCLUSION<br />
Overweight (23.8%) and obesity (8.4%) is very high and<br />
alarming for both the sex. The prevalence is comparable to other<br />
national studies; again there is paucity of data. The study also<br />
suggested that under nutrition rates remain high in children.<br />
Therefore Special attention has to given for their overall<br />
nutrition.<br />
REFERENCES<br />
[1] Ulijaszek S.J. a disorder of convenience. Obesity Reviews; (2007) 8(S1):<br />
183-187.<br />
[2] Farooqi IS, O‘Rahilly S. Genetic factors in human obesity. Obesity Review;<br />
(2007) 8(s1): 37-40.<br />
[3] Abdul-Rahim Hf, Abu-Rmeileh NME, Husseine A, Homloe-ottesen G,<br />
Jervell j, Bjertness E Obesity and selected co-morbidities in an urban<br />
Palestinian population. International Journal of Obesity; (2001) 25: 1736-<br />
174<br />
[4] Kopelman P. Health risks associated with overweight and obesity. Obesity<br />
Reviews; (2007) 8(s1): 13-17.<br />
[5] WHO Nutrition http: www.who.int/nut/obs/ht, accessed in 2003.<br />
[6] Popkin BM. the nutrition transition and obesity in the developing world.<br />
Nutritional Journal; (2001) 131: 871 s- 873.<br />
[7] Tanner JM. Fetus into man: Physical growth from conception to maturity.<br />
New York wells, open book publishing limited, 1978: pp 22-36.<br />
[8] Chinn S, Rona RJ. Prevalence and trends in overweight and obesity in three<br />
cross-sectional studies of British children, Br Med J; (2001) 197-494; 322:<br />
24-26.<br />
[9] Louis A Baur. Child and adolescent obesity in 21 st century: an Australian<br />
perspective, Asia pacific Journal of clinical nutrition; (2002) 11(suppl): (s<br />
524- s 528).<br />
[10] Martorell R, Kettel Khan L, Hugher ML, Grummer Strawn LM.<br />
Overweight and obesity in preschool children from developing countries,<br />
Int J Obes Relat Metab Disord; (2000) 24: 959-967.<br />
[11] Sundaram KR, Ahuja RK andRamachandran K. Indices of physicalbuild<br />
nutrition and obesity in schoolgoing children. Indian J Pediatr. 1988; 55:<br />
889-898<br />
[12] Gupta AK. and Ahmad AJ. Childhood obesity and hypertension. Indian<br />
Pediatr.1990; 27: 333-337. Kapil U, Singh P, Pathak P, Dwivedi SN. and<br />
Bhasin S. Prevalence of obesity amongst affluent adolescent school children<br />
in Delhi. Indian Pediatr. 2002; 39: 449-452.<br />
[13] Sachdev HPS. Recent transitions in anthropometric profile of Indian<br />
children: clinical and public health implications. F.I. Bull. 2003; 2 4: 6-8.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 379<br />
ISSN 2250-3153<br />
[14] Bhargava SK, Sachdev HPS, Fall CHD, Osmond C, Lakshmy R, Barker<br />
DJP, Biswas, SKD, Ramji S, Prabhakaran D and Reddy KS. Relation of<br />
serial changes in childhood body-mass index to impaired glucose tolerance<br />
in young adulthood. N. Engl. J. Med.2004; 350: 865-875.<br />
[15] Vedavathi S, Jayashree R, RafiM. Prevalence of Overweight & Obesity in<br />
Affluent adolescent school girls in Chennai in 1981 & 1998. Indian<br />
Pediatrics, 2003; 40; 775-779.<br />
[16] Kapil U et al. Prevalence of obesity among Affluent adolescent school<br />
children in Delhi. Indian Pediatrics.2002; Vol 39: 449- 452.<br />
[17] Styne DM. Childhood obesity and adolescent obesity: PCNA. 2001; 48:<br />
823-847.<br />
[18] Park K. Park‘s textbook of Preventive and Social Medicine: Banarsidas<br />
Bhanot Publishers, 18th Edition. 2005; 316- 319.<br />
[19] Dietz WHJ. Obesity in infants, children, and adolescents in the United<br />
States. Identification, natural history, and aftereffects. Nutr Res. 1981; 1:<br />
117-137.<br />
[20] Aristimuno GG, Foster TA, Voors AW, Srinivasan SR, Berenson GS.<br />
Influence of persistent obesity in children on cardiovascular risk factors: the<br />
Bogalusa Heart Study. Circulation 1984; 69: 895- 904<br />
[21] Dietz WH. Childhood weight affects adult morbidity and mortality. J Nutr<br />
1998; 128: (Suppl 2) 411S-414S.<br />
[22] Kaur S, Kapil U, Singh P. Pattern of chronic diseases amongst adolescent<br />
obese. Children in developing countries cur Sci.; (2005) 88: 1052-6.<br />
[23] Sakmota N, Wansorns S, Tantrisirink, Marni E. A social epidemiological<br />
study of obesity among preschool children in Thailand. Int J Obes Relat<br />
Metab Disord; (2001) 25: 389-94.<br />
[24] Thompson OM, Ballew C, Resnicow K, Must A, Bandini LG, Dietz WH.<br />
Food purchased away from home as a predictor of change in BMI z-score<br />
among girls. International Journal of obesity and Relate Metabolic<br />
Disorder; (2004) 28(2):282-9.<br />
AUTHORS<br />
First Author – Garvita Jain Research scholar, Pt. Ravishankar<br />
shukla university, Raipur, Chhattisgarh.<br />
Email id - garvita_jain24@rediffmail.com<br />
Second Author – Dr (smt) S.K Bharadwaj Principal, Govt. D.T<br />
College, Utai, Durg, Chhattisgarh.<br />
Third Author – Dr (smt) Abhaya R. Joglekar Professor,<br />
Department of Home science, Dr.R.B Govt Navin Kanya<br />
College, Raipur, Chhattisgarh.<br />
Email id - abha_abhaya@yahoo.co.in<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 380<br />
ISSN 2250-3153<br />
Condition based reporting of multi-machine monitoring<br />
system using GSM<br />
Jinia Datta(Das), Soumyajit Datta, Sumana Chowdhuri and Jitendranath Bera<br />
Abstract- This work describes a condition based reporting<br />
technique of a multi-machine System using GSM technology. In<br />
this present approach, a dedicated microcontroller based<br />
hardware unit (DHU) has been developed to continuously<br />
measure the parameters of the motors viz. voltage, current, speed<br />
etc. to monitor the running condition of each motor in a plant. In<br />
a multi-machine monitoring system each motor is connected with<br />
one such DHU, which are also connected to a Global System for<br />
Mobile Communication (GSM) modem. The preliminary level of<br />
fault or abnormality in operation of each machine is diagnosed<br />
by the respective DHU and the fault or abnormalities details are<br />
reported to the pre-assigned operator through an SMS service. In<br />
extreme case, the provision of machine shut down by a return<br />
SMS is also provided. A proto-type lab model is set up and is<br />
working satisfactorily.<br />
Index Terms- GSM Modem, Machine Fault Reporting, Multi-<br />
Machine Monitoring, SMS Service.<br />
E<br />
I. INTRODUCTION<br />
lectrical machines, installed in different locations in a plant,<br />
are needed to be monitoring and control for their healthy<br />
operation and smooth running of the plant. It is not always<br />
possible, rather difficult, to keep track of all the machines at a<br />
time simply by days long manual observation. On the other side,<br />
modern civilization is advancing at very faster pace with the<br />
adoption of wireless technology. The convergence of wireless<br />
technology and the embedded technology with the different<br />
transducers makes these supervisory systems more reliable, much<br />
efficient as well as cost effective one. Keeping this in mind, the<br />
present approach has been made to apply the advantages of<br />
wireless communication and embedded technology towards<br />
electrical machines condition monitoring and automation. This<br />
work describes the development of a supervisory automated<br />
reporting system for remote condition based monitoring,<br />
analyzing and control of electrical parameters of different<br />
machines of a plant or in power station, sub-station etc so as to<br />
enhance the overall system performance using GSM (The Global<br />
System for Mobile Communication) communication.<br />
A detailed discussion [1] on electrical drive condition based<br />
monitoring, diagnostic research and development is made for the<br />
smooth running of the machines. In Ref. [1] the authors dealt<br />
with a state-of-the-art discussion of the electrical drive condition<br />
monitoring, diagnosis, research and development, highlighting<br />
analytical and technical considerations as well as various issues<br />
related to different failures.<br />
Among different parameters of induction machine monitoring<br />
of stator voltage, stator current, rotor speed are most important<br />
for early detection of fault in the machine. Speed and winding<br />
current estimation is helpful to determine the mechanical stresses<br />
like bearing failure or shaft failure, turn to turn short circuit,<br />
cracked/broken rotor [2]-[4],[8]-[10]. Continuous current<br />
monitoring to obtain the running condition of an induction<br />
machine is important and has been discussed in [5]-[7].<br />
Now-a-days wireless and mobile communication is the major<br />
tool that can be used to provide the information to the operator or<br />
concerned authority for their supervisory control. These issues of<br />
mobile communication technology in the recent years have been<br />
extensively used in different form in different application areas<br />
[18], [19], [21]-[23].<br />
The application of less expensive but more powerful<br />
microcontroller will lead this data acquisition system more<br />
simple. The convergence of microcontroller based hardware with<br />
the wireless communication system (like GSM, GPRS) is<br />
becoming very popular choice to the researchers and scientists<br />
for such type of fault detecting, reporting, diagnosis and control<br />
applications.<br />
In this scheme, a state-of-the-art stand alone Dedicated<br />
Hardware Unit (DHU) is developed using microcontroller for<br />
monitoring the machine parameters like instantaneous voltage,<br />
current and speed of a machine in a typical plant. The DHU is<br />
responsible for measuring the machine basic parameters and<br />
controlling the supply to the motor and hence DHU is located at<br />
the machine site with one card per machine basis. The card is<br />
also interfaced with GSM modem for GSM based wireless<br />
accessing. There will be multiple cards for multiple machines<br />
system. Each DHU compares the measured value with pre-set or<br />
limiting values of the above mentioned parameters and if any<br />
abnormalities are detected an SMS is generated and is sent to the<br />
pre-located mobile or central station. The receiver may then send<br />
a return SMS requesting the details of the abnormalities. Upon<br />
receiving this request the details of the fault are then sent through<br />
another SMS by the DHU and it will take the appropriate action<br />
as per the content of the return message.<br />
I. MATERIALS AND METHODS<br />
The developed GSM based remote fault reporting system<br />
consists of three main blocks viz. DHU, GSM Modem, Mobile<br />
unit or central control Station as shown in Fig 1. In a plant with<br />
multi-machine operating, each machine is associated with a DHU<br />
for data acquisition to measure different parameters. All such<br />
units in this multi-machine system are interfaced with any remote<br />
mobile station through GSM technology. A preliminary level of<br />
abnormal running condition is detected by the DHU when the<br />
measured parameter exceeds beyond their set or limiting values.<br />
At this situation /stage, the DHU generates a message and sends<br />
it to the pre-assigned operator in form of SMS through GSM<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 381<br />
ISSN 2250-3153<br />
modem. Realising the criticalness of the SMS or in case of an<br />
emergency situation the operator/the receiver of this SMS will be<br />
able to turn off this particular machine by sending another SMS<br />
from his/her mobile to that DHU. Hence the total work can be<br />
divided into two parts –where the development of<br />
microcontroller based DHU for different parameters<br />
measurement with some emergency control as first part and the<br />
development of GSM modem based SMS service system as<br />
second part.<br />
Fig. 1 Block diagram of PC based wireless monitoring of multimachine<br />
system<br />
A. Dedicated Hardware Unit for Data Acquisition<br />
The DHU is designed around an 8 bit microcontroller along<br />
with different transducers for parameters measurements, as<br />
shown in Fig 2.<br />
Fig. 2 Schematic diagram of a particular DHU<br />
In each DHU, the microcontroller is interfaced with different<br />
sensors like potential transformer (PT), current transformer (CT)<br />
or hall sensor (HS), proximity sensor (PS) through proper<br />
hardware circuitry in order to measure the applied voltage,<br />
inflowing current and speed of the motor. The firmware is<br />
designed in such a way that it is able to detect preliminary<br />
abnormal situations like over voltage, under voltage, over<br />
current, over load, short circuit current, over speed, single<br />
phasing etc. The fault or abnormal conditions are also classified<br />
into different levels or priorities. Depending upon the priority of<br />
the type of abnormal conditions the DHU decides its action. In<br />
case of highest priority abnormal conditions the machine will be<br />
isolated from supply. Once a fault of such kind is initiated, other<br />
than taking the preliminary action the DHU also dictates the<br />
GSM modem to communicate the abnormality along with its<br />
type, as occurred in the system, by generating a fault respective<br />
SMS.<br />
On receiving the SMS, the person or the operator at Mobile<br />
unit and/or central control Station may have some details query<br />
and accordingly a message requesting the details of the abnormal<br />
situation(s) can be sent to that DHU. On its reply, the DHU will<br />
send some details of voltage, current, speed etc. at the time of<br />
abnormal situation(s) through another message.<br />
B. GSM Modem Interfacing with DHU<br />
The GSM modem (i-300 GSM Modem. It supports GSM<br />
07.07, 07.05 and SIMCOM enhanced AT commands) is built<br />
with a COM port with RS232 protocol based interfacing facility.<br />
Hence the microcontroller is connected with the modem using<br />
9600, N, 8, 1 protocol after the necessary hardware interfacing<br />
for proper TTL to RS 232 level conversion. As the modem works<br />
on AT command sets, following AT commands are to be sent to<br />
the modem in order to execute the SMS services.<br />
[25] First the microcontroller has to send ―AT‖ command word.<br />
A response ―ok‖ is returned from the GSM modem. The<br />
microcontroller sends another query by sending<br />
―AT+CPIN?‖ to get the PIN (Personal Identification<br />
Number).If the SIM card is ready for the use, the response<br />
―+CPIN: READY‖ is returned. After this, following AT<br />
commands are to be sent for the required SMS services.<br />
[26] For the configuration of the GSM modem in text mode of<br />
SMS the AT Command AT+CMGF = 1 is to be sent.<br />
[27] In order to send the SMS, the desired mobile number is to be<br />
sent with ―AT+CMGS=+91xxxxxxxxxx‖AT Command.<br />
[28] The desired message, containing a maximum of 160<br />
characters, is to be constructed and to be sent to the modem.<br />
After then the ASCII code for ‗CTRL+Z‘ character is also to<br />
be sent to the modem in order to transmit the message to<br />
mobile phone +91xxxxxxxxxx.<br />
In a similar way, any message received by the GSM modem<br />
will be sent to the microcontroller for its decoding and<br />
proper action.<br />
C. Hand held Mobile unit or GSM Modem at the central<br />
control station<br />
The Hand held Mobile station may be of any mobile unit who<br />
can roam around but still have the facility to monitor the status of<br />
the motor through SMS services with the corresponding DHU. In<br />
extreme case or for any emergency situations this station can stop<br />
the motor from its running through a return SMS. At the same<br />
time the operator at the central control station can be instructed<br />
for the due course of action based on the SMS from the DHU.<br />
The DHU can also send the same SMS to the central control<br />
station where a PC based monitoring, and reporting system is<br />
installed. On receiving the SMS from DHU or getting instruction<br />
from the hand held station the operator at the central control<br />
station performs the required task through a return SMS to the<br />
DHU. The PC software has the capability to store this<br />
communications for future analysis.<br />
A GSM modem is thus installed at the central control station<br />
in order to have the SMS communication with the DHU and it is<br />
connected with the PC through its COM port.<br />
The SIM numbers of the hand held station as well as the<br />
central station must be pre-loaded to the DHU.<br />
II. PARAMETERS MEASUREMENT TECHNIQUE<br />
A. Voltage and Current Measurement<br />
Input voltage to the drive is reduced for the measurement<br />
purpose to a level, by Potential Transformer (PT) and Potential<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 382<br />
ISSN 2250-3153<br />
Divider (PD), compatible to ADC of DHU. The transformation<br />
ratio from input to DHU end will enable to find out the actual<br />
voltage. The transformation ratio and the gain of the PD are<br />
adjusted so that +5V and 0 V at the ADC input corresponds to +<br />
360.6 V and -360.6 V peak value of supply voltage.<br />
The measurement of current is accomplished by Hall Sensor<br />
(HS), with sensitivity (S). The sensor‘s output is current which is<br />
converted to voltage by passing this output current through the<br />
series resistor, Rm as an ohmic drop. Here also this output voltage<br />
across the series measuring resistance Rm (100Ω-320 Ω) of HS,<br />
is reduced by Potential divider (PD) accordingly to make it<br />
compatible to ADC. The current is calibrated as,<br />
V<br />
i <br />
SR m<br />
B. Speed Measurement<br />
Shaft speed information is provided by using one Proximity<br />
Sensor (PS) mounted on the stator housing along with one<br />
metallic screw connected to the rotor shaft. This arrangement<br />
generates pulsed output, the frequency of which depends on<br />
speed of the motor. This signal is fed to the interrupt pin of the<br />
microcontroller of DHU for its measurement, where it interrupts<br />
the microcontroller at its every falling edge. The interval between<br />
successive interrupts i.e. the pulse period is measured with a 16<br />
bit counter where the counter increases its count value at the<br />
clock frequency fclk which is generated by the over flow rate of<br />
timer 0 of microcontroller. If Nsp be the count value of the<br />
counter for the pulse period, which is actually the counts between<br />
successive edges, the speed in rpm (ω) can be calculated by the<br />
equation as,<br />
fclk<br />
60<br />
<br />
N<br />
SP<br />
The timing diagram of the reference clock frequency and<br />
different count values for the measurement of speed, frequency<br />
and power factor is shown if Fig.3.<br />
(2)<br />
(1)<br />
Fig. 3 Timing diagram to measure speed<br />
C. Abnormality detection state Chart Diagram with DHU<br />
An elegant way to depict a real time system is to use state<br />
Chart Diagram [22].In this work the abnormality detection and<br />
GSM activation by DHU is represented by state chart (Fig 4).<br />
Here different states are represented by rectangular boxes. For<br />
example, Voltage, current and speed are measured continuously.<br />
If any abnormality appears the DHU sends warning to the GSM<br />
modem or otherwise if any request comes from the remote<br />
station then DHU also sends the requested information. Depths<br />
of different states are indicated by drawing small boxes within<br />
the large box. The state transitions are indicated by the arcs<br />
joining the boxes. Concurrencies of different states are indicated<br />
by dotted lines.<br />
Fig. 4 State Chart diagram of DHU algorithm<br />
III. GSM BASED SMS REPORTING STRUCTURE<br />
In case of an emergency situation or faulty condition the DHU<br />
generates the SMS and sends it to the pre-assigned node number<br />
/operator through GSM Modem. Then the operator gets<br />
notification about the type of fault, caution level and details of<br />
the fault through this message.<br />
SMS structure generated by the microcontroller will be as<br />
follows<br />
Where represents the blank space, Machine (M/C) number<br />
(NO) is represented by a three digit number (nnn), running<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 383<br />
ISSN 2250-3153<br />
Voltage (V) is three digit value (mmm) V, current (A) is two<br />
digit value (qq), speed (N) is four digit (pppp) RPM. This is a 40<br />
digit message structure.<br />
If abnormal condition occurs or if request comes from central<br />
station then the message structure will be as below followed by<br />
the type of abnormality.<br />
DHU generates SMS to indicate the cause of abnormality. There<br />
are different levels of fault detection (UV) and over voltage (OV)<br />
detection is made. But in case of current there are three levels of<br />
abnormal condition. Like up to a certain percentage of rated<br />
current the system will show over current (OC), then above this<br />
value up to another level the system shows over load condition<br />
(OL) and beyond another level of current the system gives short<br />
circuit (SC) condition ( Table 2). In speed messaging only one<br />
level (OS) is detected. Among all these abnormal conditions,<br />
DHU may be then dictated for shut down in some of the extreme<br />
cases.<br />
Table 7: Different levels of fault conditions<br />
[1] Conditions [2] Message<br />
indication<br />
[3] Over Voltage [4] OV<br />
[5] Under voltage [6] UV<br />
[7] Over Current [8] OC<br />
[9] Over Load [10] OL<br />
[11] Short<br />
Current<br />
Circuit [12] SC<br />
[13] Over Speed [14] OS<br />
IV. RESULTS<br />
The experimental setup of multi-machine system from remote<br />
mobile station is shown below<br />
Fig. 5 Experimental Set-up<br />
The SMS format for reporting of a particular type fault of<br />
multi-machine system from remote mobile station is shown<br />
below<br />
[15] Rated<br />
Curr<br />
ent<br />
Table 2: Current based SMS level status<br />
[16] Current<br />
Drawn<br />
[17] Report<br />
Status<br />
[18] Probable<br />
action<br />
from<br />
operator<br />
via<br />
replay<br />
[19] 1<br />
Amp<br />
[23] 1<br />
Amp<br />
[27] 1<br />
Amp<br />
[31] 1<br />
Amp<br />
message<br />
[20] < 1Amp [21] Nil [22] Allow<br />
[24] 1.1 Amp [25] Over<br />
Current<br />
[28] 1.5 Amp [29] Over<br />
Load<br />
[32] Above 2<br />
Amp<br />
[33] Short<br />
Circuit<br />
Conditi<br />
on<br />
V. DISCUSSION AND FUTURE SCOPE<br />
[26] Allow<br />
[30] Take<br />
necessary<br />
action<br />
[34] Shut<br />
down<br />
The uniqueness of the proposed system is that the abnormal<br />
running conditions of electric machines installed at different<br />
geographical locations in a plant are detected, diagnosed and<br />
reported to any mobile and /or central control station.<br />
The self developed DHU, other than sending the SMS to any<br />
desired SIM of mobile unit or central control station, can also<br />
take the preliminary action to stop the motor either of its own or<br />
by an instruction received from a return SMS.<br />
The desired SIM numbers are pre-loaded within the memory<br />
of each DHU and the same message is sent to all of them one by<br />
one.<br />
In the central control station, a PC is interfaced with the GSM<br />
modem which will store the messages for any future analysis of<br />
the faults. Simple VB based software is developed to capture the<br />
SMSs through its serial port and to store them in a DOC file.<br />
The prototype system is tested with one Induction machine<br />
and it can easily be extended to any number of machines by<br />
connecting the DHU and the GSM modem.<br />
The GPRS technology can also be incorporated for details<br />
diagnosis of the system monitoring continuous data of the<br />
machine from the central control station.<br />
ACKNOWLEDGEMENT<br />
This work is under the auspices of UGC –SAP-DRS-I Project<br />
Authors Acknowledge Mr. Ranjit K. Paul for his untiring help in<br />
technical development of this work.<br />
REFERENCES<br />
[1] K. Singh, Sa‘ad Ahmed Saleh Al Kazzaz, ―Induction machine drive<br />
condition monitoring and diagnostic research-/a survey,‖ Electric Power<br />
Systems Research Vol. 64 No. , Elsevier Science, pp. 145-158, 2003.<br />
[2] Der Minassians, H. MeshginKeik, H.A. Toliat, Milimonfared,and Subhasis<br />
Nandi, ―A Novel Approach for Broken Rotor Bar Detection in Cage<br />
Induction Motors,‖ IEEE Transactions on Industry Applications vol.35,<br />
no.5, pp.1000-1006,Sept./Oct 1999.<br />
[3] Neelam Mehla, Ratna Dahiya, ―An Approach of Condition Monitoring of<br />
Induction motor Using MCSA‖ International Journal of Systems<br />
Applications, Engineering & Development vol 1. Issue1, pp 13-17, 2007.<br />
[4] Gerhard P. Hancke, Chris F.T. Viljoen, ―The Microprocessor Measurement<br />
of Low Values of Rotational Speed and Acceleration‖, IEEE Transactions<br />
on Instrumentation and Measurement, Vol. 39, No. 6, pp. 1014-1017,<br />
December 1990.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 384<br />
ISSN 2250-3153<br />
[5] C.M. Riley, ―Stator current harmonics and their causal vibrations: a<br />
preliminary investigation of sensorless vibration monitoring applications,‖<br />
IEEE Trans. Ind. Appl., Vol. 35 (1), pp 94-99, 1999.<br />
[6] C.M. Riley, B.K. Lin, T.G. Habetter, R.R. Schoen, ―A method for sensorless<br />
on-line vibration monitoring of induction machines,‖ IEEE Trans. Ind.<br />
Appl. , Vol. 34 (6), pp 1240-1245,1998.<br />
[7] F.J. Watson, G.D. Dorrell, ―The use of finite element methods of improve<br />
techniques for the early detection of faults in three-phase induction motors,‖<br />
IEEE Trans. Energy Conversation, Vol.14 (3), pp 655- 660, 1999.<br />
[8] Randy R. Schoen and et.al, ―An Unsupervised, On-Line System for<br />
Induction Motor Fault Detection Using Stator Current Monitoring,‖ IEEE<br />
Transactions on Industry Applications, vol.31, no.6, pp1280-1286,<br />
Nov./Dec.1995.<br />
[9] G.B. Kliman, J. Stein, ―Methods of motor current signature analysis‖,<br />
Electric Power Systems and Components, Taylor and Francis Publ., Vol. 20<br />
(5), pp 463-473, 1992.<br />
[10] K.R. Cho, J.H. Lang, S.D. Umans, ―Detection of broken rotor bars in<br />
induction motors using state parameter estimation‖ IEEE Trans. Ind. Appl.<br />
,Vol. 28 (3), pp. 702-708.,1992.<br />
[11] S. Vitturi, ―PC-based automation systems: an example of application for<br />
the real-time control of blowing machines,‖ Computer Standards &<br />
Interfaces, Vol. 26, Elsevier Publication, pp. 145–155, 2004.<br />
[12] Min-Chun Pan, Po-Ching Li, Yong-Ren Cheng, ―Remote online machine<br />
condition monitoring system,‖ Measurement, Elsevier Publication, Vol. 41,<br />
pp 912–921, 2008.<br />
[13] Kin Yeung, Jie Huang, ―Development of a remote-access laboratory: a dc<br />
motor control experiment‖, Computers in Industry, vol.52, Elsevier<br />
Publication, pp. 305–311, 2003.<br />
[14] W. Wang, P.W. Tse, J. Lee, ―Remote machine maintenance system<br />
through Internet and mobile communication,‖ International Journal of<br />
Advanced Manufacturing Technology ,vol. 31, pp. 783–789, 2007,<br />
[15] B. Wu, B.-H. Zhou, L.-F. Xi, ―Remote multirobot monitoring and control<br />
system based on MMS and web services,‖ Industrial Robot, Emerald, vol.<br />
34 (3), pp. 225–239., 2007.<br />
[16] L. Peretto, S. Rapuano, M. Riccio, D. Bonatti, ―Distance learning of<br />
electronic measurements by means of measurement set-up models‖,<br />
Measurement, Elsevier Publication, Vol. 41, pp 274–283,2008.<br />
[17] Kostas Kalaitzakis*, Eftichios Koutroulis, Vassilios Vlachos<br />
―Development of a data acquisition system for remote monitoring of<br />
renewable energy systems‖, Measurement, Elsevier Publication, Vol. 34,pp<br />
75–83,2003.<br />
[18] Jinia Datta (Das)*, Sumana Chowdhuri, Jitendranath Bera, Gautam Sarkar<br />
―Remote monitoring of different electrical parametersof multi-machine<br />
System using PC‖ Measurement, Elsevier Publication, Vol. 45, pp 118–<br />
125, <strong>2012</strong>.<br />
[19] L.Boquete*, I.Bravo, R.Barea, M.A.Garcia,―Telemetry and control system<br />
with GSM communication‖, Microprocessor and Microsystems, Elsevier<br />
Publication, Vol. 27, pp 1–8, 2003.<br />
[20] Joe-Air Jianga, Chwan-Lu Tsengb, Fu-Ming Lua, En-Cheng Yangc, Zong-<br />
Siou Wua, Chia-Pang Chena, Shih-Hsiang Lina, Kuang-Chang Linb,<br />
Chih-Sheng Liaob‖ A GSM-based remote wireless automatic monitoring<br />
system for field information: A case study for ecological monitoring of the<br />
oriental fruit fly, Bactrocera dorsalis (Hendel)‖ Computer and Electronics<br />
in Agriculture, Elsevier Publication, Vol. 62, pp 243–259, 2008.<br />
[21] Chawn-Lu Tsenga, Joe-Air Jianga ,Ren-Guey Lee,Fu-Ming Lu,Cheng-<br />
Shiou Ouyang,Yih-Shaing Chen,Chin-hsiang Chang―Feasibility study on<br />
application of GSM-SMS technology to field data acquisition‖ Computers<br />
and electronics in agriculture, Elsevier Publication,Vol.53, pp 45-59,<br />
2006.<br />
[22] David Harel, ― Statecharts: A Visual Formalism for Complex Syatems‖,<br />
Elsevier Publication, Science of Computer Programming Vol.8, pp 231-<br />
274, 1987.<br />
AUTHORS<br />
First Author - J. Datta(Das) is with the Birbhum Institute of<br />
Engineering and Technology, Suri (corresponding author)<br />
Email id - dattajinia@gmail.com<br />
Second Author – S. Datta is now with the Department of<br />
Applied Physics, Junior Research Fellow, University of Calcutta.<br />
Email id - sjit.cordite@gmail.com<br />
Third Author – Dr. S. Chowdhuri is with the Applied Physics<br />
Department, University of Calcutta, Kolkata<br />
Email id - sumana_cu05@rediffmail.com<br />
Fourth author: Dr. J. N. Bera is with the Applied Physics<br />
Department, University of Calcutta, Kolkata<br />
Email id - jitendrabera@rediffmail.com)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 385<br />
ISSN 2250-3153<br />
Income Elasticities of Demand for major consumption<br />
items.<br />
Case study of Kashmir University Teachers<br />
Abstract- Kashmir University teachers belong to upper<br />
sedentary and rich class is not a fact as the consumption behavior<br />
shown by them is similar to middle class society. The sample<br />
under examination differ in size of the family, age, designation,<br />
property ownership and other characteristics; in general we<br />
expect the household with above given different characteristics to<br />
have different expenditure plans but the analysis shows same<br />
expenditure by every income bracket which confirms<br />
Duessenbary‘s relative income hypothesis. While analyzing the<br />
income pattern of Kashmir university teachers we find that all<br />
observations do not lie on the straight line because in addition to<br />
the income other variables also affect consumption pattern.<br />
Direct taxes have more immediate effect on Consumption and<br />
Kashmir university teachers being healthy payer of taxes thereby<br />
their consumption pattern also shows a different behavior.<br />
Index Terms- consumption, disposable income,<br />
Duessenbary‘s relative income hypothesis, income elasticity of<br />
demand, consumer durables<br />
N<br />
I. INTRODUCTION<br />
o body denies the importance of consumers in the economy<br />
or ignores the momentous results that may flow from their<br />
decisions.<br />
The most appealing feature of economic research into<br />
consumer behavior is the close relationship between theoretical<br />
specification and appropriate estimation technique. There are two<br />
major approaches to the estimation of income elasticity, as they<br />
are usually derived from budget surveys, used by national and<br />
international agencies for the purpose of commodity projection.<br />
This is most apparent when empirical analysis and testing takes<br />
place at micro level.<br />
Attempts to discover consumer habits and preferences now<br />
depend not only on intuitive theories but also on objective<br />
research. Psychologists and economists make survey, often by a<br />
sampling process, to learn how, when, and if possible, why<br />
consumer at various incomes levels and in various places spend<br />
their money. Economists accumulate and interpret statistical<br />
information about consumer‘s habits in the past and their<br />
intentions to buy or not to buy various classifications of goods in<br />
future. Most certainly, any theory of consumer behavior must<br />
recognize the importance of social forces to shape consumer<br />
behavior.<br />
Samira Khan<br />
Department of Economics, University of Kashmir, India<br />
The idea that consumers are the supreme arbiters of what is<br />
produced under a system of free enterprises has a long and<br />
central place in the history of economic thought. It has to be<br />
sharply distinguished from the teleological version, that the<br />
consumer should be sovereign, which has an even older origin in<br />
Adam Smith without whose dictum ―Consumption is the true end<br />
and purpose of all production‖ no book on the political economy<br />
of consumers would be complete.<br />
The traditional relationship between the amount of family<br />
income and the pattern of family expenditure was discovered in<br />
1857 by the German Civil Servant Ernst Engel, in the<br />
examination of an extensive collection of family budgets .It is<br />
known as Engel‘s Law. In present context Engel‘s great<br />
contribution is the clarification and elaboration of the concept of<br />
the income elasticity of demand, which a frame work within<br />
which numerical measurement of consumer behavior could be<br />
affected. Prior to 1936 economists would believe that interest<br />
determines the level of consumption.<br />
According to Keynes consumption spending and saving are<br />
explained by the level of income; the relationships between<br />
spending, saving and the level of income are shown by the<br />
consumption function and the saving function. In the elementary<br />
Keynesian model, the rise in real income of households will lead<br />
households to increase the amount of goods purchased and viceversa.<br />
To consider how consumption expenditures are related to<br />
disposable income we may begin by posting that consumption<br />
expenditures, vary directly with disposable income. Second we<br />
can quantify i.e. saying how much consumption increases with a<br />
specific increase in disposable income. Keynes did this in his<br />
―fundamental psychological Law‖ which states that ―men are<br />
disposed, as a rule and on the average, to increase their<br />
consumption as their income increases but not as much as the<br />
increase in their income‖. Four general theories currently exist on<br />
the determinants of total consumer spending: the absolute income<br />
hypothesis, the relative income hypothesis; the permanent<br />
income hypothesis and life cycle income hypothesis. Each<br />
hypothesis postulates a relationship between consumption and<br />
income though the concepts underlying these terms may vary<br />
substantially.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 386<br />
ISSN 2250-3153<br />
II. OBJECTIVES:<br />
The present investigation has been carried out to study the<br />
Income Elasticities of academia. The investigation is taken with<br />
the following objectives:-<br />
1. To know the consumption preferences of academia.<br />
2. To study whether the consumption preferences of university<br />
teachers are different from accepted consumption<br />
hypothesis.<br />
3. To study the asset preference in university teachers.<br />
III. LITERATURE REVIEW<br />
Realizing the importance of consumer in the economic aspect<br />
many scholars and researchers from various disciples ranging<br />
from commerce, management etc intervene in the study of<br />
consumer behavior. Among a few studies directly or indirectly<br />
dealing with the similar prospective have been under taken by<br />
Stone – Geary; Cable and Godge 1994; E.M.Ojala 1952; Lewis<br />
Scheppar;A.S.Oswald; Paris Quirino 1970;Muelbaures and<br />
Deapon 1980; Richard Blundell 1954 have done comprehensive<br />
work in this field. In a study The impact of food price on<br />
consumption,feb2010 a systematic review of research on price<br />
elasticity of demand for food, by Tatiana Andreyeva ,Michael<br />
W.Long and Kelly D.Brownell lights the proposals to improve<br />
diets by shifting food prices ,results potray percentage wise<br />
increase in price and its impact on consumption.<br />
Ethiopian development research institute (EDRI) in a research<br />
note 90,FOOD DEMAND ELASTICITIES IN ETHIOPIA 2011,<br />
By Kibrom Tafere,Alemayehu seyoum Taffesse,S<br />
Tamiru,Nigussie Tafera and Zelekawork Paulos ;investigates<br />
howhouseholds have adjusted their demand for various food and<br />
non food items to change in price and income. The results<br />
suggest that ETHIOPIAN households display significant<br />
responses to change in price and income. In both rural and urban<br />
areas consumption increases of teff, animal products, and non<br />
food items exceeds the proportional income increase. The price<br />
elasticity of demand for cereals are roughly same throughout the<br />
country.<br />
The present study will be an improvement over the existing<br />
knowledge. This analysis is carried out with the objectives to<br />
capture behavioral parameters of University teachers a white<br />
collar group and measuring Income Elasticities of academia and<br />
shall study the consumption preferences.<br />
I. It is believed that consumption preference in case of<br />
high income brackets are oriented to consumer durables<br />
than necessities.<br />
II. University teachers though falling in high income<br />
brackets have not high disposable income, however<br />
their consumption preference need to be investigated,<br />
whether they are oriented to durables or basic consumer<br />
items.<br />
IV. RESEARCH METHODOLOGY<br />
Methodology of the present study proceeds along the<br />
following lines<br />
1. Statement of the problem<br />
2. Specification of econometric model<br />
3. Obtaining the data<br />
4. estimating the Engel Elasticities and behavioral parameters<br />
of econometric model<br />
5. Testing hypothesis.<br />
The present study uses linear regression economic model.<br />
X= a+bY +U<br />
Where X is consumption, Y is income, a is autonomous<br />
consumption/ intercept and b is the slope coefficient or marginal<br />
propensity to consume. U is known as the disturbance or error<br />
term in a random variable (stochastic variable) that has well<br />
defined probabilistic properties. The term U may well represent<br />
all those factors that affect consumption but are not taken into<br />
account explicitly.<br />
To estimate the Income Elasticities and the behavioral<br />
parameters of the econometric model the primary data required is<br />
collected by questionnaires.<br />
The data for the study is outcome of a series of<br />
questionnaires collected from a random sample of the Kashmir<br />
University Teachers. The series consisted of the 110 waves of<br />
questionnaires taken from Kashmir University teachers. The data<br />
under investigation is fragmented into 5 income brackets The<br />
size of the first bracket is 7. Teachers falling under second<br />
bracket is equal to 26, in the third bracket we have 29 teachers<br />
while in the 4 th there are 18 teachers, in the last group i.e is the<br />
highest income bracket the number of respondents is 9.<br />
V. RESEARCH FINDINGS AND INTERPRETATION<br />
To analyze the consumption expenditure of Kashmir<br />
University Teachers in general we first estimate the income<br />
Elasticities of various items separately e.g. food, non-food<br />
consumer durables etc. This could be done in;<br />
a) The consumption –income relationship has to be<br />
analyzed with the help of Engel Functions<br />
b) An income distribution has to be compared with<br />
Consumption distribution.<br />
The important economic determinants usually considered are<br />
income, price, level of assets held. Prices are kept constant and<br />
only income is allowed to vary among household. Our main<br />
objective is to compare the consumption income behavior of<br />
Teachers within Kashmir University. For this we derive Income<br />
Elasticities by fitting various types of functional forms.<br />
With a view to assess, the impact of higher income on<br />
standard of living, we use suitable econometric and statistical<br />
techniques<br />
An attempt has been made in this regard<br />
(I) To assess the differences in consumption pattern of<br />
University teachers.<br />
(II) To work out the distribution of consumption<br />
expenditure. The proposed analysis will proceed as,<br />
first; the consumption pattern of Kashmir University<br />
Teachers will be examined. This will be followed by the<br />
analysis of the composition of the consumption<br />
expenditure taking into account, the consumer durable<br />
etc. as part of consumption. Side by side we analyze the<br />
income data and take into consideration the total<br />
disposable income. Viewing the complex of ceaseless<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 387<br />
ISSN 2250-3153<br />
change to which the human affairs are subject; the<br />
economist could claim the end of human development is<br />
the increase in income, giving ―Income‖. A definition<br />
broad enough to include those elements of well being<br />
that can be measured in terms of money. In the present<br />
area of research the income of Kashmir University<br />
Teachers includes their own salaries, earning of their<br />
spouse, income of their parents, income from primary or<br />
tertiary sector. All when added gives as a gross figure<br />
from which direct and indirect taxes are deducted to get<br />
the disposable income.<br />
It needs to be mentioned here that there is slight difference in<br />
consumption level of Kashmir University Teachers although<br />
there is a attributable difference in income levels.<br />
Table: 1 Mean Values and APC<br />
Status according to Income<br />
Level<br />
Mean value of<br />
income<br />
The mean values for expenditure on individual components<br />
has been given in increasing order according to income levels in<br />
below mentioned table 1.<br />
Salaries are very much age related; thus age factor of a<br />
teacher become major factor determining his appropriate salary<br />
Non-academic out side earnings are obtained by a small<br />
proportion of teachers. Kashmir University teachers all form a<br />
same income group have never about same life style will<br />
manifest a wide range of difference in their choice and decision<br />
behavior.<br />
NSS data do not give figures of income by categories but only<br />
total consumption expenditure .All these consumption<br />
expenditures figures exclude saving, and as savings are likely to<br />
go up.<br />
Mean value of<br />
expenditure on<br />
food items<br />
Average Propensity to consume<br />
1 st Bracket 5.24 4.6 0.87<br />
2 nd Bracket 5.80 4.8 0.82<br />
3 rd Bracket 5.9 5.01 0.84<br />
4 th Bracket 5.2 4.05 0.79<br />
High Income Bracket 5.01 3.02 0.6<br />
www.ijsrp.org
Income Brackets<br />
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 388<br />
ISSN 2250-3153<br />
Table: 2 Value of Income Elasticities of Demand for major consumption items.<br />
Income elasticity of expenditure on<br />
food items<br />
Income elasticity of expenditure on<br />
non- food items<br />
1 st Bracket 0.5 0.46<br />
At 1% ‗level of significance‘ at 5% ‗level of significance‘, that is<br />
under confidence limit 99% and 95% the above data is relevant.<br />
Among various forms the double log form is best fit on each item<br />
VI. CONCLUSION<br />
Income elasticity of expenditure on<br />
consumer durables.<br />
The study of Income elasticity and consumption parameters of<br />
Kashmir University Teachers is of inestimable importance for the<br />
help in understanding an estimating Engel elasticities and<br />
consumption parameters .The present study of academia has<br />
yielded an interesting and fascinating information regarding the<br />
preference of academia for food items, non-food items and<br />
consumer durables. The prosperity of academia is attributed to<br />
higher and better education as well as the better quality<br />
evocations.<br />
Empirical application express that consumption expenditure is<br />
function of income as well other variables. Saving rate does not<br />
depend upon income but on the relative position of income scale.<br />
Major part of the effort in the research has been on consumption<br />
and consumption expenditure on particular commodities which<br />
direct to determine the regression of consumption on income.<br />
The study shows strong tendency among teachers to emulate<br />
other colleagues and at the same time strive constantly for higher<br />
standard of living. Pigouian Real Balance Effect is absent<br />
because there is negligible impact of wealth on consumption<br />
shown by Kashmir university teachers.<br />
It is believed that consumption preference in case of high<br />
Standard deviation<br />
0.68 0.15 0.06<br />
Standard error<br />
Value of T<br />
T- test<br />
2 nd Bracket 0.4 0.5 0.7 0.15 0.19 -2.36 0.67<br />
3 rd Bracket 0.37 0.3 0.8 0.09 0.01 1.00 0.54<br />
4 th Bracket 0.2 0.38 0.87 0.15 0.09 1.11 0.62<br />
High Income<br />
Bracket<br />
-2.5<br />
of expenditure .In each case we test for the statistical significance<br />
of the elasticity coefficients at 5% level and 1% level.<br />
income groups are oriented to consumer durables than<br />
necessities, though University Teacher belong to the middle<br />
class, still the preference for consumer durable, is very high.<br />
Their consumption preference when investigated shows their<br />
orientation to durables not to basic consumer items. An important<br />
factor of consumer economics that direct access shows<br />
immediate effect on consumption, mainly when taxation is<br />
progressive in nature. Since whole University teacher staff are<br />
tax payers therefore, their consumption is also effected by tax<br />
system.<br />
REFERENCES<br />
[1] Ando,A & Modigliant (1963), The life cycle hypothesis Volume No.53 An<br />
American Economic review.<br />
[2] Blundell Richard (1954) , Consumer behaviour theory and empirical<br />
evidence a Survey.<br />
[3] Deaton and Muellbaures, 1980 Cambridge University Press,Economics and<br />
Consumer Behaviour.<br />
[4] Feguson Goulds (1988), Micro Economic theory, Princeton University<br />
press.<br />
[5] Friedman Milton (1956), Consumer Behaviour ,Oxford & IBH, publishing.<br />
[6] F.Knox (1969) , Consumers and Economy ,By George G.Harrap& Co.Ltd<br />
[7] Intriligator D.M.(1978), Econometric models techniques and applications<br />
Prentice Hall, Inc.<br />
[8] John .D.Hey (1979), Stastistics in Economics Martin Robert son.<br />
Coefficient of determination R 2<br />
0.80<br />
0.018 0.2 0.9 0.11 0.037 2.43 0.63<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 389<br />
ISSN 2250-3153<br />
[9] Kelejian , Introduction to Econometrics.<br />
[10] Kothari C.S.(1985), Research methodology, Whishwa Parakashan<br />
[11] Koutsoyiannis.A (1973), Theory of Econometrics, Palgrave publishers Ltd<br />
[12] Marquez Jaine, Economic theory and Econometrics.<br />
[13] Meghnad Dessi (1976),Applied Economics,Tata McGREW- HILL<br />
Publishing company.<br />
[14] Ojala E.M.(1952), Agriculture Economic progress, Oxford University<br />
Press.<br />
[15] Oswald A.S.( Vol II), Survey in Economics.<br />
[16] Quirino Paris(1970), An appraisal of income Elasticities for total food<br />
consumption in developing countries.<br />
[17] Richard Hevin (1991), Statistics for management studies, Pre<br />
[18] The Royal Economic society(1973), Surveys of applied economics.Volume<br />
II Macmillan Press Ltd<br />
[19] Royal economic society (1966) ,Surveys of economic theory,Volume III<br />
Macmillan Press Ltd<br />
[20] American journal of public health, VOL 100 NO 2.<br />
[21] Journalof International food policy research institute IFPRI<br />
AUTHORS<br />
First Author – Samira Khan, PhD. Scholar PG Department of<br />
Economics. University of Kashmir, India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 390<br />
ISSN 2250-3153<br />
Enhancing a Future version of the Nigerian SME<br />
Technology Incubation Model: Lessons for other<br />
developing countries<br />
Nkem Okpa Obaji 1 , Aslan Amat Senin 2 , Cameron Keith Richards 3<br />
1, 2<br />
Department of Management and Human Resources Development Universiti Teknologi Malaysia<br />
Perdana School of Science, Technology and Innovation Policy, Universiti Teknologi Malaysia 3<br />
Abstract- The Nigerian government‘s implementation of an<br />
SME incubation model has not been particularly successful. The<br />
challenges faced in Nigeria perhaps reflect how policies or<br />
models taken from elsewhere need to be adapted to local contexts<br />
for better chances of success. This is especially policies or<br />
models borrowed from developed countries and implemented in<br />
developing country contexts. Therefore this paper will focus on<br />
the case study implications for other developing countries of an<br />
inquiry into the requirements for enhancing a future version of<br />
the Nigerian SME incubation model.<br />
Keywords: Business incubator, Developing countries, SMEs,<br />
Technology Incubation Model<br />
T<br />
I. INTRODUCTION<br />
his research aims to improve on the existing business<br />
incubation model in Nigeria and developing countries<br />
generally which has been marred with series of flaws and<br />
weakness which have resulted into failure of the program. The<br />
rationale is to institute best practices that will move the program<br />
at par with related schemes in other countries especially USA<br />
and other Organization for Economic Co-operation and<br />
Development (OECD) countries.<br />
The entrepreneurs who are formally described as SMEs are<br />
usually recognized as the foundation for the urban and economic<br />
growth of many nations. Globally, SMEs are noted for their<br />
massive assistance to the advancement procedure as well as<br />
engine for economic growth (Obitayo, 2001). The main benefit<br />
of this segment according to Aremu and Adeyemi (2011) is its<br />
job creation prospect at modest investment outlay. Kumar and<br />
Ravindran, (<strong>2012</strong>) also concur on this as they declare that<br />
entrepreneurship is vital to the growth of a country through<br />
employment generation, innovative products development as<br />
well as methods through modernization. Libecap, (2011) also<br />
declares that when policymakers as well as macroeconomists are<br />
anxiously looking for measures that could drive economic<br />
development, spurn inactivity as well as promote employment<br />
formation, private enterprise is usually the spotlight for<br />
consideration. Technology business incubation scheme is the<br />
particular mechanism that will actualize the above mentioned<br />
macroeconomic strategies. In citing NBIA, (2010), Al-Mubaraki,<br />
(<strong>2012</strong>) declares that business incubators assist business<br />
enterprises to transform their thoughts into practicable as well as<br />
strengthening their ventures by assisting them from<br />
commencement to when they will be able to survive on their<br />
own. Business incubators are mechanism for value addition to<br />
firms and incubatees. Incubation program is aimed at achieving<br />
three main macroeconomic objectives of job creation, economic<br />
development and international Networking.<br />
Most industrialized and developing nations have implemented<br />
TBI scheme to accelerate the establishment of innovative<br />
knowledge-related businesses because of its above eighty percent<br />
success level of innovative business enterprise formation, as well<br />
as its support arising from its spinoff effects such as Technology<br />
transfer, job creation as well as capital.<br />
II. LITERATURE REVIEW<br />
The Technology Business Incubation (TBI) in Nigeria was put<br />
into practice in 1993 when the first Center was set up in Agege,<br />
Lagos (FMST, 2005). Ihenacho, (2005) pinpoints that there is<br />
proliferation of TBIs in Nigeria, but the performances of almost<br />
all of them are below expectation due to inadequate task<br />
execution and abysmal administrations. A crucial evaluation<br />
according, to Adegbite, (2001) shows that TBIs have failed to<br />
accomplish the basic purpose of developing sustained successful<br />
ventures. The growth of the initiative has been hindered by<br />
adaptation problem, incoherent financial support, structural<br />
difficulties in administrative dealings as well as ineffectively<br />
construed relationships with appropriate establishments as well<br />
as inconsistent government policies as they relate to Science,<br />
technology and innovation (STI) and Technology Incubation in<br />
particular. Other Achilles‘ heel to the Nigerian model which is<br />
similar to other developing countries include heavy reliance on<br />
government patronage as well as paying particular attention to<br />
physical amenities instead of services of intangible value.<br />
Business incubation initiatives have really thrived seriously in<br />
places like Western Europe and North America where the idea of<br />
business incubation program was conceived, nursed and brought<br />
to the fore.<br />
Most developing countries just like Nigeria aspire to institute<br />
best practices that will move the program at par with related<br />
schemes in other countries with success stories on incubation<br />
program particularly USA and other OECD countries but the<br />
dilemma faced by Nigeria as a developing country also affect<br />
majority of the developing countries in their path to a better<br />
incubation model. Since the initiative was a borrowed technology<br />
from the OECD Countries to developing countries the issue of<br />
adaptability has been a major predicament for some of the<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 391<br />
ISSN 2250-3153<br />
emerging countries, for instance, Nigeria which adapted the<br />
scheme from the USA with recommendation and design from the<br />
United Nations Development Programme (UNDP) has social<br />
infrastructural problems, therefore how is the initiative going to<br />
succeed without the country first tackle the infrastructural<br />
problem.<br />
III. DEVELOPING COUNTRIES CONTEXT – CHINA AND BRAZIL<br />
China and Brazil are chosen as country cases because these<br />
two nations combined together host over 1000 incubators and are<br />
ranked third and fourth respectively in numerical terms. The<br />
choice of Brazil as a country of comparison in this study is based<br />
on the fact that as the entrepreneurship movement in Brazil has<br />
grown rapidly in recent years, the Business Incubators also<br />
follow this trend of rapid growth. Therefore this trend is ripe for<br />
detailed analysis of both movements given the fact that Brazil<br />
was being listed among the countries with highest entrepreneurial<br />
activity worldwide with comparable indices including USA.<br />
Government participation in incubation programme in most<br />
developing countries is still very high in terms of establishment<br />
and funding. There is also lack of public – private partnership,<br />
hence the for-profit notion is not yet established (Akcomak 2009:<br />
Adegbite 2001). In terms of funding, there is lack of information<br />
on how much governments spend on the incubators as most<br />
funding for incubator promotion is integrated to other major<br />
funding programmes. For instance, most incubators in<br />
developing countries are supported by international financial<br />
institutions like the World Bank and UNDP, as the World Bank<br />
does not have a precise programme initiative for incubators but<br />
always fund particular projects (Scaramuzzi 2002). This will<br />
make incubator performance and evaluation not to be accurate as<br />
there is no clear cut information on the funding of the incubators.<br />
In most developing countries, incubator establishment and<br />
funding is always the prerogative of the governments, hence,<br />
governments attitudes towards the program will dictate the<br />
achievement or failure of the initiative (Stefanovic et al., 2008).<br />
IV. BUSINESS INCUBATION IN CHINA<br />
Business incubation initiative is an important strategy to help<br />
entrepreneurship and innovation in both developed and<br />
industrializing nations (OECD, 1999; UN, 2000). Scaraborough<br />
and Zimmerman (2002) suggest that the reason for business<br />
incubation lies on two facts. The first being the small business is<br />
an important constituent of economic growth and social<br />
development. The second fact is that the failure rate of small<br />
business is high, especially at the start-up stage. In view of these<br />
high failure rates of small and new businesses vis-a-vis the<br />
important help they render to government and society, various<br />
ideas and plans have been invented to help these enterprises.<br />
Such strategies relate to the establishment, development and<br />
survival of new and small businesses (Cromie 1991; Xu 2010).<br />
One of the existing concepts and strategies adopted was the<br />
business incubation which began in China since 1987. The<br />
Chinese Business Incubators are funded by government. They<br />
use Business Incubators as a strategic mechanism for market<br />
creation by providing financial funding for both construction and<br />
operations of the business incubator. This, the government<br />
accomplish through the TORCH Program of the Ministry of<br />
Science and Technology (MOST) which was set up in the 1990s<br />
by the central government to support the creation and growth of<br />
incubators in China. The government provides various lines of<br />
dedicated Funds to support incubation programs, for example,<br />
‗Construction‘ Funds for incubators, ‗Seed Capital‘ Funds for<br />
start-ups and ‗Innovation‘ Funds for SMEs that are in the growth<br />
stage of their life cycle. The Torch Program has made huge<br />
success in China. It was reported that as of 2003, fifty-three<br />
national Science & Technology Industrial Parks (STIPS) created<br />
over 3.5 Million jobs and $200 Billion which translated to18% of<br />
China GDP for that year. Also, 465 technology incubators are<br />
dynamically operational for sustainable advancement.<br />
NBIA in 2007 estimated that about 5000 business incubators<br />
exist worldwide. The Chinese business incubation industry is<br />
generally accepted as the largest in developing countries and the<br />
second largest worldwide after USA.<br />
V. BUSINESS INCUBATION IN BRAZIL<br />
Brazilian incubation development started in the 1980s. The<br />
first incubator was set up in 1986 and by 1996, there were<br />
already forty incubators. Most incubators there were located in a<br />
university or a research institute and more than eighty percent of<br />
the tenants were spin-offs from the academia and other firms<br />
(Lalkaka and Bishop, 1996). At the start of the incubator<br />
movement, the chief impotence was lack of good relations with<br />
the university personnel and inadequate business support services<br />
(Akcomak 2009). The Brazilian Incubators exhibit the triple<br />
helix of the university, industry and government which enhances<br />
a synergy (Etzkowitz et al. 2005). Incubation models of different<br />
incubators in Brazil are based on the local needs which include<br />
easing of poverty, employment creation, economic development<br />
and technology commercialization (Lalkaka and Schaffer, 1999).<br />
Another fascinating feature of the Brazilian incubators is where<br />
already existing and reliable incubators are asked to develop<br />
newer incubators (Chandra 2007).<br />
Scaramuzzi (2002) explains that micro and Small enterprises<br />
account for 98 percent of the existing firms in Brazil employ<br />
about 60 percent of the active population and contribute to 21<br />
percent of its GDP. Although, according to him, 80 percent of<br />
such firms tend to fail before the expiration of their first year as a<br />
result of bureaucratic barriers, administrative barriers and lack of<br />
core management skills. Almeida (2005) in his study explains<br />
that in 2003 there were over 1000 incubatee firms with more than<br />
15000 employees.<br />
VI. FINDINGS<br />
From the foregoing study, it has been shown that technology<br />
business incubation program is a good scheme for the survival<br />
and promotion of the Small and Medium businesses as well as an<br />
economic development strategy for countries especially the<br />
developing countries. The developing countries approaches to the<br />
scheme have been almost the same, especially in the areas of<br />
depending solely on government for financial support and other<br />
assistance. This is the case with Nigerian model, however, the<br />
Chinese model of business incubation have shown that despite<br />
government patronage, the incubation program in China has<br />
grown to be a major factor in contributing to both job creation as<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 392<br />
ISSN 2250-3153<br />
well as huge contributor to the GDP of the country. The same is<br />
obtainable for Brazil; therefore some developing countries are on<br />
the right path to achieving the best practices of the incubation<br />
model.<br />
VII. CONCLUSION<br />
This paper has presented a general idea on business incubation<br />
especially as it relates to technological firms in developing<br />
countries with particular reference to Nigeria. There is need for<br />
stakeholders especially the policy makers to find a lasting<br />
solution to the problems facing the initiative as well as making<br />
the program to reflect the public-private partnership whereby<br />
government will reduce its stake on the program and concentrate<br />
on providing a conducive business environment in the area of<br />
infrastructural development which ought to be a prerequisite to<br />
the smooth running of the initiative. There is need for<br />
government policies especially as they relate to Technology<br />
Incubation to be properly and effectively implemented so as to<br />
achieve the objectives of the policy documents which are always<br />
extraordinary on paper but implementation always fall short of<br />
the expectations of the final beneficiaries.<br />
REFERENCES<br />
[1] Adegbite, Oyeyemi, ― Business Incubators and Small Enterprise<br />
Development: The Nigerian Experience‖. Small Business Economics 17:<br />
157-166, 2001.<br />
[2] Akcomak, I.S. (2009). Incubators as Tools for Entrepreneurship Promotion<br />
in Developing Countries: World Institute for Development Economics<br />
Research. Research Paper No. 2009/52<br />
[3] Chandra, A. (2007). Approaches to Business Incubation: A Comparative<br />
Study of the United States, China and Brazil. Working paper 2007–WP–29.<br />
Indianapolis: Network Financial Institute.<br />
[4] Cromie, S. (1991). The problems experienced by young firms. International<br />
Small Business Journal, Vol. 9, No.3, pp.51-69.<br />
[5] FMST, (2005). Federal Ministry of Science and Technology Quarterly,<br />
vol.2, 2005, Abuja, Nigeria.<br />
[6] Gary D. Libecap. ―Advances in the Study of Entrepreneurship, Innovation<br />
& Economic Growth‖ Advances in the Study of Entrepreneurship,<br />
Innovation & Economic Growth, Volume 22), Emerald Group Publishing<br />
Limited, pp. ix – xii.<br />
[7] H.M. Al-Mubaraki and M. Busler. ― Incubators economic Indicators:<br />
Mixed Approach‖ Journal of Case Research in Business and Economics,<br />
<strong>2012</strong>.<br />
[8] Ihenacho, R.N., (2005). A study of the Dynamics of institutional support<br />
Measures to SMEs in Nigeria. A Ph.D Dissertation in Management. St<br />
Clements University, USA.<br />
[9] K.M. Obitayo. ― Creating an enabling environment for Small and Medium<br />
Industries, CBN 25(3).<br />
[10] K.S. Kumar and D.S.R. Ravindran. ―A Study on Elements of Key Success<br />
Factors Determining the Performance of Incubators‖ European Journal of<br />
Social Sciences ISSN 1450-2267 Vol.28 No.1 (<strong>2012</strong>), pp. 13-23.<br />
[11] Lalkaka, R. and Bishop, J. (1996). Business Incubator in Economic<br />
Development: An initial Assessment in Industrialized Countries. New York,<br />
UNDP/UNIDO/OAS.<br />
[12] Lalkaka, R. and Shaffer, D.(1999). Nurturing Entrepreneurs, Creating<br />
Enterprises: Technology Incubation in Brazil. International Conference<br />
on Effective Business Development Services. Rio de Janeiro, Brazil.<br />
[13] M.A. Aremu and S.L. Adeyemi. ― Small and Medium scale Enterprises as a<br />
survival strategy for employment generation in Nigeria. Journal of<br />
Sustainable Development 2011. 4(1), 200-206,<br />
[14] OECD,(1999). Small Business, Job creation and Growth: Facts, Obstacles<br />
and Best Practices. OECD, Paris.<br />
[15] Scaramuzzi, E. (2002). Incubators in developing countries: Status and<br />
Development Perspectives. InfoDev programme. The World Bank,<br />
Washington DC.<br />
[16] Scarborough, N.M. and Zimmerer, T.W. (2002). Effective Small Business<br />
Management: An entrepreneurial Approach, 4th edition, Prentice Hall,<br />
Upper Saddle River, NJ.<br />
[17] Stefanovic, M., Devedzic, G. and Eric, M (2008). Incubators in Developing<br />
Countries: Development Perspectives. International Journal for Quality<br />
Research, Volume2, No.3. 2008.<br />
[18] United Nations (2000). Best Practice in Business Incubation. United<br />
Nations, New York and Geneva.<br />
[19] Xu, Lilai. (2010). Business incubation in China: Effectiveness and<br />
Perceived Contributions to Tenant Enterprises. Management Research<br />
Review. Vol.33 No.1. 2010 Pg 90 – 97. Emerald Group Publish Limited.<br />
[20] Verma, S. (2004). Success factors for business incubators: An empirical<br />
study of Canadian Business Incubators. A Masters of Management Thesis<br />
submitted To the Faculty of Graduate Studies and Research, Eric Sprott<br />
School of Business, Carleton University, Ottawa, Ontario.<br />
AUTHORS<br />
First Author - Nkem Okpa Obaji Ph.D Candidate, Department<br />
of Management and Human Resources Development, Universiti<br />
Teknologi Malaysia<br />
Email id - amazonsng@yahoo.com<br />
Second Author - Aslan Amat Senin, Department of<br />
Management and Human Resources Development Universiti<br />
Teknologi Malaysia<br />
Third Author - Cameron Keith Richards, Perdana School of<br />
Science, Technology and Innovation Policy Universiti Teknologi<br />
Malaysia<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 393<br />
ISSN 2250-3153<br />
The Effect of Ionic Composition on Structural and<br />
Optical Properties of CdxZn1-xS Thin films Grown by<br />
Spray pyrolysis<br />
Ravangave L. S. 1 , Biradar U. V. 2 , Misal S. D. 3<br />
1 Department of physics, Shri Sant Gadge Maharaj College,Loha.(M.S.) India.<br />
2 Department of physics, Mahatma Basweshwar College, Latur. (M.S.) India.<br />
3 Department of physics, Kumar Swami College,Ausa. (M.S.) India.<br />
Paper Received: May 15, <strong>2012</strong>, Paper Accepted: May 21, <strong>2012</strong>, Paper Published: June 04, <strong>2012</strong><br />
Abstract- In this work we prepared cadmium zinc sulphide<br />
(CdxZn1-xS) thin films on glass substrate using spray pyrolysis<br />
chemical deposition technique. The effect of Cd composition on<br />
structural and optical was studied. The XRD pattern of CdxZn1-xS<br />
films shows hexagonal wartzite symmetry of CdZnS material.<br />
The XRD data confirmed that the crystallites were increased with<br />
composition of Cd 2+ content. The intensity of (002) peak is<br />
increased for x= 0.6 and 0.8. The variation of grain size with<br />
composition was investigated from XRD data. The optical<br />
energy band gap obtained from data of the absorption spectra<br />
confirmed that the band gap is increased with Zn content in<br />
CdxZn1-xS thin films. The transmittance spectra reaveled the %<br />
transmittance was increased with increase of Zn content in<br />
CdxZn1-xS thin films.<br />
Keywords: - Spray Pyrolysis, CdxZn1-xS thin film, Optical<br />
energy Band gap, Solar cells.<br />
C<br />
I. INTRODUCTION<br />
dS thin film absorbs the light energy in the blue region of<br />
the solar spectrum and have smaller optical band gap of 2.42<br />
eV (1). For high performance of solar cell devices an appropriate<br />
window material should be necessary. CdZnS has larger band<br />
gap and convenient to made as window layer instead of CdS. The<br />
CdxZn1-xS films would advantages for application in solar cell<br />
because they also offer a wider band gap (larger than 2.5 eV) as<br />
compared to the CdS films (2). There have been many report on<br />
the deposition of CdZnS thin films with different concentration<br />
of Zn +2 using different methods of depositions (3,4,5). It is of<br />
great technological interest that the cadmium zinc sulphide<br />
(CdZnS) thin film have been widely used as a wide band gap<br />
window material in hetrojunction solar cells and in<br />
photoconductive devices. The synthesis and characterization of<br />
nanoparticle thin films of cadmium and zinc chalcogenides have<br />
became an area of great interest over last few years. The thin<br />
films of CdZnS have extensive applications in various optical,<br />
electronic and optoelectronic devices and especially in wide<br />
band gap photovoltaic solar cells with different polycrystalline<br />
absorber materials like CdTe (6),.<br />
Keeping in view, more attention is being made in fabricating<br />
good quality CdxZn1-xS thin films and study the structural and<br />
optical properties of the prepared thin films.<br />
A number of thin film deposition techniques are used for<br />
deposition of the thin films. Of the most spray pyrolysis is the<br />
practically attractive because of its simplicity in comparison with<br />
methods requiring vacuum conditions on complex equipments.<br />
It is fast, inexpensive vaccuumeless and suitable for mass<br />
production. It is basically a chemical deposition technique in<br />
which solutions of desired material are sprayed onto a preheated<br />
substrate. Continuous films are deposited onto substrate by<br />
thermal decomposition of reactants(7).<br />
In the present investigations the spray pyrolysis technique was<br />
used for deposition of CdxZn1-xS thin films. Prepared CdxZn1xS<br />
films are characterized with XRD, and UV-Visible<br />
spectroscopic technique for structural and optical study.<br />
II. MATERIALS AND METHODS<br />
Aqueous solutions of CdCl2, ZnCl2 and (NH2)2CS were used<br />
as sources of cd 2+ , Zn 2+ and S 2- ions respectively. The entire<br />
chemical used in the present study and reagent used were of<br />
analytical reagent grade. For the preparation of good quality<br />
films concentration of CdCl2 (0.1M), ZnCl2 (0.05M) and (0.1M)<br />
NH2-CS-NH2 were previously optimized and used as stock<br />
solutions. To obtain homogeneity of uniform deposition each<br />
solution was stirred for 5 minute before the film deposition.<br />
Deionised water was used as a solvent.<br />
CdxZn1-xS films were deposited on ultrasonically precleaned<br />
microscopic glass substrates. With different Cd 2+ concentrations<br />
(for x= 00, 0.2, 0.4, 0.6, 0.8, 1) using chemical spray pyrolysis<br />
technique. Here x represents the concentration in the spraying<br />
solution. The solution was spray at the rate of 1 ml per minute at<br />
optimized temperature of 573 0 K, at 1 Kg/m 2 pressure. Prepared<br />
CdxZn1-xS films were characterized by XRD and UV Visible<br />
spectroscopic techniques. The structural and optical properties of<br />
the deposited films were studied using data obtained from XRD<br />
and UV-Visible technique.<br />
III. RESULTS AND DISCUSSION<br />
i. Structural properties<br />
The XRD spectra of prepared CdxZn1-xS thin films are<br />
recorded using Regacu Miniflex II diffractometer and displayed<br />
in Fig. 1 a to f. All the peaks assigned to (100), (002) , (101),<br />
(102) (110), (103), and (200) orientations of hexagonal phase of<br />
CdxZn1-xS The intensity of (002) of XRD patterns for<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 394<br />
ISSN 2250-3153<br />
composition x=0.6 and x=0.8 was significantly increased as<br />
compared to intensity of (002) peak for other compositions. Y.<br />
Raviprakash et al.(2009) were reported earlier the hexagonal<br />
plane symmetry of CdxZn1-xS for CdCl2 and ZnCl2 based<br />
CdxZn1-xS thin films (8). The observed diffraction patterns are<br />
in good agreement with the standard crystallographic data for the<br />
CdS and ZnS metals of JCPDS card 02-0549 and 80-0007. The<br />
(002) diffraction peak gives the lattice matching to the<br />
chalcogenide semiconductor such as CuInxGa1-xSe2 and CuIn(S1-x<br />
Sex)2 ,which are used in photovoltaic solar cells (9). The lattice<br />
constant a and c for hexagonal planes of the CdxZn1-xS thin<br />
films are calculated from XRD data using the following equation.<br />
1/d 2 =4/3 (h 2 +hk+k 2 )/a 2 + l 2 /c 2 …… (1)<br />
The values of lattice constant observed to vary as composition<br />
of cadimium( from x=0 to1). The variation of lattice parameters<br />
versus temperature is given in table 1, and displayed in fig. 2.<br />
The value of lattice constant ‗a‘ and ‗c‘ varies with composition<br />
from 0.377 to 0.4037 nm and 0.652 to 0.688 nm respectively.<br />
The increase in values of lattice parameters with composition of<br />
Cd confirmed the increase of uite cell size.<br />
The grain size was calculated from XRD data using Sherrie‘s<br />
formula (10).<br />
D=0.94 λ/βCosθ ----- (2)<br />
Where λ is the wave length of X-ray used (1.54 nm Cukα line),<br />
β is the broadening of the diffraction peak measured at half of its<br />
maximum intensity (FWHM) and θ is the Braggs angle. Table 1<br />
shows the variation of grain size with Cd composition and<br />
presented in fig 3. It is observed that the grain size of the<br />
CdxZn1-xS increased with increase in Cd composition. The<br />
average grain size is observed increased from 3.4 to 14 nm.<br />
ii. Optical Characterization<br />
The optical absorption of the CdxZn1-xS films for x=0.0, .2,<br />
0.4, 0.6, 0.8, and 1 were recorded using Systronic Ddouble beam<br />
UV-Visible spectrophotometer 2201 in the wavelength range 350<br />
to 900 nm. The absorption spectra are presented in fig. 4. The<br />
spectra have been used to evaluate the absorption coefficient (α),<br />
energy band gap (Eg ) and nature of transition involved. Optical<br />
energy band gap (Eg) can be calculated using absorption<br />
coefficient (11).<br />
α=A (һυ-Eg) 1/2 -------------3<br />
һυ<br />
A is constant, һν is photon energy. Thickness of the CdS films<br />
was estimated by weight difference method using<br />
t = m/ρA --------------------- (4)<br />
Where m is the mass of the film deposited on the substrate, A<br />
is area of the deposited film on the substrate and ρ the density of<br />
the bulk material. The variation of film thickness with<br />
concentration was shown in Table 1.<br />
The spectra shows that the absorption edges are blue shifted.<br />
Blue shifting of the absorption edge confirmed that the<br />
crystallites in the films decreased with composition of Zn. The<br />
experimental values of (αһν) 2 plotted against һν for different<br />
composition is shown in Fig. 5. All the films show high<br />
absorption coefficient (α=10 12 cm -1 ). The linear portion of the<br />
curve extrapolated to (αһν) 2 =0 gives the value of optical energy<br />
band gap (Eg). The optical band gap Eg obtained at (αһν) 2 = 0<br />
was vary from 2.42 to 3.49 eV. (121). The 3.49 eV maximum<br />
energy band gap is observed Cd0.0Zn1.0S. The increase of band<br />
gap can prevent the window absorption losses. The variation of<br />
optical band gap with composition is shown in Table 1. and<br />
displayed in Fig.6.<br />
The variation of % transmittance against wavelength for<br />
different composition x is presented in Fig. 7. It is observed that<br />
% transmittance increased with increase the Zn content in the<br />
CdxZn1-xS thin films. The % transmittance varied from 10 to 53<br />
as x varies from 1 to 0.0.<br />
IV. CONCLUSION<br />
CdxZn1-xS thin film was successfully synthesized using<br />
aqueous solutions of CdCl2, ZnCl2 and (NH2)2CS by spray<br />
pyrolysis technique. The XRD study revealed the hexagonal<br />
phase of the CdxZn1-xS thin films. The intensity of the (002)<br />
peak was improved for x=.06 and 0.8. The grain size is observed<br />
increased with Cd incorporation study confirmed that the CdZns<br />
compound has hexagonal phase. The (002) diffraction peak was<br />
dominant for CdxZn1-xS thin films gives the lattice matching to<br />
the Cu Inx Ga1-xSe2 and CuIn(S1-x Sex)2 chalcogenised<br />
semiconductors which are used in photovoltaic solar cells. The<br />
change of lattice parameters was observed with Cd composition.<br />
Optical study confirmed that energy band gap of CdS, (direct<br />
band gap semiconductor), is increased with incorporation of Zn<br />
content. The % transmittance was observed increased with<br />
increase of Zn content of CdxZn1-xS thin films.<br />
Table 1. The Lattice parameters, Grain size (XRD), Energy band<br />
gap, Film Thickness.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 395<br />
ISSN 2250-3153<br />
Fig. 1: XRD spectra of CdxZn1-xS for (a) x=00, (b) x=0.2, (c)<br />
x=0.4 (d) x=0.6, (e0 x=0.8 and (f) x=1<br />
Fig. 2: The varation of lattice parameters with composition x 1.<br />
Lattice constant ‗a‘, 2 lattice constant ‗c‘.<br />
Fig. 3: Variation of grain size with composition of CdxZn1-xS<br />
Fig.4: The absorption spectra of Cdx Zn1-x S for (a) x=1.0, (b)<br />
x=0.8 (c) x=0.6 (d) x=0.4 (e) x=0.2 (f) x=0.0<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 396<br />
ISSN 2250-3153<br />
Fig.5: The plot of (αһυ) 2 versus һυ of CdxZn1-xS films with (a)<br />
x=1, (b) x=0.8 (c) x=0.6 (d) X=0.4 (e) x=0.2 (f) x=00<br />
Fig. 6: Dependence of optical band gap of Cdx Zn1-x Sfilms on<br />
composition parameter x.<br />
Fig.7: % transmittance is plotted against wavelength for Cdx Zn1x<br />
S for (a) x=1.0, (b) x=0.0.8 (c) x=0.6 (d) x=0.4 (e) x=0.2 (f)<br />
x=0.0<br />
REFERENCES<br />
[1] Chang Y.J. Munsee C. L., Herman G. S. Wager J. F. Mugdur P., Lee D. H.,<br />
Chang C. H., ―Growth, Characterization and application of CdS thin films<br />
deposited by chemical Bath Deposition‖, Surface and Interface Analysis<br />
Vol.37 (4), 2005, 398-405<br />
[2] Lee Jae-Hyeong, Song Woo-Chang, Yi Jun-Sin , Yoo Yeong-Sik,<br />
―Characteristics of the CdZnS thin Film Doped by ThermalDiffusion of<br />
Vacuum Evaporated Indium Films‖, Solar Energy Materials & Solar Cells<br />
,759, 2003, 227-234.<br />
[3] Zhou J., Wu X., Teeter G., To B., Dhere R. G. and Gessert T. A., ―CBD<br />
Deposited CdxZn1-xS Thin Films and Their Application in CdTe‖, Solar<br />
Cell. Phy. Stat. Sol., 24 (13), 2004, 775-778.<br />
[4] Burton L.C. , Hetch T.L., ZnxCd1-x S Films for use in Hetrojunction Solar<br />
Cells.Appl.phys,Lett . 29, 1976, 612.<br />
[5] Valkonen M. P., Kanniainen T., Lindroos S., Leskela M. and Rauhala E.,<br />
‗‘growth of Zns, CdS and multilayer ZnS/CdS Thin Films by Silar<br />
Technique‘, Applied Surface Science, 115, 1997, 386-392.<br />
[6] Oladeji I., Chow L., Ferekdes C., viswanathan V.. and Zhao Z., Metal/<br />
CdTe/ CdS /Cd1-ZnxS/TiO/glass, A New Cdte Thin Film Solar Cell<br />
Structure‖, Sol. Ener. Matter.sola.Cells, 61(2), 2000, 203-211.<br />
[7] Y. Raviprakash, V. Kasturi , Bangera G., K. Shivakumar,‘ ―Growth,<br />
Structural and Optocal Properties of CdxZn1-x S thin films deposited using<br />
Spray Pyrolysis Technique‖ , Current Applied Physics 10, 2010, 193-198.<br />
[8] Y. Raviprakash, V. Kasturi , Bangera G., K. Shivakumar,‘ ―Preparation and<br />
Chacractrization of CdxZn1-x S thin films by Spray Pyrolysis Tec‖,<br />
Applications.Sola Technique for Photovoltaic r Energy 83, 2009, 1645-<br />
1651<br />
[9] Borse S.V.,Chavhan S.D., Sharma,Ramphal, ―Growth structural and optical<br />
properties of Cd1-xZnxS alloy thin films grown by Solution Growth<br />
technique(SGT)‖.Alloy.Cmopd.436, 2007, 407.<br />
[10] Azaroff L. V., Elements of X-ray Crystallography, McGraw –Hill<br />
Company (1968), pp 485.<br />
[11] Moss, T.S., Optical properties of semiconductors, 1961, Butterworth and Co<br />
Pub. Ltd London 2<br />
[12] Pentia, E., V. Draghici, G. Sarua, B. Mereu, L. Pintilie, F. Sava and M.<br />
Popescu structural electrical and photoelectrical properties of CdxPb1-xS<br />
thin film prepared by chemical bath deposition, J. Electrochem. Soc. Vol.<br />
151 (11), 2004, 729-733<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 397<br />
ISSN 2250-3153<br />
AUTHORS<br />
First Author - Ravangave L. S, M. Sc. M.Phil. Ph. D. Shri Sant<br />
Gadge Maharaj College loha dist Nanded (M. S.) India PIN<br />
431708<br />
Email id - lsravangave@gmail.com<br />
Second Author - Birajdar U. V. M. Sc. M. Phil. Department of<br />
physics, Mahatma Basweshwar College, Latur. (M.S.) India<br />
Email id - umakantvbiradar60@gmail.com<br />
Third Author - Misal S. D., M. Sc., Department of physics<br />
,Kumar Swami College,Ausa. (M.S.) India.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 398<br />
ISSN 2250-3153<br />
Hybrid Algorithm for Segmentation of Left Ventricle in<br />
Cardiac MRI<br />
Abstract- According to estimates from the American Heart<br />
Association, each year 17 million people die of cardiovascular<br />
disease (CVD). More than 30% of all deaths in world are due to<br />
cardiovascular disease. Hybrid algorithm using k-means<br />
clustering and level- set is proposed in this paper in order to<br />
improve the efficiency of segmentation. K-means algorithm is<br />
used to initially locate the position of left ventricle and the<br />
accurate segmentation has been achieved with the help of level<br />
set algorithm. Preprocessing has been carried out with the help of<br />
5*5 kernel median filter and speckles inside the heart region are<br />
faded. The preprocessing has sufficiently reduced speckle noise<br />
and preserved the LV edges.<br />
Index Terms- K-means clustering, speckle noise, level set,<br />
CVD<br />
G<br />
I. INTRODUCTION<br />
enerally cardiac examination involves assessing a<br />
combination of the four following physiological measures:<br />
cardiac structure, function, perfusion and myocardial viability.<br />
Different imaging modalities, including Ultrasound (US), singlephoton<br />
emission computer tomography (SPECT), computed<br />
tomography (CT), and magnetic resonance imaging (MRI) are<br />
used in performing cardiac examinations. Among existing<br />
methods, cardiac MRI [7](CMR) has attracted significant interest<br />
in the research community, as a single imaging technique capable<br />
of retrieving all cardiac measures appropriately.<br />
More specifically the aim for this work is to segment the left<br />
ventricle in the heart using cardiac MRI and to find out various<br />
clinical parameters. Currently, medical practitioners are using<br />
manual segmentation which is very tedious task. This automated<br />
segmentation will reduce the burden on medical practitioners.<br />
Automated segmentation is important for assessment of LV<br />
filling because cavity volumes must be measured on hundreds of<br />
short-axis cine images, making manual tracing impractical for<br />
widespread clinical application [3]. Figure 1 shows that the left<br />
ventricle shape and its endo-cardial and epi-cardial contours. We<br />
can note that the shape of heart changes from apex to bottom and<br />
each heart is having slightly different position. So to detect the<br />
exact location of left ventricle in individual person is a dynamic<br />
process.<br />
So it is very difficult to have a global algorithm which can be<br />
able to detect left ventricle.<br />
We need to address the following challenges to develop an<br />
automatic LV detection system.<br />
R.Sreemathy 1 , Rekha S. Patil 2 , Priyanka Shirude 3<br />
Pune Institute of Computer Technology, Pune, India 1,3<br />
Dr. D. Y. Patil Technical Campus,Talsande, Kolhapur 2<br />
1. The position and orientation of the LV is unconstrained in an<br />
image.<br />
2. A 2D image loses a lot of useful information about a 3D<br />
object.<br />
3. The LV shape changes significantly in a cardiac cycle.<br />
4. There are large variations in the image intensity.<br />
Figure 1 includes various levels approximately 8-10 levels for<br />
patients and each level consist of approximately 20 frames.<br />
Figure 1: (a) LV endocardial contours (b) LV epicardial contours,<br />
Data from MRI is more accurate than that derived from LV<br />
angiocardiography, where the calculation is based on the<br />
assumption that the LV is ellipsoidal in shape. Volume<br />
measurements by MRI are independent of cavity shape, with the<br />
area from contiguous slices integrated over the chamber of<br />
interest.<br />
Here in this paper an attempt has been made to identify left<br />
ventricle by using k-means clustering algorithm [2] and a more<br />
precise segmentation of endocardium has been carried out with<br />
level set[5]. The area measured with this hybrid algorithm has<br />
been compared with the ground truth which is marked by experts<br />
in this field.<br />
II. METHODOLOGY<br />
Small variations in the magnetic field introduced by the<br />
radiofrequency (RF) system (the B1 field introduce slowly<br />
undulating (low frequency) in homogeneities in the image which<br />
can be visually distracting), can impact the textural significance<br />
of an area, and because they can substantially reduce the contrast<br />
in different image regions, is a barrier to using any kind of<br />
segmentation or region delineation tool which is based on<br />
thresholding.<br />
Thresholding techniques produce segments having pixels<br />
with similar intensities. They can handle any underlying image<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 399<br />
ISSN 2250-3153<br />
model as long as each intensity is associated with the only one<br />
segment. [1]<br />
The following steps are used in order to achieve the final<br />
segmentation<br />
1). Median filtering<br />
2) K-means clustering<br />
3) Connected components finding<br />
4) Centroid detection<br />
5) Levelset algorithm<br />
Figure 2 shows the methodology used for the implementation of<br />
hybrid algorithm for detection of left ventricle.<br />
Input<br />
Image<br />
Levelset<br />
Segmentation<br />
Median<br />
Filtering<br />
Centroid<br />
Detection<br />
A. Median filtering<br />
Median filter of size 5*5 kernel has been used on original image<br />
in order to reduce the noise and to sharpen the edges. The<br />
original input image is shown in Figure3 and the final median<br />
filtered image is shown in Figure4.<br />
Figure 3: Original Image<br />
Figure 4: Filtered Image<br />
K-means<br />
clustering<br />
Connected<br />
Component<br />
Finding<br />
Figure 2: Block Diagram for automated segmentation<br />
B. K-means clustering<br />
K-means clustering [7] is an algorithm to classify or to group<br />
objects based on attributes/features into K number of group. K is<br />
positive integer number. The grouping is done by minimizing the<br />
sum of squares of distances between data and the corresponding<br />
cluster centroid. Thus, the purpose of K-mean clustering is to<br />
classify the data.<br />
K-means algorithm is summarized as follow:<br />
1. Choose k initial class means.<br />
2. Assign each pixel to the class with the closest mean.<br />
3. Reassign one pixel to a new class such that the move best<br />
reduces the overall sum of square distances criterion.<br />
4. Recompute the class means using the new assignments.<br />
5. If the criterion was improved, go to Step 3.<br />
Figure5 shows the K-means clustered output on the filtered<br />
image.<br />
Figure 5: Clustered Image with 3 regions<br />
C. Connected components labeling<br />
Next step is to find the connected components in the clustered<br />
image and to select proper component containing left ventricle.<br />
Results of it are shown over Figure6.<br />
Figure 6: connected components finding<br />
D. Centroid detection<br />
After rigorous study, it is found that the label of the left ventricle<br />
is found to be one. Now the centroid of this label is found. Thus<br />
we are able to locate a central point on left ventricle.<br />
E. Levelset segmentation<br />
Figure 7: Centroid Detected<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 400<br />
ISSN 2250-3153<br />
The level-set method is one computational technique for<br />
tracking a propagating interface over time, which in many<br />
problems has proven more accurate in handling topological<br />
complexities such as corners and cusps, and in handling<br />
complexities in the evolving interface such as entropy conditions<br />
and weak solutions. It is a robust scheme that is relatively easy<br />
to implement.<br />
The general idea behind the level-set method is to apply a<br />
function Φ (t) to the space the interface inhabits, where Φ is a<br />
point in that space, t a point in time. The function is initialized at<br />
t = 0, and then a scheme is used to approximate the value of Φ (t)<br />
over small time increments.<br />
Levelset algorithm can be summarized as follows:<br />
1. Introduce a co-ordinate system<br />
2. Embed the interface in the x-y plane.<br />
3. Invent the function z = Φ (x, y, t). This is level set function.<br />
Using the centroid located in section D and with minimum<br />
radius of the left ventricle initial contour of the level set<br />
algorithm is drawn automatically with the centroid as center.<br />
Thus by detecting the centroid, the change in location of left<br />
ventricle is found easily. And hence the final segmentation is<br />
more accurate as we are able to change the position of the initial<br />
contour automatically and easily. Hence tracking the left<br />
ventricle with respect to various levels has become simplified.<br />
Figure 8 shows final segmented left ventricle for one image of<br />
level1.<br />
Figure 8: Level set segmented contour<br />
III. RESULTS<br />
The database used [8] has about 33 patients. The algorithm is<br />
tested by using above database. Accuracy of algorithm has been<br />
tested on sufficient number of images. The above mentioned<br />
algorithm has worked successfully on all levels starting from<br />
base to apex. The algorithm is working successfully in the base,<br />
middle and apical slices and the algorithm is able to locate a<br />
point successfully on the left ventricle which made the job of<br />
drawing initial contour simple.<br />
A. Result Analysis of k-means clustering<br />
While performing k-means clustering, endo-cardium and<br />
epicardium are merged with each other.<br />
B. Result analysis of centroid detection<br />
The centroid of first 5 levels is located exactly in left ventricle.<br />
But in apical levels centroid of left ventricle is getting shifted<br />
slightly. And because of the same reason for those levels we are<br />
facing problems in initializing the contour for level set. Here<br />
Figure 9 shows the bar chart for centroid detection against<br />
different levels, which shows that for 1 st five levels, we are<br />
having 100% success rate and from 6 th to 8 th level we are having<br />
80%-85% success rate.<br />
Figure 10 shows the area segmented using the above proposed<br />
algorithm on one of the levels. The x-axis represents the frame<br />
number and y-axis represents the corresponding area of left<br />
ventricle<br />
100<br />
80<br />
60<br />
40<br />
20<br />
0<br />
1st<br />
level<br />
4th<br />
level<br />
7th<br />
level<br />
success rate%<br />
Figure 9: Bar chart for success rate on different levels<br />
Figure 10: Graph of segmented area of left ventricle using hybrid<br />
algorithm<br />
The mean area error between ground truth and the above<br />
algorithm is 0.5%.<br />
IV. CONCLUSION<br />
A new hybrid algorithm using k-means and level set algorithm<br />
has been proposed in this paper. K-means algorithm has been<br />
used as an initial tool to locate the left ventricular region. The kmeans<br />
algorithm has made the segmentation task automatic as<br />
we are able to easily locate a point on the left ventricle. This<br />
point is used as initial seed for the final level set segmentation.<br />
REFERENCES<br />
[1] Salem Saleh Al-amri, N.V. Kalyankar and Khamitkar S.D ―Image<br />
Segmentation by Using Thershold Techniques‖, journal of computing,<br />
volume 2, issue 5, May 2010, issn 2151-9617<br />
[2] M. Lynch, O. Ghita, P.F.Whelan, ‖Automatic segmentation of the left<br />
ventricle cavity and myocardium in MRI data‖, Computers in Biology<br />
and Medicine 36 (2006) 389–407<br />
[3] Si Yong Yeo, Liang Zhong, Yi Su, Ru San Tan, Dhanjoo N. Ghista,<br />
―Analysis of Left Ventricular Surface Deformation during Isovolumic<br />
Contraction”, Proceedings of the 29th Annual International Conference of<br />
the IEEE EMBS Cite International, France, 2007<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 401<br />
ISSN 2250-3153<br />
[4] Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D.<br />
Piatko, Ruth Silverman, and Angela Y. Wu, ―An Efficient k-Means<br />
Clustering Algorithm: Analysis and Implementation‖, IEEE transactions on<br />
pattern analysis and machine intelligence, vol. 24, no. 7, July 2002.<br />
[5] Sethian, J. A., ―Level Set Mehods: Evolving interfaces in geometry, fluid<br />
mechanics, computer vision, and material science‖, Cambridge University<br />
Press, 1996.<br />
[6] M Puvaneswary, ‖Cardiac MR Imaging‖, JP brothers Medical Publishers(P)<br />
Ltd, 2005<br />
[7] Kanungo, T.; Mount, D. M.; Netanyahu, N. S.; Piatko, C. D.;<br />
Silverman, R.; Wu, A. Y. 2002. "An efficient k-means clustering<br />
algorithm: Analysis and implementation". IEEE Trans. Pattern<br />
Analysis and Machine Intelligence 24, p. 881–892.<br />
[8] Alexander Andreopoulos, John K. Tsotsos, ―Efficient and Generalizable<br />
Statistical Models of Shape and Appearance for Analysis of Cardiac MRI‖,<br />
Medical Image Analysis, Volume 12, Issue 3, June 2008, Pages 335-357.<br />
First Author – R. Sreemathy, ME(Electronics) and<br />
MS(Electronics and control), Pune Institute of Computer<br />
Technology. Email id - sreemathyr@yahoo.com.<br />
Second Author – Rekha S. Patil, PhD (Electronics), Dr. D. Y.<br />
Patil Technical Campus. Email id - prekha46@yahoo.com.<br />
Third Author – Priyanka B. Shirude, BE(E&TC), Pune Institute<br />
of Computer Technology. Email id - p.shirude2@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 402<br />
ISSN 2250-3153<br />
Effect of in-plane forces on frequency parameters<br />
Abstract- Vibration and buckling characteristics of stiffened<br />
plates subjected to in-plane uniform and non-uniform edge<br />
loading at the plate boundaries are investigated using the finite<br />
element method. Rectangular stiffened plates possessing<br />
different boundary conditions, aspect ratios, varying mass and<br />
stiffness properties and varying number of stiffeners have been<br />
analyzed for buckling and vibration studies. The characteristic<br />
equations for the natural frequencies, buckling loads and their<br />
corresponding mode shapes are obtained from the equation of<br />
motion. The effects of the position of stiffeners and number of<br />
stiffeners, aspect ratios, boundary conditions, stiffeners<br />
parameters upon the buckling load parameter and fundamental<br />
frequency of the stiffened plates are investigated. The results are<br />
obtained considering the bending displacements of the plate and<br />
the stiffener. Eccentricity of the stiffeners gives rise to axial and<br />
bending displacement in the middle plane of the plate.<br />
Comparison with published results indicates good agreement. In<br />
the structure modelling, the plate and the stiffeners are treated as<br />
separate elements where the compatibility between these two<br />
types of elements is maintained.<br />
Index Terms- Finite element method, Stiffened plate,<br />
Buckling and frequency parameter, Stiffeners parameters<br />
Notations<br />
a - Plate dimension in longitudinal direction<br />
b - Plate dimension in the transverse direction<br />
t - Plate thickness<br />
E, G - Young‘s and shear moduli for the plate material<br />
b s , d s - web thickness and depth of a x-stiffener<br />
, - Non –dimensional element coordinate<br />
A S - Cross sectional area of the stiffener<br />
I S - Moment of inertia of the stiffener cross-section about<br />
reference axis<br />
{q} r - Vector of nodal displacement a r th node<br />
[D P ] - Rigidity matrix of plate<br />
[D S ] - Rigidity matrix of stiffener<br />
[K e ] - Elastic stiffness matrix of plate<br />
[K S ] - Elastic stiffness matrix of stiffener<br />
M<br />
M , - Consistent mass matrix of plate, stiffener<br />
p<br />
S<br />
[K G ] - Geometric stiffness matrix<br />
A.K.L. Srivastava, S.R.Pandey<br />
* Department of Civil Engineering, N. I. T. Jamshedpur- 831014, India<br />
[N] r - Matrix of a shape function of a node r<br />
P cr - Critical buckling load<br />
P (t) - In plane load<br />
T - Torsional constant<br />
S<br />
P - Polar moment of inertia of the stiffener element<br />
S<br />
T<br />
I. INTRODUCTION<br />
he dynamic behaviour of stiffened plates has been the<br />
subject of intensive study for many years. For aerodynamic<br />
considerations, stiffener will be provided inside the hull of<br />
aircraft and for space structures the stringer can be provided<br />
outside if that is more structurally efficient. Stiffened plates are<br />
structural components consisting of plates reinforced by a system<br />
of ribs to enhance their load carrying capacities. These structures<br />
are widely used in aircraft, ship, bridge, building, and some other<br />
engineering activities. In many circumstances these structures are<br />
found to be exposed to in-plane loading.<br />
The buckling and vibration characteristics of stiffened plates<br />
subjected to uniform and non-uniform in-plane edge loading are<br />
of considerable importance to aerospace, naval, mechanical and<br />
structural engineers. Aircraft wing skin panels, which are made<br />
of thin sheets are usually subjected to non-uniform in-plane<br />
stresses caused by concentrated or partial edge loading at the<br />
edges, and due to panel stiffener support conditions<br />
Diez et al. [1] studied the effect of combined normal and<br />
shear in-plane loads by the Galerkin method. Transverse<br />
vibration of rectangular plates subjected to in-plane forces under<br />
various combinations has been studied by Singh and Dey [2] by a<br />
difference based variational approach.<br />
The vibration and buckling of partially loaded simply<br />
supported plates were studied by Deolasi et al. [3]. Recently<br />
Sundersan et al. [4] have studied the influence of partial edge<br />
compression on buckling behaviour of angle ply plates for a few<br />
orientations.<br />
A brief literature survey reveals that a variety of methods<br />
have been proposed to study the vibration of stiffened plates. The<br />
most common method used in early literature was to approximate<br />
the stiffened plate as equivalent orthotropic plates, using the<br />
smeared stiffener approach. In more recent literature, with the<br />
help of high-speed computers, the plate and stiffeners were<br />
treated separately. Such numerical methods as the finite element<br />
method and finite difference method are widely used.<br />
Aksu [5] has presented a variational principle in conjunction<br />
with the finite difference method for analysis of free vibration of<br />
uni-directionally and cross-stiffened plates considering in-plane<br />
inertia and in plane displacements in both directions.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 403<br />
ISSN 2250-3153<br />
Shastry and Rao [6] have used the 3 noded conforming<br />
element and refined beam-bending element for arbitrary oriented<br />
stiffeners.<br />
Olson and Hazell [7] have presented a critical study on<br />
clamped integrally stiffened plate by the finite element method.<br />
The mode shapes and frequencies have been determined<br />
experimentally using the real time holographic technique. The<br />
effect of change in rib stiffness on various modes has been<br />
studied.<br />
Bapu Rao et al. [8] have also reported their work on<br />
experimental determination of frequencies with real time<br />
holographic technique for skew stiffened cantilever plates.<br />
Mukhopadhyay [9] has applied the semi-analytic finite difference<br />
method to the stability analysis of rectangular stiffened plates<br />
based on the plate beam idealization.<br />
Sheikh and Mukhopadhyay [10] applied the spline finite strip<br />
method to the free vibration analysis of stiffened plates of<br />
arbitrary shapes. They analyzed the plate of rectangular, skew<br />
and annular shapes with concentric as well as eccentric stiffeners.<br />
Large amplitude, free flexural vibration of stiffened plates has<br />
been investigated by the spline finite strip method by Sheikh and<br />
Mukhopadhyay [11]. The stiffener has been elegantly modelled<br />
so that it can be placed anywhere within the plate strip.<br />
Harik and Guo [12] have developed a compound finite<br />
element model to investigate the stiffened plates in free vibration<br />
where they have treated the beam and plate element as the<br />
integral part of a compound section, and not as independent<br />
bending components.<br />
Bedair [13] has studied the free vibration characteristics of<br />
stiffened plates due to plate/stiffener proportions. He has<br />
considered the plate and the stiffener as the discrete elements<br />
rigidly connected at their junctions and the nonlinear strain<br />
energy function of the assembled structure has been transformed<br />
into an unconstrained optimization problem to which Sequential<br />
quadratic programming has been applied to determine the<br />
magnitudes of the lowest natural frequency and the associated<br />
mode shape<br />
Allman [14] has carried out the analysis of buckling loads of<br />
square and rectangular stiffened plates using triangular element.<br />
He has presented the results both by including and neglecting the<br />
torsional stiffness of the stiffeners. Vibration of stiffened plates<br />
with elastically restrained edges has been analyzed by Wu and<br />
Liu [15] using Rayleigh-Ritz method. The first four lower<br />
frequencies for restrained plates up to six intermediate stiffeners<br />
are calculated.<br />
Mukhopadhyay [16] has extended the static and vibration<br />
analysis of plates to analyse the stability of ship plating and<br />
allied plated structures using the semi-analytic method.<br />
An isoparametric stiffened plate bending element for the<br />
buckling analysis of stiffened plate has been presented by<br />
Mukherjee and Mukhopadhyay [17]. Here the stiffener can be<br />
positioned anywhere within the plate element and need not<br />
necessarily be placed on the nodal lines.The general spline finite<br />
strip method has been extended by Sheikh and Mukhopadhyay<br />
[18] to analyse stiffened plate of arbitrary shape. Stiffened plates<br />
having various shapes, boundary conditions and also possessing<br />
various dispositions of stiffeners have been analyzed by the<br />
proposed method. The stability of partially stiffened, simply<br />
supported and clamped square plates is studied by Roy et al.<br />
[19]. A high precision triangular finite element and a compatible<br />
stiffener element are used in the finite element analysis. Buckling<br />
of stiffened plates has been studied by Bedair [20]. An<br />
investigation on stiffened plates has been conducted to determine<br />
the elastic parameters as well as the cross-sectional dimensions<br />
of rectangular stiffeners from experimental modal data and finite<br />
element prediction, using model-updating technique by<br />
Chakraborty and Mukhopadhyay [21].<br />
A differential quadrature analysis for the free vibration of<br />
eccentrically stiffened plates is studied by Zeng and Bert [22].<br />
The plate and the stiffeners are separated at the interface with<br />
equilibrium and continuity condition satisfied. Vibration and<br />
dynamic stability of stiffened plates subjected to in-plane<br />
uniform harmonic edge loading is studied using finite element<br />
analysis by Srivastava et al. [23] considering and neglecting inplane<br />
displacements. Further Srivastava et al [24] extended their<br />
work to study the principal dynamic instability behaviour of<br />
stiffened plates subjected to non-uniform harmonic in-plane edge<br />
loading. Various methods used for vibration analysis such as Ritz<br />
technique, Levy‘s solution, finite difference method, finite<br />
element method, Galerkin method, differential quadrature<br />
method and method using boundary characteristics orthogonal<br />
polynomials (BCOP) have been reviewed extensively by Leissa<br />
[25]. The effect of the gap between the stiffener tip and the<br />
supporting edge on the natural frequencies has been investigated<br />
by Nair and Rao [26]. The panel is represented by triangular<br />
plate bending elements and the stiffener by beam elements.<br />
The applied load is seldom uniform and the boundary<br />
conditions may be completely arbitrary in practice. The problem<br />
becomes complicated when the numbers of stiffeners are<br />
increasing regardless of the position of stiffeners not necessary<br />
along the nodal lines. Loading is non-uniformly distributed over<br />
the edges and along the stiffeners thus affecting the boundary<br />
conditions. Analysis of stiffened plate is carried out normally by<br />
energy method by adding energies due to plate and stiffener. The<br />
energy stored in the stiffener will depend on its cross section and<br />
if a thin walled open section, the effect of twisting as well as<br />
warping have to be included. These studies for most part being<br />
concerned with the numerical analysis of the theoretical buckling<br />
load and also mostly related to unstiffened plates.<br />
The present paper deals with the problem of vibration and<br />
buckling of rectangular stiffened plates subjected to in-plane<br />
uniform and non-uniform edge loading. Finite element<br />
formulation is applied for obtaining the non-uniform stress<br />
distribution in the plate and also to solve the buckling load and<br />
frequency parameters in various modes with different boundary<br />
conditions, aspect ratios and various parameters of stiffened<br />
plates. The analysis presented determines the stresses all over the<br />
region. In the present analysis, the plate is modeled with the nine<br />
nodded isoperimetric quadratic element where the contributions<br />
of bending and membrane actions are taken into account. Thus<br />
the analysis can be carried out for both thin and thick plates.<br />
Moreover it can be applied to a structure having irregular<br />
boundaries. The formulation of the stiffener is done in such a<br />
manner so that it may lie anywhere within a plate element. In<br />
order to maintain compatibility between plate and stiffener, the<br />
interpolation functions used for the plate are used for the<br />
stiffeners also.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 404<br />
ISSN 2250-3153<br />
II. MATHEMATICAL FORMULATION<br />
The governing equations for the buckling and vibration of<br />
stiffened plates subjected to in-plane harmonic edge loading are<br />
developed. The presence of uniform and non-uniform external<br />
in-plane loads, boundary conditions, stiffeners locations and<br />
cutouts if any in the plate induce a non-uniform stress field in the<br />
structures. This necessitates the determination of the stress field<br />
as a prerequisite to the solution of the problems like vibration,<br />
buckling and vibration behaviour of stiffened plates. As the<br />
thickness of the structure is relatively smaller, the determination<br />
of stress field reduces to the solution of a plane stress problem in<br />
the plate skin and stiffeners (where the thickness and breath are<br />
small compared to length). The stiffened plates are modeled and<br />
the governing equations are solved by finite element method. In<br />
the present analysis, the plate is modelled with nine noded<br />
isoparametric quadratic elements where the contributions of<br />
bending and membrane actions are taken into account. One of the<br />
advantages of the element is that it includes the effect of shear<br />
deformation and rotary inertia in its formulation. Thus the<br />
analysis can be carried out for both thin and thick plates.<br />
Moreover it can be applied to a structure having irregular<br />
boundaries. Also it can handle any position of cutout, different<br />
boundary and position of in-plane concentrated loads or loading<br />
conditions. In order to maintain compatibility between plate and<br />
stiffener, the interrelation functions used for the plate are used<br />
for the stiffeners also. Numerical methods like finite element<br />
method (FEM) are preferred for problems involving complex in<br />
plane loading and boundary conditions as analytical methods are<br />
not easily adaptable. The formulation is based on Mindlin's plate<br />
theory, which will allow for the incorporation of shear<br />
deformation. The plate skin and the stiffeners/composite are<br />
modelled as separate elements but the compatibility between<br />
them is maintained. The nine noded isoparametric quadratic<br />
elements with five degrees of freedom (u, v, w, X and y ) per<br />
node have been employed in the present analysis.<br />
The in-plane displacements u and v need to be considered<br />
only when the stiffeners are connected eccentrically to the plate.<br />
If the plate and stiffeners are connected concentrically, no in<br />
plane stresses develop The effect of in-plane deformations is<br />
taken into account in addition to the deformations due to<br />
bending, which will help to model the stiffener eccentricity<br />
conveniently. The element matrices of the stiffened plate element<br />
consist of the contribution of the plate and that of the stiffener.<br />
in the power of the thickness co-ordinate as:<br />
The explicit evaluation of integrals involved in the evaluation<br />
of element stiffness and mass matrices of the plate is tedious and<br />
as such is not attempted. A Gaussian integration technique has<br />
been adopted for this purpose for its high accuracy and also it can<br />
be implemented easily. A exact integration needs an order of 3 x<br />
3. However, a reduced integration proves to be more effective<br />
and cheaper. To integrate the element matrices a 2 x 2 Gaussian<br />
integration has been adopted, however, the order of integration<br />
has been mentioned.<br />
To integrate the element matrices a 2 x 2 Gaussian integration has been adopted, however, the order of integration has been<br />
mentioned.<br />
The displacement at any point within the element can be expressed as:<br />
u<br />
<br />
<br />
v<br />
<br />
<br />
w<br />
<br />
<br />
<br />
x <br />
<br />
y <br />
=<br />
r<br />
Strain displacement relation can be written as:<br />
9<br />
<br />
<br />
1<br />
N r<br />
I <br />
5<br />
u<br />
<br />
r<br />
<br />
vr<br />
<br />
<br />
w<br />
r<br />
<br />
<br />
xr <br />
<br />
<br />
yr <br />
B p r q r B p q <br />
(1)<br />
(2)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 405<br />
ISSN 2250-3153<br />
and<br />
B <br />
P<br />
r<br />
N<br />
r<br />
<br />
x<br />
<br />
0<br />
<br />
N<br />
r<br />
<br />
y<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
The generalized stress-strain relationship for a plate element is<br />
where the stress resultant vector is<br />
<br />
<br />
p Dp p<br />
p<br />
T<br />
<br />
<br />
N<br />
x<br />
N<br />
y<br />
N<br />
x<br />
0<br />
N<br />
y<br />
N<br />
x<br />
y<br />
0<br />
0<br />
0<br />
0<br />
0<br />
r<br />
r<br />
M<br />
x<br />
0<br />
0<br />
0<br />
0<br />
0<br />
0<br />
N<br />
x<br />
N<br />
y<br />
r<br />
r<br />
M<br />
y<br />
0<br />
0<br />
0<br />
N<br />
<br />
x<br />
0<br />
N<br />
<br />
y<br />
Using the isoparametric coordinates, the element stiffness matrix is expressed as:<br />
1<br />
1<br />
T<br />
b B p D p B p <br />
p<br />
K J p<br />
1<br />
1<br />
The element mass matrix can be expressed in iso parametric coordinate as:<br />
1 1<br />
M J p<br />
1 1<br />
T<br />
p e N<br />
m p N<br />
Geometric stiffness matrix expressed in isoparametric coordinates as:<br />
1<br />
1<br />
T<br />
B B <br />
<br />
KG P<br />
G p P G p p<br />
1<br />
1<br />
N<br />
0<br />
d<br />
d<br />
r<br />
r<br />
r<br />
M<br />
x<br />
d<br />
d<br />
J d<br />
d<br />
0<br />
0<br />
0<br />
0<br />
N<br />
<br />
y<br />
N<br />
<br />
x<br />
0<br />
N<br />
<br />
y <br />
<br />
r<br />
r<br />
r<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
(4)<br />
(5)<br />
(6)<br />
(7)<br />
(8)<br />
(3)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 406<br />
ISSN 2250-3153<br />
<br />
Geometric stiffness of stiffener<br />
P<br />
<br />
x t<br />
<br />
<br />
xy t<br />
<br />
0<br />
<br />
<br />
<br />
0<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
The strain matrix can be expressed as<br />
and<br />
where<br />
<br />
xy<br />
t<br />
y<br />
0<br />
0<br />
0<br />
0<br />
t<br />
0<br />
0<br />
t<br />
<br />
x<br />
12<br />
0<br />
xy<br />
12<br />
0<br />
t<br />
3<br />
3<br />
0<br />
0<br />
0<br />
t<br />
<br />
y<br />
12<br />
0<br />
xy<br />
t<br />
12<br />
3<br />
3<br />
0<br />
0<br />
t<br />
xy<br />
12<br />
0<br />
t<br />
x<br />
12<br />
0<br />
3<br />
3<br />
<br />
0<br />
0<br />
0<br />
xy<br />
12<br />
0<br />
t<br />
t<br />
y<br />
12<br />
9<br />
<br />
r 1<br />
3<br />
3<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
q B q <br />
S<br />
G<br />
<br />
B GS<br />
<br />
0<br />
<br />
r<br />
<br />
<br />
0<br />
<br />
BGS GS<br />
0<br />
0<br />
N<br />
r<br />
x<br />
0<br />
<br />
A<br />
0<br />
N<br />
r<br />
x<br />
r<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
0<br />
x S<br />
S <br />
<br />
0 X S S <br />
where AS is the area, FS the first moment of area about reference plane, SS the second moment of area about reference plane, TS the<br />
torsional constant and PS the polar moment of area of the stiffener cross-section.<br />
The expression for the geometric stiffness matrix can be formed by equating the internal work done by the stresses to the external<br />
work done by the nodal forces.<br />
The geometric stiffness of the stiffener element can be expressed in iso-parametric co- ordinate as:<br />
The derivatives of x and y with respect to x / are given by<br />
x<br />
cos<br />
/<br />
x<br />
KG S<br />
1<br />
G S S GS S<br />
1<br />
(13)<br />
T<br />
B B J d<br />
y<br />
/<br />
x<br />
sin <br />
The components of generalized strain vectors are obtained as follows:<br />
/ /<br />
u<br />
u<br />
<br />
/<br />
x x<br />
x<br />
/<br />
x<br />
/<br />
u<br />
<br />
y<br />
y<br />
/<br />
x<br />
/<br />
x<br />
/<br />
/<br />
x<br />
<br />
x <br />
<br />
<br />
/<br />
x x x y<br />
/<br />
x<br />
y<br />
x<br />
/<br />
<br />
r<br />
(14)<br />
(15)<br />
(16)<br />
(10)<br />
(11)<br />
(12)<br />
(9)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 407<br />
ISSN 2250-3153<br />
We can substitute the values and finally we get as:<br />
/ x <br />
/ /<br />
/<br />
y<br />
<br />
y x <br />
y<br />
<br />
<br />
/<br />
/<br />
x x x y<br />
y<br />
/<br />
x<br />
(17)<br />
u<br />
2 1 u<br />
v<br />
v<br />
2 <br />
<br />
cos ( ) sin 2<br />
sin <br />
x<br />
2 y<br />
x<br />
y<br />
<br />
<br />
<br />
<br />
2 1 <br />
<br />
x<br />
x y<br />
y 2<br />
cos ( ) sin 2<br />
sin <br />
<br />
x<br />
2 y<br />
x<br />
y<br />
<br />
<br />
w<br />
w<br />
<br />
<br />
( <br />
x ) cos<br />
( <br />
y ) sin<br />
<br />
<br />
x<br />
y<br />
<br />
1 <br />
<br />
<br />
<br />
2 <br />
x y<br />
x<br />
y 2<br />
(<br />
( ) sin 2<br />
sin cos ) <br />
<br />
2 x<br />
y<br />
y<br />
x<br />
<br />
The generalized strain components in the stiffeners in x / and y / coordinates are given by<br />
/ x<br />
x T <br />
Where [T] is the transformation matrix and is given by<br />
<br />
x<br />
where<br />
T <br />
2<br />
cos <br />
2<br />
sin <br />
0.<br />
5sin<br />
2<br />
<br />
0<br />
<br />
<br />
0<br />
0<br />
<br />
0<br />
0<br />
<br />
<br />
0<br />
0<br />
0<br />
0<br />
2<br />
cos <br />
2<br />
sin <br />
0.<br />
5sin<br />
0.<br />
5sin<br />
0<br />
0<br />
2<br />
2<br />
0<br />
0<br />
0<br />
0<br />
0<br />
0<br />
0<br />
cos<br />
sin<br />
0 <br />
<br />
0 <br />
0 <br />
<br />
0.<br />
5sin<br />
2<br />
<br />
<br />
0.<br />
5sin<br />
2<br />
<br />
2<br />
cos <br />
2 <br />
sin <br />
0 <br />
<br />
0 <br />
<br />
u v u<br />
v <br />
<br />
y <br />
x<br />
y <br />
x w w <br />
, , ( ), , , , , ( <br />
x ), ( <br />
y ) <br />
<br />
x y y x x y x y x y <br />
9<br />
x<br />
BS r r BS <br />
r 1<br />
B B B B B <br />
S<br />
S<br />
1 S 2 S r S<br />
9<br />
(19)<br />
(20)<br />
(18)<br />
(22)<br />
(23)<br />
(21)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 408<br />
ISSN 2250-3153<br />
and<br />
B <br />
<br />
B S<br />
D S <br />
/<br />
x r<br />
The equivalent nodal forces are given by<br />
S<br />
<br />
Nr<br />
<br />
<br />
x<br />
<br />
<br />
0<br />
r<br />
<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
'<br />
x<br />
<br />
EA<br />
<br />
<br />
EF<br />
0<br />
<br />
0<br />
S<br />
S<br />
<br />
<br />
<br />
0<br />
<br />
<br />
<br />
<br />
N<br />
r<br />
cos<br />
x<br />
<br />
<br />
N<br />
r<br />
<br />
sin<br />
x<br />
<br />
<br />
<br />
<br />
0<br />
<br />
<br />
<br />
0<br />
0<br />
0<br />
0<br />
EF<br />
ES<br />
0<br />
0<br />
0<br />
0<br />
Nr<br />
x<br />
S<br />
S<br />
<br />
<br />
0<br />
0<br />
0<br />
GT<br />
0<br />
Nr<br />
2<br />
cos<br />
x<br />
N<br />
<br />
r<br />
x<br />
S<br />
<br />
Nr<br />
sin 2<br />
x<br />
2<br />
Nr<br />
cos<br />
Nr<br />
sin 2<br />
x 2<br />
Nr<br />
2<br />
cos<br />
x<br />
T<br />
F N P t J d<br />
d<br />
e <br />
o<br />
<br />
<br />
0<br />
Nr<br />
0<br />
<br />
0 <br />
0<br />
<br />
<br />
0 <br />
<br />
GAS<br />
/ 1.<br />
2<br />
<br />
0 <br />
<br />
<br />
0<br />
<br />
<br />
0<br />
<br />
<br />
N<br />
<br />
r <br />
x <br />
<br />
Nr<br />
2<br />
sin <br />
x<br />
<br />
<br />
<br />
Nr<br />
sin 2<br />
<br />
x<br />
2<br />
<br />
<br />
<br />
<br />
N <br />
r sin<br />
<br />
<br />
<br />
<br />
N<br />
<br />
<br />
r sin 2 <br />
x 2 <br />
<br />
<br />
N<br />
2 <br />
r<br />
sin <br />
x <br />
The intensity of loading within the patch is assumed to be uniform. In such situations it becomes necessary to obtain the equivalent<br />
nodal forces when a concentrated load is acting within the element. Again, the equivalent nodal forces are expressed as:<br />
2.1 Governing Equations<br />
P<br />
r <br />
P<br />
o<br />
T N J<br />
The governing equations for specified problems like vibration, static and dynamic stability are as:.<br />
Free vibration:<br />
2 M <br />
q 0<br />
K b<br />
(28)<br />
(29)<br />
(27)<br />
(24)<br />
(25)<br />
(26)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 409<br />
ISSN 2250-3153<br />
Vibration without in-plane load:<br />
Vibration with in-plane load:<br />
Static stability or buckling<br />
Or<br />
0 q K q<br />
<br />
M b<br />
<br />
0 <br />
q K P K q M <br />
b<br />
G<br />
2<br />
P K M q <br />
0<br />
Kb c r G<br />
PK<br />
<br />
q 0 <br />
K G<br />
(30)<br />
(31)<br />
(32)<br />
b (33)<br />
where K b ,<br />
K G ,<br />
M are overall elastic stiffness, geometric stiffness, and mass matrices respectively, <br />
vector. To evaluate the overall elastic stiffness, geometric stiffness, and mass matrices K b ,<br />
K G ,<br />
<br />
q is the displacement<br />
M respectively, it is<br />
necessary to use the same shape functions for both plate and stiffener elements The element matrices for the plate and stiffener are<br />
generated separately and then added up to form overall matrices.<br />
The equations are solved using the technique proposed by Corr<br />
and Jennings [28 ] where the matrices [K], [M] and [KG] are<br />
stored in single array according to skyline storage algorithm. In<br />
all the cases, the stiffness matrix [K] is factorized according to<br />
Cholesky‘s decomposition technique. With this, the solution for<br />
displacement is simply obtained by its forward elimination and<br />
backward substitution techniques. These displacements<br />
components are used to find out the stress field. These stresses<br />
are used to calculate the geometric stiffness matrices. The<br />
solutions of equations go through a number of operations.<br />
Moreover it requires a number of iterations to get the solution<br />
since these equations come under the category of eigenvalue<br />
problem. In such cases, the solution of eigen vector and eigen<br />
Frequencies of vibration ( ) b t D<br />
2<br />
value is more than one where the different solutions correspond<br />
to different modes of vibration or different modes of buckling.<br />
The mode which gives lowest value of the eigen value is quite<br />
important and it is known as fundamental mode.<br />
2.3 Non-dimensionalisation of Parameters<br />
Majority of the model parameters and results are presented in<br />
non-dimensional form to make them independent of the plate<br />
size, thickness, material properties, etc for the convenience of the<br />
analysis. The non-dimensionalisation of different parameters like<br />
vibration, buckling and excitation frequency for dynamic<br />
stability analysis is taken as given below:<br />
2 2<br />
Buckling load ( ) (1) Distributed load b D<br />
3<br />
2<br />
N X<br />
(2) Concentrated load b D<br />
Where D is the plate flexural rigidity, D = E t 12(<br />
1<br />
) , P is the applied load, Pc r is the buckling load, is the density of the<br />
plate material and t is the plate thickness. In addition, certain quantities are expressed as the ratio of that quantity to some reference<br />
quantity. Assuming a general case of several longitudinal ribs and denoting<br />
EI S the flexural rigidity of a stiffener at a distance (Dx) from the edge y = 0, the stiffener parameter terms<br />
and are defined as: AS bt<br />
= Ratio of cross-sectional area of the stiffener to the plate, where A S is the<br />
area of the stiffener.<br />
I bD<br />
E S = Ratio of bending stiffness rigidity of stiffener to the plate, where S<br />
the stiffener cross-section about reference axis.<br />
Pc r<br />
I is the moment of inertia of<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 410<br />
ISSN 2250-3153<br />
2.4 Problem Identification<br />
The basic configuration of the problem considered here is a unstiffened and stiffened plate subjected to various uniform and nonuniform<br />
edge loadings as shown in figures 1 (a-d). The cross-section of the stiffened plate is shown in figure 4.2 for rectangular crosssection<br />
and figure 4.3 for Skew rectangular plate cross section under uniaxially loading.<br />
(a) Uni-axial loading (b) Bi-axial loading<br />
(c) In-plane shear loading (d) In-plane Shear loading<br />
The problem considered here consists of a rectangular plate (a x<br />
b) with stiffener subjected to various types of loading. In Figures<br />
1 (a-d), the plates are subjected to uniformly distributed in plane<br />
uniaxial, biaxial, shear edge loading. The length (a) of the<br />
stiffened plate considered above is varied keeping its other<br />
A<br />
A<br />
A<br />
b<br />
a<br />
Figure 1 (a-d): Plate subjected to inplane uniform edge loading<br />
1 in<br />
Figure 2: Stiffened plate cross section<br />
t<br />
b<br />
a S b<br />
c<br />
parameters unchanged. The cross-section of the stiffener is<br />
shown in figure 2 and 3. Rectangular skew plates under general<br />
uniformly distributed in-plane edge loading are considered also<br />
as shown in figure 4.3 to study the vibration and dynamic<br />
stability behaviour of skew stiffened plates.<br />
S d<br />
Figure 3: Skew rectangular plate under uniaxially loading<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 411<br />
ISSN 2250-3153<br />
A parametric study is carried out here for the plates to present<br />
some new results in the present studies.on the topic using the<br />
present finite element approach. Different kind of loading cases<br />
as written below are applied for buckling, vibration of stiffened<br />
plates.<br />
III. RESULT AND DISCUSSION<br />
3.1 Convergence and validation studies with previous results<br />
In a finite element analysis, it is desired to have the convergence<br />
studies to estimate the order of mesh size to be necessary for the<br />
numerical solution. The problem of isotropic rectangular<br />
a/b<br />
1<br />
0.5<br />
2.5<br />
Boundary<br />
Condition<br />
1. In-plane Uniaxial compression<br />
2. In-plane biaxial Compression<br />
3. In-plane shear load<br />
4. Biaxial compression and in-plane shear<br />
unstiffened plates with uniform loading is investigated in table 1<br />
for buckling and vibration for a/b = 1, 0.5, 2, 2.5 and validated<br />
with available results of Leissa [25]. As the convergence study<br />
shows that a mesh size of 10x10 is sufficient enough to get a<br />
reasonable order of accuracy. The analysis in the subsequent<br />
problems is carried out with this mesh size.<br />
.<br />
Table 1: Buckling and Vibration studies of rectangular unstiffened plate<br />
Buckling<br />
Parameter<br />
Non dimensional frequency parameter<br />
Reference Mode No<br />
1 2 3 4<br />
SSSS 3.99 Present 19.73 49.35 49.35 78.96<br />
Leissa [ 25] 19.732 49.438 49.438 78.95<br />
CCCC 10.07 Present 35.98 73.43 -- 108.21<br />
Leissa [25] 35.992 73.221 73.221 108.27<br />
SCSS 4.84 Present 23.64 51.12 58.23 86.34<br />
SSSS 6.24 Present 49.33 78.94 128.76 167.45<br />
CCCC 19.31 Present 98.29 127.56 179.97 254.56<br />
SCSS 10.37 Present 69.23 94.789 140.09 207.45<br />
SSSS 4.13 Present 11.643 16.97 24.356 35.98<br />
Leissa[25] 11.44 16.18 24.08 35.135<br />
CCCC 7.85 Present 23.64 27.81 35.46 46.93<br />
Leissa [25 ] 23.648 27.817 35.446 46.770<br />
SCSS 4.116 Present 11.74 17.123 25.56 38.76<br />
A square plate clamped in all edges having a centrally placed<br />
concentric stiffener as presented by Nair & Rao [26] using a<br />
package stift1, Mukharjee [17] , Mukhopadhyay [16], and Seikh<br />
[18] using FEM , semi analytical method, and spline finite strip<br />
method respectively has been analyzed presently in table 2. Seikh<br />
[18] has given results neglecting and including mass moment of<br />
inertia which has been validated in present results marked as<br />
Plate size = 600mm x 600 mm Plate thickness = 1.0 mm,<br />
Poisson‘s ratio = 0.34 Mass density = 2.78e-6 Kg /<br />
E = 6.87<br />
7<br />
2<br />
10 N / mm , As = 67.0 mm 2<br />
Present (1) for M.I. Neglecting and Present (2) as mass moment<br />
of inertia including. The first six frequencies are compared. The<br />
agreement is excellent. In Mukhopadhyay [16] in-plane<br />
displacement is not considered in the analysis so results cause<br />
slightly varying. Table2 also present convergence study showing<br />
good convergence of results.<br />
mm<br />
, Is = 2290 mm 4<br />
Js = 22.33 mm 4<br />
Table 2: Frequency in (rad / s) of clamped stiffened plate with a concentric Stiffener<br />
Source Mode<br />
No<br />
Present 6 x 6<br />
8 x 8<br />
10 x 10<br />
Present 10 x 10<br />
1 2 3 4 5 6<br />
318.62<br />
317.36<br />
317.00<br />
317.00<br />
404.53<br />
401.66<br />
400.84<br />
400.84<br />
474.30<br />
472.34<br />
471.74<br />
471.74<br />
541.56<br />
538.26<br />
537.32<br />
537.32<br />
727.81<br />
719.23<br />
716.35<br />
716.35<br />
3<br />
771.47<br />
763.23<br />
759.54<br />
759.54<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 412<br />
ISSN 2250-3153<br />
Nair and Rao [26]<br />
Mukharjee [17]<br />
Mukhopadhyay [16]<br />
(1) Seikh [18]<br />
(2) Seikh [18]<br />
317.54<br />
322.34<br />
305.12<br />
316.85<br />
316.85<br />
400.12<br />
412.23<br />
382.34<br />
400.35<br />
400.35<br />
The Effect of the stiffener for the same plate but with a stiffener<br />
of 20 mm by 3 mm size has been solved and presented in table 3.<br />
Dimension of the stiffened plate is shown in figure 4. Seikh [18]<br />
solved this problem by spline finite strip method and finite<br />
600 mm<br />
A A<br />
AAA 3 mm<br />
600mm<br />
Figure 4: Eccentrically clamped square stiffened plate<br />
472.23<br />
506.87<br />
454.76<br />
471.69<br />
471.68<br />
537.14<br />
599.34<br />
519.17<br />
536.95<br />
536.94<br />
714.14<br />
772.15<br />
696.18<br />
716.04<br />
716.02<br />
760.17<br />
860.93<br />
741.15<br />
759.14<br />
759.12<br />
element method respectively. The results are compared and are<br />
found to agree well. Nair also solved placing the stiffener at<br />
various eccentricities.<br />
1 mm<br />
20 mm<br />
Table 3: Convergence of the frequency with Mesh Division<br />
Mesh Division<br />
3 x 3 4 x 4 6 x 6 8 x 8 9 x 9 10 x 10<br />
Sheikh Mode 1 324.703 319.921 317.433 316.949 316.94 316.799<br />
[18] Mode 2 403.147 403.147 401.627 400.611 400.369 400.327<br />
Present Mode 1 342.473 325.62 318.64 317.66 317.25 316.79<br />
Mode 2 410.06 420.62 404.53 401.66 403.10 400.32<br />
3.2 Buckling of longitudinally stiffened plate under<br />
uniaxial load<br />
3.2.1 Validation Studies for Buckling Studies of a Central<br />
concentric stiffened plate<br />
The present formulation is validated for buckling analysis of<br />
rectangular stiffened plate. The buckling load parameters have<br />
been obtained for various aspect ratios, bending stiffness rigidity<br />
and stiffener area ratios for one central longitudinal stiffener in<br />
table 4. The plate thickness ratio (a/h) and isotropic plate and<br />
stiffener material (ν) are taken as 100 and 0.3 respectively. The<br />
dimension ‗a‟ is varied keeping b as constant to get different<br />
values of aspect ratio (a/b). The plate is subjected to uniform<br />
compression in the x-direction. The mesh division chosen for the<br />
whole plate is 10 x 10. A good agreement is observed with the<br />
result obtained by Timoshenko and Gere [27]. In table 4 A is for<br />
Timoshenko and Gere [27].<br />
Table 4: Comparison of buckling load parameters of a rectangular stiffened plate with one longitudinal central stiffener<br />
subjected to uniform normal edge loading along x- direction.<br />
a/b<br />
= 5<br />
=10<br />
= 0.05 = 0.1 = 0.05 = 0.10<br />
Present A<br />
[27]<br />
Present A<br />
[27]<br />
Present A [27] Present A [27]<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 413<br />
ISSN 2250-3153<br />
0.6<br />
1.0<br />
1.2<br />
1.6<br />
2.0<br />
3.0<br />
16.54<br />
11.98<br />
9.85<br />
8.17<br />
8.01<br />
8.31<br />
16.5<br />
12.0<br />
9.83<br />
8.01<br />
7.95<br />
8.31<br />
16.54<br />
11.03<br />
9.02<br />
7.35<br />
7.28<br />
7.67<br />
After the validation of free vibration analysis and buckling<br />
analysis of stiffened plates, detailed studies has been done for<br />
variation of buckling and vibration load parameters of stiffened<br />
plates for different aspect ratios, various boundary conditions<br />
with varying load P/Pcr with different number of stiffeners.<br />
The variation of buckling and frequency parameters with P/Pcr<br />
for rectangular eccentric stiffened plate with 1, 2, 3 longitudinal<br />
equispaced stiffeners subjected to in-plane uniform uni-axial for<br />
various aspect ratios (a/b = 1, 1.5, 2) and boundary conditions<br />
(SSSS, CCCC, SCSS) are studied in details and presented in<br />
table 5-8 for different boundary conditions and aspect ratios for<br />
the sake of getting various interlinking results of number of<br />
stiffeners and aspect ratios. Here n is number of stiffeners.<br />
16.5<br />
11.11<br />
9.06<br />
7.38<br />
7.29<br />
7.62<br />
16.54<br />
15.99<br />
15.34<br />
11.43<br />
10.20<br />
12.03<br />
16.50<br />
16.00<br />
15.30<br />
11.40<br />
10.20<br />
12.0<br />
16.54<br />
15.99<br />
14.09<br />
10.48<br />
9.34<br />
11.10<br />
16.5<br />
16.0<br />
14.2<br />
10.5<br />
9.35<br />
11.1<br />
It is observed from the above studies that frequency parameters<br />
at any value of P/Pcr will be more for square stiffened plate.<br />
These values decrease with the increase of aspect ratios.<br />
Similarly it is also concluded that buckling loads parameters will<br />
decrease, as the aspect ratios will increase. It may be concluded<br />
from above observation that buckling load parameter and<br />
frequency parameter will increase with increase of number of<br />
stiffeners. The value will also increase with the increase of<br />
degree of restraints. Thus the buckling and frequency parameter<br />
of CCCC is more than SSSS and SCSS. In the same manner the<br />
buckling and frequency parameter of SCSS is more than SSSS.<br />
Table 5: Variation of frequency parameter and buckling load parameter ( ) in the case of different boundary condition and<br />
various aspect ratios for one longitudinal stiffener at the centre having ( = 0.1 and = 5).<br />
a/b<br />
1<br />
1.5<br />
2<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
11.03<br />
24.90<br />
17.02<br />
7.56<br />
23.73<br />
11.07<br />
7.285<br />
22.47<br />
8.89<br />
<br />
Frequency parameter<br />
-1 -0.5 0 0.5 0.9<br />
46.39<br />
87.89<br />
62.70<br />
25.60<br />
52.48<br />
33.47<br />
18.84<br />
37.97<br />
22.49<br />
40.17<br />
79.47<br />
54.91<br />
22.17<br />
46.41<br />
29.20<br />
16.32<br />
33.54<br />
19.64<br />
32.80<br />
69.76<br />
45.60<br />
18.10<br />
39.17<br />
24.09<br />
13.32<br />
28.22<br />
16.22<br />
23.19<br />
57.64<br />
33.24<br />
12.84<br />
29.53<br />
17.29<br />
9.41<br />
21.04<br />
11.667<br />
Table 6: Variation of frequency parameter and buckling load parameter ( ) in the case of different boundary<br />
a/b<br />
1<br />
1.5<br />
condition and aspect ratios for two longitudinal stiffener having ( = 0.1 and = 5)<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
14.44<br />
43.50<br />
26.10<br />
8.72<br />
29.54<br />
14.0<br />
2.31<br />
7.95<br />
1.81<br />
1.28<br />
----<br />
1.77<br />
0.94<br />
2.20<br />
1.20<br />
<br />
Frequency parameter<br />
-1 -0.5 0 0.4 0.6 0.9<br />
53.07<br />
---<br />
77.26<br />
27.49<br />
56.88<br />
37.65<br />
45.96<br />
94.46<br />
67.35<br />
23.81<br />
49.89<br />
32.79<br />
37.52<br />
79.78<br />
55.46<br />
19.44<br />
41.28<br />
26.96<br />
29.07<br />
64.95<br />
43.34<br />
15.06<br />
32.51<br />
21.06<br />
23.73<br />
55.48<br />
35.57<br />
12.29<br />
26.83<br />
2.65<br />
8.73<br />
1.37<br />
1.37<br />
3.07<br />
1.94<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 414<br />
ISSN 2250-3153<br />
2<br />
SSSS<br />
CCCC<br />
SCSS<br />
7.68<br />
25.11<br />
10.27<br />
19.35<br />
39.46<br />
24.18<br />
16.79<br />
34.64<br />
21.07<br />
13.69<br />
28.81<br />
17.35<br />
10.60<br />
22.80<br />
13.56<br />
8.66<br />
18.89<br />
11.13<br />
Table 7: Variation of frequency parameter and buckling load parameter ( ) in the case of different boundary condition and<br />
a/b<br />
1<br />
1.5<br />
2<br />
aspect ratios for three longitudinal stiffener having ( = 0.1 and = 5).<br />
BoundaryC<br />
ondition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
17.04<br />
60.64<br />
32.08<br />
9.69<br />
34.12<br />
16.30<br />
8.03<br />
27.2<br />
11.38<br />
0.96<br />
2.18<br />
1.26<br />
<br />
Frequency parameter<br />
-1 -0.5 0 0.4 0.6 0.9<br />
57.67<br />
---<br />
85.63<br />
28.97<br />
60.95<br />
40.63<br />
19.78<br />
40.92<br />
25.46<br />
49.94<br />
---<br />
74.55<br />
25.09<br />
53.25<br />
35.37<br />
17.13<br />
35.82<br />
22.18<br />
Table 8: Variation of frequency parameter and buckling load parameter ( ) for stiffened plate (Equispaced, one stiffener, two<br />
40.78<br />
88.85<br />
61.27<br />
20.49<br />
43.95<br />
29.05<br />
14<br />
29.67<br />
18.24<br />
31.58<br />
69.93<br />
47.76<br />
15.87<br />
34.42<br />
22.64<br />
10.83<br />
23.35<br />
14.24<br />
25.79<br />
57.79<br />
39.15<br />
12.96<br />
28.29<br />
18.36<br />
8.85<br />
19.25<br />
11.68<br />
2.88<br />
6.61<br />
4.41<br />
1.45<br />
3.20<br />
2. 09<br />
0.99<br />
2.19<br />
1.32<br />
stiffener, three stiffener) with different aspect ratio and boundary condition having ( = 0.1, = 5)<br />
a/b<br />
1<br />
2<br />
1.5<br />
No of Stiffener<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
11.03<br />
24.90<br />
17.02<br />
7.285<br />
22.47<br />
8.89<br />
7.56<br />
23.73<br />
11.07<br />
1 2 3<br />
<br />
32.80<br />
69.76<br />
45.60<br />
13.32<br />
28.22<br />
16.22<br />
18.10<br />
39.17<br />
24.09<br />
3.3 Unstiffened/stiffened plates under in-plane biaxial<br />
load<br />
3.3.1 Convergence and validation study<br />
The accuracy of the proposed method for unstiffened plates<br />
under in-plane biaxial load are first established by comparing the<br />
results of various problems with those of earlier investigators‘<br />
available in the literature. The analysis has been done for<br />
buckling load factor for square plates having various boundary<br />
14.40<br />
43.50<br />
26.70<br />
7.68<br />
25.11<br />
10.27<br />
8.72<br />
29.54<br />
14.03<br />
<br />
37.52<br />
79.78<br />
55.46<br />
13.69<br />
28.81<br />
17.35<br />
19.44<br />
41.28<br />
26.96<br />
17.04<br />
60.64<br />
32.08<br />
8.03<br />
27.2<br />
11.38<br />
9.69<br />
34.12<br />
16.30<br />
<br />
40.78<br />
88.85<br />
61.25<br />
14.00<br />
29.67<br />
18.24<br />
20.49<br />
43.95<br />
29.05<br />
conditions (SSSS, CCCC, CSCS) under bi-axial load considering<br />
compressive in-plane load and validated in table 9. To study the<br />
aspect of convergence, a simply supported square plate subjected<br />
to in-plane compressive load in both directions has been<br />
undertaken in table 10. In this case, the result is compared with<br />
finite difference solution by Singh and Dey [2]. The result is<br />
observed to converge satisfactorily at 8 x 8 and 10 x 10 mesh<br />
divisions.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 415<br />
ISSN 2250-3153<br />
Further frequency parameter ( ) for a simply supported square<br />
plate subjected to bi-axial load. (Nx = Ny = N and Nxy = 0), =<br />
Boundary<br />
Conditions<br />
SSSS<br />
CCCC<br />
CSCS<br />
0.3, P/Pcr = 0.5 is analyzed and validated in table 9 with the result<br />
of Singh and Dey [2] and analytical solution of Diez [1].<br />
Table 9: Buckling load factor for square plate under biaxial load<br />
Non-dimensional buckling load<br />
Present Ref [2]<br />
Mode1 Mode 2 Mode1 Mode 2<br />
1.99<br />
5.60<br />
3.82<br />
4.999<br />
9.333<br />
5.948<br />
Table 10: Convergence and validation study of frequency parameter for a simply supported square plate subjected to biaxial<br />
load. (Nx = Ny = N, Nxy = 0), = 0.3, P/Pcr = 0.5<br />
Mode No.<br />
1<br />
2<br />
3<br />
4<br />
After convergence and validation study for buckling and free<br />
vibration of unstiffened plates in well condition for bi-axial edge<br />
loading, the analysis is now extended to unstiffened/stiffened<br />
plates subjected to bi-axial load for buckling and vibration<br />
analysis.<br />
3.4 Vibration and buckling studies<br />
The variation of frequency parameter with in-plane load intensity<br />
factor of a plate of various aspect ratio and edge condition<br />
compressed uniformly on all edges (Nx = Ny = N & Nxy = 0) is<br />
2.0<br />
5.61<br />
3.83<br />
Frequency Parameter <br />
Present<br />
4 x 4 6 x 6 8 x 8 10 x 10 Singh and Dey<br />
[2]<br />
13.974 13.959 13.957 13.956 13.96<br />
44.729 44.253 44.148 44.144 44.13<br />
44.729 44.253 44.148 44.144 44.13<br />
75.015 74.078 73.892 73.865 73.86<br />
5.0<br />
9.42<br />
5.92<br />
Analytical [1]<br />
13.96<br />
43.35<br />
43.35<br />
73.87<br />
studied in this section. The fundamental frequency parameter for<br />
plate having different boundary conditions (SSSS, CCCC, SCSS<br />
) are studied in table 11.<br />
The trend of the results for a simply supported plate shown in<br />
table 11 is almost similar for CCCC plates and SCSS, except for<br />
its gradient of rise. For CCCC plate, there is a steep increase in<br />
frequencies with increasing aspect ratios. The natural frequencies<br />
are found to increase with decreased magnitude of compressive<br />
in-plane forces.<br />
Table 11: Variation of frequency parameter with in-plane load intensity factor of a late of various aspect ratio and edge<br />
condition compressed uniformly on all edges (Nx = Ny = N & Nxy = 0), = 0.3.<br />
a/b<br />
1<br />
0.5<br />
2<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
Buckling<br />
Parameter<br />
<br />
1.99<br />
5.30<br />
2.66<br />
4.99<br />
15.67<br />
8.61<br />
1.24<br />
3.92<br />
1.34<br />
Frequency parameter<br />
at P/Pcr<br />
0 0.2 0.5 0.8 0.995<br />
19.73<br />
35.98<br />
23.64<br />
43.33<br />
98.29<br />
69.31<br />
12.34<br />
24.57<br />
12.91<br />
17.65<br />
32.28<br />
21.26<br />
44.13<br />
88.22<br />
62.10<br />
11.03<br />
22.06<br />
11.55<br />
13.95<br />
25.65<br />
16.76<br />
34.88<br />
70.17<br />
49.29<br />
8.72<br />
17.54<br />
9.14<br />
8.82<br />
16.32<br />
10.62<br />
22.06<br />
44.73<br />
31.24<br />
5.56<br />
11.18<br />
5.78<br />
0.438<br />
0.815<br />
0.53<br />
0.109<br />
0.224<br />
0.115<br />
0.270<br />
0.558<br />
0.286<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 416<br />
ISSN 2250-3153<br />
Now the study is extended to stiffened plates subjected to biaxial<br />
in-plane edge loading. The variation of buckling and<br />
frequency parameters with P/Pcr for rectangular stiffened plate<br />
with 1, 2, 3 longitudinal equispaced stiffeners (Stiffener<br />
parameters = 0.1 and = 5) subjected to in-plane uniform bi-<br />
axial for various aspect ratios (a/b= 1, 1.5, 2) and boundary<br />
conditions (SSSS, CCCC, SCSS) are studied in detail and shown<br />
in table 12-14 for the sake of getting various interlinking results<br />
of number of stiffeners and aspect ratios.<br />
Table 12: Variation of frequency parameter with in-plane load intensity factor of stiffened Plate with one central stiffener<br />
having ( = 0.1 and = 5) compressed uniformly on all edges (<br />
a/b<br />
1<br />
0.5<br />
2<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
5.00<br />
9.33<br />
5.36<br />
7.99<br />
17.23<br />
10.64<br />
1.67<br />
6.18<br />
2.38<br />
<br />
x y x y<br />
,<br />
0<br />
),<br />
0.<br />
3<br />
Frequency parameter<br />
at Load intensity factor P/Pcr<br />
-2 -1 -0.5 0 0.25 0.5 0.8<br />
53.86<br />
95.28<br />
65.79<br />
131.57<br />
221.34<br />
163.97<br />
23.06<br />
48.12<br />
27.98<br />
44.65<br />
83.89<br />
56.86<br />
111.94<br />
186.09<br />
137.97<br />
18.126<br />
38.98<br />
22.54<br />
39.21<br />
77.32<br />
51.64<br />
100.09<br />
154.12<br />
115.56<br />
15.99<br />
33.98<br />
19.12<br />
32.80<br />
69.75<br />
45.60<br />
78.98<br />
127.22<br />
94.87<br />
13.21<br />
28.43<br />
16.34<br />
29.03<br />
63.78<br />
42.11<br />
68.12<br />
110.76<br />
81.76<br />
11.23<br />
23.98<br />
14.09<br />
24.69<br />
52.22<br />
36.56<br />
55.098<br />
89.98<br />
67.45<br />
Table 13: Variation of frequency parameter with in-plane load intensity factor of stiffened plate with two equispaced stiffener<br />
having ( = 0.1 and = 5) compressed uniformly on all edges (<br />
a/b<br />
1<br />
2<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
7.35<br />
14.21<br />
10.24<br />
1.88<br />
6.39<br />
2.91<br />
<br />
x y x y<br />
9.01<br />
20.34<br />
11.23<br />
,<br />
0<br />
),<br />
17.87<br />
33.18<br />
23.13<br />
35.34<br />
56.78<br />
42.34<br />
5.12<br />
11.98<br />
7.12<br />
0.<br />
3<br />
Frequency parameter<br />
at Load intensity factor P/Pcr<br />
-2 -1 -0.5 0 0.25 0.5 0.8<br />
62.89<br />
---<br />
83.50<br />
23.70<br />
48.32<br />
29.99<br />
51.80<br />
97.82<br />
71.09<br />
19.35<br />
39.95<br />
24.51<br />
45.23<br />
89.60<br />
63.70<br />
16.76<br />
34.89<br />
21.24<br />
37.52<br />
79.78<br />
55.46<br />
13.69<br />
28.81<br />
17.35<br />
33.0<br />
73.62<br />
50.00<br />
11./85<br />
25.13<br />
15.03<br />
27.73<br />
65.33<br />
45.12<br />
9.68<br />
20.70<br />
12.28<br />
19.61<br />
46.50<br />
31.09<br />
6.12<br />
13.26<br />
7.77<br />
Table 14: Variation of frequency parameter with in-plane load intensity factor of stiffened plate with three equispaced<br />
stiffeners having ( = 0.1 and = 5) compressed uniformly on all edges. (<br />
a/b<br />
1<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
SCSS<br />
<br />
8.27<br />
18.96<br />
13.24<br />
<br />
x y x y<br />
,<br />
0<br />
Frequency parameter<br />
At Load intensity factor P/Pcr<br />
-2 -1 -0.5 0 0.25 0.5 0.8<br />
66.59<br />
--<br />
92.66<br />
52.21<br />
---<br />
78.63<br />
48.54<br />
99.40<br />
70.51<br />
40.78<br />
88.85<br />
61.27<br />
36.28<br />
82.80<br />
56.05<br />
31.13<br />
75.88<br />
50.27<br />
)<br />
23.52<br />
54.01<br />
32.53<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 417<br />
ISSN 2250-3153<br />
2<br />
SSSS<br />
CCCC<br />
SCSS<br />
2.08<br />
7.19<br />
3.39<br />
24.42<br />
49.84<br />
31.53<br />
19.78<br />
41.18<br />
25.77<br />
The analysis is also presented below in figure 5 for simply supported stiffened plate which has been above for 1, 2, 3 stiffeners to<br />
show as a combined effects and overview.<br />
Non dimensional frequency parameter<br />
<br />
70<br />
60<br />
50<br />
17.13<br />
35.96<br />
22.33<br />
13.99<br />
29.67<br />
18.24<br />
12.11<br />
25.87<br />
15.80<br />
9.89<br />
21.29<br />
12.91<br />
40<br />
Simply supported<br />
30<br />
stiffened plate<br />
Aspect ratio=1<br />
20<br />
N =N =N<br />
x y<br />
=0.1&=5<br />
10<br />
1 stiffener<br />
2 stiffener<br />
3 stiffener<br />
0<br />
-2.0 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5<br />
P/P cr<br />
Figure 5: Variation of Non-dimensional frequency parameter vs P/Pcr for stiffened plate subjected by uniform compression on<br />
all edges.<br />
3.5 Unstiffened and stiffened plates uunder shear edge<br />
loading<br />
3.5.1 Validation studies with unstiffened plate<br />
The variation of frequency parameter with various in-plane load<br />
intensity (P/Pcr) of unstiffened square plate having boundary<br />
Boundary<br />
Condition<br />
SSSS<br />
CCCC<br />
CSCS<br />
6.26<br />
13.69<br />
8.17<br />
conditions (SSSS, CCCC, CSCS) subjected to inplane shear load<br />
at all edges have been analyzed in various modes and the results<br />
are obtained in table 15 and validated with the result of Singh<br />
and Dey [2].<br />
Table 15: Buckling load factors for square plate under shear load.<br />
3.6 Buckling and Vibration Studies of stiffened pates<br />
subjected to Shear Load<br />
After validating the results for buckling of unstiffened plates<br />
under shear, it is extended for further study for stiffened plates in<br />
order to get details insight and with the view to get some new<br />
numerical results under in-plane shear load.<br />
The variation of frequency parameters with P/Pcr for simply<br />
supported rectangular stiffened plate with 1, 2, 3 longitudinal<br />
equispaced stiffeners (Stiffener parameters = 0.1 and = 5)<br />
Buckling Load Parameter<br />
Present Ref [2]<br />
Mode 1 Mode 2 Mode1 Mode 2<br />
9.32<br />
11.568<br />
9.33<br />
11.56<br />
14.65<br />
16.958<br />
14.66 16.96<br />
12.58<br />
14.228<br />
12.58 14.23<br />
subjected to uniform shear has been studied for (a/b= 1, 1.5, 2) in<br />
table 16-19 4.27- 4.30. Variation of non-dimensional frequency<br />
parameter ( ) vs P/Pcr for simply supported stiffened plate<br />
having ( =0.1 and =5) subjected by in-plane uniform shear<br />
may be drawn. This is for the sake of getting various interlinking<br />
results of number of stiffeners and aspect ratios. It is observed<br />
from the above studies that frequency parameters at any value of<br />
P/Pcr will be more for square stiffened plate. These values<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 418<br />
ISSN 2250-3153<br />
decrease with the increase of aspect ratios. Similarly it is also<br />
concluded that buckling loads parameters will decrease, as the<br />
aspect ratios will increase.<br />
Table 16: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) of a simply supported stiffened plate<br />
with one central stiffener having ( = 0.1, = 5) subjected to edge shear only. (<br />
a/b<br />
1<br />
1.5<br />
2<br />
<br />
20.38<br />
11.41<br />
9.44<br />
Frequency parameter at P/Pcr<br />
0,<br />
<br />
x y x y<br />
0 0.2 0.4 0.5 0.6 0.8<br />
32.80<br />
18.10<br />
13.32<br />
32.10<br />
17.73<br />
13.06<br />
29.71<br />
16.53<br />
12.23<br />
27.58<br />
15.54<br />
11.55<br />
24.42<br />
14.19<br />
10.64<br />
9.44<br />
9.27<br />
7.72<br />
),<br />
0.<br />
3<br />
Table 17: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) of a simply supported stiffened plate<br />
with two equispaced stiffeners ( = 0.1, x y 0,<br />
x y <br />
= 5) subjected to edge shear only. (<br />
), 0.<br />
3<br />
.<br />
a/b<br />
1<br />
1.5<br />
2<br />
<br />
35.76<br />
17.22<br />
11.82<br />
Frequency parameter at P/Pcr<br />
0 0.2 0.4 0.5 0.6 0.8<br />
37.52<br />
19.44<br />
13.44<br />
36.75<br />
19.07<br />
13.44<br />
34.21<br />
17.88<br />
12.66<br />
32.05<br />
16.89<br />
12.01<br />
29.04<br />
15.53<br />
11.13<br />
Table 18: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) of a simply supported stiffened plate<br />
with three equispaced stiffeners ( = 0.1, = 5) subjected to edge shear only. (<br />
a/b<br />
1<br />
1.5<br />
2<br />
<br />
57.78<br />
21.39<br />
13.58<br />
Frequency parameter at P/Pcr<br />
--<br />
10.7<br />
8.20<br />
0,<br />
<br />
x y x y<br />
0 0.2 0.4 0.5 0.6 0.8<br />
40.78<br />
20.49<br />
13.99<br />
39.77<br />
21.12<br />
13.74<br />
36.36<br />
18.93<br />
12.95<br />
33.19<br />
17.93<br />
12.30<br />
14.56<br />
16.56<br />
11.42<br />
---<br />
11.8<br />
8.52<br />
),<br />
0.<br />
3<br />
Table 19: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) and buckling load parameter of a<br />
simply supported stiffened plate with equispaced stiffeners ( =0.1 and =5) subjected to edge shear only.<br />
x y 0,<br />
x y <br />
(<br />
), 0.<br />
3<br />
.<br />
No of<br />
stiffeners<br />
1<br />
a/b Buckling<br />
Parameter<br />
1<br />
1.5<br />
2<br />
20.38<br />
11.41<br />
9.44<br />
Frequency parameter at P/Pcr<br />
0 0.2 0.4 0.5 0.6 0.8<br />
32.80<br />
18.10<br />
13.32<br />
32.10<br />
17.73<br />
13.06<br />
29.71<br />
16.53<br />
12.23<br />
27.58<br />
15.54<br />
11.55<br />
24.42<br />
14.19<br />
10.64<br />
9.44<br />
9.27<br />
7.72<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 419<br />
ISSN 2250-3153<br />
2<br />
3<br />
1<br />
1.5<br />
2<br />
1<br />
1.5<br />
2<br />
35.76<br />
17.23<br />
11.82<br />
57.78<br />
21.39<br />
13.58<br />
37.52<br />
19.44<br />
13.69<br />
40.78<br />
20.49<br />
13.99<br />
36.75<br />
19.07<br />
13.44<br />
39.77<br />
20.12<br />
13.74<br />
34.21<br />
17.88<br />
12.66<br />
36.36<br />
18.93<br />
12.95<br />
32.05<br />
16.89<br />
12.01<br />
33.19<br />
17.93<br />
12.30<br />
29.04<br />
15.53<br />
11.13<br />
14.56<br />
16.56<br />
11.42<br />
--<br />
10.77<br />
8.20<br />
---<br />
11.81<br />
8.52<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 420<br />
ISSN 2250-3153<br />
IV. CONCLUSION<br />
The results from the study of the compressive buckling and<br />
vibration behaviour of a stiffened plate subjected to in-plane<br />
uniform and non-uniform edge loading can be summarized as<br />
follows.<br />
The stability resistance increases with increase of restraint at<br />
the edges for all types of loading, stiffener parameters and plate<br />
aspect ratios. The stability resistance increases with increase of<br />
number of stiffeners. The variation of buckling load with the<br />
position of the concentrated load on the edges is more<br />
pronounced for the stiffened plates of the smaller aspect ratios.<br />
The buckling load parameter of unstiffened plates simply<br />
supported along all the edges increase as the loads are nearer to<br />
the support. For plates with small aspect ratios, the boundary<br />
condition on the loaded edge has the significant effect on the<br />
load required to cause elastic stability. Natural frequencies of<br />
stiffened plates always decrease with the increase of the in-plane<br />
compressive load. The fundamental frequency becomes zero at<br />
the respective values of the buckling load. The inclusion of inplane<br />
displacements reduces the frequency of the stiffened plates.<br />
The buckling load of the stiffened plates reduces with the<br />
eccentricity of the stiffeners. The eccentricity of the stiffened<br />
plate element should not be neglected, especially for higher<br />
modes of vibration.<br />
REFERENCES<br />
[1] Diez, L., Gianetti, C.E. and Laura, P. A. A. A note on transverse vibration<br />
of rectangular plates subjected to in-plane normal and shear forces. Journal<br />
of Sound and Vibration, 59, 503-508,1978.<br />
[2] Singh, J.P. and Dey, S.S. Transverse vibration of rectangular plates<br />
subjected to in-plane forces by a difference based variational approach.<br />
International Journal of Mechanical Sciences. 32(7), 591-598, 1990.<br />
[3] Deolasi, P.K., Datta, P.K., and Prabhakar, D.L. Buckling and vibration of<br />
rectangular plates subjected to partial edge loading (Compression or<br />
tension). Journal of Structural Engineering, 22(3), 135-144, 1995.<br />
[4] Sundaresan, P., Singh, G., and Rao, G.V. Buckling of moderately thick<br />
rectangular composite plates subjected to partial edge compression.<br />
International Journal of Mechanical Sciences, 40(11), 1105-1117, 1998.<br />
[5] Aksu, G. Free vibration analysis of stiffened plates including the effects of<br />
in-plane inertia. Journal of Applied Mechanics, Trans of ASME, 49, 206-<br />
212, 1982.<br />
[6] Shastry, B. P. and Rao, G. V. Vibration of thin rectangular plates with<br />
arbitrarily oriented stiffeners. Computer and Structures, 7, 627-635, 1977.<br />
[7] Olson, M.D and Hazell, C.R. Vibration studies of some integral rib<br />
stiffened plates. Journal of Sound and Vibration. 50 , 43-61,1977.<br />
[8] Bapu Rao, M. N., Guruswami, P., Venketeswara Rao, M. and Pavitran, S.<br />
Studies on vibration of some rib-stiffened cantilever plates. Journal of<br />
Sound and Vibration, 57 (3), 389-402, 1978.<br />
[9] Mukhopadhyay, M. Vibration and stability analysis of stiffened plates by<br />
semi analytic finite difference method. Part I: Consideration of bending<br />
displacement only. Journal of Sound and Vibration, 130 (1), 27-39, 1989.<br />
[10] Sheikh, A.H. and Mukhopadhayay, M. Free vibration analysis of stiffened<br />
plates with arbitrary planform by the general spline finite strip method.<br />
Journal of Sound and Vibration, 162 (1) , 147-164, 1993.<br />
[11] Sheikh, A.H., and Mukhopadhyay, M. Large deflection free flexural<br />
vibration of stiffened plates. AIAA Journal, 24 (11), 1996.<br />
[12] Harik, I.E. and Guo, M. Finite element analysis of eccentrically stiffened<br />
plates in free vibration. Computer and Structures, 49 (6), 1007-1015, 1993.<br />
[13] Bedair, O.K. Fundamental frequency determination of stiffened plates using<br />
sequential quadratic programming. Computer and Structures, 199, 88-106,<br />
1997.<br />
[14] Allman, D. J. Calculation of the elastic buckling loads of thin flat<br />
reinforced plates using triangular finite elements. International Journal of<br />
Numerical Methods in Engineering, 9, 415-432, 1975.<br />
[15] Wu, J. R. and Liu, W. H. Vibration of rectangular plates with edge restraints<br />
and intermediate stiffeners. Journal of Sound and Vibration, 123(1), 103-<br />
113, 1988.<br />
[16] Mukhopadhyay, M. A semi analytic solution for rectangular plate bending.<br />
Computer and Structures, 9, 81-87, 1978.<br />
[17] Mukherjee, A and Mukhopadhyay, M. Finite Element Buckling Analysis of<br />
stiffened plates. Computer and Structures, 34 (6), 795-803, 1990.<br />
[18] Sheikh, A. H. and Mukhopadhyay, M. Analysis of Stiffened plates with<br />
arbitrary planform by the general spline finite strip method. Computer and<br />
Structures, 42(1), 53-67, 1992.<br />
[19] Arun Roy, Y., Shastry, B. P. and Rao, G. V., Stability of partially stiffened<br />
square plates using high precision finite element. Computer and Structures,<br />
37 (4), 613-615, 1990.<br />
[20] Bedair, O.K., A contribution to the stability of stiffened plates under<br />
uniform compression. Computer and Structures, 66, 535-570, 1998.<br />
[21] Chakraborty, S. and Mukhophyay, M. Estimation of In-plane elastic<br />
parameters and stiffener geometry of stiffened plates, Journal of Sound and<br />
Vibration, 231 (1), 99-124, 2000.<br />
[22] Zeng, H and Bert, C. W. A differential quadrature analysis of vibration for<br />
stiffened plates. Journal of Sound and Vibration, 241 (2), 247-252, 2001.<br />
[23] Srivastava, A. K. L., Datta, P. K., Sheikh, A. H., ‗Vibration and Dynamic<br />
instability of stiffened plates subjected to in-plane harmonic edge loading,‘<br />
International Journal of Structural Stability and Dynamics, 2002, 2(2), 185-<br />
206.<br />
[24] Srivastava, A. K. L., Datta, P. K., Sheikh, A. H., ‗Dynamic stability of<br />
stiffened plates subjected to non-uniform harmonic in-plane edge loading,‘<br />
Journal of Sound and Vibration, 2003, 262 (5), 1171-1189.<br />
[25] Leissa, A.W. Recent studies in plate vibration: 1981-1985, Part-I, Classical<br />
theory. Shock and Vibration Digest, 19(2), 11-18, 1987.<br />
[26] Nair, P. S. and Rao, M. S., On vibration of plates with varying stiffener<br />
length. Journal of Sound and Vibration, 95(1), 19-29, 1984.<br />
[27] Timoshenko, S.P. and Gere, J. M. Theory of Elastic Stability. McGraw-Hill,<br />
Newyork, 1961.<br />
AUTHORS<br />
First Author – A.K.L. Srivastava, Department of Civil<br />
Engineering, N. I. T. Jamshedpur- 831014, India, Email:<br />
aklsriv.nitjsr@yahoo.com<br />
Second Author – S.R.Pandey, Department of Civil Engineering,<br />
N. I. T. Jamshedpur- 831014, India, Email:<br />
ravi_sujay@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 421<br />
ISSN 2250-3153<br />
An Efficient Synthesis of Bio Active Azetidinones and<br />
Thiazolidinones of 3-METHYL-1-PHENYL-1H-<br />
PYRAZOL-5-OL<br />
Ravindra Kumar*, Abha Shukla**, and D.S.Tyagi***<br />
* Department of Chemistry, Gurukul Kangri University, Haridwar-249404, India<br />
** Department of Chemistry, K.G.M. Gurukul Kangri University, Haridwar-249404, India<br />
** Department of Chemistry, L.R.P.G.College, Sahibabad, Ghaziabad, U.P., India<br />
Abstract- A series of Azetidinone; 3-chloro-1-{4-[8-(2hydroxy-4-methylphenyl)-6,10-dimethyl-4,12-diphenyl-<br />
2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-1(9), 3(7), 5,10tetraen-2-yl]phenyl}-4-aryl<br />
azetidin-2-one (3a-e) and<br />
thiazolidinones; 3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10dimethyl-4,12-diphenyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9), 3(7), 5,10-tetraen-2yl]phenyl}-2-aryl-1,3-thiazolidin-4-one<br />
(4a-e) were synthesized<br />
using new schiff base; 2-(6,10-dimethyl-4,12-diphenyl-2-{4-<br />
[(E)-(arylmethylidene)amino]phenyl}-2,4,5,11,12pentaazatricyclo<br />
[7.3.0.0 3,7 ]dodeca-1(9), 3(7), 5,10-tetraen-8-yl)-<br />
5-methyl phenol (2a-e). The schiff base were synthesized by the<br />
reaction of aromatic aldehyde and 2-[2-(4-aminophenyl)-6,10dimethyl-4,12-diphenyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9), 3(7), 5,10-tetraen-8-yl]-<br />
5-methyl phenol (1) under microwave and conventional methods.<br />
Our results show that the synthesis of schiff bases under solvent<br />
free microwave conditions is the most efficient method of<br />
synthesis having highest yield than both conventional method<br />
and microwave with solvent. The newly synthesized compounds<br />
were characterized on the basis of different spectroscopic (IR,<br />
1 HNMR, Mass) and elemental (C, H, N) analysis techniques.<br />
Compounds (3a-e and 4a-e) were screened for their biological<br />
activities against the panel of nine bacterial strains.<br />
Index Terms- Antibacterial activity, azetidinones derivatives,<br />
microwave method, thiazolidinones derivatives,.<br />
M<br />
I. INTRODUCTION<br />
icrowave assisted heterocyclic synthesis is an efficient and<br />
eco-friendly synthetic strategy and has now become a<br />
power full tool for green chemistry. Microwave irradiation has<br />
been applied to organic reactions in the absence of solvent and or<br />
in the presence of a solid support such as clay, alumina and<br />
silica, resulting in shorter reaction time and better product yields<br />
than those obtained by using conventional heating (1-7) . Much<br />
attention has been paid to the synthesis of heterocyclic<br />
compounds (8-11) .<br />
Thiazolidinone is one of the most important pharmacores. 4thiazolidinone<br />
derivatives exhibit a broader spectrum of<br />
biological activity (12) . In recent years 4-thiazolidinones are the<br />
most extensively investigated class of compounds, and its<br />
derivatives have been found to have potentially chemotherapic<br />
activities such as anticonvulsant, antibacterial, antifungal,<br />
antinflammatory (13) , anticancer, and antipsychotic properties (14) .<br />
With a view to further assess the pharmacological profile of this<br />
class of compounds contains nitrogen and sulphur, we thought to<br />
synthesize some Azetidinone and thiazolidinones moieties in a<br />
single molecular frame work. Conventional methods are used for<br />
the synthesis of compounds (1). It was prepared by the reaction<br />
of 3-methyl-1-phenyl-5-pyrzolone, p-phenylene diamine and 4methyl-salicylaldehyde<br />
in ethanol condensation of compounds in<br />
ethanol gave the corresponding schiff base (2). Compound (2)<br />
was prepared by both methods conventional and microwave<br />
procedures. Cyclisation of schiff basses (2) with chloroacetic<br />
acid, POCl3 in presence of triethylamine and with thioglycolic<br />
acid in dichloromethane afforded azetidinones and<br />
thiazolidinones respectively. Purity of the compounds was<br />
checked by TLC, and characterized by elemental analysis, IR,<br />
1 H-NMR and mass spectrometric techniques. . The antibacterial<br />
activities of the title compounds were evaluated against the<br />
different bacterial strains (15-18) .<br />
II. RESEARCH ELABORATIONS<br />
All solvents and alcohols employed were distilled once before<br />
use and purchased form S.D. fine chemicals Ltd. India.,<br />
Qualigens fine chemical, India. Melting points were taken in an<br />
open capillary in an electro thermal apparatus and are<br />
uncorrected. IR (KBr) Spectra were recorded on a Perkin-Elmer<br />
spectrophotometer. 1H-NMR spectra were recorded on a Brucker<br />
AMX 560 MHz in DMSO-d6 using TMS as internal standard.<br />
Samsung microwave oven (Model No.M1630N, 2450MHz) was<br />
used for irradiation. The microwave assisted synthesis of schiff<br />
base compounds were carried out in a Samsung laboratory<br />
microwave reactor. EL-MS spectra were determined on a LCQ<br />
ion tap mass spectrometer. (Thermo Fisher, San Jose, CA. USA)<br />
equipped with an El-Source.<br />
2-[2-(4-aminophenyl)-6,10-dimethyl-4,12-dipheneyl-<br />
2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-1(9),3(7),5,10tetraen-8-yl]-5-methylphenol<br />
(1): A mixture of 5-methyl-2phenyl-1H-pyrazol-3-one<br />
(0.2 mol), 4-methyl Salicylaldehyde<br />
(0.1 mol) in ethanol (10 ml) was refluxed for about 3-4 hours.<br />
After cooling, the reaction mixture was poured in ice cold water,<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 422<br />
ISSN 2250-3153<br />
the solid precipitate was obtained and then filtered, dried and<br />
crystallized from chloroform to give light yellow solid.<br />
2-(6,10-dimethyl-4,12-diphenyl-2-{4-[(E)-<br />
(arylmethylidene)amino]phenyl}-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />
5-methylphenol (2a-e):<br />
Microwave method with solvent: 0.01 mol of 2-[2-(4aminophenyl)-6,10-dimethyl-4,12-dipheneyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl]-5methylphenol<br />
(1), and aromatic aldehyde and ethanol were taken<br />
in a glass tube which was loosely closed and irradiated in<br />
microwave oven for 2 minutes. The completion of the reaction<br />
was monitored by TLC. The reaction mixture was allowed to<br />
attain room temperature. The solvent was removed and the crude<br />
product was recrystallized with chloroform. (figure -1)<br />
Classical method: 0.01 mol of 2-[2-(4-aminophenyl)-6,10dimethyl-4,12-dipheneyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl]-5methylphenol<br />
(1), and aromatic aldehyde and 2-3 drops of acetic<br />
acid in ethanol(10 ml) was refluxed for 4-5 hours. The reaction<br />
was monitored by TLC. After completion of the reaction, the<br />
reaction mixture was set in one side to cool. Then the reaction<br />
mixture was poured in ice cold water and solid precipitate was<br />
separated out, filtered and recrystallized from chloroform.<br />
2-(6,10-dimethyl-4,12-diphenyl-2-{4-[(E)-<br />
(phenylmethylidene)amino]phenyl}-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />
5-methylphenol (2a): m. p.: 165 0 C, IR(KBr); 760(1-2<br />
disubtituted benzene ring), 1285 (C-N), 1572(C=C), 1618(C=N),<br />
2920(Ar-CH), 2998 cm -1 (Ar-OH); 1 H-NMR: δ=2.23(m, 6H, Ar-<br />
CH); 3.08 (s, 6H, (N-CH3)2); 4.12 (s, 1H, Ar-CH); 4.47 (d, J=8.5<br />
Hz, 2H, Ar-CH); 6.72-6.94 (m, 6H, Ar-CH), 7.08 (m, 6H, Ar-<br />
CH); 7.27-7.37 (m, 6H, Ar-CH); 7.51 (t, J=7.12 Hz, 3H, Ar-CH),<br />
7.80 (d, J=8.24 Hz, 2H, Ar-CH); 8.33(s, 1H, N=CH); 9.61 (s, 1H,<br />
Ar-OH); Analysis Calculated for C41H34N6O: C, 78.50; H, 5.42;<br />
N, 13.40; Found: C, 78.07; H, 4.37; N, 12.97; Mass spectra, m/z<br />
= 644 (100%).<br />
2-(2-{4-[(E)-[(2-hydroxyphenyl)methylidene]amino]phenyl}-<br />
6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />
5-methylphenol (2b): m. p.: 185 0 C, IR(KBr); 733 (1-2<br />
disubtituted benzene ring), 1210 (C-N), 1553 (C=C), 1605<br />
(C=N), 2850 (Ar-CH), 3015 cm -1 (Ar-OH); 1 H-NMR: δ=2.63(m,<br />
6H, Ar-CH); 3.35 (s, 6H, (N-CH3)2); 4.17 (s, 1H, Ar-CH); 4.64<br />
(d, J=8.2 Hz, 2H, Ar-CH); 6.82-7.24 (m, 6H, Ar-CH), 7.45 (m,<br />
8H, Ar-CH); 7.47-7.64 (m, 7H, Ar-CH); 7.71 (s, 1H, Ar-CH);<br />
8.38 (s, 1H, N=CH); 9.74 (s, 1H, Ar-OH); 11.24 (s, 1H, Ar-OH);<br />
Analysis Calculated for C41H34N6O2; C, 76.55; H, 5.29; N,<br />
13.40; Found: C, 75.81; H, 4.37; N, 12.97; Mass spectra, m/z =<br />
660 (100%).<br />
2-(2-{4-[(E)-[(4-hydroxyphenyl)methylidene]amino]phenyl}-<br />
6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />
5-methylphenol (2c): m. p.: 135 0 C, IR(KBr); 775 (1-2<br />
disubtituted benzene ring), 1293 (C-N), 1523 (C=C), 1635<br />
(C=N), 2935 (Ar-CH), 3035 cm -1 (Ar-OH); 1 H-NMR: δ=1.93(m,<br />
6H, Ar-CH); 3.18 (s, 6H, (N-CH3)2); 3.95 (s, 1H, Ar-CH); 4.34<br />
(d, J=8.5 Hz, 2H, Ar-CH); 6.52-7.14 (m, 8H, Ar-CH); 7.25-7.45<br />
(m, 6H, Ar-CH); 7.55-7..71 (m, 6H, Ar-CH); 7.83 (d, J = 8.2 Hz,<br />
2H, Ar-CH); 8.64 (s, 1H, N=CH); 9.54 (s, 1H, Ar-OH); 9.94 (s,<br />
1H, Ar-OH); Analysis Calculated for C41H34N6O2; C, 76.55; H,<br />
5.29; N, 13.07; Found: C, 76.01; H, 5.09; N, 12.75; Mass spectra,<br />
m/z = 660 (100%).<br />
2-(2-{4-[(E)-[(4-methoxyphenyl)methylidene]amino]phenyl}-<br />
6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />
5-methylphenol (2d): m. p.: 175 0 C, IR(KBr); 762 (1-2<br />
disubtituted benzene ring), 1253 (C-N), 1513 (C=C), 1655<br />
(C=N), 2915 (Ar-CH), 3065 cm -1 (Ar-OH); 1 H-NMR: δ=2.33 (m,<br />
6H, Ar-CH); 3.42 (s, 6H, (N-CH3)2); 3.85 (s, 3H, Ar-OCH3);<br />
4.24 (s, 1H, Ar-CH); 4.48 (d, J=8.5 Hz, 2H, Ar-CH); 6.32-6.94<br />
(m, 6H, Ar-CH); 7.05-7.25 (m, 8H, Ar-CH); 7.34-7.41 (m, 6H,<br />
Ar-CH); 7.88 (d, J = 8.3 Hz, 2H, Ar-CH); 8.54 (s, 1H, N=CH);<br />
9.74 (s, 1H, Ar-OH); Analysis Calculated for C42H36N6O2; C,<br />
76.74; H, 5.48; N, 12.79; Found: C, 75.81; H, 5.01; N, 12.44;<br />
Mass spectra, m/z = 674 (100%).<br />
2-(2-{4-[(E)-[(3-nitrophenyl)methylidene]amino]phenyl}-<br />
6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />
5-methylphenol (2e): m. p.: 145 0 C, IR(KBr); 752 (1-2<br />
disubtituted benzene ring), 1273 (C-N), 1583 (C=C), 1613<br />
(C=N), 2914 (Ar-CH), 3054 cm -1 (Ar-OH); 1 H-NMR: δ=2.43(m,<br />
6H, Ar-CH); 3.32 (s, 6H, (N-CH3)2); 3.83 (s, 1H, Ar-CH); 4.24<br />
(d, J=8.3 Hz, 2H, Ar-CH); 6.62-7.04 (m, 6H, Ar-CH); 7.12-7.25<br />
(m, 6H, Ar-CH); 7.41-7..59 (m, 7H, Ar-CH); 7.73 (s, 1H, Ar-<br />
CH); 8.08 (d, J = 8.2 Hz, 2H, Ar-CH); 8.62 (s, 1H, N=CH); 8.84<br />
(s, 1H, Ar-OH); 9.34 (s, 1H, Ar-OH); Analysis Calculated for<br />
C41H37N7O3; C, 73.24; H, 4.91; N, 14.59; Found: C, 72.71; H,<br />
4.31; N, 14.15; Mass spectra, m/z = 689 (100%).<br />
3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />
4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-arylazetidin-2-one (3ae):<br />
A mixture of schiff base (0.002 mols) chloroacetic acid<br />
(0.002 mols) was dissolved in dichloromethane (15 ml.) in<br />
stoppered conical flask, cooled and stirred. The reaction mixture,<br />
triethylamine (TEA, 0.002 mols) was added in it, which is<br />
followed by dropwise addition of POCl3 in dichloromethane<br />
(0.002 mols) with vigorous stirring. The reaction mixture was<br />
then stirred for additional 18 hrs. The completion of the reaction<br />
was monitored by TLC. The reaction mixture was washed with<br />
water and dried over sodium sulphate. The products that were<br />
obtained after removing the solvent were purified from<br />
chloroform.<br />
3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />
4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-phenylazetidin-2-one<br />
(3a). Yield: 61%; m. p.: 185 0 C, IR (KBr):764 (1, 2 disubtituted<br />
benzene ring),1285 (C-N), 1318 (C-N, β-lactam ring), 1573<br />
(C=C), 1738 (C=O, β-lactam), 2920 (Ar-CH), 2999cm -1 (Ar-<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 423<br />
ISSN 2250-3153<br />
OH); 1 H NMR: δ = 2.22 (m, 6H, Ar-CH); 3.09 (s, 6H, (N-<br />
CH3)2); 4.10 (s, 1H, Ar-CH); 4.46 (d, J = 8.3 Hz, 2H, Ar-CH);<br />
5.12 (s, 1H, Ar-CH); 5.38 (s, 1H, CH-Cl); 6.52 (d, J = 8.4 Hz,<br />
2H, Ar-CH); 6.72-6.89 (m, 6H, Ar-CH); 7.02-7.19 (m, 6H, Ar-<br />
CH); 7.26-7.42 (m, 9H, Ar-CH); 9.58 (s, 1H, Ar-OH); Analysed<br />
Calculated For C43H35N6O2Cl : C, 73.38; H, 4.98; N, 11.94;<br />
Found: C, 73.01; H, 4.45; N, 11.24 ; Mass spectra, m/z = 720<br />
(100%).<br />
3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />
4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(2-hydroxyphenyl)<br />
azetidin-2-one (3b). Yield: 55%; m. p.: 212 0 C, IR (KBr):723 (1,<br />
2 disubtituted benzene ring), 1212 (C-N), 1338 (C-N, β-lactam<br />
ring),1554 (C=C), 1718 (C=O, β-lactam), 2851 (Ar-CH), 3013<br />
cm -1 (Ar-OH); 1 HNMR: δ = 2.29 (m, 6H, Ar-CH); 2.92 (s, 6H,<br />
(N-CH3)2); 3.84 (s, 1H, Ar-CH); 4.37 (d, J = 8.3 Hz, 2H, Ar-CH);<br />
5.22 (s, 1H, Ar-CH); 5.48 (s, 1H, CH-Cl); 6.61 (d, J = 8.2 Hz,<br />
2H, Ar-CH); 6.62-6.71 (m, 8H, Ar-CH); 6.98-7.22 (m, 8H, Ar-<br />
CH); 7.49 (m, 4H, Ar-CH); 9.58 (d, J = 8.5 Hz, 2H, Ar-OH);<br />
Analysis Calculated For C43H35N6O3Cl : C, 71.74; H, 4.87; N,<br />
11.68; Found: C, 71.16; H, 4.26; N, 11.08 ; Mass spectra, m/z =<br />
730 (100%).<br />
3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />
4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(4-hydroxyphenyl)<br />
azetidin-2-one (3c). Yield: 67%; m. p.: 175 0 C, IR (KBr):769 (1,<br />
2 disubtituted benzene ring), 1287 (C-N), 1334 (C-N, β-lactam<br />
ring), 1520 (C=C), 1729 (C=O, β-lactam), 2943 (Ar-CH), 3028<br />
cm -1 (Ar-OH); 1 H NMR: δ = 2.03 (m, 6H, Ar-CH); 3.08 (s, 6H,<br />
(N-CH3)2); 4.02 (s, 1H, Ar-CH); 4.18 (d, J = 8.3 Hz, 2H, Ar-CH);<br />
5.11 (s, 1H, Ar-CH); 5.48 (s, 1H, CH-Cl); 6.53 (d, J = 8.5 Hz,<br />
2H, Ar-CH); 6.72 (d, J = 8.4 Hz, 2H, Ar-CH); 6.78-6.88 (m, 6H,<br />
Ar-CH); 7.13 (m, 8H, Ar-CH); 7.31 (m, 4H, Ar-CH); 9.39 (s, 1H,<br />
Ar-OH); 9.68 (s, 1H, Ar-OH); Analysis Calculated For<br />
C43H35N6O3Cl : C, 71.74; H, 4.87; N, 11.68; Found: C, 71.06; H,<br />
4.36; N, 11.38 ; Mass spectra, m/z = 731 (100%).<br />
3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />
4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(4-methoxyphenyl)<br />
azetidin-2-one (3d). Yield: 70%; m. p.: 248 0 C, IR (KBr):758<br />
(1, 2 disubtituted benzene ring), 1248 (C-N), 1362 (C-N, βlactam<br />
ring), 1518 (C=C), 1752 (C=O, β-lactam), 2920 (Ar-CH),<br />
3065 cm -1 (Ar-OH); 1 HNMR: δ = 2.32 (m, 6H, Ar-CH); 3.18 (s,<br />
6H, (NCH3)2); 3.92 (s, 3H, Ar-CH3); 4.28 (s, 1H, Ar-CH); 4.48<br />
(d, J = 8.5 Hz, 2H, Ar-CH); 5.25 (s,1H, Ar-CH); 5.35 (s, 1H,<br />
CH-Cl); 6.35 (d, J = 8.5 Hz, 2H, Ar-CH); 6.75-6.95 (m, 8H, Ar-<br />
CH); 7.10-7.25 (m, 8H, Ar-CH); 7.42 (m, 4H, Ar-CH); 9.18 (s,<br />
1H, Ar-OH); Analysis Calculated For C44H37N6O3Cl : C, 72.01;<br />
H, 5.05; N, 11.46; Found: C, 71.27; H, 4.18; N, 11.07 ; Mass<br />
spectra, m/z = 750 (100%).<br />
3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />
4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(3-nitrophenyl) azetidin-<br />
2-one (3e). Yield: 72%; m. p.: 228 0 C, IR (KBr):752 (1, 2<br />
disubtituted benzene ring), 1275 (C-N), 1355 (C-N, β-lactam<br />
ring), 1585 (C=C), 1765 (C=O, β-lactam), 2915 (Ar-CH), 3050<br />
cm -1 (Ar-OH); 1 H NMR: δ = 2.12 (m, 6H, Ar-CH); 3.02 (s, 6H,<br />
(N-CH3)2); 3.85 (s, 1H, Ar-CH); 4.25 (d, J = 8.7 Hz, 2H, Ar-CH);<br />
4.89 (s, 1H, Ar-CH); 5.15 (s, 1H, CH-Cl); 6.25 (d, J = 8.3 Hz,<br />
2H, Ar-CH); 6.45-6.85 (m, 6H, Ar-CH); 7.15-7.25 (m, 6H, Ar-<br />
CH); 7.55 (m, 4H, Ar-CH); 7.75 (d, J = 8.3 Hz, 2H, Ar-CH);<br />
8.05 (s, 1H, Ar-CH); 8.25 (s, 1H, Ar-CH); 9.45 (s, 1H, Ar-OH);<br />
Analysed Calculated. For C43H34N7O4Cl: C, 68.96; H, 4.54; N,<br />
13.10; Found: C, 67.99; H, 4.18; N, 12.40; Mass spectra, m/z =<br />
767 (100%).<br />
3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-aryl-1,3-thiazolidin-4one<br />
(4a-e). A Mixture of Schiff base (0.002 mols) and<br />
thioglycolic acid (0.002 mols) was dissolved in ethanol (10 ml)<br />
and the reaction mixture was refluxed for 14-16 hrs. The<br />
completion of the reaction was monitored by TLC. After the<br />
completion of reaction, it was poured in ice cold water and the<br />
solid precipitate was separated out. Collect the solid deposit by<br />
filtration and the crude product was recrystallized from<br />
chloroform.<br />
3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-phenyl-1,3-thiazolidin-4one<br />
(4a). Yield: 60 %; m. p.: 212 0 C, IR (KBr): 620 (C-S-C, 4thiazolidinone),<br />
758 (1, 2 disubtituted benzene ring), 1275 (C-N),<br />
1576 (C=C), 1616 (C=O, thiazolidinone), 2920 (Ar-CH), 3000<br />
cm -1 (Ar-OH); 1 H NMR: δ = 2.25 (m, 6H, Ar-CH); 3.15 (s, 6H,<br />
(N-CH3)2); 3.95-4.05 (d, J = 8.7 Hz, 2H, Ar-CH, thiazolidinone);<br />
4.05 (s, 1H, Ar-CH); 4.42 (d, J = 8.3 Hz, 2H, Ar-CH); 6.45 (s,<br />
1H, Ar-CH, thiazolidinone); 6.58 (d, J = 8.6 Hz, 2H, Ar-CH);<br />
6.75-6.85 (m, 6H, Ar-CH); 7.20-7.40 (m, 6H, Ar-CH); 7.42-7.72<br />
(m, 9H, Ar-CH); 9.65 (s, 1H, Ar-OH); Analysis Calculated For<br />
C43H36N6O2S : C, 73.62; H, 5.14; N, 11.99; S, 4.57; Found: C,<br />
73.01; H, 4.45; N, 11.50 ; S, 4.11; Mass spectra, m/z = 720<br />
(100%).<br />
3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(2-hydroxyphenyl)-1,3thiazolidin-4-one<br />
(4b). Yield: 60 %; m. p.: 263 0 C, IR (KBr):<br />
640 (C-S-C,4-thiazolidinone), 737 (1,2 disubtituted benzene<br />
ring), 1210 (C-N), 1540 (C=C), 1650 (C=O, thiazolidinone),<br />
2850 (Ar-CH), 3020 cm -1 (Ar-OH); 1H NMR: δ = 2.60-2.62 (m,<br />
6H, Ar-CH); 3.20 (s, 6H, (N-CH3)2); 4.10 (s, 2H, Ar-CH,<br />
thiazolidinone); 4.16-4,20 (d, J = 8.5 Hz, 2H, Ar-CH); 4.50 (d, J<br />
= 8.1 Hz, 2H, Ar-CH); 6.50 (s, 1H, Ar-CH, thiazolidinone); 7.00-<br />
7.70 (m, 2H, Ar-CH); 9.80 (s, 1H, Ar-OH); 10.90 (s, 1H, Ar-<br />
OH); Analysed Calculated For C43H36N6O3S : C, 71.98; H, 5.02;<br />
N, 11.72; S, 4.46; Found: C, 71.17; H, 4.56; N, 11.38 ; S, 4.05;<br />
Mass spectra, m/z = 728 (100%).<br />
3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(4-hydroxyphenyl)-1,3thiazolidin-4-one<br />
(4c). Yield: 70 %; m. p.: 242 0 C, IR (KBr):<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 424<br />
ISSN 2250-3153<br />
625 (C-S-C, 4-thiazolidinone),780 (1, 2 disubtituted benzene<br />
ring), 1280 (C-N), 1530 (C=C), 1610 (C=O, thiazolidinone),<br />
2950 (Ar-CH), 3020 cm -1 (Ar-OH); 1 H NMR: δ = 2.20 (m, 6H,<br />
Ar-CH); 2.80 (s, 6H, (N-CH3)2); 3.95 (s, 1H, Ar-CH,<br />
thiazolidinone); 4.15 (s, 1H, Ar-CH); 4.30 (d, J = 8.1 Hz, 2H, Ar-<br />
CH); 6.40 (s, 1H, Ar-CH, thiazolidinone); 6.40-6.50 (m, 5H, Ar-<br />
CH); 6.75-7.05 (m, 6H, Ar-CH); 7.10-7.40 (m, 6H, Ar-CH); 7.60<br />
(m, 4H, Ar-CH); 7.80 (d, J = 8.3 Hz, 2H, Ar-CH); 9.50 (s, 1H,<br />
Ar-OH); 9.70 (s, 1H, Ar-OH); Analysed Calculated For<br />
C43H36N6O3S: C, 71.98; H, 5.02; N, 11.72; S, 4.46; Found: C,<br />
71.27; H, 4.66; N, 11.28 ; S, 4.05; Mass spectra, m/z = 725<br />
(100%).<br />
3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(4-methoxyphenyl)-1,3thiazolidin-4-one<br />
(4d). Yield: 70 %; m. p.: 272 0 C, IR (KBr):<br />
620 (C-S-C, 4-thiazolidinone), 770 (1, 2- disubtituted benzene<br />
ring), 1260 (C-N), 1520 (C=C), 1660 (C=O, thiazolidinone),<br />
2920 (Ar-CH), 3060 cm -1 (Ar-OH); 1 H NMR: δ = 2.32 (m, 6H,<br />
Ar-CH); 3.10 (s, 6H, (N-CH3)2); 3.70 (s, 3H, Ar-OCH3); 4.20 (s,<br />
1H, Ar-CH, thiazolidinone); 4.30 (s, 1H, Ar-CH); 4.40 (d, J = 8.7<br />
Hz, 2H, Ar-CH); 6.40 (s, 1H, Ar-CH, thiazolidinone); 6.60 (d, J<br />
= 8.2 Hz, 2H, Ar-CH); 6.70-6.80 (m, 7H, Ar-CH); 7.20-7.30 (m,<br />
8H, Ar-CH); 7.40-7.50 (m, 4H, Ar-CH); 7.80 (d, J = 8.4 Hz, 2H,<br />
Ar-CH); 9.60 (s, 1H, Ar-OH); Analysed Calculated For<br />
C44H38N6O3S : C, 72.24; H, 5.20; N, 11.49; S, 4.38; Found: C,<br />
71.77; H, 4.43; N, 11.37 ; S, 4.25; Mass spectra, m/z = 750<br />
(100%).<br />
3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-<br />
1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(3-nitrophenyl)-1,3thiazolidin-4-one<br />
(4e). Yield: 68%; m. p.: 242 0 C, IR (KBr): 660<br />
C<br />
H 3<br />
N OH<br />
N<br />
2 +<br />
NH 2<br />
NH 2<br />
+<br />
HO<br />
CH 3<br />
CHO<br />
EtOH<br />
N<br />
HO<br />
C<br />
H 3<br />
N<br />
CH 3<br />
N<br />
(C-S-C, 4-thiazolidinone), 760 (1, 2- disubtituted benzene ring),<br />
1260 (C-N), 1590 (C=C), 1660 (C=O, thiazolidinone), 2920 (Ar-<br />
CH), 3050cm -1 (Ar-OH); 1 H NMR: δ = 2.40 (m, 6H, Ar-CH);<br />
3.30 (s, 6H, (N-CH3)2); 4.10 (s, 1H, Ar-CH, thiazolidinone);<br />
4.10 (s, 1H, Ar-CH); 4.40 (d, J = 8.3 Hz, 2H, Ar-CH); 6.10 (s,<br />
1H, Ar-CH, thiazolidinone); 6.80 (d, J = 8.5 Hz, 2H, Ar-CH);<br />
6.70-6.90 (m, 5H, Ar-CH); 7.10 (m, 4H, Ar-CH); 7.40-8.00 (m,<br />
8H, Ar-CH); 8.10 (s, 1H, Ar-CH); 8.00 (s, 1H, Ar-CH); 8.20-<br />
8.30 (d, J = 8.1 Hz, 2H, Ar-CH); 9.90 (s, 1H, Ar-OH); Analysed<br />
Calculated For C43H35N7O4S : C, 69.18; H, 4.38; N, 13.14; S,<br />
4.29; Found: C, 68.50; H, 4.38; N, 12.61 ; S, 3.99; Mass spectra,<br />
m/z = 764 (100%).<br />
III. RESULTS<br />
2-[2-(4-aminophenyl)-6,10-dimethyl-4,12-dipheneyl-<br />
2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-1(9),3(7),5,10tetraen-8-yl]-5-methylphenol<br />
(1): was prepared in quantitative<br />
yield. By the reaction of compound 1 with different aldehydes,<br />
we have synthesized 2-(6,10-dimethyl-4,12-diphenyl-2-{4-[(E)-<br />
(arylmethylidene)amino]phenyl}-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-5methylphenol<br />
(2a-e), in good yields by using neat conditions<br />
under microwave irradiation in presence of solvent as well as<br />
solvent free as compared to that of conventional reflux reactions<br />
in ethanol (Figure 1). The comparison of isolated yields and<br />
reaction time of the three conditions employed showed<br />
microwave-assisted reactions as the most efficient synthetic<br />
method in terms of energy and time consumption (Table 1). The<br />
comparison of the isolated yield by different methods has been<br />
depicted graphically as shown in Figure 2.<br />
N<br />
CH 3<br />
N<br />
MW EtOH<br />
EtOH<br />
MW solvent free<br />
N<br />
NH2 (1)<br />
Ar H<br />
Figure – 1<br />
(2a-e)<br />
Synthesis of Schiff bases (2a-e) by MW, MW Solvent free and classical technique.<br />
N<br />
HO<br />
C<br />
H 3<br />
N<br />
CH 3<br />
N<br />
N<br />
CH 3<br />
N<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 425<br />
ISSN 2250-3153<br />
Compds<br />
. Ar<br />
Table – 1: Time and yield comparison between classical and MW Irradiation.<br />
MWI<br />
(Solvent free)<br />
Reaction time (min/sec) Yield (%) a<br />
MWI<br />
(EtOH)<br />
Classical<br />
(EtOH)<br />
MWI<br />
(Solvent free)<br />
MWI<br />
(EtOH)<br />
Classical (EtOH)<br />
2a -C6H5 2 min 2 min 300 min 92 87 77<br />
2b 2-OHC6H4 2 min 2 min 300 min 85 73 65<br />
2c 4-OHC6H4 2 min 2 min 300 min 82 67 62<br />
2d 4-OCH3C6H4 2 min 2 min 300 min 87 77 72<br />
2e 3-NO2C6H4 2 min 2 min 300 min 79 72 64<br />
a Isolated Yield<br />
Figure – 2: Comparison of the yields of compounds (2a-e) using different methods.<br />
Compounds 2 reacts with chloroacetic acid in presence of triethylamine, POCl3 and mercaptoacetic acid to afford 3-chloro-1-{4-[8-(2hydroxy-4-methylphenyl)-6,10-dimethyl-4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />
3,7 ]dodeca-1(9),3(7),5,10-tetraen-2yl]phenyl}-4-arylazetidin-2-one<br />
and 3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />
3,7 ] dodeca-1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-aryl-1,3-thiazolidin-4-one respectively (Figure 3).<br />
HO<br />
H3C N<br />
N<br />
Ar<br />
(3a-e)<br />
CH 3<br />
N<br />
N<br />
Cl<br />
O<br />
CH 3<br />
N<br />
N<br />
POCL 3, DCM, TEA<br />
Chloroacetic acid<br />
N<br />
HO<br />
C<br />
H 3<br />
N<br />
CH 3<br />
N<br />
N<br />
Ar H<br />
N<br />
CH 3<br />
N<br />
Thioglycolic Acid<br />
EtOH<br />
HO<br />
H3C Figure – 3: Synthesis of azetidinones (3a-e) and thiazolidinones (4a-e).<br />
N<br />
N<br />
Ar<br />
S<br />
CH 3<br />
N<br />
N<br />
(4a-e)<br />
O<br />
CH 3<br />
N<br />
N<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 426<br />
ISSN 2250-3153<br />
IV. ANTIBACTERIAL ACTIVITY<br />
Antibacterial activities of all the compounds were studied against<br />
nine different bacterial strains [E. coil (mixed), B. subtilis,<br />
Pseudomonas sp., S.aureus, P.vulageris, Salmonella sp. , E. coil<br />
(+ve strain), Rhodococci, B. stearothermopelus] by measuring<br />
the zone of inhibition on agar plates. The compounds possess<br />
Bacterial strain<br />
moderate to good activity against all stains in comparison with<br />
standard drug (Table 2). It can be observed from these results<br />
that compounds 3a-e and 4a-e have shown positive bacterial<br />
activity against different bacterial species, which are also known<br />
as human pathogenic bacteria. It was also observed that within<br />
the synthesized compound extracts, all compounds show good<br />
activity against all bacterial strains<br />
Table – 2: Biological activities of azetidinones and thiazolidinones.<br />
Zone of inhibition in mm along without well diameter (5mm)<br />
Chemical Compounds<br />
3a 3b 3c 3d 3e 4a 4b 4c 4d 4e<br />
E. coil (mixed) 14 13 8 12.8 – 8 15 10 9 10 16<br />
B. subtilis 3 3.5 5 - 4 4 5 3 10 6 6<br />
Pseudomonas sp. 9 5 12 10.2 8 7 8 11 7 3.6 12<br />
S. aureus 4 - 5.5 6.6 4 7.9 9 7.5 6 8.8 9<br />
P. vulageris 11 14 10.6 14.5 16 12.5 6.5 12 15 9 16<br />
Std.<br />
Nystatin<br />
Salmonella sp. 11 15 16.5 18 14 16 11 13 10 16 18.8<br />
E. coil (+ve strain) - 8 7.2 5.3 10 6.5 10 5 - 4 10<br />
Rhodococci 2 - - 3 4.5 4.8 5 3.8 4 2.6 6<br />
B. Stearothermopelus 4 3 5.1 6.4 3.6 6.4 4.8 3 11 5.8 7.2<br />
―-―represent ―not active‖<br />
V. CONCLUSION<br />
Microwave irradiation technique is becoming a popular<br />
method of heating and replaces the classical chemical route,<br />
because of its features like clean, cheap & convenience. Often, it<br />
affords higher yields and results within short reaction times. In<br />
this paper we have reported synthesis of imines 2a-e using<br />
microwave irradiation, which are far superior over existing<br />
procedures. In microwave synthesis the yield of all the products<br />
are more and the reaction time is considerably reduced to 2<br />
minute instead of 5 hours in the classical way. From data of<br />
antimicrobial activity of the compounds of the series, 3a-e and<br />
4a-e show good comparable activity against standard drugs.<br />
ACKNOWLEDGMENT<br />
The authors are thankful to Head, department of chemistry,<br />
Gurukul Kangri University, Haridwar and Head, department of<br />
chemistry, L.R.P.G.College, Sahibabad, Ghaziabad for<br />
encouraging and providing the research facilities.<br />
REFERENCES<br />
[1] S. Caddick – Tetrahedron 51 (1995) 0403.<br />
[2] L. Perrenx & A. Loupy – Tetrahedron 57 (2001) 9199.<br />
[3] S. A. Galema – Chem. Soc. Rev; 26 (1997) 233.<br />
[4] S. K. Srivastava, A. nena & S. D. Srivastava – Ind. J. Chem. 47B (2008)<br />
9225.<br />
[5] P. Ledstrom, J. Tiernly, B. wathey & J. Westman - 57 (2001) 9225.<br />
[6] A. R. Katritzky & S. K. Singh – Arkivoc 13 (2003) 68.<br />
[7] V. M. Patel & K. R. Desai - Arkivoc 1 (2004) 123.<br />
[8] S. K. Sonwane, S. D. Srivastava, S. K. Srivastava Ind. J. Chem. 47B (2008)<br />
633.<br />
[9] P. Kohli, S. K. Srivastava J. Ind. Chem. Soc. 85 (2008) 326.<br />
[10] K. Mistry & K. R. Desai – Ind. J. Chem. 45B (2006) 1762.<br />
[11] A. Kumar & C. S. – Eur. J. Med. Chem. 44(2009) 83.<br />
[12] K. Omar, A. Geronikaki, P. Zoumpoulakis, C. Camoutsis, M. Sokovic, A.<br />
Ciric & J. Glamoclija – Bio. Org. Med-Chem. 18 (1) (2010) 426.<br />
[13] K. V. G. C. Sekhar, V. S. Sekhar, A. S. Reddy, R. Sunandini & V. S. A. K.<br />
Satuluri – Bull. Korean Chem. Soc. 31 (5) (2010) 1219.<br />
[14] A. Verma, S. K. Saraf - Eur. J. Med. Chem. 43 (5) (2008) 897.<br />
[15] E. C. Oka for – Jour. Inorg. Nucl – chem.; 42 (1980) 1155.<br />
[16] Samkunchandy & P. Indrasevan – Polyhedron 9 (1990) 795.<br />
[17] W. S. Hamama, M. A. Smail, S. Shaaban, H. H. Zoorob – J. Het Chem 45<br />
(4) (2008) 939.<br />
[18] H. N. Chopde, R. Pagdala, S. M. Meshram, V. Jetli – Der Pharma Chemica<br />
2 (3) (2010) 294.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 427<br />
ISSN 2250-3153<br />
AUTHORS<br />
First Author – Author name, qualifications, associated institute<br />
(if any) and email address. Ravindra Kumar, M. Phill, Ph. D.<br />
student, Department of Chemistry, Gurukul Kangri University,<br />
Haridwar, India, Email: ravi_tyagi18@rediffmail.com<br />
Second Author –Abha Shukla, M. Sc. (Ph. D.), Department of<br />
Chemistry, K.G.M., Gurukul Kangri University, Haridwar,<br />
India., Email-id : rks.hdr@gmail.com<br />
Third Author –Prof. D. S. Tyagi, Department of Chemistry,<br />
L.R.P.G.College, Sahibabad, Ghaziabad, India.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 428<br />
ISSN 2250-3153<br />
Colposcopy and carcinoma buccal mucosa: finding<br />
significance, a pilot study<br />
Dr.Abhishek Singh Nayyar 1 , Dr.Gayitri H.C. 2 , Dr.Mubeen Khan 3 , Dr.U.D.Bafna 4 , Dr.Siddique Ahmed 5<br />
Post-graduate 1 , Post-graduate student 2 , Professor and Head 3 , Professor and Head 4 , Professor and Head 5<br />
Department of Oral Medicine and Radiology, Government Dental College and Research Institute 1, 2, 3 , Department of Gynecology, Kidwai Memorial<br />
Institute of Oncology 4 , Department of Pathology, Bowring and Lady Curzon Hospitals 5 , Bangalore-560 002, Karnataka, India<br />
Abstract- Introduction and objectives: The diagnosis of<br />
malignant and potentially malignant epithelial lesions of the oral<br />
mucosa cannot be based solely on clinical findings. Therefore,<br />
histologic evaluation of a representative biopsy specimen is<br />
necessary. However, the site for the biopsy is always a subjective<br />
choice that sometimes raises doubts about its representativeness.<br />
Colposcopy, a well-known gynaecological diagnostic procedure,<br />
is helpful in the selection of these sites of epithelial dysplasia<br />
depending upon the vascular pattern. Hence, this study was<br />
planned to assess the role of Colposcopic examination in the<br />
selection of biopsy site for carcinoma buccal mucosa.<br />
Materials and methods: 30 patients between the ages of 30-60<br />
years clinically diagnosed with carcinoma buccal mucosa were<br />
included in the study. For each of the subject, a thorough clinical<br />
examination followed by Colpospopic assessment was carried<br />
out and the most representative site was selected for biopsy from<br />
the involved buccal mucosa. The biopsy specimens measuring 6<br />
mm were taken using a punch biopsy and subjected to<br />
histopathological examination. The histopathological findings<br />
were then compared in the two cases.<br />
Results: The sensitivity and specificity of biopsy done on the<br />
basis of clinical criteria was found to be more than as compared<br />
to the ones directed through colposcopic examination.<br />
Conclusion: From the study, it was concluded that clinical<br />
criterion was found to be more appropriate for the selection of<br />
biopsy specimens in cases of carcinoma buccal mucosa.<br />
Keywords- Colposcopy, potentially malignant epithelial lesions,<br />
histopathological, epithelial dysplasia, vascular pattern.<br />
O<br />
I. INTRODUCTION<br />
ral squamous cell carcinoma (OSCC) is the most common<br />
cancer in the oral cavity. It accounts for more than 90% of<br />
all oral cancers. 1 Each year, globally, there are 222,000 new<br />
cases of oral cancer diagnosed in men (5% of all cancer) and<br />
90,000 new cases diagnosed in women (2% of all cancer). 2<br />
The incidence of premalignant lesions and oral cancers is<br />
steadily increasing globally. In spite of advancement in the early<br />
detection, there is seen increased mortality and morbidity related<br />
to oral cancers. 3 In India, the incidence of leukoplakia and<br />
carcinoma buccal mucosa is 46% as reported by Paymaster JC<br />
(1962). 4 Carcinoma of buccal mucosa, in particular, deserves<br />
special mention with increased incidence because of numerous<br />
premalignant lesions and conditions seen predominantly in this<br />
part of oral mucosa, the most common being leukoplakia and<br />
pouch keratosis, attributed commonly to the quid habit in Indian<br />
population.<br />
Clinical diagnosis of squamous cell carcinomas of the oral<br />
mucosa is not difficult when the lesion is obviously invasive or,<br />
when the patient experiences pain, functional limitation, or,<br />
regional lymphadenopathy. Conversely, it is more difficult to<br />
diagnose dysplasia and carcinomas mainly in potentially<br />
malignant epithelial lesions (PMELs). With the aim of improving<br />
the efficiency of these diagnoses, techniques are being developed<br />
to complement clinical examination and to facilitate the<br />
identification of early dysplastic changes and initial carcinomas. 5<br />
Though, biopsy with histopathological examination is still<br />
considered the gold standard in the diagnosis of oral cancer and<br />
precancerous lesions and conditions, the selection of the site for<br />
biopsy is the most important criteria to arrive at a correct<br />
diagnosis. But, as biopsy site is a subjective choice, it is possible<br />
that biopsy specimens are taken from unrepresentative sites of<br />
the lesion or, before the morphologic changes could be detected<br />
in it.<br />
At present, though there are simple chairside methods<br />
including staining with toluidine blue and exfoliative cytology to<br />
aid the diagnosis of such changes, there is a high risk of false<br />
positives which can be as high as 30%. 6 Therefore, a technique<br />
for non-invasively detecting dysplastic changes or, helping the<br />
clinician choose the appropriate site for biopsy can save patients<br />
from multiple biopsies and allow a broader range of diagnoses<br />
which can aid early detection of oral cancers. 7<br />
Colposcopy (direct intra-oral microscopy) offers advantages in<br />
selecting the more representative sites for biopsy than routine<br />
clinical examination alone and is a simple, painless, chair side<br />
diagnostic method. 8 Colposcopic criteria included vascular<br />
pattern, inter-capillary distance, surface pattern, color tone, and<br />
opacity, as well as clarity of demarcation of the mucosal lesions. 8<br />
The accuracy of colposcopic examination for the detection of<br />
mucosal changes approximates between 70% and 98%. 9-11<br />
Various authors have tried to adapt gynecologic methods of<br />
examination to the oral cavity as there is similarity between the<br />
two types of mucosa. 12 Colposcopy is one such method used to<br />
observe the mucosa of cervix for premalignant and malignant<br />
changes. So far, a few studies have highlighted the value of<br />
Colposcopy (direct intra-oral microscopy) in the diagnosis of oral<br />
mucosal lesions. Hence, the study has been planned to assess the<br />
role of Colposcopic examination in the selection of biopsy site to<br />
aid early diagnosis of epithelial dysplasia in cases of carcinoma<br />
buccal mucosa.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 429<br />
ISSN 2250-3153<br />
II. OBJECTIVES<br />
1. To assess the feasibility of using Colposcopic examination for<br />
carcinoma buccal mucosa;<br />
2. To compare the Colposcopic examination findings with<br />
clinical criteria for selection of biopsy site in carcinoma buccal<br />
mucosa;<br />
3. To correlate the histopathological findings with Colposcopic<br />
findings and clinical criteria; and<br />
4. To assess the sensitivity and specificity of Colposcopic<br />
examination in selecting the biopsy site in carcinoma buccal<br />
mucosa.<br />
III. MATERIALS AND METHODS<br />
A. Source of data<br />
The study was conducted in the Department of Oral Medicine<br />
and Radiology, Government Dental College and Research<br />
Institute, Bangalore and Kidwai Memorial Institute of Oncology,<br />
Bangalore, for a period of 1 year from May 2010 to May 2011.<br />
The study group consisted of 30 cases of clinically diagnosed<br />
cases of carcinoma buccal mucosa between the age group of 30-<br />
60 years and control group consisting of 25 healthy individuals<br />
with matched age.<br />
B. Method of Collection of Data<br />
Patients were selected according to the defined inclusion and<br />
exclusion criteria. Before selecting the patients for study, details<br />
of the study were explained to the patients and written informed<br />
consent was obtained for inclusion in the study. The ethical<br />
clearance for the study was obtained from the ethical committee<br />
of Government Dental College and Research Institute, Bangalore<br />
and Kidwai Memorial Institute of Oncology, Bangalore.<br />
C. Selection criteria<br />
i. Inclusion Criteria:<br />
1. Clinically diagnosed cases of carcinoma buccal mucosa; and<br />
ii. Exclusion Criteria:<br />
1. Patients with carcinoma buccal mucosa with secondary<br />
infection;<br />
2. Patients with carcinoma buccal mucosa having other systemic<br />
diseases; and<br />
3. Patients undergoing treatment for carcinoma buccal mucosa.<br />
D. Methodology<br />
A total of 30 carcinoma buccal mucosa cases were selected for<br />
the study based on inclusion and exclusion criteria. The<br />
significance of the number of samples was analyzed statistically<br />
before their inclusion into the study. For each of the subjects, a<br />
detailed case history and thorough clinical examination was<br />
carried out and under good illumination, intra-oral examination<br />
of the lesion was performed. Inspectory and palpatory findings<br />
were recorded in a prepared proforma. Following clinical<br />
examination of the lesion, the most representative site of the<br />
lesion was selected for biopsy based on set clinical criteria for<br />
dysplastic changes in leukoplakia and carcinoma buccal mucosa.<br />
Clinical criteria for selection of biopsy site for carcinoma buccal<br />
mucosa included erythema, induration and ulceration. The<br />
outline of the lesion was marked with a black color pen and the<br />
biopsy site with a red color pen with the help of a grid placed on<br />
the buccal mucosa. All the cases were then subjected to the<br />
Colposcopic examination. Before taking up the patients for<br />
Colposcopic evaluation, the normal Colposcopic findings were<br />
standardized based on the Colposcopic criteria. Colposcopic<br />
assessment was done and the most representative site for biopsy<br />
was selected from the involved buccal mucosa depending upon<br />
the Colposcopic criteria as mentioned by the author Göran W.<br />
Gynther. 13<br />
All patients were subjected to routine blood investigations<br />
(Hb, BT, CT, RBS, TLC, DLC and ESR) before the routine<br />
biopsy for histopathological examination and punch biopsy after<br />
Colposcopic evaluation with 6mm diameter under local<br />
anesthesia were performed. Biopsy specimen was immediately<br />
immersed in 10% neutral buffered formaldehyde solution and<br />
was coded. Later it was embedded in paraffin by routine methods<br />
and subjected to histopathological examination.<br />
E. Colposcopic Examination<br />
Following clinical examination, mucosa was wiped with saline.<br />
After the mucosa was wiped with saline, abnormal epithelium<br />
appeared much darker than the normal epithelium. (Fig. 1)<br />
Using the blue (or, green) filter and higher-power magnification<br />
(Fig. 2), abnormal vascular patterns were evaluated.<br />
Then 5% acetic acid was applied to the lesion for about 60<br />
seconds. The grid was placed again on the buccal mucosa. Area<br />
that estimated to have the most extensive cell changes based on<br />
Colposcopic criteria was selected for biopsy and the area of the<br />
biopsy site was marked on the grid with a green pen (Fig. 3).<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 430<br />
ISSN 2250-3153<br />
Colposcopic criteria included vascular pattern, inter-capillary<br />
distance, surface pattern, color tone, and opacity, as well as<br />
clarity of demarcation of the mucosal lesions. In the normal<br />
mucosa of the uterine cervix, two basic types of capillary<br />
networks can be seen with direct microscopy (ie, Colposcopy):<br />
hairpin capillaries (Fig. 4a)<br />
and network capillaries (Fig. 4b).<br />
In areas of dysplasia and carcinoma-in-situ of the uterine cervix,<br />
a specific vascular pattern, punctation (previously called ground),<br />
is seen commonly. Punctation (Fig. 4c) is characterized by<br />
dilated, often twisted, irregular, hairpin-type vessels.<br />
Another pattern of the vessels in dysplasia is called mosaic (Fig.<br />
4d). If the vessels do not reach the epithelial surface but extend<br />
only partially into the epithelium, they appear as red lines as<br />
surrounding blocks of epithelium. The Colposcopic image<br />
resembles tiles of a floor. After application of acetic acid, this<br />
pattern is accentuated because of acetowhiteness of the atypical<br />
epithelium, forming a honey comb pattern. True mosaic vessels<br />
are usually seen in sharply demarcated areas.<br />
When it is difficult to describe the pattern of the vessels, the term<br />
atypical vessels (Fig. 4e) is used.<br />
Capillary, punctation, mosaic, or atypical patterns are<br />
encountered in malignant lesions. Therefore, if one of them is<br />
present, this is an indication for biopsy and histopathological<br />
examination.<br />
When the area selected for biopsy by clinical criteria and<br />
Colposcopy was superimposed (red and green area), then only<br />
one common biopsy sample was obtained. When two different<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 431<br />
ISSN 2250-3153<br />
areas were selected from the same lesion, two different areas<br />
which were marked with red and green pen (Fig. 3) were<br />
biopsied and subjected to histopathological examination. Biopsy<br />
specimens were taken with 6 mm punch, biopsy wounds were<br />
sutured (Fig. 5) and histo-pathological examination of the same<br />
was performed.<br />
F. Histopathological procedure<br />
All the biopsied tissue specimens were sent for histo-pathological<br />
evaluation. The biopsied tissue was immediately transferred to<br />
the bottle containing 10% buffered formalin solution.<br />
Heamotoxylin and Eosin staining was done for the microscopic<br />
examination of the sections.<br />
Comparison of the histo-pathlogical diagnosis obtained with<br />
routine clinical examination and direct intra-oral microscopy was<br />
performed, and the data was subjected to statistical analysis.<br />
G. Grid preparation:<br />
<strong>Print</strong>ed graph on OHP sheet was used as a grid in marking the<br />
biopsy site. Each lesion was measured and the grid was prepared<br />
to the approximate size of the lesion. The entire lesion was<br />
divided into 6 x 6 mm squares on a transparent grid. The outline<br />
of the lesion was marked with black color pen, the red color pen<br />
was used to mark the area of the biopsy site with clinical criteria<br />
and green color pen was used to mark the area of the biopsy site<br />
performed with Colposcopic criteria.<br />
Age<br />
IV. RESULTS<br />
The study group consisted of 30 cases of clinically diagnosed<br />
carcinoma buccal mucosa and a control group consisting of 25<br />
healthy individuals.<br />
Age and gender distribution: The age and gender<br />
distribution of the cases and controls has been illustrated<br />
in the figures. (Table 1)<br />
Commoner clinical presentation observed in cases: Out<br />
of the 30 patients, induration in was observed 18 while<br />
ulceration was observed in 12 patients.<br />
Vascular pattern observed in cases: Out of the 30<br />
patients, punctation vessel pattern was observed in 10<br />
(33%) cases, mosaic pattern in 4 (13%) cases, atypical<br />
vessel pattern in 4 (13%) cases while in 12 (40%) cases,<br />
vascular pattern was not appreciated because of<br />
secondary infection and/or, ulceration. In the control<br />
group, out of the 25 controls, network capillary pattern<br />
was observed in 12 (48%) cases and hair-pin pattern in<br />
9 (36%) cases while in 4 (16%) cases, vascular pattern<br />
could not well be appreciated.<br />
Histopathological findings observed in the biopsy specimen<br />
obtained from clinical presentation: Out of 30 cases,<br />
histopathological report of 19 (66.3%) cases were showing welldifferentiated<br />
squamous cell carcinoma, 7 (23.3%) cases,<br />
moderately differentiated squamous cell carcinoma, 2 (6.7%)<br />
cases, carcinoma-in-situ while 2 (6.7%) cases presented with<br />
severe dysplasia.<br />
Histopathologic findings in Colposcopically directed biopsy<br />
specimens: Out of 30 cases, histopathological report of 15 (50%)<br />
cases revealed well-differentiated squamous cell carcinoma, 9<br />
(30%) cases, moderately differentiated squamous cell carcinoma,<br />
3 (10%) cases, poorly differentiated squamous cell carcinoma<br />
while 3 (10%) cases were showing carcinoma-in-situ.<br />
Sensitivity and specificity for biopsy samples taken from<br />
clinical presentation in cases: A sensitivity of 0.6842 (68%) and<br />
a specificity of 0.5455 (57%) was obtained for biopsy samples<br />
taken from clinical presentation in the patients. (Table 2)<br />
Sensitivity and specificity of Colposcopically directed biopsy<br />
specimens in cases: Sensitivity for Colposcopically directed<br />
biopsy specimens in patients came out to be 0.7826 (78%) with a<br />
specificity of 0.5714 (57%). (Table 2)<br />
Table 1: Age distribution and Gender distribution in the study sample<br />
Age in years<br />
Carcinoma<br />
buccal mucosa<br />
patients<br />
Controls<br />
No % No %<br />
31-40 2 6.7 3 12.0<br />
41-50 5 16.7 12 48.0<br />
51-60 23 76.7 10 40.0<br />
Total 30 100.0 25 100.0<br />
Mean ± SD 54.07±6.55 49.72±7.17<br />
Samples are<br />
age matched<br />
between cases<br />
and controls<br />
with P=0.397<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 432<br />
ISSN 2250-3153<br />
Gender<br />
Male 10 33.3 15 60.0 Samples are<br />
gender<br />
matched<br />
Female 20 66.7 10 40.0 between cases<br />
and controls<br />
with P=0.191<br />
Total 30 100.0 25 100.0<br />
Table 2: Sensitivity and Specificity for biopsy specimens taken from Clinical examination and directed by Colposcopic examination in<br />
Carcinoma buccal mucosa patients<br />
Clinical<br />
examination<br />
Colposcopy<br />
Histopathology<br />
Positive Negative Total<br />
Positive 18 3 21<br />
Negative 5 4 9<br />
Total 23 7 30<br />
Positive 13 5 18<br />
Negative<br />
6 6 12<br />
Total 19 11 30<br />
V. DISCUSSION<br />
Oral squamous cell carcinoma is a well-known malignancy<br />
which accounts for more than 90% of all oral cancers. The<br />
overall 5-year survival rate of oral squamous cell carcinoma has<br />
not significantly increased in the last few years despite<br />
tremendous advancements made in the plethora of diagnostic and<br />
treatment modalities in the last 2-3 decades. Hence, the most<br />
important task is to establish an early diagnosis at the first stages<br />
of the disease. 14<br />
The present study aimed at assessing the vascular patterns by<br />
Colposcopic findings and selecting the biopsy site in clinically<br />
diagnosed cases of carcinoma buccal mucosa and compares the<br />
two methods, clinical criteria and Colposcopic examination for<br />
selecting the biopsy site.<br />
In our study, maximum patients were seen in the age group of<br />
51 to 60 years and there was seen a female predominance in this<br />
group. This suggested the habit of quid to be more common in<br />
females and smoking more common in males. The findings of<br />
our study were consistent with the age and gender of the oral<br />
cancer patients reported by other studies by Silverman 15 ,<br />
Neville 16 and Swango 17 .<br />
Sensitivity Specificity PPV NPV<br />
0.7826<br />
(78%)<br />
0.6842<br />
(68%)<br />
0.5714<br />
(57%)<br />
0.5455<br />
(54%)<br />
0.8571 0.4444<br />
0.7222<br />
0.5000<br />
In our study, 18 patients of oral carcinoma presented indurated<br />
lesions while ulceration was noted in 12 out of 30 patients. These<br />
findings suggested that the patients reported to the clinicians only<br />
when they developed symptoms of pain invariably associated<br />
with ulceration in confirmation with the various other studies.<br />
Jose Bagan 18 reported in his study that the clinical presentation of<br />
these early malignant lesions was usually seen in the form of<br />
well demarcated, indurated erytholeukoplastic lesions, often<br />
associated with pain and ulceration.<br />
A sensitivity of 0.7826 (78%) and specificity of 0.5714 (57%)<br />
of the biopsy specimens taken with the help of clinical criteria<br />
for carcinoma buccal mucosa were in accordance with the studies<br />
reported by Lingen MW, Kalmar JR, Karrison TC, Speight PM 19<br />
who reported similar findings in their study. Lingen, in his study,<br />
suggested the conventional oral examination (COE) using normal<br />
(incandescent) light as one of the standard method for oral cancer<br />
screening. A study by Fedele S 20 with 9 years randomized<br />
controlled trial also revealed that screening via visual<br />
examination of the oral mucosa under white light is effective in<br />
reducing mortality in individuals exposed to risk factors.<br />
Simple visual examination, however, is well known to be<br />
limited by subjective interpretation and by the potential, albeit<br />
rare, occurrence of dysplasia and early oral squamous cell<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 433<br />
ISSN 2250-3153<br />
carcinoma within areas of normal looking oral mucosa. As a<br />
consequence, adjunctive techniques have been suggested to<br />
increase the ability to differentiate between benign changes of<br />
the mucosa from dysplastic/malignant changes as well as to<br />
identify areas of dysplasia/early oral squamous cell carcinoma<br />
that are not visible to the naked eye.<br />
Ellen H Hopman 21 , in his study stated colposcopy as an effective<br />
tool for diagnosing cervical intra-epithelial neoplasia. It was<br />
suggested that micro-invasive carcinoma was suspected when<br />
mosaic, punctation and acetowhite epithelium was seen with a<br />
thick white epithelium that had a clear and elevated margin with<br />
an irregular surface contour and raised capillaries.<br />
Devi Charan Shetty, 22 in his study, stated that the<br />
histopathological assessment of a biopsy specimen is regarded as<br />
the most reliable criterion for a correct diagnosis in cases of<br />
epithelial dysplasia; consequently the specimen must be taken<br />
from the most representative area of a suspicious looking lesion<br />
for increasing the diagnostic accuracy.<br />
In our study, we used the criteria for vascular changes<br />
described in Colposcopic literature for the selection of biopsy<br />
site. 21, 23, 24 These included the vascular pattern, inter-capillary<br />
distance, surface pattern, color tone and opacity as well as the<br />
clarity of demarcation of the mucosal lesions. The results of our<br />
Colposcopic examination regarding the selection of biopsy sites<br />
for carcinoma buccal mucosa reported a sensitivity of 0.6842<br />
(68%) with a specificity of about 0.5455 (54%). The results of<br />
our study were similar to the previously reported studies<br />
including the one conducted by Goran W. Gynther 13 for<br />
assessing the value of Colposcopy in diagnosing the mucosal<br />
lesions and the one reported by Devi Charan Shetty 22 who<br />
correlated the relevance of tumor angiogenesis pattern with the<br />
histopathological results in oral epithelial dysplasia.<br />
The results of Colposcopic findings are actually based on<br />
vascular and tissue changes. The capillary changes preceding<br />
tumor growth with the pattern of tumor angiogenesis are<br />
different from the usual neo-vascularization taking place during<br />
repair and regeneration processes. At a cellular level, various<br />
molecules such as vascular endothelial growth factor, basic<br />
fibroblast growth factor, and transforming growth factor alpha<br />
are implicated. Direct optical visualization of these patterns<br />
would be helpful in the early determination of the underlying<br />
pathology and also aid in marking out the site of biopsy. 25<br />
In the present study, we found that the biopsy specimens<br />
selected with Colposcopic criteria appeared to be more<br />
representative of the histopathological findings at least in certain<br />
cases than those selected with routine clinical examination<br />
(COE). The altered vascular patterns, in the initial stages of<br />
lesion progression, definitely helped with the correct selection of<br />
the biopsy site, which in turn helped us reach a more definitive<br />
diagnosis, thus avoiding false-negative results. The study<br />
however concludes with the conventional oral examination<br />
having a superior edge in carcinoma buccal mucosa patients<br />
against colposcopy criteria. (Table 2) This could be explained by<br />
the fact that keratinization and thickness is more in carcinoma<br />
buccal mucosa cases compared to leukoplakia cases, hence,<br />
vascular patterns could not be visualized. However further<br />
studies are required to conclude the results.<br />
VI. CONCLUSION<br />
This is a preliminary study that emphasized the selection of<br />
biopsy site using Colposcopic examination as a method to select<br />
the most representative sites of epithelial dysplasia in frank<br />
malignant and potentially malignant epithelial lesions (PMELs).<br />
VII. CONTRIBUTIONS FROM THE AUTHORS<br />
Literature search, manuscript preparation, manuscript editing<br />
and manuscript review.<br />
VIII. ETHICAL DECLARATION<br />
The study has been approved by the ethical committee<br />
appointed by the Government Dental College and Research<br />
Institute, Bangalore and Bangalore Medical College and<br />
Research Institute, Bangalore and has therefore been performed<br />
in accordance with the ethical standards laid down in the 1975<br />
declaration of Helsinki and its later amendments in 2000 after a<br />
written informed consent from the patients for their inclusion in<br />
the study. Details that might disclose the identity of the patient<br />
have been omitted.<br />
IX. COMPETING INTERESTS AND OTHER DECLARATIONS<br />
None<br />
ACKNOWLEDGEMENT<br />
We thank all the people who directly and indirectly<br />
contributed for the study as the study required intense efforts<br />
from the people outside our Department including Department of<br />
Oral Pathology, and Department of Gynecology and Department<br />
of General Pathology, Bangalore Medical College and Research<br />
Institute and Associated Hospitals.<br />
LEGENDS FOR FIGURES<br />
Figure.1: Carcinoma buccal mucosa (nodular variety) on left<br />
buccal mucosa before biopsy<br />
Figure.2: Patient positioning for Colposcopic examination<br />
Figure.3: Placement of grid for selection of biopsy site (green<br />
color for colposcopy and red color for clinical criteria)<br />
Figure.4a-e: Vascular patterns seen in colposcopy:<br />
Figure.4a: Hair pin capillary pattern in normal buccal mucosa<br />
Figure.4b: Network capillary pattern in normal buccal mucosa<br />
Figure.4c: Punctation vessel pattern in carcinoma buccal mucosa<br />
Figure.4d: Mosaic pattern in carcinoma buccal mucosa<br />
Figure.4e: Atypical vessel pattern in carcinoma buccal mucosa<br />
Figure.5: Sutured biopsy wounds in relation to carcinoma buccal<br />
mucosa after biopsy at two different sites<br />
REFERENCES<br />
[1] Silverman S Jr. Oral cancer. 5th ed. Hamilton, Canada: BC Decker, 2003.<br />
[2] Parkin DM, Pisani P, Ferlay J. Estimates of the worldwide incidence of 25<br />
major cancers in 1990s. Int J Cancer 1999;80:827-41.<br />
[3] Kujan O, Glenny AN, Duxbury J, Thakker N, Sloan P. Evaluation of<br />
screening strategies for improving oral cancer mortality. A Cochrane<br />
systemic review. J Dent Edu 2005;69(2):255-64.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 434<br />
ISSN 2250-3153<br />
[4] Paymaster JC. Some observations in oral and pharyngeal carcinomas in the<br />
state of Bombay. Cancer 1962;15:578-83.<br />
[5] Onofre A Mirian, Sposto R Maria, Navarro M Claudia. Reliability of<br />
toluidine blue application in the detection of oral epithelial dysplasia and insitu<br />
and invasive squamous cell carcinomas. Oral Surg Oral Med Oral<br />
Pathol Oral Radiol Endod 2001;91:535-40.<br />
[6] Silverman S Jr, Dillon WP. Diagnosis oral cancer. 3rd Ed, New York, Am<br />
cancer soc.1990;p.41-60.<br />
[7] Wang CY, Chiang HK, Chen CT, Chiang CP, Kuo YS, Chow SN.<br />
Diagnosis of oral cancer by light-induced autofluorescence spectroscopy<br />
using double excitation wavelengths. Oral Oncology 1999;35:144-50.<br />
[8] Kolstad P. Terminology and definitions. In: Kolstad P, editor. Atlas of<br />
colposcopy. 3rd ed. London: Churchill Livingstone. 1982;p 21-31.<br />
[9] Kirkup W, Singer A, Hill SA. The accuracy of colposcopically directed<br />
biopsy in patients with suspected intra-epithelial neoplasia of the cervix. Br<br />
J Obstet Gynecol 1980;87:1-4.<br />
[10] Helmerhorst TJM, Dijkhuizen GH, Calame JJ, Kwikkel HJ, Stolk JG. The<br />
accuracy of colposcopically directed biopsy in diagnosis of CIN. Eur J<br />
Obstet Gynecol Reprod Biol 1987;24:221-9.<br />
[11] Cinel A, Oselladore M, Insacco E, Minucci D. The accuracy of<br />
colposcopically directed biopsy in the diagnosis of cervical intra-epithelial<br />
neoplasia. Eur J Gynaec Oncol 1990;6:433-7.<br />
[12] Estrange PL, Bevenius J, Williams L, Brisbane, Australia, Huddinge. Intraoral<br />
application of microcolpohysteroscopy: A new technique for clinical<br />
examination of oral tissues at high magnification. Oral Surg Oral Med Oral<br />
Pathol 1989;67:282-5.<br />
[13] Gynther GW, Rozell B, Heimdahl A. Direct oral microscopy and its value<br />
in diagnosing mucosal lesion. Oral Surg Oral Med Oral Pathol Oral Radiol<br />
Endod 2000;90:164-70.<br />
[14] Smith RA, Cokkinides V, Von Eschenbach AC. American Cancer Society<br />
guidelines for the early detection of cancer. CA Cancer J Clin 2002;52:8-22.<br />
[15] Sol Silverman. Demographics and occurrence of oral and pharyngeal<br />
cancers: The Outcomes, the Trends and the Challenge. J Am Dent Assoc<br />
2001;132:7S-11S.<br />
[16] Brad W Neville, Terry A Day. Oral Cancer and Precancerous Lesions. CA<br />
Cancer J Clin 2002;52:195-215.<br />
[17] Swango PA. Cancers of the oral cavity and pharynx in the United States: an<br />
epidemiologic overview. J Public Health Dent 1996;56:309-18.<br />
[18] Bagan J, Sarrion G, Jimenez Y. Oral cancer: clinical features. Oral Oncol<br />
2010;46(6):414-7.<br />
[19] Lingen MW, Kalmar JR, Karrison TC, Speight PM. Critical evaluation of<br />
diagnostic aids for the detection of oral cancer. Oral oncology 2007;44:10–<br />
22.<br />
[20] Fedele S. Diagnostic aids in the screening of oral cancer Head Neck Oncol.<br />
2009;1:5-15.<br />
[21] Hopman EH, Helmerhorst TJM. Colposcopic findings and nomenclature.<br />
CME Journal of Gynaecologic Oncology 2005;10:11-3.<br />
[22] Shetty DC, Ahuja P, Rathore AS, Ahuja US, Kumar K, Ahuja A et al.<br />
Relevance of tumor angiogenesis patterns as a diagnostic value and<br />
prognostic indicator in oral pre-cancer and cancer. Vascular Health and<br />
Risk Management 2011;7:41-7.<br />
[23] Dresang LT. Colposcopy: An Evidence-Based Update. J Am Board Fam<br />
Med 2005;18(5):383-92.<br />
[24] Walker P, De Palo G, Campion M, Jakob C, Roy M. International<br />
terminology of Colposcopy: An updated report from the International<br />
Federation for Cervical Pathology and colposcopy. Obstet Gynecol<br />
2003;101(1):175-7.<br />
[25] Miriam P Rosin, Catherine F Poh, Martial Guillard, P Michele Williams,<br />
Lewei Zhang, Calum Macaulay. Visualization and Other Emerging<br />
Technologies as Change Makers for Oral Cancer Prevention. Ann NY Acad<br />
Sci 2007;1098:167–83.<br />
AUTHORS<br />
First Author - Dr.Abhishek Singh Nayyar, Post-graduate,<br />
Department of Oral Medicine and Radiology, Government<br />
Dental College and Research Institute, , Bangalore-560 002,<br />
Karnataka, India<br />
Email id - singhabhishek.rims@gmail.com<br />
Second Author - Dr.Gayitri H.C, Post-graduate student,<br />
Department of Oral Medicine and Radiology, Government<br />
Dental College and Research Institute, Bangalore-560 002,<br />
Karnataka, India<br />
Third Author - Dr.Mubeen Khan, Professor and Head,<br />
Department of Oral Medicine and Radiology, Government<br />
Dental College and Research Institute, Bangalore-560 002,<br />
Karnataka, India<br />
Fourth Author - Dr.U.D.Bafna, Professor and Head,<br />
Department of Gynecology, Kidwai Memorial Institute of<br />
Oncology, Bangalore-560 002, Karnataka, India<br />
Fifth Author - Dr.Siddique Ahmed, Professor and Head,<br />
Department of Pathology, Bowring and Lady Curzon Hospitals,<br />
Bangalore-560 002, Karnataka, India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 435<br />
ISSN 2250-3153<br />
On a class of g**-closed sets in topological spaces and<br />
some mappings<br />
Dr. D.Saravanakumar, K.M.Sathishkumar<br />
Department of Mathematics, K.L.N. College of Information Technology, Sivagangai<br />
Abstract- In this paper, we introduced the concepts of<br />
g ** -closed sets as well as g ** -open sets and studied some of<br />
their basic properties. Further we defined g ** -continuous<br />
mappings and investigated their basic properties. In addition we<br />
obtained g ** -irresolute mappings and some of their properties<br />
are derived.<br />
AMS (2000) subject classifications: 54A05, 54A10, and 54D10.<br />
Keywords: g ** -closed, g ** -open, g ** -continuous,<br />
g ** -irresolute.<br />
T<br />
I. INTRODUCTION<br />
he concept of generalized closed (g-closed) sets in a<br />
topological space was introduced by Levine [8] and concept<br />
of T1/2 spaces was initiated by Dunham [5] further investigated<br />
the properties of T1/2 spaces and defined a new closure operator<br />
cl * by using generalized closed sets. We begin with some basic<br />
concepts. A subset A of a topological space (X, ) is called<br />
-open[12] (resp. semi open[9]) if A int(cl(int(A)))<br />
(resp. A cl(int(A))). Also A is said to be -closed (resp. semi<br />
closed) if X – A is -open (resp. semi open). The collection of all<br />
-open (resp. semi open) subsets in (X, ) is denoted by (resp.<br />
SO(X)). The -closure (resp. semi closure) of a subset A is<br />
smallest -closed (resp. semi closed) set containing A and this is<br />
denoted by cl(A) (resp. scl(A)) in the present paper. We recall<br />
definitions of some generalized closed sets. A subset A is called<br />
g-closed[10] (resp. g-closed [10], g # -closed[13]) if cl(A) <br />
U whenever A U and U is an -open (resp. open, g-open) set<br />
in (X, ). Moreover G. Sai Sundara Krishnan et.al [16]<br />
introduced the concept of g ** -open sets and defined a subset A<br />
of X is said to be g ** - open if and only if there exist an open set<br />
U of X such that U A cl ** (U). Also its complement is called<br />
g ** -closed. A topological space (X, ) is said to be a g ** -T½ space<br />
if every g ** -closed set is closed. J.Chitra and D.Saravanakumar<br />
[2] introduced the concept of sg ** -closed sets and defined a<br />
subset A of X is said to be sg ** - closed if scl(A) U whenever<br />
A U and U is a g ** -open set in (X, ).<br />
In this paper we introduced the concept of<br />
g ** -closed sets, which is analogous to -generalized closed sets<br />
and introduced the notion G ** C(X) which is the set of all<br />
g ** -closed sets in a topological space. In addition, we defined<br />
the concept of g ** -open sets and studied of its some basic<br />
properties. Finally we introduced the concept of<br />
g ** -continuous and g ** -irresolute maps in a topological space<br />
and investigated relationship between them. Throughout this<br />
paper we denoted cl * by cl ** and we represented the topological<br />
spaces (X, τ), (Y, ) and (Z, ) as X, Y and Z respectively.<br />
Unless otherwise no separation axiom mentioned.<br />
II. g ** -CLOSED SET<br />
In this section we introduce a new class of closed set called<br />
g ** -closed set and study further some of their properties.<br />
Definition 2.1. Let A be subset of a topological space X. It is<br />
called g ** -closed set if cl(A) ⊆ U whenever A ⊆ U and U is<br />
g ** -open. The set of all g ** -closed sets denoted by G ** C(X). A<br />
subset A of X is called g ** -open if X – A is g ** -closed in X.<br />
Example 2.1. If X = {a, b, c, d}, X, {c, d}}, then<br />
g ** -closed sets of X are X, {a}, {b}, {a, b}, {a, c}, {a, d},<br />
{b, c}, {b, d}, {a, b, c}, {a, b, d}, {a, c, d}, {b, c, d}}.<br />
Remark 2.1. The concepts of -open and g ** -open are<br />
independent.<br />
Let X = {a, b, c} and = {X, {a}, {b}, {a, b}}. Then {a, c}<br />
and {b, c} are g ** -open sets but not -open.<br />
Let X = {a, b, c} and = {X, {a}}. Then {a, b} and {a, c} are<br />
-open sets but not g ** -open.<br />
Remark 2.2.The concepts of g-closed sets and g ** -closed sets<br />
are independent.<br />
Let X = {a, b, c, d} and X, {b}, {b, c}, {a, b, c},<br />
{b, c, d}}. Then {a, b, d} is a g-closed set but not g ** -closed.<br />
Also {c}, {a, c} and {c, d} are g ** -closed sets but not g-closed.<br />
Theorem 2.1. Let A be a subset of a topological space X and if<br />
A is a -closed set in X, then A is g ** -closed.<br />
Proof: Let A be a -closed set in X and A U where U is<br />
g ** -open. Since A is -closed, cl(A) = A U. Hence A is<br />
g ** -closed in X.<br />
The reverse implication does not hold.<br />
Example 2.2. Let X = {a, b, c, d} and X, {a}, {b},<br />
{a, b}, {b, c, d}}. Then {b, c} is a g ** -closed set but not closed.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 436<br />
ISSN 2250-3153<br />
Theorem 2.2. Let A be a subset of a topological space X and if<br />
A is a g ** -closed set in X, then A is g-closed.<br />
Proof: Let A be a g-closed set in X and A U where U is<br />
open. Since every open set is g ** -open and A is g ** -closed,<br />
cl(A) U. Hence A is g-closed in X.<br />
The reverse implication does not hold.<br />
Example 2.3. Let X = {a, b, c, d} and X, {a}, {a, b},<br />
{a, c}, {a, b, c}, {a, b, d}}. Then {a, c, d} is a g-closed set but<br />
not g ** -closed.<br />
Remark 2.3. The concepts of g-closed and g ** -closed are<br />
independent.<br />
Let X = {a, b, c} and = {X, {a}}. Then {a, b} and {a, c} are<br />
g ** -closed sets but not g-closed.<br />
Let X = {a, b, c, d} and = {X, {a}, {a, b}, {c, d}, {a, c, d}}.<br />
Then {b, c} and {b, d} are g-closed sets but not g ** -closed.<br />
Remark 2.4. The concepts of g # -closed and g ** -closed are<br />
independent.<br />
Let X = {a, b, c, d} and X, {a}, {b}, {a, b}, {b, c, d}}.<br />
Then {b, c} and {a, b, c} are g ** -closed sets but not<br />
g # -closed.<br />
Let X = {a, b, c, d} and X, {b}, {b, c}, {a, b, c},<br />
{b, c, d}}. Then {a, b, d} is a g # -closed set but not g ** -closed.<br />
Remark 2.5. From the Theorems 2.1, 2.2 and Remarks 2.3, 2.4,<br />
we have the following diagram<br />
g # -closed<br />
where A B represents A imply B, A B represents A does<br />
not imply B.<br />
Theorem 2.3. If A is a g ** -closed set in X, then it is<br />
sg ** -closed.<br />
Proof: Let A be a g ** -closed set such that AU, where U is<br />
g ** -open. By Definition 2.1, we have cl(A) U. Since cl(A)<br />
is a semi closed set and scl(A) is the least semi closed set<br />
containing A, we have scl(A) cl(A) U. Hence A is sg ** -<br />
closed.<br />
The reverse implication does not hold.<br />
Example 2.4. Let X = {a, b, c, d} and = {, X, {a}, {b},<br />
{a, b}, {a, b, c}}. Then {a}, {b}, {a, c} are sg ** -closed sets in X<br />
but not g ** -closed.<br />
Theorem 2.4. Let A be a g-closed set in a topological space X.<br />
Then A is g ** -closed if X is g ** -T1/2.<br />
Proof: Let A be a g-closed set in X and A U where U is<br />
g ** -open. Since X is a g ** -T1/2 space and A is g-closed, every<br />
g ** -open set is open and hence cl(A) U. Therefore A is<br />
g ** -closed in X.<br />
Corollary 2.1. If X is g ** -T1/2, then every g-closed set is<br />
g ** -closed.<br />
Proof: Follows from the above Theorem 2.4.<br />
Corollary 2.2. If X is g ** -T1/2, then every g # -closed set is<br />
g ** -closed.<br />
Proof: Follows from the above Theorem 2.4.<br />
Theorem 2.5. Let {Ai : i J} be the collection of g ** -closed<br />
sets in a topological space X. Then iJ Ai is also a<br />
g ** -closed set in X.<br />
Proof. Let iJ Ai U where U is g ** -open. Then Ai U for<br />
each i J. Since Ai is g ** -closed for each i J, we have cl(Ai)<br />
⊆ U for each i J. This implies that cl(iJ Ai) = iJ cl(Ai)<br />
⊆ U. Hence iJ Ai is g ** -closed in X.<br />
Remark 2.6. (i) Intersection of two g ** -closed sets need not be<br />
g ** -closed.<br />
Let X = {a, b, c}, X, {a}}. Then g ** -closed sets of X<br />
are X, {b}, {c}, {a, b}, {a, c}, {b, c}}.<br />
If A = {a, b} and B = {a, c}, then the sets A and B are<br />
g ** -closed but A B = {a} is not g ** -closed.<br />
Theorem 2.6. If a set A is g ** -closed in X, then cl(A) – A<br />
contains no non-empty g ** -closed set.<br />
Proof: Let F be a g ** -closed set such that F cl(A) – A. Since<br />
X – F is g ** -open and A X – F, from the definition of<br />
g ** -closed set it follows that cl(A) X – F. Thus F <br />
X – cl(A). This implies that F cl(A) (X – cl(A)) = .<br />
Corollary 2.3. Let A be a g ** -closed set in X. Then A is<br />
-closed if and only if cl(A) – A is g ** -closed.<br />
Proof: Necessity. Let A be -closed in X. Then cl(A) A.<br />
This implies that cl(A) – A = . Therefore cl(A) – A is<br />
g ** -closed.<br />
Sufficiency, Suppose cl(A) – A is g ** -closed. Then by Theorem<br />
2.6, cl(A) – A contains does not contain any non-empty<br />
g ** -closed set and hence cl(A) – A = . This implies that<br />
cl(A) = A. Therefore A is -closed in X.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 437<br />
ISSN 2250-3153<br />
Theorem 2.7. Suppose that X is an -space (i.e., = ). A<br />
g ** -closed set A is -closed in X if and only if cl(A) – A is<br />
-closed in X.<br />
Proof: Necessity. If A is -closed in X, then cl(A) A. This<br />
implies that cl(A) we have cl(A) is -closed in<br />
X.<br />
Sufficiency, Suppose that A is g ** -closed and cl(A) is<br />
-closed. It follows from the assumption that = .<br />
Then cl(A) is g ** -closed in X. By Theorem 2.6, we<br />
have cl(A) this implies that cl(A) enceis<br />
-closed in X<br />
Theorem 2.8. Let A be a g ** -closed set in X. If A is<br />
g ** -open, then cl(A) – A = .<br />
Proof: Let A be g ** -open in X. Since A is g ** -closed, cl(A) <br />
A. This implies that cl(A) – A = .<br />
Theorem 2.9. Every subset is g ** -closed in X if and only if<br />
every g ** -open set is -closed.<br />
Proof: Necessity. Let A be g ** -open in X. Then by hypothesis A<br />
is g ** -closed in X. By Theorem 2.8 cl(A) – A = . Hence A<br />
is -closed.<br />
Sufficiency. Let A be a subset of X and U a g ** -open set such<br />
that A U. Then by hypothesis, U is -closed. This implies that<br />
cl(A) cl(U) U. Hence A is g ** -closed.<br />
Theorem 2.10. If A is a g ** -closed set in X and A B <br />
cl(A), then B is g ** -closed in X.<br />
Proof: Let BU where U is g ** -open. Since A is g ** -closed in<br />
X and A U, it follows that cl(A) U. By hypothesis, B <br />
cl(A) and hence cl(B) cl(A). Consequently, cl(B) U<br />
and B becomes g ** -closed in X.<br />
Theorem 2.11. For each x X, {x} is g ** -closed or its<br />
complement X – {x} is g ** -closed in a space X.<br />
Proof: Suppose that {x} is not g ** -closed in X. Since X – {x} is<br />
not g ** -open, the space X itself is only g ** -open set containing<br />
X – {x}. Therefore, cl(X – {x}) X holds and so X – {x} is<br />
g ** -closed.<br />
III. g ** -OPEN SET<br />
In this section, we introduce a new class of open set called<br />
g**-open set and study some of their properties.<br />
Definition 3.1. A subset A of a topological space is called semi<br />
g ** -open (briefly g ** -open) if and only if X – A is<br />
g ** -closed. The set of all g ** -open set denoted by G ** O(X).<br />
Theorem 3.1. Let {Ai : i J} be the collection of g ** -open sets<br />
in a topological space X. Then iJ Ai is also a g ** -open set in<br />
X.<br />
Proof. Since Ai is g ** -open in X for each i J. This implies that<br />
X – Ai is g ** -closed in X for each i J. Then by Theorem 2.5,<br />
we have X – iJ Ai = iJ (X – Ai) is also g ** -closed in X.<br />
Hence iJ Ai is g ** -open in X.<br />
Remark 3.1. Union of two g ** -open sets need not be<br />
g ** -open.<br />
Let X = {a, b, c}, X, {a}}. Then g ** -open sets of X are<br />
X, {a}, {b}, {c}, {a, b}, {a, c}}<br />
If A= {b} and B={c}. Then the sets A and B are g ** -open but<br />
A B = {b, c} is not g ** -open.<br />
Theorem 3.2. A set A is g ** -open in X if and only if<br />
F int(A) whenever F is g ** -closed and F A.<br />
Proof: Necessity, Let A be g ** -open and suppose F A where<br />
F is g ** -closed. By Definition 3.1, X – A is g ** -closed. Also<br />
X – A is contained in the g ** -open set X – F. This implies that<br />
cl(X – A) = X – int(A). Hence X – int(A) X – F.<br />
Therefore F int(A).<br />
Sufficiency. If F is a g ** -closed set with F int(A) whenever<br />
FA, it follows that X – A X – F and X – int(A) X – F.<br />
Thus cl(X – A) X – F. Hence X – A is g ** -closed and<br />
A becomes g ** -open. This proves the theorem.<br />
Theorem 3.3. If int(A ) B A and A is g ** -open in X, then<br />
B is g ** -open.<br />
Proof: By hypothesis, X – A X – B X - int(A).<br />
Thus X – A X – B X – (X - cl(X – A)) = cl(X – A). Now<br />
X –A is g ** -closed and hence by Theorem 2.10, X – B is<br />
g ** -closed. Hence B is g ** -open in X.<br />
IV. g ** -CONTINUOUS MAP and<br />
g ** -IRRESOLUTE MAP<br />
In this section we introduce the concepts of<br />
g**-continuous map and g**-irresolute map and study<br />
relationship between some other mappings.<br />
Definition 4.1. A map f : X Y is called g ** -continuous if<br />
f –1 (V) is g ** -closed in X for every closed set V of Y.<br />
Definition 4.2. A map f : X Y is called g ** -irresolute if<br />
f –1 (V) is g ** -closed in X for every g ** -closed set V of Y.<br />
Theorem 4.1. Let f : X Y be g ** -continuous. Then f is<br />
g-continuous but not conversely.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 438<br />
ISSN 2250-3153<br />
Proof: Let V be a closed set in Y. Then f –1 (V) is g ** -closed in<br />
X since f is g ** -continuous. By Theorem 2.2, every g ** -closed<br />
set is g-closed. Therefore f –1 (V) is g-closed in X. Hence f is<br />
g-continuous. The converse need not be true as seen from the<br />
following example.<br />
Example 4.1. Let X = {a, b, c, d}, = {, X, {b}, {b, c}, {a, b,<br />
c}, {b, c, d}}, Y = {1, 2, 3, 4} and = {, Y, {1}, {2}, {1, 2},<br />
{2, 3, 4}}. Define a map f : X Y by f(a) = 3, f(b) = 2, f(c) = 1,<br />
f(d) = 4. Then f is g-continuous. f –1 ({2, 3, 4}) = {a, b, d} is not<br />
g ** -closed in X for the closed set {2, 3, 4} of Y. So f is not<br />
g ** -continuous.<br />
Theorem 4.2. Let f : X Y be a mapping from a topological<br />
space X into a topological space Y. Then the following<br />
statements are equivalent.<br />
(i) f is g ** -continuous;<br />
(ii) the inverse image of each open set in Y is g ** -open in X.<br />
Proof: Straight forward from the Definition 3.1.<br />
Definition 4.3. A space X is called g ** -T1/2 space if every<br />
g ** -closed set is g ** -closed.<br />
Theorem 4.3. Let f : X Y be a map. If f is g ** -continuous,<br />
then f is g ** -irresolute where X is g ** -T1/2 and Y is g ** -T1/2.<br />
Proof: Let V be g ** -closed in Y. Since Y is g ** -T1/2, we have V is<br />
closed in Y. Then f –1 (V) is g ** -closed in X, since f is<br />
g ** -continuous. But X is g ** -T1/2 and so f –1 (V) is<br />
g ** -closed. Hence f is g ** -irresolute.<br />
Theorem 4.4. Let f : X Y be a map. If f is g ** -continuous,<br />
then f is g ** -irresolute where X is g ** -T1/2 and Y is g ** -T1/2.<br />
Proof: Let V be g ** -closed in Y. Since Y is g ** -T1/2, we have V<br />
is g ** -closed in Y. Then f –1 (V) is g ** -closed in X, since f is<br />
g ** -continuous. But X is g ** -T1/2 and so f –1 (V) is g ** -closed.<br />
Hence f is g ** -irresolute.<br />
Note that if f : X Y and g : Y Z are both<br />
g ** -continuous, then the composition g f : X Z is not<br />
g ** -continuous mapping.<br />
Example 4.2. Let X = Y = Z = {a, b, c}, = {, X, {a}, {b},<br />
{a, b}}, = {, Y, {a}} and = {, Z, {a}, {a, b}, {a, c}}.<br />
Define f : X Y by f(a) = c, f(b) = a and f(c) = b and define<br />
g : Y Z by g(a) = a, g(b) = c, g(c) = b. Then f and g are<br />
g ** -continuous mappings. The set {b} is closed in Z.<br />
(g f) –1 ({b}) = f –1 (g –1 ({b})) = f –1 ({c}) = {a} which is not<br />
g ** -closed in X. Hence g f is not g ** -continuous.<br />
Theorem 4.5. Let f : X Y and g : Y Z be two mappings.<br />
(i) If f is g ** -irresolute and g is g ** -continuous, then the<br />
composition g f is g ** -continuous;<br />
(ii) If f and g are g ** -irresolute, then the composition g f is<br />
g ** -irresolute;<br />
(iii) Let a space Y be g ** -T1/2. If f : X Y is g ** -irresolute<br />
g : Y Z is g ** -continuous, then the composition g f : X Z<br />
is g ** -continuous.<br />
Proof: (i) Let V be closed in Z. Then g ** -continuity of<br />
g implies that g –1 (V) is g ** -closed in Y. Since f is<br />
g ** -irresolute, it follows that f –1 (g –1 (V)) is g ** -closed in X.<br />
Hence g f is g ** -continuous.<br />
(ii) Let V be g ** -closed in Z. Then g ** -irresolute of g implies<br />
that g –1 (V) is g ** -closed in Y. Since f is g ** -irresolute, it<br />
follows that f –1 (g –1 (V)) is g ** -closed in X. Hence g f is<br />
g ** -irresolute.<br />
(iii) Let V be closed in Z. Then g ** -continuity of g implies that<br />
g –1 (V) is g ** -closed in Y. Thus g –1 (V) is g ** -closed in Y since<br />
Y is g ** -T1/2. Therefore f –1 (g –1 (V)) is g ** -closed in X, because<br />
f is g ** -irresolute. Hence g f is g ** -continuous.<br />
REFERENCES<br />
[1] K.Balachandran, P.Sundram and H.Maki, On generalized continuous maps<br />
in topological spaces, Mem.Fac. Kochi Univ.SerA, Math., 12 (1991), 5-13.<br />
[2] J.Chitra and D.Saravanakumar, On a Class of New Generalized Closed Sets<br />
in Topological Spaces, Proc. of HICAMS-(<strong>2012</strong>), 121 – 128.<br />
[3] R.Devi, K.Balachandran and H.Maki ,Generalized -closed maps and -<br />
generalized closed maps, Indian J. Pure. Appl. Math., 29(1) (1988),37-49.<br />
[4] J.Dontchev, On some separation axioms associated with the -topology,<br />
Mem. Fac.Sci. Kochi Univ. Ser.A. Math.,116 (1997),31-35.<br />
[5] W.Dunham, T ½ -spaces, Kyngpook Math. J.,17 (1977),161-169.<br />
[6] W.Dunham, A new closure operator for non T 1 topologies, Kungpook<br />
Math.J., 22 (1982),55-60.<br />
[7] W.Dunham and N.Levine, Further results on generalized closed sets in<br />
topology, kyungpook Math. J., 20 (1980),169-175.<br />
[8] N.Levine, Generalized closed sets in topology, Rend.<br />
Circ.Math.Palermo,19(2) (1970), 169-96.<br />
[9] N.Levine, Semi- open sets and semi – continuity in topological spaces,<br />
Amer. Math. Monthly, 70 (1963), 36-41.<br />
[10] H.Maki,R.Devi and K.Balachandran, Associated topologies of generalized<br />
- closed sets and -generalized closed sets, Mem. Fac.Sci.Kochi Univ.<br />
Ser.A, Math.,15 (1994),51-63.<br />
[11] H.Maki,R.Devi and K.Balachandran, Generalized -closed sets in topology,<br />
Bull.Fukuoka Univ.Ed.PartIII,42 (1993),13-21.<br />
[12] O. Njastad, On some classes of nearly open sets, Pacif. J. Math, 15(1965),<br />
961 – 970.<br />
[13] K. Nono, R.Devi, M.Devipriya, K.Muthukumaraswamy and H.Maki, On<br />
g#-closed sets and the digital plane, Bull. of Fuku. Univ. Ed. Part III,<br />
53(2004), 15 – 24.<br />
[14] T. Ohba and J. Umehara, A simple proof of being a topology, Mem. Fac.<br />
Sci. Kochi Uni. (Math.), 21 (2000), 1 – 19.<br />
[15] N.Palaniappan and K.C.Rao, Regular generalized closed sets, Kyungpook<br />
math. J., 33(2) (1993),211-219.<br />
[16] G. Sai Sundara krishnan and K. Balachandran, A new type of<br />
homeomorphism in a topological space, Bull. Cal. Math. Soc., 97, (1)<br />
(2005), 69 – 78.<br />
[17] D. Saravanakumar and G. Sai Sundara krishnan , Generalized mappings via<br />
new closed sets, Int. J. of Math. Sci. and Appl., Vol 2, No. 2, <strong>2012</strong>, 127 –<br />
137.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 439<br />
ISSN 2250-3153<br />
AUTHORS<br />
First Author - Dr. D.Saravanakumar, Assistant professor,<br />
Department of Mathematics, K.L.N. College of Engineering,<br />
Sivagangai, Email id – saravana_13kumar@yahoo.co.in<br />
Second Author - K.M.Sathishkumar, Assistant professor,<br />
Department of Mathematics, K.L.N. College of Information<br />
Technology, Sivagangai,<br />
Email id - sathish_infinity@yahoo.co.in<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 440<br />
ISSN 2250-3153<br />
I<br />
The White Tiger: Quest of Existence<br />
I. INTRODUCTION<br />
ndian English literature is full with the novelists who presented<br />
their protagonist character in relation with the humanism.<br />
Mulkraj Anand‘s Bakha, Tagore‘s Gora, Coolie of the Mulkraj<br />
Anand and Arvind Adiga‘s Balram Halwai alias Munna.<br />
Everybody craves for his identity, his existence, in this world.<br />
Balram halwai has done same act He attempted to get life of<br />
human being but his attempts with the moral are in vain. Who<br />
born on this earth, he asks the question to the creator ―Who am<br />
I‖? Some becomes ascetic in search of this, life begins and ends,<br />
nothing remains in our hand because we are mere pawns in the<br />
hands of destiny. But things are not true with the Balram, he is<br />
not ascetic, but he pursued this question in the novel. Although<br />
he is the person who born among low class, but like hero of the<br />
postmodern fruit he challenged his destiny.<br />
―Today, I am really Indian.‖(Rabindranath Tagore-406) Like<br />
Gora he never declared his existence, so it is not only quest of<br />
Balram but it is of the reader too. Reader goes through the page<br />
to page in search of humanity. The novelist has used epistolary<br />
form for novel to express the feelings of the Balram. Balram has<br />
several names among the novel in them he finds his existence.<br />
Balram is the name given by his teacher named Krishna.Balram<br />
is the kickside of the Krishna. Like Coolie journey for search of<br />
existence starts in his life from small village, Laxmangarh, in<br />
Bihar in the heart of darkness. The animal imagery is used to<br />
suggest the Balram Halwai amoral victim of the society.<br />
The white tiger is the nickname of the protagonist Balram<br />
Halwai. He earned name from an education inspector, even<br />
Adiga described as ―so that‘s how I became the White Tiger,<br />
There will be third and fourth name too, but that late in the<br />
story.‖Arvind Adiga-page-35 Like Coolie of Mulkraj Anand he<br />
had several names. Difference among them is Coolie died with<br />
the identity of Coolie, Balram proceeds life as owner of the<br />
White Tigers Company. Like coolie he is working on the tea<br />
stall, when Balram hitting the piece of coal he is hitting<br />
unknowingly, his childhood. A huge portrait of the Mahatma<br />
Gandhi was watching the every chunk of coal burning the<br />
childhood of the Balram. He got another name with new<br />
profession ―the coal breaker‖. He remarks about children in India<br />
are weak, fragile, looks like ―the guilty conscience of the<br />
government‖<br />
At the tea shop one boy asked ―What is the creature that comes<br />
along only once in a genration ―? ―The coal braker‖ Arvind<br />
Adiga-page-37 Feelings of alienation aroused in him. Balram is<br />
gradually turning himself towards explosion.Every incident<br />
making him shellto explode. Balram is not the original thinker<br />
but he was original listener. he listened carefully, so he turned<br />
himself into the new profession of driving. Though he had lost<br />
Prof. Sakate Bharat Shamarao<br />
M.A. NET<br />
Balwant College vita<br />
his childhood days, with humanitarian view he is dreaming to<br />
start Language school. Where he wants teach not about Gandhi,<br />
God- ―nothing but facts of life for these kids. A school full of<br />
White Tigers, unleashed on Banglore……..‖ Arvind Adiga-page-<br />
319 Balram Halwai alias Munna is the son of rikshaw puller<br />
Vikram Halwai .Balram is the youth of 25- 35 blackish in<br />
complexion, oval face, five feet four inches youth. But he is<br />
craving for identity his anguish is in Indian society father forget<br />
to giove names to their children But he is craving for identity his<br />
anguish is in Indian society parents forget to give names to their<br />
children. Time makes them orphan. Alienation made Balram to<br />
passes comments ―now what kind of place is it where people<br />
forget to name their children‖. - Arvind Adiga-page-14.<br />
Balram speaks about Buddha‘s philosophy, scared Ganga,<br />
Hanuman the Hindu god in the Ramayana as wellas fidelity, love<br />
and devotion, which reader as well as Balram, couldn‘t see<br />
anywhere it is the feelings of alienation. He had surrendered to<br />
the society of the evil like Dr. Faustus in search of physical<br />
luxury. Even on a tea shop owner named him thug. He searched<br />
his identity in the half baked, person of the postmodern world.<br />
Balram driver fascinated so much due to the moll wants to enter<br />
in the moll where only big bellies have permission to enter, when<br />
he entered the guard pushed him outside of the moll. These small<br />
Bellies had not right to enter into the society of the big bellied<br />
person. As driver, he had new name given by the society<br />
‗country mouse‘. Rootlessness is slowly developed in the mind<br />
of the Balram. Cleaned society needs clean clothes but they<br />
neednot clean mans. Balram changed roles as per demand of the<br />
period, because he observed on the tea stall, the people use the<br />
paper to wrap greasy samosas, wherw written the philosophy<br />
―May be once in hundred years there is revolution that frees the<br />
poor.‖ Arvind Adiga - page - 303. But the representative of the<br />
poor, Balram had had his view. According to him revolution<br />
wouldn‘t take place in India because people are waiting for the<br />
war which would give him freedom. But it would come from<br />
from somewhere else. Apathy of related life can be clearly seen<br />
on the face of Balram Halwai by through this opinion. He<br />
became murder, thief by snatching the amount from his master<br />
Ashoka whom he considers Ram and Seeta. He founds the white<br />
tigers company.<br />
He ponders over country, culture. He wrote that if people<br />
started to biting judge then what is the future of this country. The<br />
protagonist calls himself half baked,even he noted that his story<br />
is ―The Autobiography of a Half Baked‖, who made of the halfbaked<br />
clay We can see sense of loss in his dialogue and action.<br />
Still he has compassion about poor people, he helped to the<br />
parents of victim. Reader has to search Balram existence He<br />
admitted his crime in front parents although he rescued from<br />
court. Reader has to search Balram existence According to<br />
Adiga- ―The novelist U R Anatha Murthy in an essay published<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 441<br />
ISSN 2250-3153<br />
in Kannad newspaper last year, pointed that Dickens had hsd<br />
virtually no impact on his contemporaries. Thoms hardy and<br />
Gorky showed them how to describe the social forces (capital,<br />
tradition and patriarchy) that constrained the protagonists of their<br />
novels, also how to withhold any overt commentary on these<br />
forces. Dickens in contrast is shamelessly didactic and<br />
sentimental; a writer who shows us divided society not to<br />
demand revolution but only ―change of the heart‖ from rich and<br />
poor alike. No self-respecting Indian novelist has wanted to<br />
imitate him‖. The Times of India- page-3<br />
Arvind Adiga is interested not only in demand of revolution<br />
but also change of heart. So Balram Halwai changed many roles,<br />
to get value of human beings. Rootlessness, alienation, loss<br />
identity, attitude of big bellies made him loose his identity<br />
among the hands of corrupt people. So he wrote ―I‘ve made it!<br />
I‘ve broken out of the coop‖ Arvind Adiga-page-320 ―That‘s<br />
why I was cheated of my destiny to be fact, and creamy skinned<br />
and smiling.‖ (Arvind Adiga-page-64)<br />
These lines remarks that he is White Tiger in the society of the<br />
beasts. The destruction of the identity laid him to prove existence<br />
by hook or crook. He would not want to die like his father<br />
suffering from the TB.So he proved his existence with beastly<br />
way.<br />
REFERENCES<br />
[1] Arvind Adiga.The White Tiger.Harper Collins Publishers India &India<br />
Today Group. New Delhi.2008<br />
[2] Arvind Adiga: A Tale of Two Artists .Times of India, (Newspaper) Pune<br />
Saturday March, 3 <strong>2012</strong>.<br />
[3] Mulakraj Anand. Untouchable. Published by Gulabo Vazirani for Arnold<br />
Heineman publishers (India) Delhi.1981<br />
Mulakraj Anand, Coolie (London: Bodley Head 1972)<br />
[4] Ravindranath Tagore.Gora. Macmilan India limited Edition -1999<br />
AUTHORS<br />
Prof. Sakate Bharat Shamarao, M.A. NET, Balwant College vita<br />
Email id - kingofindia.1696@rediffmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 442<br />
ISSN 2250-3153<br />
Integrity Checking Mechanism with Effective 1nd<br />
Realistic Approach in Distributed Database<br />
Pallavi Saxena, Nitin Dubey, Sonali Pathak<br />
Lovely Professional University, Department Computer Science Phagwara, Punjab, India<br />
Abstract- In Constructing of a successful distributed<br />
database we require to introduce the strong integrity checking<br />
mechanism as less adhering may possibly breach security<br />
aspects. The mechanism should represent the semantic<br />
properties of stored data. Verifying the integrity of data from<br />
various outsourced safety is a challenge for database<br />
researchers, this paper proposes a specific approach to bring<br />
pureness of data by employ checking method to substantiating<br />
send back query result in distributed database. To accomplish<br />
our goals, a unique property is dynamically inserted into each<br />
tuples called faux attribute as well as this method also detects<br />
the unauthorized alteration on data.<br />
Index Terms- faux attribute; verification; validation;<br />
trigger manager<br />
T<br />
I. INTRODUCTION<br />
he race between confidentiality, integrity and availability<br />
has put terrible pressure for the need of out-of-box<br />
thinking. The increase in cruciality of information to the<br />
business has inflated the challenges in protecting and managing<br />
the data. The bulk of data that business must manage has<br />
driven planning to make data available on 59‘s rule that is<br />
99.999%.The goal of business continuity is to assure<br />
information security. The main aspects are to increase the<br />
accessibility of information without compromising of security<br />
measures. Distributing data is one of the ways to provide<br />
business continuity. Distributed database is a aggregation of<br />
different databases that are logically distributed and stored in a<br />
variety of outsourced database system that aspects client as a<br />
centralized application where each database application may<br />
involve different database technology and different computer<br />
architecture that contribute the execution of global query. With<br />
the more promotion of internet technologies, the major<br />
problem is to preserve the integrity of data. Integrity is the<br />
unity of stored data. In decentralized environment, the more<br />
advanced view of Integrity as shown in Fig.1 is degree of<br />
correctness, completeness, freshness, timeliness, efficient,<br />
accuracy, entireness and identity of data set. Infects, there are<br />
more research on data confidentiality and integrity on<br />
centralized system but very little have been focused on<br />
integrity checking in distributed system keeping in mind the<br />
cloud environment that have brood of storage array‘s contain<br />
multiple fragment of data .Based on researches on traditional<br />
integrity maintenance techniques and methods, this paper<br />
design Real time integrity checking through Verifying and<br />
Validate Query result by accommodate the trusted third party<br />
in distributed system This is set up by dynamically inserting a<br />
unique attribute on every tuples of each fragment by using<br />
trigger called faux attribute.<br />
Figure1: Advanced view of integrity<br />
.<br />
Structure of the paper are as follow. In section 2, we briefly<br />
discuss the previous work on integrity and next section contain<br />
method and performance countermeasure and atlast we<br />
summarize our solution and outline the future work.<br />
II. RELATED WORK<br />
A Glimpse of pre-implemented techniques for integrity in<br />
distributed database<br />
As with the increase in requirement of distributed data,<br />
different threats of database like Excessive Privilege Abuse,<br />
Legitimate Privilege Abuse, Privilege Elevation, Database<br />
Platform abuse, SQL Injection, Weak Audit Trail, Weak<br />
authentication, Backup Data Exposure, weak audit trail and<br />
Denial of service sneak their way inside which greatly breach<br />
the integrity of decentralized system. From the analysis as<br />
illustrated in fig. 2, it may be shown that the excessive<br />
privilege abuse and sql injection greatly affects the integrity of<br />
the global schema. By keeping in mind of these kinds of<br />
threats, the integrity can be categorized into different group.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 443<br />
ISSN 2250-3153<br />
Figure 2: Effect of database treats on distributed system<br />
From the last 5 year, there have been many research fruits<br />
on these vulnerabilities. Some discussion on the multilevel<br />
using security policy or tag to achieve integrity, as in [5],<br />
author upholds a integrity of data in term of completeness and<br />
freshness by using fake attribute, as in [2], but this fake<br />
attribute is generated manually by owner not dynamic,<br />
moreover in distributed environment because for every<br />
fragment to insert a fake attribute manually is very time<br />
consuming also privacy of fake attribute is compromised, when<br />
malicious user will able to break through the fake attribute.<br />
Some research focus on intrusion-tolerant mechanism to<br />
maintain integrity and confidentiality in distributed<br />
environment, as in [9], the approach like strategies of the<br />
control, test of the integrity, the test of efficiency and legality<br />
of data from client to assure the integrity of data with the<br />
technology of tighten, defaulting, ruling, in database, as in [6],<br />
and author use the concept of traditional hashing and<br />
encryption techniques by assembling a hash function through<br />
the application of grouping of encryption algorithm to<br />
simultaneously provides data confidentiality and integrity<br />
during storing and operating to protect illegally stolen and<br />
distorted in database application. This database assurance can<br />
be obtained from the encryption, as in [5], However from the<br />
encryption the main drawback is to big amount of key and<br />
more complex management of key. Adopting one-way hash<br />
function signature ensure the client as tuples receive by them<br />
are not tampered or destroy by malicious transaction In hashing<br />
some serious drawback is before digest the database tuples<br />
must be sorted and cannot support dynamic update properly,<br />
update will generate a new value that is time consuming work.<br />
Moreover Table I shown that there will be more number of<br />
collision attacks in different hashing algorithm.<br />
Table 8: List of Attacks on Hash Algorithm<br />
Algor Design<br />
ithm ers<br />
MD2 Ronald<br />
Rivest<br />
in<br />
1989<br />
MD5 Ronald<br />
Rivest<br />
in<br />
1992<br />
SHA-<br />
0<br />
SHA-<br />
1<br />
Nation<br />
al<br />
Securit<br />
y<br />
Agenc<br />
y<br />
Nation<br />
al<br />
Securit<br />
y<br />
Agenc<br />
y<br />
Diges<br />
t size<br />
128<br />
bits<br />
128<br />
bits<br />
160<br />
bits<br />
160<br />
bits<br />
Attack year Scout<br />
er<br />
Finding<br />
a preimage<br />
attack with tim<br />
e complexity<br />
equivalent to<br />
2 104 2004 Mulle<br />
r<br />
applicatio<br />
ns of the<br />
compaction<br />
function.<br />
Vulnerable to<br />
a primate<br />
attack against<br />
MD5 This<br />
attack is only<br />
theoretical,<br />
with a time<br />
complexity of<br />
2 123.4 2009 Toe<br />
Xie<br />
and<br />
dengg<br />
uo<br />
feeng<br />
.<br />
Determine the<br />
collision attack<br />
with time<br />
complexity 2 51<br />
The attacks<br />
can find<br />
collisions in<br />
the full version<br />
of SHA-1,<br />
requiring time<br />
complexity<br />
smaller than<br />
2 69 operations.<br />
2004 Joux,<br />
Carri<br />
bault,<br />
Lemu<br />
et,<br />
and<br />
Jalby<br />
2005 Profe<br />
ssor<br />
Wang<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 444<br />
ISSN 2250-3153<br />
Concepts<br />
In this paper ,the main concepts behind this is the owner store<br />
the encrypted database that contain faux attribute on the service<br />
provider and meanwhile for the verification and validation of<br />
data transmit the encrypted total sum value of faux attribute to<br />
the trusted third party. The encrypted value in trusted third<br />
party should be able to protect and secure reasonable data and<br />
should be in accordance with the data in service provider.<br />
III. METHODOLOGY<br />
A. Preliminaries<br />
The sensitivity of metadata for distributed storage. At present<br />
most enterprise network, use distributed system to store files in<br />
different nodes, we need to store Data definition call catalog<br />
files in specialized server that facilitates the management,<br />
access and retrieval of massive fragment of schema. catalog<br />
files are used for the translation, optimization and execution of<br />
transaction and their statistics is also updated when data<br />
definition changed with respect to local autonomy of each site.<br />
The catalog consists of a global schema module includes the<br />
global relation‘s attributes, Fragments distribution modules<br />
includes the attributes belong to each fragment, qualification<br />
of fragment ,fragment mapping or allocation module consists<br />
of binding the name of physical images to the local data stored<br />
at each site in related to access matrix module includes<br />
accessibility of fragments with respect to remote and site<br />
autonomy, statistics module consists of profile of each of the<br />
fragments, and state management module comprise lock and<br />
recovery information. Catalog management system located in<br />
corresponding with different fragment to ensure the files access<br />
efficiency for users. We don‘t need to access all sites for<br />
finding location of data just focus on catalog for fast retrieval<br />
of data which enhances the performance and scalability of<br />
Distributed System.<br />
Faux attribute. The idea of the approach is to consider faux<br />
attribute which is the basic protection unit in distributed<br />
system. We use trigger to generate faux attribute, as trigger is<br />
an stored procedure which is automatically fired when<br />
insertion, deletion and updating happen in database. When<br />
insertion of data goes on, trigger manager automatically inserts<br />
unique faux attribute on every tuples into the schema.<br />
Definition. For the purpose of convenience, ”FA” in this<br />
paper means faux attribute, and refers to the faux tuple of Row<br />
N and column M “RPN” stands for random parity number.<br />
S(FA) means the process of adding parity number to faux<br />
attribute. TS(FA) stands for the process of adding faux<br />
attribute and generation total sum of it. E(TS((FA)) means<br />
the process of encrypting total sum by key “K”.<br />
Techniques of generating Faux attribute. Let us suppose a<br />
tuple R where t1 is an attribute of the R0 and t1 is<br />
of any data type to fulfill our mechanism we add a faux<br />
attribute call tf ,now the tuple become Rf. The<br />
generated faux attribute will correlate with every tuples, Fig.3<br />
shows the structure. Irrespective of this random parity number<br />
is added to the faux attribute it is same as in case of CRC in<br />
networking to check whether the value of faux attribute receive<br />
by user is same as send by providers, this improve the privacy<br />
of faux attribute then calculate the total sum of all faux<br />
attribute after that encrypt sum from symmetric key with<br />
algorithm triple DES.<br />
Figure 3: Structure of faux attribute<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 445<br />
ISSN 2250-3153<br />
B. Verification.<br />
We use five participants in our approach, Fig. 4 show the<br />
procedure<br />
Figure 4: Structure of verification mechanism<br />
Trigger manager. Here trigger manager has responsibility to<br />
manage special kind of catalog which stores the information<br />
related to different trigger for different fragments. Whenever new<br />
tuples insert into fragment, trigger manager automatically fires<br />
trigger for that fragments that will insert faux attribute in respect<br />
of that tuple.<br />
Owner. Owner refers to the current authorization identifier<br />
which creates the database. Owner firstly make some operation,<br />
they breakup the whole global schema into logical units called<br />
fragments meanwhile with the help of trigger manager generate<br />
faux attribute by using (1) and insert it into the fragments of each<br />
database and then allocate those fragments into service provider.<br />
S(FA) = ((tf1)+t(RPN))+(tf2+t(RPN))+…(tfn+t(RPN)) (1)<br />
T(S(FA)) = FA1+FA2+FA3+…FAn (2)<br />
T(S(FA)) = E(TS((FA)) (3)<br />
Service Provider. After inserting faux attribute, owner resides<br />
the encrypted database on the premises of provider. It is an<br />
organization that provides access to database. It processes the<br />
user query and facilitates verification and validation of data.<br />
TTP. Trusted Third Party is a constitution that assists the real<br />
time integrity checking of data by different users. The owner<br />
send the encrypted total sum value E(TS((FA)) of faux attribute<br />
to the TTP. When user get result from service provider at the<br />
same time will receive the E(T(FA)). TTP ease interaction<br />
between service provider and user who both have trust to TTP.<br />
User. When one authenticate user desire to access the<br />
database, he will fetch query to the service provider, user receive<br />
the predicted result that hold the integrity checking module<br />
TS((FA)) generated by the service provider by Using(2), In the<br />
meantime user gets the E(T(FA))from the TTP, decrypt it. The<br />
same value ensures the verification of result and implies no<br />
alteration take place. Since faux attribute relates with every<br />
tuples as suppose tuples will contain data {x,y,z} then<br />
faux attribute will be tf1 = {( xyz)+RPN},.If any unauthorized<br />
modification will happen and tuple changed to {r,y,z}, then faux<br />
attribute value clearly interpolate the inconsistency by matching<br />
it with each tuples and detect where violation of integrity occur.<br />
Furthermore, user recalculates the value of faux attribute by<br />
deducting it with RPN to assure that faux attribute is not<br />
manipulated during transmission by malicious transaction.<br />
IV. PERFORMANCE COUNTERMEASURE<br />
Compared with the traditional method for integrity checking<br />
as hash function like MD5 and CRC a more compact hash (< 128<br />
bits) are convenience and do attention about performance but<br />
very prone to security attacks while SHA-256 or SHA-512 where<br />
security is predominant but for a network system with high<br />
traffic, these hash functions can take a substantial toll on the<br />
CPU. Moreover this algorithm is more vulnerable to attack and<br />
susceptible to collision attack. The addition of faux attribute that<br />
is numeric for Simplicity will have great impact on security and<br />
performance, illustrate in Fig.5. .<br />
Figure 5: Performance Result<br />
1) More secure as for every row there will be unique faux<br />
attribute it is difficult for attacker to guess which<br />
attribute is fake, Moreover addition of RPN which is<br />
only known to user and service provider increase the<br />
confidentiality of faux attribute as it ensure that<br />
authenticate users will get the result.<br />
2) Save storage space as only one column is added to the<br />
original table this reduce the cost of transmission,<br />
therefore increase performance.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 446<br />
ISSN 2250-3153<br />
3) Sustain integrity between data as Faux attribute is<br />
related with every tuples, it will be easy to find where<br />
violation can take place by examine the faux attribute.<br />
4) Although, no manually work is perform by owner for<br />
insertion, updating and deletion of faux attribute.<br />
Trigger manager will automatically insert and update<br />
faux attribute when require in each fragment of table,<br />
improve the speed of system.<br />
V. CONCLUSION<br />
The main motive of the paper is to check the unity of<br />
important and sensible data system by infix faux attribute in each<br />
fragment of distributed system. The faux attribute bring real time<br />
integrity check value which can be used to provide verification<br />
and validation of data. This method also provides trust to service<br />
provider by verifying result of send back query with TTP.<br />
Moreover, the solution requires less consuming power as<br />
compared with other solutions. Uniqueness of faux attribute will<br />
be bottleneck, but with effectual use of advanced trigger can<br />
impart to the problem solving approach<br />
ACKNOWLEDGMENT<br />
First of all we would like to thank <strong>IJSRP</strong> for providing us<br />
with the platform to present our work to people and for giving us<br />
opportunity to get our research completed. We thank Lovely<br />
professional University for its support throughout the research<br />
work. This project was supported by the University efficiently,<br />
so we thank everyone involved throughout the work. We would<br />
like to thank the university for providing us with tools required to<br />
complete the research work<br />
REFERENCES<br />
[1] Bertino, E, Sandhu, R, ‖ Database Security –concepts and challenges,‖ on<br />
IEEE Transaction on Dependable and Secure Computing, vol.2 (1), 2005,<br />
pp.2-19.<br />
[2] Dai Jiazhu, Zhang Yurong, Li Xin, Luo Shuangyan, ‖A completeness and<br />
freshness guarantee scheme for outsourced database,‖ on Second<br />
International Conference on Networking and Distributed Computing,<br />
2011, pp.201-205.<br />
[3] Min Xie, Haixun Wang, Jian Yin, and Xiaofeng Meng. Integrity auditing of<br />
outsourced data. In VLDB, 2007.<br />
[4] Li-xin Xu, Dong Sun, and Dan Liu, ‖ study on method for data<br />
confidentiality and data integrity in relational Database,‖ in 3rd IEEE<br />
International Conference on Computer Science and Information Technology<br />
(ICCSIT),vol(1),2010,pp.292-295.<br />
[5] S. Jajodia and R. Sandhu, "Polyinstantiation Integrity in Multilevel<br />
Relations," in Proc IEEE Symposium on Research in Security and<br />
Privacy, 1990, pp. 104-105.<br />
[6] S. Jajodia and R. Sandhu, "Integrity Mechanisms in Database<br />
Management System," in Proceedings of the 13th NINS-NCSC<br />
National Computer Security Conference, 1990-10, pp. 526-540.<br />
[7] V. Daza and J. Herranz, "A Distributed and Computationally Secure<br />
Key Distribution Scheme. ISC'02. LNCS 2433.," on<br />
http://eprint.iacr.org/2002/069 , 2002.<br />
[8] Zubi, Z.S. ‖ On distributed database security aspects,‖ in International<br />
Conference on Multimedia Computing and Systems, pp231-235, April 2009<br />
[9] Gu-Ping Zheng andLu-Feng Xu, ‖ Distributed database system security<br />
model of power enterprise based on intusion tolerance technology, ‖ on<br />
International Conference on Power System Technology, pp1-4,<br />
October2006<br />
[10] http://en.wikipedia.org/wiki/MD2_(cryptography)<br />
AUTHORS<br />
First Author – Pallavi Saxena, M.Tech, Student, Lovely<br />
Professional University,Department.Computer Science<br />
Phagwara, Punjab, India, Email: pallavisaxena021@gmail.com<br />
Second Author – Nitin Dubey, Assistant Professor, Lovely<br />
Professional University,Department.Computer Science<br />
Phagwara, Punjab, India, Email: nitmeerut@gmail.com<br />
Third Author – Sonali Pathak, M.Tech, Student, Lovely<br />
Professional University,Department.Computer Science<br />
Phagwara, Punjab, India, Email: Pritipathak.pathak@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 447<br />
ISSN 2250-3153<br />
Empowerment of Women in India- An Attempt to Fill the<br />
Gender Gap (June, <strong>2012</strong>)<br />
Dr. Ravi N. Kadam<br />
Associate Professor,Department of P.G. Studies and Research in Economics, Jnana Sahyadri, Kuvempu University, Shankarghatta, Shimoga Dist.<br />
Karnataka, India.<br />
Abstract- The discriminated and exploited of women is seen<br />
all over the world. The empowerment is an aid to help women to<br />
achieve equality with men or, at least, to reduce gender gap<br />
considerably. Women play a very strategic role in the<br />
development of society in particular and development of<br />
economy in general. Woman is the leader planner of the family,<br />
the first trainer; supplier of labour power and by playing focal<br />
role in the development of agriculture, industry, service sector,<br />
socio-culture etc. creates a civilized society. Women contribute<br />
directly or indirectly for economic development. Though the<br />
nature has given the genetic power of reproduction especially to<br />
the women, the socio-economic status of women is so poor and<br />
the incidence of poverty is more on woman only. Empowering<br />
women is the only solution for all questions. Her potential<br />
hidden power is to be utilized for which, her status in the society<br />
must be improved and economically she should be strengthened.<br />
The poverty is the main cause for her low bargaining power<br />
hence poverty should be removed. Empowering women and<br />
removal of poverty go hand in hand. Woman if is educated and<br />
empowered, her potential power can be utilized for the economic<br />
development. Mahatma Gandhiji says, ―You educate a man, you<br />
educate an individual. You educate a woman, you educate an<br />
entire family‖.<br />
The paper contains need, objectives, methodology of the<br />
study, Better and Bitter conditions of Women, Need for Women<br />
Empowerment, Women Empowerment of India, Government<br />
Schemes of Empowerment, Conclusion, etc<br />
Index Terms- Empowerment, Safeguarding, opportunity,<br />
development, potential<br />
T<br />
I. INTRODUCTION<br />
he discriminated and exploited of women is seen all over the<br />
world. The empowerment is an support to help women to<br />
accomplish equal opportunity with men or to reduce the gap<br />
between men and women. Women play a very strategic role in<br />
the development of society in particular and development of<br />
economy in general. Woman is the leader planner of the family,<br />
the first trainer; supplier of labour and by playing focal role in<br />
the development of different sectors like agriculture, industry,<br />
service, etc. and she contrbutes for the creation of a enlightened<br />
society. Women contribute directly or indirectly for economic<br />
development. Though the nature has given the genetic power of<br />
reproduction especially to the women, the socio-economic status<br />
of women is so poor and the incidence of poverty is more on<br />
woman only. Empowering women is the only solution for all<br />
questions. Her potential hidden power is to be utilized for which,<br />
her status in the society must be improved and economically she<br />
should be strengthened. The poverty is the main cause for her<br />
low bargaining power hence poverty should be removed.<br />
Empowering women and removal of poverty go hand in hand.<br />
Woman if is educated and empowered, her potential power can<br />
be utilized for the economic development. Mahatma Gandhiji<br />
says, ―You educate a man, you educate an individual. You<br />
educate a woman, you educate an entire family‖.<br />
Women make up 496 million (48 pecent) of the India‘s<br />
population, comprise 127 million workers with 26 percent of<br />
work participation rate (31percent discriminated and exploited.<br />
India is not exception for this (as per 2001 census). The intensity<br />
of exploitation and subjugation varies from society to society.<br />
But there is no such a society which has eliminated the<br />
exploitation and subjugation. The patriarchal system has<br />
confined the women to specific areas such as kitchen and the bed<br />
room and fixed gender roles like bearing and rearing children,<br />
cooking and cleaning. Even today a woman is viewed as<br />
‗property‘ and not a human being who has her own likes and<br />
dislikes. Opportunities for self development are denied to them.<br />
Need and Importance of the Study:<br />
Women play an important role in all the fields of<br />
development. Socially economically if she is strengthened then<br />
she will create wonders. Women contribute directly and<br />
indirectly for the economic development. Though the nature has<br />
given the genetic power of reproduction especially to the women,<br />
the socio-economic status of women is so poor and the incidence<br />
of poverty is more on woman only. Empowering women is the<br />
only solution for all questions. Hence it is essential to study the<br />
past and present position of women and suggest measures for<br />
their upliftment.<br />
II. OBJECTIVES OF THE STUDY<br />
The study has following objectives,<br />
1. To study the scenario of status of women and efforts<br />
made in past and present,<br />
2. To study the necessity of empowerment of women and<br />
3. To know the available schemes for women<br />
empowerment in India.<br />
III. METHODOLOGY:<br />
For the preparation of this paper secondary data is used.<br />
BETTER AND BITTER CONDITION OF WOMEN:<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 448<br />
ISSN 2250-3153<br />
Women in Ancient India<br />
The status of women is changing from time to time. The<br />
history of women in India has been exciting. Over the past few<br />
millennia, the status of women in India has been subject to many<br />
changes. Women enjoyed equal status with men in all fields of<br />
life in ancient days of India. Works by ancient Indian<br />
grammarians such as Patanjali and Katyayana point out that,<br />
women were educated in the early Vedic period. The Rigvedic<br />
verses tell that, the women married at a mature age and were free<br />
to select their life partner. Rig Veda and Upanishads, the holy<br />
books mention that, There were many women sages and seers,<br />
like Gari and Maitreyi. Stri. Dharma Paddhati, the text of<br />
Tryambakayajvan reflects the role of women and tells that,<br />
‗women were enjoined to be of service to their husbands‘. In<br />
some kingdoms of ancient India, tradition like Nagar Vadhu i.e<br />
bride of the city was practiced. Amrapali was the famous Nagar<br />
Vadhu. Women were competing to win the popular title of the<br />
‗Nagar Vadhu‘.<br />
During the early Vedic Period women enjoyed equal<br />
position and rights. Later around 500 B.C the position of women<br />
started to decline with the Manusmiti and with the Mughal<br />
invasion of Babur and the Mughal empire and later Christianity<br />
cut the freedom and rights of women. Even though penitentiary<br />
movements like Jainism allowed women to be admitted to the<br />
religious order by and large, the women in India faced captivity<br />
and restrictions. Around sixth century, the practice of child<br />
marriages started.<br />
Medieval Period<br />
During the medieval period, the position of Indian woman<br />
in the society further deteriorated. Among some communities in<br />
India, practice of Sati, Child Marriages and a ban on remarriages<br />
of widows became part of social life. The Muslim conquest<br />
brought the purdah practice in the Indian society. The Jauhar was<br />
practiced among the Rajputs of Rajasthan. The practices of<br />
temple women (Devadasi) was in practice and were sexually<br />
exploited in some parts of India. Among Hindu Kshatriya rulers<br />
polygamy was widely practiced. Women were restricted to<br />
Zenana areas in many Muslim families.<br />
During and after British rule the condition of women is not<br />
very good. The women are not viewed with equal status. In India,<br />
woman herself doesn‘t feel equal and many times she ill treats<br />
herself.<br />
IV. NEED FOR WOMEN EMPOWERMENT<br />
The empowerment is an aid to help women to achieve<br />
equality with men or, at least, to reduce gender gap considerably.<br />
Without empowerment certain social roles cannot be performed.<br />
Women play a distinct role in the economic development. She is<br />
the chief architect of family, the first teacher; supplier of labour<br />
power and by playing main role in the development of<br />
agriculture, industry, service sector, socio-culture etc. creates a<br />
civilized society. In the visible and invisible form women<br />
contribute for economic development. The nature has given the<br />
biological power of reproduction especially to the women. She<br />
can create social, cultural and economic wonders. Even then the<br />
socio-economic status of women is so poor. Often the women are<br />
victimized in the cases like rape, dowry harassments, sexual<br />
harassments, kidnapping, female infanticides and sex selective<br />
abortions, domestic violence, trafficking, etc. The verdicts of<br />
many of such cases go against women because of the nonavailability<br />
of witness, discontinuation of suits, difficulty of<br />
proving the incidents etc. Hence she should be strengthened and<br />
her status should be improved; she should be physically,<br />
mentally, economically, socially, politically and culturally<br />
strengthened so that the country can make use of hidden potential<br />
power for the economic development. Therefore empower the<br />
women.<br />
V. WOMEN EMPOWERMENT IN INDIA<br />
It is the man who has to take initiative for women<br />
empowerment. The efforts for the upliftment of conditions of<br />
Indian women have been noticed before and after British rule in<br />
India.<br />
During British Rule<br />
In the 19th century European scholars observed that, the<br />
Hindu women are naturally innocent, faithful and more virtuous<br />
than other women. During the British Rule, many reformers like<br />
Rajaram Mohan Roy, Ishwar Chandra Vidyasagar, Jyotirao<br />
Phule, etc. struggled for the upliftment of the conditions of<br />
women in India. The first free school for girls (Kalikrishna Girls'<br />
High School) in Barasat (Calcutta) was started by Peary Charan<br />
Sarkar, (student of Hindu College, Calcutta and a member of<br />
Young Bengal) in 1847. missionaries' wives like Martha Mault<br />
née Mead and her daughter Eliza Caldwell née Mault pioneered<br />
the education and training of girls in south India<br />
In 1829, the efforts of Raja Rammohan Roy resulted in the<br />
abolition of the practice of ‗Sati‘ under Governor- General<br />
William Bentinck. The Widow Remarriage Act of 1856 was the<br />
result of Ishwar Chandra Vidyasagar's movement for the<br />
improvement in conditions of widows. The efforts of women<br />
reformer, Pandita Ramabai also helped for upliftment of<br />
conditions of women in India. The Indian National Congress<br />
supported the first women's delegation which met the Secretary<br />
of State to demand women's political rights in 1917. In 1927, The<br />
All India Women's Education Conference was held at Pune. The<br />
efforts of Mahhommad Ali Jinna, resulted in passing of Child<br />
Marriage Restraint Act in 1929. Mahatma Gandhi called upon<br />
the young men to marry the child widows and urged people to<br />
boycott child marriages.<br />
Independent India<br />
After independence India is free to take new and innovative<br />
steps for women empowerment. The Indian Constitution<br />
guarantees about, women equality, no discrimination, equality of<br />
opportunity, equal pay for equal work for all Indian women and<br />
it allows the State to make special provisions in favour of women<br />
and children, renounces practices insulting to the dignity of<br />
women and for provisions for securing just and humanitarian<br />
conditions of work and for maternity relief. The cases of<br />
trafficking of young girls and women have been reported. These<br />
women are either forced into prostitution, domestic work or child<br />
labour to prevent this, the Immoral Traffic (Prevention) Act was<br />
passed in 1956. In 1961, the Government of India passed the<br />
Dowry Prohibition Act and the Dowry Prohibition (maintenance<br />
of lists of presents to the bride and bridegroom) rules were<br />
framed in 1985. In India all the medical tests that can be used to<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 449<br />
ISSN 2250-3153<br />
decide the sex of the child have been banned. Female infanticide<br />
is still prevails in some areas. In India the abuse of the dowry<br />
tradition has been one of the major reasons for sex-selective<br />
abortions and female infanticides. During late 1970s the feminist<br />
activism got momentum and the protest due to the issue of rape<br />
of young girl Mathura in police station by a policeman compelled<br />
the government to amend the Evidence Act, the Criminal<br />
Procedure Code and the Indian Penal Code and introduce the<br />
category of custodial rape. Female activists amalgamated the<br />
issues of female infanticide, gender bias, women health, and<br />
female literacy. The Government of India passed the Muslim<br />
Women's (Protection of Rights Upon Divorce) Act, on the base<br />
of Supreme Court Judjment in 1986. Women-oriented NGOs<br />
were formed with the help of grants from foreign donors in<br />
1990s. Self Help Groups, Self Employed Women‘s Association<br />
(SEWA), etc. played a key role in protecting women's rights by<br />
which many women have emerged as leaders of local movements<br />
in India. In 1997, the Supreme Court of India in important<br />
judgment took a strong stand against sexual harassment of<br />
women in the workplace and the Court laid down guidelines for<br />
the prevention and redressal of grievances. Subsequently the<br />
National Commission for Women elaborated these guidelines<br />
into a Code of Conduct for employers.<br />
In 2001, the Government of India declared the year 2001 as<br />
the Year of Women's Empowerment (Swashakti) and the<br />
National Policy for the Empowerment of Women was passed. In<br />
2005, the Hindu law of inheritance has been amended and now<br />
the women have been provided the same status as that of men<br />
have i.e right of having share in ancestral property. In 2006, the<br />
rape case of Imrana was highlighted, the announcement of some<br />
Muslim religious leader that, ‗Imrana should marry her father-inlaw‘<br />
(the rapist) caused widespread protests and resulted in<br />
conviction verdict for 10 years imprisonment which was<br />
welcomed by many women's groups and the All India Muslim<br />
Personal Law Board. On 26 th October, 2006, the Protection of<br />
Women from Domestic Violence Act, 2005 has come into force.<br />
Rajyasabha passed Women's Reservation Bill, ensuring 33<br />
percent reservation to women in Parliament and State Legislative<br />
bodies on 9 th March, 2010. According to the 73rd and 74th<br />
Constitutional Amendment Acts, all local elected bodies reserve<br />
one-third of their seats for women. Even though the percentages<br />
of women in various levels of political activity have risen<br />
considerably, women are still under-represented in governance<br />
and decision making positions.<br />
VI. GOVERNMENT SCHEMES FOR WOMEN<br />
EMPOWERMENT<br />
The government of India has been trying to empower the<br />
women through various schemes some of schemes related to<br />
women empowerment in India are-<br />
Creches/ Day Care Centres for the children of working and<br />
Ailing mothers.Swayamsidh, Swa-Shakti Project, Support to<br />
Training and Employment Programme for Women (STEP),<br />
Swawalamban, Hostels for working women, Swadhar, Rashtriya<br />
Mahila Kosh (RMK), Self Help Groups (SHGs) etc.<br />
VII. CONCLUSION:<br />
The women play a strategic role in the society and in the<br />
economy. The status of women in India is not even in all the<br />
times. In ancient period they enjoyed equal status with men, in<br />
the medieval period, the position of Indian women deteriorated.<br />
During British rule and after independence many efforts are<br />
being made for improving the status of women in India. The<br />
government of India, by passing timely and essential Acts and<br />
implementing rules and regulations trying to empower and<br />
strengthen the women. No doubt the government of India has<br />
many weapons to fight for women empowerment, the prompt and<br />
strict implementation is quite essential. Unless the Acts, Policies,<br />
Rules, Regulations, etc, are strictly implemented the idea of<br />
women empowerment remains unachieved. Hence the efforts of<br />
the government are still inadequate and the process of<br />
empowering women in India is long way to go.<br />
REFERENCES<br />
[1] Neera Desai & Mathreyi Krishnaraj: ―Women & Society in India‖ (1990) -<br />
Ajanta book International, Delhi.<br />
[2] Neera Desai & Usha Thakkar: ―Women in Indian Society‖ (2001) - NBT,<br />
New Delhi.<br />
[3] C. N. Shankar Rao (2005) –― Indian Society Structure and Change‖, Jai<br />
Bharath Prakashana, Manglore. Ref.1.pp.161<br />
[4] Ruddar Dutt & K.P.M. Sundaram: Indian Economy‖ (2006) - S Chand&<br />
Company Ltd. 7361, Ram Nagar, New Delhi-55.<br />
[5] H. R. Krishnamurthy: ―Economic Development ion India‖ (2006) - Sapna<br />
Book House, Bangalore.<br />
[6] Web pages.<br />
AUTHORS<br />
First Author –Dr.Ravi N.Kadam, Associate Professor, Dept. of<br />
Economics, Kuvempu University, Shimoga, Karnataka,<br />
09480024629, e-mail:ravinkadam123@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 450<br />
ISSN 2250-3153<br />
Energy Efficient Multi Hop Clustering Protocol for<br />
Wireless Networks<br />
M.Shankar, G.JegaJothi, S. Karthigaiveni, M.Ganesan, L Dinesh<br />
Abstract- Bluetooth and wireless LAN communication models<br />
are used in mobile devices. Mobile devices are equipped with<br />
multi radio features for WLAN and Bluetooth communications.<br />
IEEE 802.11 standards are used for WLAN communication.<br />
Bluetooth supports bandwidth level of 2 Mbps with a range of 10<br />
meters. Wireless LAN communication requires high energy<br />
resources. Wireless LAN communication model is integrated<br />
with Bluetooth communication mechanism. Bluetooth Personal<br />
Area Network (PAN) is formed with one cluster head and a set of<br />
nodes. Low power Bluetooth is used to access WLAN resources.<br />
Cooperative networking (CONET) protocol is used to<br />
dynamically cluster the nodes. Node‘s bandwidth requirement,<br />
energy use, and application type details are used in cluster<br />
construction process. Clustering is performed independently of<br />
WLAN access points. CONET protocol reduces the energy<br />
consumption in WLAN. CONET protocol supports single hop<br />
clustering model. Limited coverage and constraint based WLAN<br />
access are the main problems in CONET protocol. CONET<br />
protocol is enhanced with multi hop clustering model. Max-Min<br />
D-Clustering algorithm is integrated with CONET protocol. Cost<br />
functions are optimized to multi hop clustering. Coverage<br />
maximization is achieved with Bluetooth.<br />
Index Terms- Polarization, Reflection guide map, Mask layers<br />
W<br />
I. INTRODUCTION<br />
ireless local area network (WLAN), or IEEE 802.11, has<br />
created a wave of popular interest because of its sufficient<br />
bandwidth and well-constructed infrastructures. However, a<br />
serious problem of WLAN is its considerable energy<br />
consumption, energy consumed by WLAN interfaces accounts<br />
for more than 50 percent of the total energy consumption in<br />
hand-held devices and up to 10 percent in laptops. Because<br />
mobile devices are usually driven by limited battery power, it is<br />
essential to devise novel solutions to reduce the power<br />
consumption due to the WLAN interface without degrading its<br />
performance.<br />
About 70 percent of smart phones in the market have a<br />
Bluetooth interface as a secondary radio for personal area<br />
networking [2]. The Bluetooth standard is primarily designed for<br />
low-power consumption, requiring only about a 10th of the<br />
WLAN power. However, because of its limited power, Bluetooth<br />
supports a low bandwidth of only 2 Mbps, with a short range of<br />
10 meters (class 2). In this work, we explore the idea of using<br />
this coexistence of high-power/high-bandwidth WLAN and lowpower/low-bandwidth<br />
Bluetooth in a single mobile platform to<br />
solve the power consumption problem in WLAN-based<br />
communication systems. Several previous works have exploited<br />
Bluetooth as a secondary radio to reduce the overall power<br />
consumption [1]. Bluetooth is mainly used to provide always a<br />
connected channel between mobile devices and the WLAN<br />
access point (AP). In On Demand Paging and Wake on Wireless,<br />
mobile devices and the AP exchange control messages, e.g.,<br />
wake-up messages, via low-power channels.1 this allows a<br />
mobile device to turn off the WLAN interface when it is not<br />
being used. CoolSpots and SwitchR use Bluetooth more actively<br />
to lengthen the power-off time of WLAN: Bluetooth is used not<br />
only for the wake-up channel, but also for data communication<br />
when applications demand low data rates. WLAN is powered up<br />
only when the data rate reaches the Bluetooth limit. However,<br />
these approaches usually assume that APs also have both WLAN<br />
and Bluetooth interfaces. This assumption guides the hardware<br />
and software modifications to our wireless infrastructures.<br />
Unlike these previous works, our approach is based on<br />
clustering. Clustering is commonly used in sensor networks for<br />
network scalability, load balancing [8], data aggregation [7], or<br />
energy efficiency. In our work, clustering makes nodes that share<br />
their WLAN interfaces with each other. Depicts the concept of<br />
our approach and compares it to the previous approaches. A<br />
cluster is a Bluetooth Personal Area Network (PAN) that consists<br />
of one cluster head (CH) and several regular nodes (RNs). CHs<br />
are responsible for coordination among the nodes within their<br />
clusters and the forwarding of packets from the PANs (clusters)<br />
to the WLAN, and vice-versa. CHs keep their WLAN interfaces<br />
on to provide links to the WLAN AP, allowing RNs to use only<br />
Bluetooth and turn their WLAN interfaces off in order to save<br />
energy. Clustering is periodically performed in a distributed<br />
manner based on the energy uses and bandwidth requirements of<br />
the nodes.<br />
In this work, clustering is performed independently of<br />
WLAN APs. Therefore, our approach does not require<br />
modifications to existing infrastructures, while the previous<br />
approaches require specialized APs with dual radios. Moreover,<br />
we solved the scalability problem of the previous works. Because<br />
of the large difference between the communication ranges of<br />
WLAN and Bluetooth, only a few devices close to the dual AP<br />
can use the low-power radio. In our case, on the other hand, since<br />
clusters can be created anywhere, most devices can obtain the<br />
benefit of energy saving.<br />
One unique requirement which distinguishes our approach<br />
from the traditional clustering problem in sensor networks is that,<br />
unlike sensor nodes which are left unattended after deployment,<br />
mobile devices are arbitrarily controlled by their users. This<br />
necessitates the consideration of node mobility as well as a large<br />
variance of bandwidth requirements of various applications.<br />
Moreover, because all devices have equal significance, rotating<br />
the CH role among all devices is necessary to distribute energy<br />
consumption. Mobile devices also can be turned off at any time<br />
and powered again depending on the users‘ needs, which<br />
necessitates the consideration of unexpected link failures.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 451<br />
ISSN 2250-3153<br />
This paper presents a distributed clustering protocol,<br />
Cooperative Networking protocol (CONET). CONET has four<br />
main objectives:<br />
1. Improving the energy efficiency of wireless networks<br />
by exploiting a secondary radio,<br />
2. Dynamically configuring clusters to meet the bandwidth<br />
requirements of all nodes,<br />
3. Producing well-distributed cluster heads, and<br />
4. Minimizing control overhead.<br />
CONET dynamically clusters the network according to each<br />
node‘s bandwidth, energy, and application type. We have<br />
implemented the CONET prototype using wearable computers to<br />
evaluate its performance on real hardware systems. We also<br />
simulate CONET for large networks of more than 100 mobile<br />
nodes and evaluate the performance. Both results demonstrate<br />
that CONET is effective in reducing the power consumption of<br />
WLAN-based communication systems.<br />
II. RELATED WORK<br />
Many previous studies have investigated techniques that<br />
reduce the energy consumption due to WLAN interfaces in<br />
single radio mobile devices. They optimize the power<br />
consumption at various layers, such as the application layer,<br />
transport/network layer [9] and MAC layer [5]. The IEEE 802.11<br />
standards also define several low-power modes, such as PSM in<br />
the legacy 802.11 and Automatic Power Save Delivery (APSD)<br />
in 802.11e. They allow nodes to keep their WLAN cards in the<br />
sleep state when they do not have to communicate and switch to<br />
active state periodically (PSM) or at application-specific instants<br />
of time APSD to retrieve data buffered in the access point.<br />
Although the majority of the WLAN interface‘s circuitry is<br />
turned off in the sleep state, the base power consumption for the<br />
minimal host card interaction and state transition is not<br />
negligible, which is typically 200-400 mW. On the other hand,<br />
CONET allows RNs to completely turn off their WLAN<br />
interfaces and use only Bluetooth. Moreover, since Bluetooth<br />
also supports low-power modes, such as sniff mode, which<br />
operate in similar manner to PSM but consume an order of<br />
magnitude less power than PSM, RNs can save more energy<br />
using Bluetooth low power modes. Of course, CHs can operate<br />
using PSM or APSD to communicate with the access point,<br />
resulting in lower average power consumption than PSM or<br />
APSD.<br />
Some advanced WLAN chipsets dramatically reduce the idle<br />
power consumption, but require cost and time for hardware<br />
upgrade or worldwide deployment. As a result, the majority of<br />
today‘s hand-held products still have power consumption<br />
problem due to the WLAN interface [4]. In contrast, CONET<br />
needs only a simple software patch at OS level, resulting fast<br />
deployment to existing mobile devices and infrastructures.<br />
As mobile devices increasingly feature multiple radios, the<br />
idea of using a secondary low-power radio to reduce the power<br />
consumption of the WLAN interface. In [3], a VoIP device<br />
exploits a secondary radio as a wake-up channel, but this incurs<br />
long latencies for activating the sleeping device. For general<br />
applications, several paging schemes have been proposed, but<br />
they also contain the latency problem to activate the WLAN<br />
channel. CoolSpots and SwitchR use the secondary radio not<br />
only for control signaling but also for data communication. They<br />
alleviate the latency problem and save more energy by<br />
lengthening the power-off time of WLAN interfaces. However,<br />
they require hardware/software modifications of existing LAN<br />
environment for deployment. Conceptually, CoolSpots and<br />
SwitchR can be special cases of CONET: if a dual AP exists, it<br />
can be regarded as a stationary node whose cost is always zero<br />
(lowest) thus always acts as a cluster head.<br />
III. PROBLEM STATEMENTS<br />
The mobile devices that we consider in this paper are popular<br />
user terminals, such as smart phones or wearable computers. For<br />
the rest of this paper, we simply refer to a mobile device as a<br />
node. We assume the following properties about the nodes and<br />
wireless networks:<br />
1. Each node has one WLAN interface (primary) and one<br />
Bluetooth interface (secondary).<br />
2. There is at least one WLAN access point in the field.<br />
Each node can communicate with the access point using<br />
its WLAN interface, regardless of its location and time.<br />
3. The WLAN access points do not have Bluetooth<br />
interfaces. This is typical for most existing wireless<br />
environments. Therefore, the previous approaches are<br />
inapplicable.<br />
4. Each node i knows the total bandwidth required, Need<br />
BWi, and the free bandwidth of its Bluetooth link, Free<br />
BWit.<br />
5. Each node i can measure its residual energy Eit.<br />
6. All Bluetooth interfaces have the same communication<br />
range.<br />
The final goal of our CONET is to reduce the power<br />
consumption in wireless networking applications. For this<br />
purpose, we first classify popular applications into two types:<br />
group networking and individual networking. Next, we propose a<br />
general clustering protocol that considers both application types.<br />
Our goal is to design a general clustering protocol that<br />
satisfies the requirements of the above application types. To<br />
accomplish this, we separate cost functions from the clustering<br />
algorithm and provide two cost functions for each of application<br />
type. Users can select proper cost functions for their applications.<br />
Depending on the selected cost function, a different set of nodes<br />
is selected as cluster heads to meet the user requirements. Also,<br />
the following requirements must be met:<br />
1. Clustering should be completely distributed. Each node<br />
independently makes its decisions based only on local<br />
information.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 452<br />
ISSN 2250-3153<br />
2. For each cluster Cj, the sum of bandwidth requirements<br />
of all regular nodes within the cluster must not exceed<br />
the maximum data rate of Bluetooth RB, i.e., RNK <br />
.NeedBWk(t) < AR B , where RNk is the regular node of<br />
ID k and NeedBWk(t) is the required bandwidth for<br />
node k at time t.<br />
3. At the end of the clustering process, each node should<br />
be either a cluster head or a regular node that belongs to<br />
exactly one cluster.<br />
4. Clustering should be efficient in terms of processing<br />
complexity and message exchange.<br />
IV. THE CONET PROTOCOL<br />
This section describes CONET in detail. First, we present the<br />
protocol design. Next, we define the parameters and cost<br />
functions.<br />
A. PROTOCOL OPERATION<br />
Fig. 2 shows the details of our protocol. Nodes exchange<br />
clustering messages via Bluetooth. For easy understanding, we<br />
describe our protocol based on the example a group networking<br />
scenario: nodes 1, 2, and 3 have a common collaborative task and<br />
attempt to maximize the group lifetime.<br />
A.1 CLUSTER HEAD ADVERTISEMENT<br />
When a node is newly booted up, it becomes a CH, as shown<br />
in the flow chart (Fig. 1). Assume that all three nodes of the<br />
example are booted up at the same time. Then, since all of them<br />
independently become CHs, three clusters are created. However,<br />
the only member of each cluster is the cluster head itself. Like<br />
these clusters, a cluster which has no RNs is called a trivial<br />
cluster, and the head of the trivial cluster is called a trivial cluster<br />
head (tCH). Therefore, tCHs do not need to use Bluetooth for<br />
packet forwarding, but only for advertising. Note that tCH is a<br />
subset of CH.<br />
When a node becomes a CH, it starts to advertise its resource<br />
information periodically via Bluetooth. It repeats advertising as<br />
long as it is a CH. The advertisement message of node i contains<br />
the clustering cost Ci, the amount of bandwidth available for<br />
packet forwarding FreeBWi, and some required information,<br />
such as the ID and the network address. Each node manages a set<br />
S , which stores the information advertised by neighboring<br />
CH<br />
i<br />
CHs.<br />
Because act as gateways that connect Bluetooth nodes (RNs)<br />
to the WLAN access point, FreeBWi of CH i should be the<br />
smaller value between Free BW w<br />
i and FreeBW B<br />
i , the amount of<br />
free bandwidth on Bluetooth and WLAN links, respectively. To<br />
estimate the free bandwidth on a wireless link, we can use wellstudied<br />
bandwidth estimation techniques [6].<br />
Fig. 1: Flow chart of CONET clustering protocol.<br />
For example, we can estimate the free bandwidth using the<br />
idle channel time. A channel is considered to be idle if the node<br />
is not sending or receiving data through the channel and a carrier<br />
or interference signal is not sensed on that channel. By<br />
monitoring the idle channel times of WLAN and Bluetooth<br />
i<br />
channels ( w<br />
i T and T B , respectively) during a period of time T,<br />
each node i can estimate its Free BW w<br />
i and FreeBW B<br />
i using a<br />
moving average with weight 2 =0, 1 as follows:<br />
Free BW w<br />
i = Free BW w T<br />
i + (1- )<br />
T<br />
I W<br />
R W - R mar , (1)<br />
Free BW w<br />
i = Free BW w T<br />
i + (1- )<br />
T<br />
I B<br />
R B - R mar, R, (2)<br />
Where R W and R B are the transmission rates of WLAN<br />
and Bluetooth, respectively. R mar is a predefined constant used to<br />
maintain the free bandwidths to be slightly lower than the<br />
bandwidth actually available. It is necessary to switch between<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 453<br />
ISSN 2250-3153<br />
radio interfaces dynamically based on the current data rate. Later,<br />
in this section, we explain the details of interface switching. Our<br />
current design assumes that R W is a predefined constant, but the<br />
IEEE 802.11 standard provides multiple transmission rates<br />
depending on Signalto Noise Ratio (SNR). We plan to improve<br />
CONET to support multiple rates in our future research.<br />
Although only CHs advertise their resources, RNs also<br />
measure free bandwidth for cluster head election (discussed<br />
later). However, because RNs use only Bluetooth, their<br />
FreeBW W values are always zero, and thus, meaningless.<br />
Therefore, the free bandwidth of RNs should be set to FreeBW B .<br />
In summary, the free bandwidth of node i, FreeBWi, can be<br />
obtained as follows:<br />
<br />
W<br />
B<br />
Min(<br />
Free BWi<br />
, FreeBWi<br />
),<br />
<br />
<br />
, (3)<br />
if node i is a CH<br />
<br />
<br />
B<br />
FreeBWi<br />
, otherwise.<br />
<br />
FreeBw i<br />
Note that CONET does not limit the bandwidth estimation<br />
technique. It can also operate with other techniques with minor<br />
modifications.<br />
A.2 RESPONDING TO JOINT REQUESTS<br />
In stage (B) of Fig. 1, each CH waits for JOIN requests from<br />
other nodes for a short time. The JOIN message of node i<br />
includes the amount of required bandwidth NeedBWi. Upon<br />
receiving a JOIN message, the CH goes to stage (C) and<br />
compares its FreeBW with the sender‘s NeedBW. If the CH has a<br />
sufficient amount of free bandwidth for the sender, it will accept<br />
the request, but, otherwise, reject it. After responding to the<br />
request, the CH returns to the initial stage. The sentence,<br />
―Become a CH,‖ in stage (A) means ―keep the CH role‖ for the<br />
nodes that are already CHs. At the initial moment, because no<br />
node has sent a JOIN message yet, all the nodes go down to stage<br />
(D).<br />
A.3 CLUSTER HEAD ELECTION<br />
When there is no JOIN request, the CH counts the number of<br />
RNs within its clusters (stage (D) in Fig. 1). If there is at least<br />
one RN in the cluster, the CH returns to the first step and keeps<br />
its current role. This allows RNs to select their next CHs by<br />
themselves, which is necessary for network stability: If CHs stop<br />
their roles of packet forwarding regardless of the associated RNs,<br />
the RNs will occasionally lose their links to the WLAN access<br />
point. Furthermore, clusters will be reformed quite frequently if<br />
CHs ignore the status of each RN, such as the first association<br />
time. The chance for energy saving is given to trivial CHs<br />
(tCHs), which turned out to have no RNs within their clusters at<br />
the end of stage (D). A tCH selects its next CH by itself. In stage<br />
(E), each tCH calls the FIND_NEXT_CH procedure, which<br />
presents the CH election process of CONET. Assume that node i<br />
calls FIND_NEXT_CH. It then executes the following<br />
procedure:<br />
FIND_NEXT_CH:<br />
1) Prune the node which has insufficient bandwidth. Let<br />
Si C H and Si CH be the original and pruned<br />
neighboring CH set of node I, For each node K Si CH<br />
,if MIN (Free BWi ,Free BWK) > Need BWi, then copy<br />
K into S i CH<br />
2) Find i‘s next CH candidate which has the lowest cost<br />
among I and all nodes in Si CH<br />
3) Return the Selected node.<br />
Even though all nodes estimate FreeBW using (3), the<br />
estimation results of two neighboring nodes could be different<br />
due to the limited radio range. For example, let us assume that<br />
there is a hidden flow on the left side of node 1, which is in node<br />
1‘s radio range, but out of nodes 2‘s radio range. In this case,<br />
FreeBW1 will be estimated to be smaller than FreeBW2 because<br />
the flow only interferes the idle channel time of node 1.<br />
Therefore, the maximum bandwidth between nodes 1 and 2 is<br />
bounded by the smaller value FreeBW 1 . This indicates that the<br />
free bandwidth on the link between nodes i and k should be the<br />
minimum value between FreeBWi and FreeBWk, i.e.,<br />
MIN(FreeBWi ,FreeBWk) because there is no hidden flow and all<br />
nodes have equal available bandwidths of 2 Mbps, neither node 2<br />
nor 3 is pruned when node 1 calls the FIND_ NEXT_CH<br />
procedure. Therefore, node 1‘s pruned<br />
CH<br />
S1 setCHSet CH<br />
S1 Next, node 1 selects the lowest cost node among the nodes in<br />
CH<br />
S 1 and itself. For simple explanation, let us assume that the<br />
cost of each node i, Ci, is simply the reciprocal of its residual<br />
energy Ei, i.e., C i =1/Ei. The purpose of this cost function is to<br />
select the node with the highest residual energy as the CH for<br />
other low-energy nodes. Because node 1 has the lowest cost in<br />
the case, it returns to stage (A) and repeats the above processes.<br />
Similarly, nodes 2 and 3 elect node 1 as their CH and send JOIN<br />
messages to it. As their requests are accepted by node 1, they go<br />
to stage (F) and become the RNs of node 1. Finally, nodes 1, 2,<br />
and 3 are clustered together.<br />
B. APPLICATION TYPES AND COST FUNCTIONS<br />
In this section, we present two cost functions designed for<br />
group networking and individual networking.<br />
B.1 GROUP NETWORKING<br />
The main objective of group networking is to prolong the<br />
group lifetime. In sensor networks, one popular cost function<br />
used to maximize the network lifetime is primarily based on the<br />
residual energy of each node, e.g., (maximum energy)/(residual<br />
energy). This cost function distributes energy dissipation over the<br />
network particularly well when the power consumption rates are<br />
equal for all nodes. In CONET, however, a variety of nodes types<br />
made by different venders are clustered together, breaking the<br />
homogeneity of the power consumption rate. Therefore, our cost<br />
function for the group networking case is based on each node‘s<br />
estimated lifetime, the estimated time for a node to survive in the<br />
www.ijsrp.org<br />
.
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 454<br />
ISSN 2250-3153<br />
future. We define the cost of being a CH for node i at time t, Cit,<br />
as follows:<br />
Ci(t) =<br />
1<br />
( t)<br />
L i<br />
……………(4)<br />
Where i t L~ is node i‘s estimated lifetime. We assume that each<br />
node i knows its current power consumption Pi(t) and residual<br />
energy Ei(t). Then, the lifetime estimation is based on the moving<br />
average of the current and past power usage.<br />
B.2 INDIVIDUAL NETWORKING<br />
For individual networking, energy saving should be as equal<br />
as possible to all cooperating nodes. This motivates us to use the<br />
energy saving ratio (ESR) as the cost for individual networking.<br />
Our goal is to equalize ESR among all cooperating nodes.<br />
Consider node i, which was booted up at t = 0 and has cooperated<br />
with others using CONET for [0, t] t >0. The role (CH or RN) of<br />
the node and cluster organization may have changed with time,<br />
depending on its resource usage. Using the cumulative amount of<br />
energy consumption, the energy saving ratio of node i at time t,<br />
ESRi(t), can be defined as follows:<br />
where Pit represents the future power consumption<br />
estimated at time t. Once Pit has been estimated, the node can<br />
calculate its Lit as follows:<br />
tr co<br />
co<br />
ESRi (t) =<br />
Ei<br />
( t)<br />
Ei<br />
( t)<br />
Ei<br />
( t)<br />
1<br />
,<br />
tr<br />
tr<br />
E ( t)<br />
E ( t)<br />
i<br />
Where E (t)<br />
tr<br />
i represents the expected energy that would<br />
be consumed if node i had communicated in the traditional<br />
WLAN-only manner (i.e., without CONET) during I =0; t<br />
E co<br />
(t)<br />
i represents the energy actually consumed by the node<br />
when it has used CONET. Therefore, E (t)<br />
co<br />
i mainly depends<br />
on the history of the node‘s current and past roles: when the node<br />
is an RN, E (t)<br />
co<br />
i will increase more slowly than E (t)<br />
tr<br />
i<br />
because RNs use only Bluetooth, resulting in an increase in<br />
ESRit. Otherwise, when the node is a CH, E (t)<br />
co<br />
i will increase<br />
as fast as (or slightly faster than) E (t)<br />
tr<br />
i thus, ESRit will<br />
decrease. According to (5), high ESR means that by cooperating<br />
with others, the node could save more energy than the others.<br />
Therefore, every time nodes rotate their roles, CONET selects<br />
high-ESR nodes as the next CHs, allowing low-ESR nodes to<br />
become RNs for energy saving. We define the cost of being a CH<br />
for node i at time t, Cit, as follows:<br />
Ci (t) = 1- ESRi (t) =<br />
co<br />
Ei<br />
( t)<br />
~ tr<br />
E ( t)<br />
With appropriate role switching periods, our protocol<br />
equalizes ESR among nodes.<br />
i<br />
i<br />
(5)<br />
(6)<br />
V. CONET PROTOCOL WITH MULTI HOP<br />
CLUSTERING MODEL<br />
CONET protocol is enhanced with multi hop clustering<br />
model. Max-Min D-Clustering algorithm is integrated with<br />
CONET protocol. Cost functions are optimized to multi hop<br />
clustering. Coverage maximization is achieved with Bluetooth.<br />
The system is designed to improve data communication under<br />
the wireless LAN environment with energy management. The<br />
private area networks are formed to manage data transmission<br />
using Bluetooth. The clustering techniques are used for the PAN<br />
construction process. The system is divided into five modules.<br />
They are Network analysis, Single hop clustering, Multi hop<br />
clustering, PAN management and Data communication.<br />
The network analysis module is designed to discover the<br />
nodes and their neighbors. The node grouping is performed under<br />
the single hop clustering process. Multi hop clustering module is<br />
designed to cluster the nodes with multi hop model. PAN<br />
construction module is designed to group up the bluetooth nodes.<br />
Data communication module handles the communication<br />
between the wireless nodes.<br />
A. NETWORK ANALYSIS<br />
The network analysis is performed to detect the node and<br />
network status. The WLAN nodes are connected through the<br />
access points. Nodes and their neighborhood nodes are identified<br />
in the network analysis. Nodes radio and energy details are<br />
collected in the network analysis.<br />
B. SINGLE HOP CLUSTERING<br />
Clustering process is carried out to manage energy and<br />
network load. CONET protocol is used for the clustering process.<br />
The bandwidth requirements are managed by the clusters. The<br />
clusters are configured dynamically.<br />
C. MULTI HOP CLUSTERING<br />
Max-Min D-Clustering algorithm is used for the multi hop<br />
clustering process. The CONET protocol is enhanced to support<br />
multi hop clustering process. The PAN construction is also tuned<br />
for multi hop clustering environment. Cluster head selection is<br />
optimized for multi hop clustering model.<br />
D. PAN MANAGEMENT<br />
The private area network is constructed with Bluetooth<br />
enabled nodes. Cluster head (CH) manages the nodes under<br />
PAN. Regular nodes (RN) communicate with cluster head (CH).<br />
Cluster head is connected with wireless LAN access points.<br />
E. DATA COMMUNICATION<br />
Data communication is done with WLAN and Bluetooth<br />
protocols. Secondary radio based communication is used to<br />
achieve energy efficiency. Cluster head manages the data<br />
transmission within its area. Cluster level transmissions are done<br />
through PAN nodes.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 455<br />
ISSN 2250-3153<br />
VI. SCREENSHOTS<br />
VII. CONCLUSION<br />
Wireless communication standards are used in Wireless<br />
Local Area Networks (WLAN). Clustering techniques are used<br />
to group up the mobile devices with Bluetooth communication.<br />
Cluster head manages the communication between the WLAN<br />
and bluetooth environment. CONET is a bandwidth aware and<br />
energy-efficient clustering protocol for multiracial mobile<br />
networks. CONET uses Bluetooth to reduce the power<br />
consumption of WLAN in mobile devices. It dynamically<br />
reconfigures the clusters based on the bandwidth requirements of<br />
applications to avoid the performance degradation. We have<br />
classified the applications into two cases: group networking and<br />
individual networking.<br />
Multi hop clustering scheme is used to handle data<br />
communication process. The system supports high frequency and<br />
low frequency environment. Multi hop is constructed. Cluster<br />
head manages the data transmission process. The system reduces<br />
the energy consumption.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 456<br />
ISSN 2250-3153<br />
REFERENCES<br />
[1] Jong-Woon Yoo and Kyu Ho Park, ―A Cooperative Clustering Protocol for<br />
Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces‖,<br />
IEEE Transactions On Mobile Computing, Vol. 10, No. 5, April 2011.<br />
[2] GSMArea,http://www.gsmarena.com/search.php3, Dec. 2009.<br />
[3] Y. Agarwal, R. Chandra, A. Wolman, P. Bahl, K. Chin, and R. Gupta,<br />
―Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi<br />
Smartphones,‖ Proc. ACM MobiSys, pp. 179-191, 2007.<br />
[4] N. Banerjee, S. Agarwal, P. Bahl, R. Chandra, A. Wolman, and M. Corner,<br />
―Virtual Compass: Relative Positioning to Sense Mobile Social<br />
Interactions,‖ Microsoft Technical Report MSR-TR-2010-5, Jan. 2010.<br />
[5] Y. He and R. Yuan, ―A Novel Scheduled Power Saving Mechanism for<br />
802.11 Wireless LANs,‖ IEEE Trans. Mobile Computing, vol. 8, no. 10, pp.<br />
1368-1383, Oct. 2009.<br />
[6] Y. Yang and R. Kravets, ―Contention-Aware Admission Control for Ad<br />
Hoc Networks,‖ IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377,<br />
July/Aug. 2005.<br />
[7] Y. Wu, X.-Y. Li, Y. Liu, and W. Lou, ―Energy-Efficient Wake-Up<br />
Scheduling for Data Collection and Aggregation,‖ IEEE Trans. Parallel and<br />
Distributed Systems, vol. 21, no. 2, pp. 275-287, Feb. 2010.<br />
[8] M. Cheng, X. Gong, and L. Cai, ―Joint Routing and Link Rate Allocation<br />
under Bandwidth and Energy Constraints in Sensor Networks,‖ IEEE Trans.<br />
Wireless Comm., vol. 8, no. 7, pp. 3770-3779, July 2009.<br />
[9] X.-Y. Li, Y. Wang, H. Chen, X. Chu, Y. Wu, and Y. Qi, ―Reliable and<br />
Energy-Efficient Routing for Static Wireless Ad Hoc Networks with<br />
Unreliable Links,‖ IEEE Trans. Parallel and Distributed Systems, vol. 20,<br />
no. 10, pp. 1408-1421, Oct. 2009.<br />
AUTHORS<br />
First Author – M. Shankar, M.E (Software Engineering),<br />
Department of Information Technology, Periyar Maniammai<br />
University, Thanjavur, India.<br />
Second Author – Dr. G. Jegajothi, Head of the Department,<br />
Department of Information Technology, Periyar Maniammai<br />
University, Thanjavur, India.<br />
Third Author – S. Karthigaiveni, Assistant Professor,<br />
Department of Information Technology, Periyar Maniammai<br />
University, Thanjavur, India<br />
Fourth Author – M. Ganesan, M.E (Computer Science and<br />
Engineering), Department of Computer Science and Engineering,<br />
Karpagam University, Coimbatore, India.<br />
Fifth Author – L. Dinesh, M.E (Software Engineering),<br />
Department of Information Technology, Periyar Maniammai<br />
University, Thanjavur, India. Emai: l_dinuma@yahoo.co.in<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 457<br />
ISSN 2250-3153<br />
Migration of Mobicents SIP Servlets on Cloud Platform<br />
Mr. Manish Giri, Sachin Waghmare, Balaji Bandhu, Akshay Sawwashere, Atul Khaire<br />
Department of Computer Engineering, Maharashtra Academy of Engineering, Alandi, Pune, India<br />
Abstract- Mobicents Sip Servlets helps the users to create,<br />
deploy, and manage services and applications that integrate<br />
voice, video and data in real time over IP networks. These<br />
applications require high resources to run. Mobicents Sip<br />
Servlets has not offered a cloud support yet. Running Mobicents<br />
Sip Servlets in a cloud would allow the users to adapt the<br />
resources used by Mobicents Sip Servlets to the real time load of<br />
the applications. We have proposed a solution to migrate<br />
Mobicents Sip Servlets on a cloud platform. Our solution<br />
provides a set of cloud images that support the Mobicents Sip<br />
Servlets platform. Besides, our solution provides an auto-scaling<br />
algorithm that automatically scales the number of instances of<br />
Mobicents Sip Servlets. It is now possible to deploy SIP<br />
applications in a cloud and the platform will adapt its resource<br />
according to the need.<br />
Index Terms- Cloud Computing, SIP servlet, JBOSS AS,<br />
Cloud images.<br />
M<br />
I. INTRODUCTION<br />
obicents Sip Servlets is an application server which runs<br />
on top of JBoss AS and which provides an Implementation<br />
of the SIP Servlet specification. The purpose of this platform is<br />
to help the users to create, deploy, and manage services and<br />
applications that integrate voice, video and data in real time over<br />
IP networks. Because of the large amount of data the applications<br />
must process, they require high resources to run. Most vendors<br />
of application servers now offer an Amazon image in order to<br />
use their products on a cloud. Indeed, a cloud can provide the<br />
high resources needed by the applications since it is easy to add<br />
or remove some resource allocated to the application in a cloud.<br />
Mobicents Sip Servlets has not offered a cloud support yet. In<br />
order to offer a cloud support, Mobicents Sip Servlets should<br />
offer cloud images that would contain the Mobicents Sip Servlets<br />
platform. Besides offering these images, another problem arises<br />
in cloud environment. This problem is how to scale the number<br />
of instances of these images according to the real time load. A<br />
cloud platform needs an entity which control the resources usage<br />
and which can allocate more or less resources depending on the<br />
load. This document will study the migration of Mobicents Sip<br />
Servlets on a cloud platform. We will provide cloud images that<br />
will contain the Mobicents Sip Servlets platform. Besides, we<br />
will propose a solution to scale up and down the resources used<br />
by the cloud.<br />
2. Cloud Architecture<br />
II. CLOUD<br />
Cloud computing is a client-server approach where the server<br />
is a network of nodes. The job of the server is distributed among<br />
several nodes that form a cloud. Some nodes can be dynamically<br />
added or removed at runtime to the cloud .Depending on the<br />
cloud, the client may either send its request to any node in the<br />
cloud, or it may send its request to a load balancer, which will act<br />
as an entry-point for the cloud and forward the request to a node.<br />
Where, a node is an instance of a virtual machine. Thus a node is<br />
also called an instance. The virtual machines are executed on a<br />
set of inter-connected physical machines. The set of physical<br />
machines is called a cluster. There are three types of cloud<br />
service models.<br />
2.1.1 IaaS<br />
If the user uses an IaaS, she is basically gaining a computer.<br />
The user has access to a virtual machine. She can decide which<br />
OS and software install on it. Then, she can use it as any server.<br />
An example of IaaS provider is Amazon Web Services.<br />
2.1.2 PaaS<br />
If the user uses a PaaS, she is gaining software or a<br />
framework. A PaaS is a hosted tool that the user can leverage to<br />
build something on. An example of PaaS is Google AppEngine.<br />
With AppEngine, the user can run her web apps on Google's<br />
infrastructure. AppEngine provides the hardware, the OS and the<br />
framework. All she has to provide is her application. Then, the<br />
clients can access her application.<br />
2.1.3SaaS<br />
If the user uses a SaaS, she is gaining business functionality.<br />
Basically, a SaaS is an software the user uses, but that is installed<br />
on a provider's hardware. For example, all web applications are<br />
SaaS. The user uses the software, but she has not had something<br />
to install.<br />
2.2 Cloud Properties<br />
Cloud has two main properties: pay per use and elasticity.<br />
2.2.1 Elasticity<br />
The user can scale resources usage up and down rapidly. In<br />
the IaaS cloud model, this means that it is possible to start new<br />
instances or stop existing instances rapidly. The newly created<br />
instances must be used by the cloud in order to decrease the load<br />
of the other instances.<br />
2.2.2 Pay per use<br />
The user only pays for the resources that she actually uses.<br />
The IaaS cloud providers usually charge an instance on an hourly<br />
basis.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 458<br />
ISSN 2250-3153<br />
III. MOBICENTS SIP SERVLETS<br />
Mobicents Sip Servlets is used to build real time system, such<br />
as VoIP software‘s. The user wants her application to be able to<br />
handle a large amount of traffic in a very short time. Mobicents<br />
is the most popular Open Source SIP Application Server for the<br />
Java platform. It facilitates the implementation of new services in<br />
a simple way and quickly enables the development of a Market<br />
oriented and cost effective Service Delivery Platform.<br />
IV. RELATED WORK<br />
4.1 Current situation<br />
Mobicents Sip Servlets is used to build real time systems,<br />
such as VoIP software‘s. The user wants her application to be<br />
able to handle a large amount of traffic in a very short time.<br />
Some applications may face a huge amount of traffic. Those<br />
applications will require a consequent computation power in<br />
order to process all this traffic. In order to ensure a quick<br />
response time, a single machine may not be able to handle all the<br />
traffic by itself. In this case, the application can be deployed on a<br />
cluster. A SIP load balancer receives the traffic from outside and<br />
distributes it to the nodes of the cluster. A more sophisticated<br />
configuration would contain several SIP load balancers. The<br />
JBoss AS cluster provides three properties: elasticity, high<br />
availability and failover. Since Mobicents Sip Servlets is built on<br />
top of JBoss, those properties are also ensured by the former.<br />
Those properties ensure that it is possible to add or remove nodes<br />
at runtime in the cluster. The new nodes are automatically added<br />
to the cluster and are responsible for processing a part of the<br />
traffic. If a node fails or is removed, the traffic that was handled<br />
by this node is redirected to the other nodes of the cluster.<br />
4.2 Problem in Current situation<br />
The problem that may occur is that the number of clients of<br />
the user's application may vary considerably in a short period of<br />
time. At some time in the day, there might be a lot of clients, and<br />
at some other time, there might be a few clients. As a result,<br />
some resources of the cluster in which the application is running<br />
may be unused, or on the contrary, the cluster may be overloaded<br />
by the amount of traffic it has to process. A first solution would<br />
be to add or remove nodes in the cluster depending of the needs.<br />
In order to do so, one would have to monitor the status of each<br />
node of the cluster. The monitoring process would then decide if<br />
some nodes need to be added or removed, and would do so.<br />
However, this solution has two drawbacks. First, it is hard to<br />
predict the amount of traffic the application will meet. As a<br />
consequence, it is also hard to predict the amount of resources<br />
that should be added to or removed from the cluster. Such a<br />
prediction would be useful, as it is needed to have those<br />
resources available in order to put them in the cluster. Secondly,<br />
the resources that are not currently used in the cluster are not<br />
costless. Indeed, the user needs to own those resources in order<br />
to be able to add them quickly in the cluster. In other words, the<br />
problem that a Mobicents Sip Servlets cluster is facing is the<br />
waste of unused resources (because they are reserved in case of<br />
higher load), or on the contrary, the overload of the cluster<br />
(because no other resource is available).<br />
V. PROPOSED SOLUTION<br />
5.1 Requirements<br />
The solution of the problem requires that we migrate,<br />
Mobicents Sip Servlets to a cloud platform. The goal for the user<br />
is to be able to access in some way to some cloud images and to<br />
use them. The user shall be able to start a set of images that will<br />
compose a Mobicents Sip Servlets platform. The user shall be<br />
able to use this platform as a Mobicents Sip Servlets cluster.<br />
Finally, to achieve a full usage of the resources, the user shall be<br />
able to adjust the number of instances allocated to the Mobicents<br />
Sip Servlet platform depending on the load of this platform.<br />
Thus, the cloud images are the building blocks of the solution.<br />
Once Mobicents Sip Servlets will run on a cloud, we will be able<br />
to solve the problem. We will have the resources we need in<br />
order to scale according to the load. Because of the pay per use<br />
property of the cloud, no resource will be wasted anymore.<br />
5.1.1 Scaling Mode<br />
There are two types of scaling modes provided.<br />
5.1.1.1 Manual-scaling<br />
The user is responsible of the scaling. The scaling is made<br />
consecutively to a manual action of the user. This requirement<br />
will be fully achieved if Mobicents Sip Servlet runs on a cloud,<br />
as the user will be able to start or stop some Mobicents Sip<br />
Servlets instances.<br />
5.1.1.2Auto-scaling<br />
The environment scales automatically depending of the<br />
load. This requires the development of a management solution.<br />
The management solution will especially need to define the<br />
factors whereby the scaling is made.<br />
5.2 Images<br />
In order to put Mobicents Sip Servlets in the clouds, we<br />
will define the role of the images that need to be provided. We<br />
will provide three images: a Mobicents Sip Servlets image, a<br />
Mobicents load balancer image and a management image.<br />
5.2.1 The Mobicents Sip Servlets image<br />
The Mobicents Sip Servlets image will contain an instance<br />
of Mobicents Sip Servlets running in clustering mode. The JBoss<br />
AS clustering mode will allow several instances of this image to<br />
work as a cluster. Besides, thanks to the elasticity provided by<br />
the JBoss AS clustering mode, new instances will be<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 459<br />
ISSN 2250-3153<br />
automatically detected by the cluster and added therein. Existing<br />
instances will also be allowed to leave the cluster. This image<br />
will also contain the applications of the user. Finally, this image<br />
will need to be monitored. The monitoring will provide<br />
measurements of the auto-scaling factors. Thus, this image will<br />
contain an agent, which will communicate with an instance of the<br />
management image.<br />
5.2.2 The Mobicents load balancer image<br />
Since the Mobicents Sip Servlets image will work as a JBoss<br />
AS cluster, a SIP load balancer is needed in order to route the<br />
traffic among the running instances of the Mobicents Sip Servlets<br />
image. Although it is possible to have multiple instances of the<br />
SIP load balancer running a distributable algorithm, we plan to<br />
initially have only one instance of the SIP load balancer. The<br />
Mobicents load balancer image will contain, as its name<br />
indicates, the SIP load balancer. The Mobicents Sip Servlets<br />
instances will need to know somehow the IP address of the<br />
Mobicents load balancer instance in order to register to the SIP<br />
load balancer.<br />
5.2.3 The Management image<br />
The management image is responsible for collecting<br />
measurements of the monitoring factors from the Mobicents Sip<br />
Servlets instances. According to those data, the management<br />
instance will be responsible for starting or stopping new<br />
instances of the Mobicents Sip Servlets image.<br />
5.3 Auto-scaling<br />
Auto-scaling is the fact that, depending of the states of all<br />
Mobicents Sip Servlets instances, some instances may be started<br />
or stopped. The goal to achieve is to have all the instances<br />
running to be in a state such as they are not idle, i.e. they are<br />
processing a substantial part of the traffic. Also, none of the<br />
instances running should be in state such as they are overloaded,<br />
i.e. they are not lacking some resources to process the traffic.<br />
Auto-scaling is a process that can be decomposed in three steps<br />
5.3.1 Monitoring<br />
It is the action of retrieving the state from an (Mobicents Sip<br />
Servlets) instance. This step is done by the agent.<br />
5.3.2 Deciding<br />
It is the ability to decide if an instance should be started or<br />
stopped. This step is done by the management system.<br />
5.3.3 Scaling<br />
It is the ability to start or stop instances. This step is done by<br />
the management system.<br />
We must also define the state of an Mobicents Sip Servlets<br />
instance. This state is defined by a set of metrics. Those metrics<br />
are the following:<br />
The uptime of the instance.<br />
The CPU load.<br />
The memory usage.<br />
The Java heap memory usage of the Java virtual<br />
machine, Mobicents Sip Servlets is running on.<br />
The number of active SIP sessions.<br />
The number of active SIP application sessions.<br />
We will define two thresholds: the minimum threshold and<br />
the maximum threshold. Each threshold will contain a value for<br />
each metric that is monitored. Periodically, the scalar will get the<br />
list of the instances of each environment it has to monitor from<br />
the Nginx (Engine-x) server. Auto Bench is a tool which gives<br />
the above parameters. It will then trigger the monitor method and<br />
get some values for each metric monitored for each instance. We<br />
will have the parameter MONITOR_INTERVAL, which allows<br />
the user to set the duration of the periods. Here three sets will be<br />
created: below, averages and above. The instances for which all<br />
the metrics are below the minim threshold are put in the bellow‘s<br />
set. The instances for which at least one of the metrics is above<br />
the maximum threshold are put in the above set. The others (for<br />
which the metrics are between the minimum and maximum<br />
thresholds) are put in the averages set. If there is not any instance<br />
in both the below and the above sets, the system is stable and no<br />
action is taken. If there are as many instances in the below as in<br />
the above set, the system is well distributed, and no action will be<br />
taken. If there are more instances in the below set than in the<br />
above set, one instance is stopped. On the other hand, if there are<br />
more instances in the above set than in the below set, one new<br />
instance is started.<br />
VI. IMPLEMENTATION DETAILS<br />
Below fig shows our proposed system for this project.<br />
6.1 Eucalyptus and NginX<br />
Eucalyptus enables the creation of on-premise private clouds,<br />
with no requirements for retooling the organization's existing IT<br />
infrastructure or need to introduce specialized hardware.<br />
Eucalyptus implements an IaaS (Infrastructure as a Service)<br />
private cloud that is accessible via an API compatible with<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 460<br />
ISSN 2250-3153<br />
Amazon EC2 and Amazon S3. We stored the virtual machine<br />
image in EUCALYPTUS, which cached it on all three NCs.<br />
Nginx is a HTTP and mail proxy server capable of load<br />
balancing. We used Nginx as a load balancer because it offers<br />
detailed logging and allows reloading the configuration file<br />
without termination of existing client sessions. We installed the<br />
Nginx as a load balancer on the front-end node and the Tomcat<br />
application server on the virtual machine. Our Web application<br />
contains one Java servlet that performs a matrix calculation. The<br />
Jboss server hosts the Web application while Nginx balances the<br />
load. We used Httperf and Autobench to generate a HTTP<br />
workload for the Web application. We developed a software<br />
component named VLBManager to monitor the average response<br />
time of requests by real-time monitoring of Nginx logs. We<br />
developed another software component named VLBCoordinator<br />
to invoke the virtual machines on the EUCALYPTUS-based<br />
cloud. Both components interact with each other using XML-<br />
RPC.<br />
The VLBManager detects the violation of the average<br />
response time for each virtual machine in the load balancer due<br />
to the heterogeneous testbed cloud.<br />
Whenever VLBManager detects a violation of the average<br />
response time, it signals the VLBCooridnator to invoke another<br />
virtual machine and add it to the load balancer.<br />
6.2 Mobicents SIP servlet s Application: ClicktoCall<br />
This simple Application shows how SIP Servlets can be used<br />
along with HTTP servlets as a converged application to place<br />
calls from a web page<br />
This application consists of following steps:<br />
1. Alice and Bob each register a SIP Softphone<br />
2. Alice clicks on the "Call" link to place a call to Bob<br />
3. Alice's phone rings<br />
4. When Alice picks up her phone, Bob's phone rings<br />
5. When Bob answers his phone, the call is connected<br />
6. When one of them hangs up, the other one is also<br />
disconnected<br />
Starts two sip phones. Open up a browser to<br />
http://localhost:8080/click2call/. If you have no registered Sip<br />
clients you will be asked to register at least two.<br />
Configure your SIP clients to use the sip servlets server as a<br />
register and proxy. (Ip address: 127.0.0.1, port: 5080)<br />
By default it will accept any password, see below for instructions<br />
on how to enable security and authentication. After the<br />
registration you will see a table where each cell will initiate a call<br />
between the corresponding clients. You can also navigate to<br />
http://localhost:8080/click2call/simplecall.html, which is a<br />
simplified version that doesn't require registered clients. You will<br />
see the index page where you can enter two SIP URIs. Enter the<br />
URIs of the two SIP phones you just started and click "Submit".<br />
The SIP phones don't have to be registered. After you pick up<br />
both phones the RTP session starts.<br />
VII. CONCLUSION<br />
It is possible to propose images with Mobicents Sip Servlets<br />
that are ready to run on a cloud. The user only needs to upload its<br />
applications to the appliance, and she will be ready to use<br />
Mobicents Sip Servlets in a cloud. We have also proposed an<br />
Auto-Scaling algorithm which will use the elasticity and pay per<br />
use property of cloud. We have proposed to use JBoss as server<br />
which will support clustering and uses high availability, failover<br />
properties of clusters.<br />
ACKNOWLEDGMENT<br />
We would like to express our gratitude towards a number of<br />
people whose support and consideration has been an invaluable<br />
asset during the course of this work. I would like to thank the<br />
Mobicents community, and more generally the whole JBoss AS<br />
community.<br />
REFERENCES<br />
[1] Securing Session Initiation Protocol in Voice over IP Domain .<br />
http://ieeexplore.ieee.org . Authors: Alsmairat, I.; Shankaran, R.; Orgun,<br />
M.; Dutkiewicz, E.<br />
[2] Eucalyptus Systems, Inc.: Eucalyptus. http://www.eucalyptus.com/<br />
[3] Mobicents :<br />
http://www.mobicents.org<br />
[4] The Session Initiation Protocol: Internet-centric signaling.<br />
http://ieeexplore.ieee.org .<br />
Authors: Dutta, A.; Makaya, C.; Das, S.; Chee, D.; Lin, J.; Komorita, S.;<br />
Chiba, T.; Yokota, H.; Schulzrinne.<br />
[5] Eucalyptus Systems, Inc.: Eucalyptus. http://www.eucalyptus.com/.<br />
[6] Mihir Kulkarni and Yannis Cosmadopoulos: Sip servlet 1.1. Specification<br />
JSR 289, Oracle, August 2008,<br />
[7] http://jcp.org/aboutJava/communityprocess/_nal/jsr289/index.html.<br />
[8] Red Hat, Inc.: JBoss AS. http://www.jboss.org/jbossas/.<br />
[9] Red Hat, Inc: Mobicents Sip Servlets. http://www.mobicents.org/products<br />
sipservlets.html.<br />
[10] Partitioning, and Clustering Working Group: Open Virtualization Format<br />
Specification. Specification, [7] DSP0243, Distributed Management Task<br />
Force, January 2010.<br />
AUTHORS<br />
First Author – Mr. Manish Giri, Master of Engineering,<br />
Maharashtra Academy of Engineering, Pune, E-mail:<br />
mbgiri@comp.maepune.ac.in<br />
Second Author – Balaji Bandhu, Bachelor of Engineering,<br />
Maharashtra Academy of Engineering, Pune, E-mail:<br />
balajibandhu@gmail.com<br />
Third Author – Sachin Waghmare, Bachelor of Engineering,<br />
Maharashtra Academy of Engineering, Pune, E-mail:<br />
sachinwaghmare3@gmail.com<br />
Fourth Author – Akshay Sawwashere, Bachelor of Engineering,<br />
Maharashtra Academy of Engineering, Pune, E-mail:<br />
arsawwashere@gmail.com<br />
Fifth Author – Atul Khaire, Bachelor of Engineering,<br />
Maharashtra Academy of Engineering, Pune, E-mail:<br />
atulkhaire.om@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 461<br />
ISSN 2250-3153<br />
Study of Fast Frequency Hopping Spread Spectrum and<br />
Jamming Systems<br />
Er.Nilesh Agrwal**, Er.Navendu Nitin**, Manjay Yadav*<br />
**Faculty and *PG Student ECE Department SHIATS-DU Allahabad India 211007<br />
manjayyadav2010@gmail.com<br />
Abstract- Frequency hopping spread spectrum is an efficient<br />
technique to combat jamming. . In this paper we analysis the<br />
effect of partial band noise jamming in Fast Frequency hopping<br />
spread spectrum system. We consider a communication system<br />
that transmits MFSK over a channel. The partial band noise<br />
interference is model as AWGN Channel using the phase<br />
analysis method. We consider (ρ) as a worst case partial band<br />
noise fraction and Pb is bit error rate probability for given m and<br />
signal to noise ratio.<br />
Index Terms- Frequency hopping spread spectrum,<br />
interference, partial band noise, AWGN<br />
I<br />
I. INTRODUCTION<br />
n frequency hopping spread spectrum the signal is broad cost<br />
over a random series of a radio frequency hopping from<br />
Frequency to Frequency speech untrue a receiver. A receive<br />
hopping between frequency in synchronization with the<br />
transmitter, piece of the message signal attain to 'jam'. It is a<br />
method of transmitting radio signal by radio rapidly switching a<br />
carrier among many frequency channels, using a pseudorandom<br />
sequence known to both transmitter and receiver. It is utilized as<br />
a multiple access method in the frequency hopping code division<br />
multiple access (FH-CDMA) Scheme. In FH-SS, the total<br />
available band width of the system is dividing into many smaller<br />
bandwidth Pulse guard spaces b/w each band width. Each band<br />
width represents channel. Transmitter and receive stay on one of<br />
these channel at one time & them hop on to another channel.<br />
Larger numbers of frequencies are used in FH-SS system. So that<br />
spread spectrum signal band width (WS) is much larger than<br />
original signal band width. Jamming is usually defined as a<br />
group of hostile communication or intentional interferers that<br />
attempt to disrupt the communication of targeted users by<br />
transmitting an interfering signal over the same communication<br />
range Additive white Gaussian Noise channel is a channel model<br />
in which the only impairment to communication is a linear<br />
addition of wideband or white noise with a constant spectral<br />
density and a Gaussian distribution of a amplitude.<br />
II. SYSTEM MODEL<br />
In the Fast Frequency hopping system the hopping rate is<br />
higher then user data rate. Therefore there are many hopes per<br />
frequency bit. It is given the block diagram of frequency hopping<br />
spread spectrum Transmitter & receiver.<br />
Fig. 1 Frequency hoping transceiver<br />
Fig. 2 Frequency hoping receiver<br />
A model of FFH-SS and Jamming system a partial band noise<br />
jamming transmits noise over a fraction of the total spread<br />
spectrum signal band spread noise of total power J evenly over<br />
some frequency range of band width Wj. We define fraction (ρ)<br />
[1] as the ratio<br />
w<br />
<br />
W<br />
j<br />
ρ ss …………………..(1)<br />
Where ρ is (0,1) which is the fraction of the total spread<br />
spectrum band and Ws is a subset the total spread band width.<br />
J<br />
W<br />
J<br />
<br />
J<br />
W<br />
ss<br />
N<br />
W<br />
<br />
W<br />
J<br />
0<br />
J<br />
N<br />
J<br />
N<br />
/ P<br />
j<br />
IP<br />
…………..(2)<br />
Suppose a Gaussian noise jammer choose to restrict its total<br />
power to a fraction ρ of the full ss band width Wss .<br />
Eb <br />
N<br />
E<br />
N<br />
b<br />
…………(3)<br />
t t ……….(4)<br />
It is assumed in Figure that the jammer hops the jammed band<br />
over Wss, relation to the FH dwell time 1/Rh, but often enough<br />
to deny the FH system the opportunity to detect that it is being<br />
jammed in a specific portion of Wss and take remedial action<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 462<br />
ISSN 2250-3153<br />
1<br />
Pb<br />
<br />
2(<br />
M )<br />
P <br />
b<br />
pP<br />
b<br />
p E<br />
N<br />
M<br />
<br />
i<br />
2<br />
b<br />
i <br />
( 1)<br />
<br />
<br />
M<br />
i<br />
<br />
e<br />
( KpEb<br />
/ N<br />
<br />
J<br />
) ( 11/<br />
i)<br />
.(5)<br />
J ……………..(6)<br />
From equation 4 and 5 the resulting average performance can be<br />
expressed as.<br />
max<br />
0 p1<br />
p<br />
<br />
2(<br />
M<br />
M<br />
1)<br />
i2<br />
1<br />
M <br />
( 1)<br />
e<br />
i <br />
(<br />
KpE / N ) ( 11/<br />
i<br />
b<br />
J<br />
) <br />
<br />
<br />
Figure 3: Frequency hopping spread spectrum with<br />
jamming.<br />
III. RESULT OF DISTENSION<br />
.(7)<br />
As mentioned equation that if ρ is reduced, the probability that<br />
an m-ary transmission is jammed is decreased. But jammed<br />
signals suffer a higher conditional error rate.<br />
Variation of Pb (probability error) with different value of ρ<br />
Keeping M= 2<br />
Table 1 Variation of Pb with different values of p.<br />
EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />
0.25 0.14 0.20 0.17 0.50 0.14<br />
1.60 0.14 1.60 0.14 1.27 0.12<br />
3.19 0.13 3.19 0.11 3.19 0.12<br />
6.37 0.12 6.37 0.10 6.37 0.11<br />
8.01 0.12 8.01 0.09 8.01 0.11<br />
12.70 0.10 12.70 0.07 12.71 0.08<br />
16.00 0.08 16.00 0.06 16.00 0.00<br />
BitErrorRate<br />
10 0<br />
10 -1<br />
M =2<br />
p = 0.3<br />
p=0.6<br />
p =1<br />
10<br />
0 2 4 6 8 10 12 14 16<br />
-2<br />
Eb/Nj<br />
Fig. 4 Performance of FH/BFSK system in partial-band noise<br />
for several fixed values of r .<br />
Table 2 Variation of Pb with different values of p keeping<br />
M=4<br />
EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />
0.25 0.88 0.25 0.84 0.25 0.84<br />
1.60 0.72 1.01 0.76 1.27 0.80<br />
3.19 0.64 5.06 0.76 3.19 0.72<br />
4.01 0.72 4.01 0.68 4.01 0.72<br />
5.06 0.64 6.37 0.68 5.06 0.72<br />
8.01 0.64 8.01 0.68 8.01 0.68<br />
16.00 0.56 16.00 0.68 16.00 0.60<br />
BitErrorRate<br />
10 -0.1<br />
10 -0.2<br />
M =4<br />
p = 0.3<br />
p=0.6<br />
p =1<br />
0 2 4 6 8<br />
Eb/Nj<br />
10 12 14 16<br />
Figure 5: Degradatub in FH/MFSK performance due to<br />
worst case, PBNJ with M=4<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 463<br />
ISSN 2250-3153<br />
Table 3: Variation of Pb with different values of p keeping<br />
m=8<br />
EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />
0.33 2.20 0.53 2.11 0.268 2.112<br />
1.69 2.11 1.07 2.02 0.358 2.112<br />
2.69 2.11 1.69 2.02 2.686 2.02<br />
5.36 2.11 2.13 2.02 3,381 1.928<br />
6.75 2.02 2.69 1.92 6.746 1.928<br />
8.49 2.02 4.25 1.20 8.492 1.837<br />
21.33 1.84 13.46 1.75 21.333 1.745<br />
BitErrorRate<br />
10 0.3<br />
10 0.2<br />
M =8<br />
p = 0.3<br />
p=0.6<br />
p =1<br />
0 5 10 15 20 25<br />
Eb/Nj<br />
Figure 6 Degradation in FH/MFSK performance due to<br />
worst case, PBNJ with M=8<br />
Table No. 4 Variation of Pb with different values of p keeping<br />
M=10<br />
EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />
0.30 2.788 0.48 2.667 0.76 2.666<br />
0.38 2.667 1.207 2.556 1.20 2.556<br />
1.519 2.667 1.519 2.556 3.817 2.556<br />
3.03 2.556 6.049 2.444 4.805 2.444<br />
6-049 2.444 7.615 2.444 15.19 2.333<br />
15.19 2.333 15.19 2.333 24.06 2.222<br />
24.08 2.11 24.08 2.333<br />
BitErrorRate<br />
10 0.44<br />
10 0.43<br />
10 0.42<br />
10 0.41<br />
10 0.4<br />
10 0.39<br />
10 0.38<br />
10 0.37<br />
M =10<br />
p = 0.3<br />
p=0.6<br />
p =1<br />
0 5 10 15 20 25<br />
Eb/Nj<br />
Figure 7 Degradation in FH/MFSK performance due to<br />
worst case, PBNJ with M=10<br />
IV. CONCLUSION<br />
This paper provide the study of fast frequency hopping spread<br />
spectrum operating in the presence of partial band noise<br />
jamming. The result has been presented for several cases. This<br />
improves the system performance in all cases. Particular it<br />
increases the value ρ of more drastically than it decrease the<br />
value of Eb/Nj.<br />
REFERENCES<br />
[1] Hussain S. and Barton S., ―Non-Coherent Detection of FSK Signals in the<br />
Presence of Oscillator Phase Noise in an AWGN Channel,‖ in Proceedings<br />
of the 7th IEE European Conference Mobile Personal Communications,<br />
Brighton, Proceedings 387, pp. 95-98, 1993.<br />
[2] Massaro M., ―Error Performance of M-ary No coherent FSK in the Presence<br />
of CW Tone Interference,‖ IEEE Transactions Commununication, vol. 23,<br />
pp. 1367-1369, 1975[3] Husain S. and Barton S., ―Non-Coherent Detection<br />
of FSK Signals in the Presence of Oscillator Phase Noise in an AWGN<br />
Channel,‖ in Proceedings of the 7th IEE European Conference Mobile<br />
Personal Communications, Brighton, Proceedings 387, pp. 95-98, 1993.<br />
[3] S. W. Houston, "Modulation Techniques for Communication, Part I: Tone<br />
and Noise Jamming Performance of Spread Spectrum M-ary FSK and 2,4ary<br />
DPSK Waveforms," in Proc.IEEE NAECON, 1975, pp. 51-58.<br />
[4] Hussain, S. and Button, S. K.; "Non-coherent Detection of FSK signals in<br />
the Resence of Oscillator Phase Noise in an AWGN Channel", Seventh IEE<br />
Erumpent Confine on Mobile Personal Comtnunica'ons, (Proc No. 383,<br />
Brighton, 13-15 Dec 1993, pp.95-98.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 464<br />
ISSN 2250-3153<br />
The Compliance of Temporary Soft Lining Materials-An<br />
in vivo & vitro study<br />
Dr. N.Shanmuganathan, Dr.T.V.Padamanabhan, Dr.R.Subramaniam, Dr.S.Madhankumar<br />
Abstract- Objective: The purpose of this study was to<br />
evaluate the change in clinical compliance of the three selected<br />
soft lining materials during use (in vivo) and also to analyze the<br />
leached out component during use. (In vitro)<br />
Methods and materials: Three soft-liner materials (Visco-gel,<br />
Coe-soft, GC Soft liner) were studied. Three circular depressions<br />
were made on the intaglio surface of the posterior palatal seal<br />
region, and they were filled with the three selected soft lining<br />
material and marked as A, B, C. Modified penetrometer was used<br />
to test the clinical compliance of the material over a period of 2<br />
hrs, 24 hrs, 1 week and 4 weeks after the denture was inserted.<br />
An in vitro study was conducted to find out the leachable<br />
components, both qualitatively and quantitatively with the use of<br />
high performance liquid chromatography and the clinical<br />
findings were correlated.<br />
Results: Paired t-test was applied to analyze the data. It was<br />
found that compliance of Visco-gel reduced the most in the 1 st<br />
week which was followed by GC Soft liner over a period of 4<br />
weeks followed by Coe Soft. In vitro study revealed that initial<br />
loss of ethanol was shown by HPLC test which caused the<br />
reduction in compliance.<br />
Conclusion: The results of this study indicated that physical<br />
property of the materials mainly depend on the type of<br />
plasticizer used and not ethanol that is present in most of the<br />
tissue conditioners. It could also be inferred that the use of<br />
plasticizer with large molecular size like benzyl salicylate, would<br />
preserve the physical property of the material over a longer<br />
period of time.<br />
Index Terms- Soft-liners, Clinical Compliance, High<br />
performance liquid chromatography<br />
T<br />
I. INTRODUCTION<br />
he inflammation and accompanying edema of the soft tissue<br />
underlying ill-fitting dentures have been the concern for<br />
many years. In the past, management of these patients, and those<br />
with congenital or acquired abnormalities, systemic disturbances<br />
or a combination of these, using hard and rigid polymers was<br />
very difficult if not impossible. The use of material designed to<br />
recondition abused denture supporting tissues and to restore a<br />
normal healthy state was reported by Chase 12 . Since then, these<br />
class of dental materials have stimulated several clinical and<br />
laboratory studies and there are many products designed to<br />
produce, tissue conditioning of the soft tissues underlying<br />
dentures‖. Clinicians who have long been aware of these<br />
materials can be effective in relieving the pain, discomfort and<br />
inflammation associated with this situation. In these conditions,<br />
tissue conditioners are used to treat the abused mucosa. These<br />
materials will confirm to the anatomy of the residual ridge and<br />
gel in that position and continue to flow slowly after application.<br />
The purpose of the soft liner is to absorb some of the energy<br />
produced by masticatory impact that would otherwise be<br />
transmitted through the denture to the soft mucosal tissues.<br />
The soft relining material can be either temporary or<br />
permanent. The temporary soft relining material which set intraorally<br />
inside the mouth, can be used for a short period (up to<br />
several weeks) to improve the comfort and fit of the complete<br />
denture until it can be remade or permanently relined. After a<br />
few weeks they begin to foul smell and debond from the denture.<br />
Hence this material has to be replaced often. The permanent soft<br />
relining material (processed soft liners) is used in a patient who<br />
is wearing a complete denture and experiencing chronic soreness<br />
with their dentures, may be because of heavy bruxism or poor<br />
oral health. These materials are processed in the laboratory in a<br />
manner similar to denture base. They may remain resilient up to<br />
a year. After which they tend to debond from the denture base or<br />
become porous and foul smelling.<br />
These soft lining materials are mainly made up of polyethyl<br />
methacrylate or polymethyl methacrylate resin added with<br />
plasticizer such as Dibutyl Phthalate or Ethanol. During use,<br />
these materials may become more rigid and inelastic due to loss<br />
of alcohol. The most important characteristic physical property<br />
of resilient denture liners is their elastic modulus. The reciprocal<br />
of the elastic modulus is called compliance, which is also<br />
referred to compressibility of the material. A compliance<br />
measurement gives the flexibility of the material. Reduction of<br />
these properties as a result of constant use in an oral cavity has<br />
been its great disadvantage. Hence this study was done to assess<br />
the resilient property and the loss of this property during intraoral<br />
use and to analyze the leachable component of these materials by<br />
in vitro to correlate with loss in the resilient property of these<br />
materials.<br />
II. MATERIALS AND METHODS<br />
Ten completely edentulous patients were selected randomly<br />
among the patients attending the Dept of Prosthodontics in the<br />
Saveetha Dental College, Chennai for replacement of their<br />
missing teeth. Convenience sampling technique was adopted for<br />
selecting the patients. The inclusion criteria included patients<br />
from both the genders, having completely edentulous area in both<br />
the maxillary and mandibular arch. All the individuals who were<br />
selected for this study had extracted their teeth before one year,<br />
with complete healing of the ridge, and it was also ensured that<br />
no pathological conditions existed in the oral cavity at the time of<br />
this study. Consent of the patient was obtained after explaining<br />
the purpose of the study and its procedures that would be<br />
followed during its conduct.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 465<br />
ISSN 2250-3153<br />
Clinical phase: Ten patients were selected and complete<br />
dentures were constructed in the conventional methods. On all<br />
the ten selected maxillary dentures, three circular depression, in<br />
the right (A) , centre (B) and left (C) on the intaglio surface of<br />
the posterior palatal region measuring about 4mm diameter x<br />
2mm depth in dimensions were made(figure-1). This region was<br />
(Table 1)<br />
Product Code Manufacturer Powder/ Liquid<br />
Ratio by weight<br />
Visco-gel VG DeTreyDivision, Dentsply Ltd,<br />
Weybridge, Surrey, England<br />
1.25<br />
COE Soft<br />
GC Soft-<br />
Liner<br />
CS Coe Laboratories Inc<br />
GC G-C Dental Industry<br />
Co,Tokyo,Japan<br />
PEMA: Polyethyl methacrylic; PMMA: Polymethyl methacrylic;<br />
BPBG: butyl pthalyl butyl glycolate; DBP: dibutylpthalate; BS:<br />
benzyl salicylate; EtOH: ethyl alcohol. In which the right (A)<br />
was filled with Visco-gel, centre (B) was filled with COE Soft<br />
and left (C) was filled with GC Soft Liner.<br />
Method of testing: The dentures were then tested for clinical<br />
compliance of each of the three samples of soft liner material<br />
using modified penetrometer and measured separately. This test<br />
was done after a period of 2 hrs, 24 hrs, 1 week and 4 weeks,<br />
after the denture was inserted. Modified flat end penetrometer<br />
needle probe was used to test the clinical compliance of the<br />
tested materials. Clinical compliance of each material, Visco-gel,<br />
Coe Soft and GC Soft liner were measured separately. The tests<br />
were performed according to Nicholas J.A Jepson et al. 9 A load<br />
of 30g was held constantly for five seconds, strain cured in<br />
during loading, recovery were recorded. Test was performed on<br />
three separate points on each specimen.<br />
III. LAB PHASE<br />
An in-vitro study was conducted to find out the leachable<br />
components, both qualitatively and quantitatively. This test was<br />
done to correlate with the clinical findings. The technique, HPLC<br />
(High performance liquid chromatography) was used for<br />
analyzing the molecules that are dissolved in a solvent. These<br />
solvents were qualitatively and quantitatively analyzed to find<br />
the leachable components of the specimen. Three samples of the<br />
relining material were made to the dimension 8.5mm in diameter<br />
and 2mm thickness(figure-3) according to Hironori Tsuchiya et<br />
al 11 .These samples were placed in nano purified water (figure-4).<br />
Selectively the samples were removed from each test material<br />
after a period of 2 hrs, 24hrs, 1week, and 4 weeks and analyzed.<br />
The high performance liquid chromatography is a method used<br />
for separating molecules dissolved in a solvent. The solvent is<br />
selected due to the space available for the placement of test<br />
sample as done by David M Casey et al. 10 These depressions<br />
were filled with the following selected soft lining materials<br />
(Table 1) and placed in the oral cavity (figure-2).<br />
Composition<br />
Powder Liquid<br />
PEMA(86.2%) BPBG(86.9%)<br />
PMMA(13.8%) DBP(8.2%)<br />
EtOH(4.9%)<br />
1.34 PEMA(100%) BS(35.1%)<br />
DBP(49.7%)<br />
EtOH(15.2%)<br />
1.25 PEMA(100%) BPBG(80.9%)<br />
DBP(4.3%)<br />
EtOH(14.8%)<br />
qualitatively and quantitatively analyzed to find the leached out<br />
components of the specimen.<br />
Figure 1: Three circular depression created on the intaglio<br />
surface<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 466<br />
ISSN 2250-3153<br />
Figure 2: depressions filled with selected three different soft<br />
lining materials<br />
Figure 3: Dyes made for preparing the samples<br />
Figure 4: All the three samples immersed in the nano purified<br />
water<br />
Similar study has been done by Minoru Kawaguchi et al 13<br />
using the HPLC test to study the amount of leachable monomers<br />
of a light activated reline resin. The different solutes will interact<br />
with stationary phase to differing phase, due to difference in size,<br />
adsorption, partitioning etc. These differences allow the mixture<br />
components to be separated from each other and studied<br />
separately. This instrument consists of a column with a fritted<br />
bottom that holds the stationary phase. The mixture to be<br />
separated is loaded on to the top of the column. The different<br />
component in the solvents passes through the column at different<br />
rates due to difference in their partitioning behavior. The<br />
different solutes are studied using UV detector at different times<br />
when it passes through the column.<br />
Qualitative analysis: Identification of different components of<br />
the samples was made by comparing retention time of different<br />
analysts with that of the standard.<br />
Quantitative analysis: Quantization was done by comparison of<br />
the sample chromatogram with that of the standard. In this study,<br />
the peak height of the chromatogram was taken in to<br />
consideration.<br />
IV. RESULTS<br />
Data were analyzed with IBM SPSS 19.0 version software.<br />
The descriptive statistics with ten numbers of samples in all the<br />
groups were shown in the table number 1 with their mean and<br />
standard deviation.<br />
Table: 1 The table shows the mean and standard deviation of<br />
clinical compliance at 2 hours,24 hours, 1 week and 4 weeks for<br />
all the three groups. In group A, the mean value in 2 hours was<br />
3.785 and it was decreased in the 4 week to 0.489. The same<br />
trend was shown in group B and group C.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 467<br />
ISSN 2250-3153<br />
Table:1<br />
Descriptive Statistics<br />
N Mean<br />
Std.<br />
Deviation<br />
Group<br />
2hrs<br />
A- 10 3.78520 .112252<br />
Group<br />
2hrs<br />
B 10 4.78380 .009271<br />
Group<br />
2hrs<br />
C 10 4.60800 .102940<br />
Group<br />
24hrs<br />
A 10 3.39120 .026097<br />
Group<br />
24hrs<br />
B 10 4.75200 .010893<br />
Group<br />
24hrs<br />
C 10 4.2321 .01022<br />
Group<br />
1wk<br />
A 10 1.44760 .010113<br />
Group<br />
1wk<br />
B 10 3.92930 .010371<br />
Group<br />
1wk<br />
C 10 2.76970 .010371<br />
Group<br />
4wks<br />
A 10 .48920 .006579<br />
Group<br />
4wks<br />
B 10 1.78330 .010371<br />
Group<br />
4wks<br />
C 10 .59290 .010225<br />
Table 2: Paired sample t test was implemented to find out the<br />
significance between the groups A, B, and C during the time<br />
duration of 2 hours, 24 hours, 1 week and 4 weeks respectively.<br />
Paired t-test<br />
Groups<br />
Table: 2<br />
Sig. (2-<br />
T Df tailed)<br />
Group A-2hrs - Group B<br />
2hrs<br />
-27.490 9 .000<br />
Group B-2hrs - Group C<br />
2hrs<br />
-26.584 9 .000<br />
Group C 2hrs - Group A-<br />
2hrs<br />
22.341 9 .000<br />
Group A 24hrs - Group<br />
B 24hrs<br />
-128.142 9 .000<br />
Group B 24hrs - Group<br />
C 24hrs<br />
89.648 9 .000<br />
Group C 24hrs - Group<br />
A 24hrs<br />
98.790 9 .000<br />
Group A 1wk - Group B -504.466 9 .000<br />
1wk<br />
Group B 1wk - Group C<br />
1wk<br />
292.305 9 .000<br />
Group C 1wk - Group A<br />
1wk<br />
412.865 9 .000<br />
Group A 4wks - Group<br />
B 4wks<br />
-307.413 9 .000<br />
Group B 4wks - Group C<br />
4wks<br />
252.371 9 .000<br />
Group C 4wks - Group<br />
A 4wks<br />
28.984 9 .000<br />
The identified p value was .0001<br />
Table 3: The following table shows the mean and standard<br />
deviation of the three types of softliner during the duration of 2<br />
hours, 24 hours, 1 week and 4 weeks respectively.<br />
Table :3<br />
Descriptive Statistics<br />
N Mean Std. Deviation<br />
VG 2 ETOH 6 .14050 .019398<br />
CS 2 ETOH 6 .82000 .028014<br />
GC 2 ETOH 6 .46183 .021321<br />
VG 24 ETOH 6 .95900 .019647<br />
VG 24 DBP 6 .14050 .018534<br />
CS 24 ETOH 6 1.33967 .017189<br />
CS 24 DBP 6 .45883 .019198<br />
GC 24 ETOH 6 .46567 .024841<br />
GC 24 DBP 6 .04617 .020913<br />
VG 1W ETOH 6 2.16967 .018403<br />
VG 1W DBP 6 .45083 .024045<br />
VG 1W BPBG 6 1.16000 .018243<br />
CS 1W ETOH 6 2.84867 .019997<br />
CS 1W DBP 6 .95850 .025758<br />
CS 1W BS 6 1.15850 .020226<br />
GC 1W ETOH 6 2.95567 .023526<br />
GC 1W DBP 6 .35967 .018085<br />
GC 1W BPBG 6 1.05283 .028273<br />
VG 4W ETOH 6 3.75050 .025774<br />
VG 4W DBP 6 1.36500 .022680<br />
VG 4W BPBG 6 2.16183 .023259<br />
CS 4W ETOH 6 4.66283 .027007<br />
CS 4W DBP 6 1.76067 .022367<br />
CS 4W BS 6 1.86350 .023287<br />
GC 4W ETOH 6 4.95533 .023636<br />
GC 4W DBP 6 1.05283 .036141<br />
GC 4W BPBG 6 2.36617 .029158<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 468<br />
ISSN 2250-3153<br />
Table4: Paired sample t test was implemented to find out the<br />
significance between the soft liners with the time duration of 2<br />
hours, 24 hours, 1 week and 4 weeks respectively. The table<br />
shows there was a significant difference between the three soft<br />
liners in the time period of 2 hours, 24 hours, 1 week and 4<br />
weeks with the p value of .0001.<br />
Table :4 Paired t-test<br />
t<br />
df<br />
Sig.(2tailed)<br />
VG 2 ETOH -<br />
CS 2 ETOH<br />
-50.389 5 .000<br />
VG 2 ETOH -<br />
GC 2 ETOH<br />
-19.750 5 .000<br />
GC 2 ETOH -<br />
VG 2 ETOH<br />
19.750 5 .000<br />
VG 24 ETOH -<br />
CS 24 ETOH<br />
-33.817 5 .000<br />
VG 24 ETOH -<br />
GC 24 ETOH<br />
65.166 5 .000<br />
CS 24 ETOH -<br />
GC 24 ETOH<br />
85.758 5 .000<br />
VG 24 DBP - CS<br />
24 DBP<br />
-30.522 5 .000<br />
CS 24 DBP - GC<br />
24 DBP<br />
37.467 5 .000<br />
GC 24 DBP - VG<br />
24 DBP<br />
-7.446 5 .001<br />
VG 1W ETOH -<br />
CS 1W ETOH<br />
-67.720 5 .000<br />
CS 1W ETOH -<br />
GC 1W ETOH<br />
-9.746 5 .000<br />
GC 1W ETOH -<br />
VG 1W ETOH<br />
77.877 5 .000<br />
VG 1W DBP -<br />
CS 1W DBP<br />
-32.927 5 .000<br />
CS 1W DBP -<br />
GC 1W DBP<br />
35.483 5 .000<br />
VG 1W DBP -<br />
GC 1W DBP<br />
7.817 5 .001<br />
GC 1W BPBG -<br />
VG 1W BPBG<br />
-8.592 5 .000<br />
VG 4W ETOH -<br />
CS 4W ETOH<br />
-59.107 5 .000<br />
CS 4W ETOH -<br />
GC 4W ETOH<br />
-15.576 5 .000<br />
GC 4W ETOH -<br />
VG 4W ETOH<br />
74.064 5 .000<br />
VG 4W DBP -<br />
CS 4W DBP<br />
-25.659 5 .000<br />
CS 4W DBP -<br />
GC 4W DBP<br />
63.990 5 .000<br />
GC 4W DBP - -15.559 5 .000<br />
VG 4W DBP<br />
VG 4W BPBG -<br />
GC 4W BPBG<br />
-13.366 5 .000<br />
V. DISCUSSION<br />
It is admitted that ill fitting dentures are bane to the patients<br />
and dental professionals. This may be due to poor fabrication of<br />
the dentures, prolonged use of the dentures and also due to<br />
systemic conditions like diabetes. These poor fitting dentures<br />
often abuse the basal tissue. The reaction may range from simple<br />
denture stomatitis to hyperplasia. The hard tissues may undergo<br />
accelerated resorption. The reason for this could be due to the<br />
pressure on the mental foramen; sharp bony spicules; thin,<br />
atrophic mucosa; bony undercuts, particularly in the mylohyoid<br />
region; irregular bony resorption; poor fit of the denture base;<br />
incorrect occlusal relationship; bruxism; and/or debilitating<br />
disease. 1 It is wise to decide whether the treatment should include<br />
remaking the prosthesis rather than simply relining a prosthesis<br />
for short-term benefit without a plan for long –term success.<br />
Research site the use of tissue conditioners to treat an abused<br />
mucosa during 1960s. 2-4 These materials stay intact to the<br />
anatomy of residual ridge and gel in that position and continue to<br />
flow slowly after application and distribute stress on denture –<br />
bearing tissues 3-6 .These tissue conditioners have plasticizer or<br />
ethanol which being a low molecular weight compound is<br />
usually leached out in the saliva over a period of time. This<br />
leaching out may result in reduction in softness of the material,<br />
which may have a negative impact on the tissues. These<br />
materials are very porous; porosity of these materials imparts the<br />
quality of shock absorption. The adverse effect of the porosity is<br />
that it forms a nidus for easy colonization with fungi and other<br />
microorganisms. So prolonged therapy is usually not possible<br />
with this class of material. The other disadvantage is the<br />
marginal leakage between these liners and the denture base.<br />
Extensive study has been done regarding these physical<br />
properties and the influence of bacterial colonization and its<br />
manifestation on the tissue liner. But studies to elicit the change<br />
of physical properties of these materials in the oral environment<br />
have not been dealt much. Hence this study was conducted to<br />
measure the change in compliance of selected tissue conditioners<br />
i.e.; Visco gel, Coe soft, GC Soft-liner and correlate it with the<br />
type and amount of chemicals leached out from the tissue<br />
conditioners over a period of time. The clinical compliance of<br />
Coe soft, Visco gel, GC Soft liner were measured individually<br />
using the modified penetrometer. The manufacture‘s<br />
recommended period of use in the oral cavity is between 3-4<br />
weeks and so it was decided to test the specimens at 2hrs, 24hrs,<br />
1 week and 4 weeks. Concurrent with this study, evaluation of<br />
the chemicals leached out from the test samples was studied<br />
using High performance liquid chromatography (HPLC). The<br />
results of this study that all the three test materials have similar<br />
initial compliance when tested at 2 hrs had the mean value of<br />
compliance at 2 hrs Group A (Visco gel) – 3.785, Group B (Coe<br />
soft) – 4.783 and Group C (GC Soft liner) – 4.608.<br />
There was a significant change in compliance over a period of 4<br />
weeks for each of the tested materials. Group B (Coe soft)<br />
showed the least change (mean value 1.781) there was a<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 469<br />
ISSN 2250-3153<br />
statistically significant difference of change in compliance when<br />
the material Group A, B & C were compared with each other.<br />
When the change in compliance between the material Group A<br />
and C were compared at a time period of 2-24 hrs there was no<br />
significant difference ( t value- 0.41). The HPLC analysis<br />
showed that ethanol leached out first in all the three samples<br />
which was seen in the 2 hrs test results with the mean value of<br />
0.1405 for Visco gel, 0.8200 for Coe soft and 0.4618 for Soft<br />
liner. Dibutyl phthalate was seen to leach out in all the three<br />
samples and was present in the 24 hrs test sample, the mean<br />
value for Visco gel was 0.1405 with a t-value of 74.23. The Coe<br />
soft had a mean value of 0.4588 with a t-value of 83.73 and GC<br />
Soft liner had the mean value of 0.0461 with the t-value 100.86.<br />
Butyl pthalyl butyl glycolate leached out at 1week from the two<br />
test samples. The mean value for Visco gel was 1.1600 with the<br />
SD of .018243 and GC Soft liner was 1.0528 with the SD of<br />
.028273. Benzyl salicylate leached out at 1 week from Coe soft,<br />
the mean value was 1.1585 with the SD of .020226. Butyl<br />
pthalyl butyl glycolate leached out at 4 weeks from the two test<br />
samples. The mean value for Visco gel was 2.1618 with the SD<br />
of .023259 and for GC Soft liner it was 2.3661 and .029158.<br />
Benzyl salicylate leached out at 4 weeks from Coe soft and had<br />
the mean value of 1.8635 with the SD - .023287. The amount of<br />
ethanol, Dibutyl phthalate, butyl pthalyl butyl glycolate, benzyl<br />
salicylate increased from leaching out at 2 hrs to 4 weeks was<br />
measured.<br />
Similarly there was an increase in the amount of Dibutyl<br />
phthalate from leaching at 24 hrs to 4 weeks. Butyl pthalyl butyl<br />
glycolate and benzyl salicylate was last to leach out and<br />
increased from 1 week to 4weeks.Correlating the above said tests<br />
for the various test specimens, it was found that the initial loss of<br />
ethanol between 2 hrs- 24 hrs caused statistically insignificant<br />
change in compliance of all the three test samples. On further<br />
testing it was found that loss of ethanol and plasticizer produced<br />
a significant change in compliance over a period of 1 week, loss<br />
of butyl pthalyl butyl glycolate produced more significant change<br />
in compliance ( as seen in Visco gel and GC Soft liner) than the<br />
loss of benzyl salicylate as seen in the case of Coe soft. Further<br />
test to a period of 4 weeks retreated the same result i.e. loss of<br />
plasticizer like butyl pthalyl butyl glycolate produced more<br />
change than loss of benzyl salicylate. This result can be inferred<br />
as the loss of ethanol and Dibutyl phthalate for all the three test<br />
samples were similar. These changes could be due to the<br />
difference in molecular size. Benzyl salicylate being larger<br />
molecule would be leached out slower than butyl pthalyl butyl<br />
glycolate which would be leached out faster and hence lead to<br />
deterioration of the physical properties as found by H.Murata et<br />
al. 13<br />
Differences in base-line properties between materials<br />
probably reflect the combined effects of varying polymer<br />
composition, ethanol concentration, plasticizer type, and powder:<br />
liquid ratio. Reductions in compliance tended to reflect a<br />
material‘s baseline softness- the higher the baseline initial<br />
compliance, the greater the reduction. Baseline values of<br />
compliance and the differences in these values between materials<br />
were both significantly reduced such that at 28 days there were<br />
only small differences in compliance values that ranged from<br />
0.14 mm/ N for CC to 0.5mm/ N for VG. Several authors have<br />
described that the viscoelastic properties best suited to their<br />
specific use as tissue conditioners or functional impression or<br />
temporary reline materials. These properties concern various<br />
combination of softness, elastic recovery, and plastic flow but<br />
have often been described only in relation to the gel formed after<br />
initial mixing. Continued changes in these properties over time<br />
are clearly important to their actual effectiveness. These were<br />
modified over time through a rapid reduction in compliance and<br />
increase in elastic recovery, a combination of properties ideally<br />
suited to its use as a functional impression material. The<br />
combination of high initial compliance and elastic recovery seen<br />
for CC and to a lesser extent CS would indicate a soft elasticity<br />
appropriate to tissue conditioning. 7-8<br />
VI. CONCLUSION<br />
The study identifies that the use of a simple, modified<br />
penetrometer enabled a clear and reproducible characterization of<br />
the viscoelastic properties of four temporary soft lining<br />
materials. 10 These changes would be attributed to the loss of<br />
ethanol and plasticizers. Initial loss of ethanol which was shown<br />
by HPLC test was also the cause for reduction in compliance.<br />
But loss of plasticizers let too drastic reduction in clinical<br />
compliance. This was more apparent when butyl phthalate butyl<br />
glycolate was the plasticizer used in the soft liner where as the<br />
material using benzyl salicylate as the plasticizer showed less<br />
change than earlier ones.<br />
Hence it can be concluded that physical property of the<br />
material mainly depends on the type of plasticizer used and not<br />
ethanol that is present in most of the tissue conditioners. It can<br />
also be inferred that use of plasticizer with large molecular size<br />
like benzyl salicylate, would preserve the physical property of<br />
the material over a longer period of time.<br />
REFERENCES<br />
[1] Storer R. Resilient denture base materials. Br Dent J 1962;113:95.<br />
[2] Goll G, Smith DE, Plein JB. The effect of denture cleaners on temporary<br />
soft liners. J Prosthet Dent 1983;50:466-472.<br />
[3] Lytle RB. Complete denture construction based on a study of the<br />
deformation of the underlying soft tissues. J Prosthet Dent 1959;9:539-551.<br />
[4] Calikkocaoglu S. Tam Protezler. 2. cilt, Protez Akademisi ve Gnatoloji<br />
Dernegi 2. Bilimsel yayini,1988.<br />
[5] Qudah S Harrison A, Huggett R: Soft lining materials in prosthetic<br />
dentistry: A review . Int J Prosthodont 1990;3:477-483.<br />
[6] Jepson NJA, McCabe JF, Storer R: Evaluation of the viscoelastic properties<br />
of denture soft lining materials. J Dent 1993;21:163-170.<br />
[7] Graham BS, Jones DW, Thomson JP, Johnson JA: Clinical compliance of<br />
two resilient denture liners. J Oral Rehabil 1990;17:157-63.<br />
[8] Jepson NJ, McCabe JF, Storer R: Age changes in the viscoelasticity of a<br />
temporary soft lining material. J Dent 1993;21:244-7.<br />
[9] Nicholas J.A.Jepson, Joseph T.McGill, John F. McCabe: Influence of<br />
dietary stimulating solvents on the viscoelasticity of temporary Soft lining<br />
materials. J Prosthet Dent 2000;83:25-31.<br />
[10] David M Casey, Ellen C.Scheer: Surface treatment of a temporary soft liner<br />
for increased longevity J Prosthet Dent 1993;69:318-324.<br />
[11] Hironori Tsuchiya,Yoshiyuhi Hoshino etal: Leaching and Cytotoxicity of<br />
formaldehyde and methyl metacrylate from acrylic resin denture base<br />
materials. J Prosthet Dent 1994;71:618-624.<br />
[12] Chase W.W: Tissue conditioning utilizing dynamic adaptive stress. J<br />
Prosthet Dent 1961;11: 804-815.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 470<br />
ISSN 2250-3153<br />
[13] Murata H, Iwangaga H, Shigeto N, Hamada T: Initial flow of tissue<br />
conditioners influence of compostion and structure on gelation. J Oral<br />
Rehabi 1993;20:177-187.<br />
AUTHORS<br />
First Author: Dr. N.Shanmuganathan,<br />
Professor, Department of Prosthodontics<br />
Faculty of Dental Sciences, Sri Ramachandra University<br />
Chennai – 600 116, India<br />
Phone: +91 9840231829<br />
Email: shansdr@yahoo.co.in<br />
Second Author: Dr.T.V.Padamanabhan<br />
Professor and HOD, Department of Prosthodontics<br />
Faculty of Dental Sciences, Sri Ramachandra University<br />
Chennai – 600 116<br />
India<br />
Third Author: Dr.R.Subramaniam<br />
DEAN, Noor-ul Islam Institue of Dental sciences<br />
Kerala, India<br />
Forth Author: Dr.S.Madhankumar<br />
Senior Lecturer, Department of Prosthodontics<br />
Faculty of Dental Sciences, Sri Ramachandra University<br />
Chennai – 600 116<br />
India<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 471<br />
ISSN 2250-3153<br />
M<br />
A Case Report – MELAS Syndrome<br />
Dr Hariom Meena*, Dr Ramraj Meena*, Dr Surendra Khosya*<br />
Department of Medicine<br />
Govt Medical College & Attached, MBS. Hospital, Kota, Rajasthan, India<br />
*JR 3 IN DEPARTMENT OF INTERNAL MEDICINE<br />
Email: drkhosya3@gmail.com<br />
I. INTRODUCTION<br />
ELAS (mitochondrial encephalomyopathy, lactic acidosis,<br />
and recurrent stroke-like episodes) syndrome is a rare<br />
neurodegenerative and fatal disease cause by mutation in<br />
mitochondrial DNA. Patients with mitochondrial myopathies<br />
typically have exercise- induced symptoms. Thus, patients are<br />
often advised to avoid exercise, which leads to deconditioning.<br />
Currently, the concept of aerobic exercise training as therapy for<br />
mitochondrial disease is not well established.<br />
MELAS is a condition that affects many of the body's systems,<br />
particularly the brain and nervous system (encephalo-) and<br />
muscles (myopathy). In most cases, the signs and symptoms of<br />
this disorder appear in childhood following a period of normal<br />
development[3].Early symptoms may include muscle weakness<br />
and pain, recurrent headaches, loss of appetite, vomiting, and<br />
seizures. Most affected individuals experience stroke-like<br />
episodes beginning before age 40. These episodes often involve<br />
temporary muscle weakness on one side of the body<br />
(hemiparesis), altered consciousness, vision abnormalities,<br />
seizures, and severe headaches resembling migraines. Repeated<br />
stroke-like episodes can progressively damage the brain, leading<br />
to vision loss, problems with movement, and a loss of intellectual<br />
function (dementia).<br />
Most people with MELAS have a buildup of lactic acid in<br />
their bodies, a condition called lactic acidosis. Increased acidity<br />
in the blood can lead to vomiting, abdominal pain, extreme<br />
tiredness (fatigue), muscle weakness, loss of bowel control, and<br />
difficulty breathing. Less commonly, people with MELAS may<br />
experience involuntary muscle spasms (myoclonus), impaired<br />
muscle coordination (ataxia), hearing loss, heart and kidney<br />
problems, diabetes, Epilepsy, and hormonal imbalances.<br />
MELAS (mitochondrial encephalomyopathy, lactic acidosis, and<br />
recurrent stroke-like episodes) syndrome is a mitochondrial<br />
disorder. Patients with MELAS generally have a poor prognosis<br />
and outcome, as effective therapiesfor MELAS syndrome have<br />
not been established. The clinical management of individuals is<br />
largely supportive and includes exercise training.[1] In recent<br />
studies, exercise has been shown to be of possible benefit to<br />
patients with mitochondrial disease as it prevents deconditioning,<br />
which can exacerbate pre-existing exercise intolerance and<br />
fatigability[2,3].Aerobic training enhances aerobic capacity,<br />
muscle oxidative metabolism, and ATP production, decreases<br />
lactate levels, and improves quality of life in patients with<br />
mitochondrial disease.[4] A regular low intensity regimen can<br />
improve muscle endurance and cardiopulmonary function.<br />
II. CASE REPORT<br />
The patient, Ahsaan Mohd. 40-year-old man, was admitted to<br />
our hospital due to an episode involving visual hallucinations,<br />
migraine-like headaches, seizure, vomiting, recurrent sudden loss<br />
of consciousness, and relative lower limbs weakness.None of his<br />
family members or relatives had MELAS. His speech was fluent<br />
with normal comprehension and repetition. He had grade 4<br />
muscle power of his both upper and lower limb, bilateral plantar<br />
are extensor. He had intact, brisk symmetrical deep tendon<br />
reflexes and absent Babinski sign bilaterally. On day 2 of his<br />
hospitalization, he become conscious and his altered sensorium<br />
improved and headache, vomiting completely resolved. On day<br />
3 he walk a maximal distance of 5 meters. He had a wide-based,<br />
slightly ataxic gait as well.<br />
Laboratory data included a serum lactate of 62.9 mmol/L<br />
(normal < 2.1 mmol/L). widal test and MP by card are normal.<br />
CSF done which is within normal limit. Serum phorphobilinogen<br />
level was normal. Magnetic resonance imaging (MRI) brain<br />
studies showed area of hyperintencity in periventricular ,parietooccipital<br />
white matter s/o leukoencephalopathy .(Figure 1).<br />
Nerve conduction velocities (NCV) of bothlower limbs were<br />
normal, but, on electromyography (EMG), myopathic changes<br />
were seen in both lowerlimbs.. A muscle biopsy was taken from<br />
the rectus femoris muscle and ragged red fibers were noted on<br />
examination.<br />
In the10 th day the patient‘s showed neurological<br />
improvement in muscle power, balance, endurance, and his gait<br />
speed. Her both extremity muscle power improved from grade 4<br />
to grade 5. After discharge, the rehabilitation program prescribed<br />
for the patient emphasized instrumentaldaily activity and home<br />
aerobic exercise walked in his community 15-20 min daily. he<br />
coulddo household tasks, including housecleaning,bathing<br />
washing dishes, and changing bed linens with minimal difficulty.<br />
After one month he was readmitted in hospital with similar kind<br />
of illness.and improved within two days.<br />
III. DISCUSSION<br />
Figure 1. Magnetic resonance imaging study of the brain<br />
shows hyperintense T2 lesions predominantly in the subcortical<br />
white matter in the right temporal, parietal, and occipital lobes.<br />
Muscle strength, gait speed, physical function, and quality of life.<br />
The recovery was possible due to the muscle adaptation that<br />
occurs with exercise training, which may improve aerobic<br />
capacity, muscle oxidative metabolism, the mitochondrial<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 472<br />
ISSN 2250-3153<br />
respiratory chain, and decrease secondary physical<br />
deconditioning.[5,6] The patient‘s ataxic gait pattern resolved,<br />
and he was able to walk with a normal gait due to improved<br />
muscle strength and decreased muscle fatigability. The patient<br />
progressed greatly in his daily functional skills. After discharge,<br />
the patient was prescribed a low level exercise program as part of<br />
her outpatient phase. The goal of our daily activity training is to<br />
minimize dependence and give the patient the ability to perform<br />
daily skill tasks. We evaluated the needs of the treatment phase<br />
based on the patient‘s physical status and provided an effective<br />
rehabilitation program.<br />
Home aerobic exercise with minimal resistance can prevent<br />
fatigue and cardiopulmonary dysfunction. All of these results<br />
have been reported to be related to improvement of skeletal<br />
muscle oxidative capacity by extraction of available oxygen and<br />
enhancement of oxygen utilization by muscle[7].The treatment of<br />
mitochondrial disease has traditionally involved diets or drugs,<br />
such as coenzyme Q,cytochrome C, nicotinamide,<br />
dichloroacetate, and succinate; however, their effects are<br />
IV. CONCLUSION<br />
Multidisciplinary management of pt. with MELAS required<br />
and would involve a geneticist, neurologist,cardiologist,<br />
nephrologist, ophthalmologist,Endocrinologist and dentist.<br />
There is no known treatment of underlying disease which is<br />
progressive and fatal. Patients are managed according to what is<br />
affected at particular time. Metabolic therapies have been used to<br />
increase production of ATP. CoenzymeQ10 (CoQ10)<br />
,ascorbate,riboflavin, vit k1 and vit k3, L-carnitin,succinate have<br />
proven quite successful.<br />
Figure 1<br />
controversial. Rehabilitation in the form of aerobic training is<br />
another approach to the treatment of mitochondrial disease. It is<br />
thought that the capacity for oxygen extraction is directly<br />
correlated with the degree of impaired muscle O2 extraction, and<br />
that capillary density and mitochondrial oxidative capacity<br />
increase in skeletal muscle if adequate training is given.[6] The<br />
reported benefits of endurance training in patients with<br />
mitochondrial myopathy include notable improvement in work<br />
and oxidative capacity. Thus, muscle mitochondrial adaptations<br />
can improve the systemic a-vO2 difference, increase the<br />
extraction of oxygen during exercise, and may also allow patients<br />
to tolerate submaximal exercise.[6] Muscle strength, gait speed,<br />
physical function, and quality of life. The recovery was possible<br />
due to the muscle adaptation that occurs with exercise training,<br />
which may improve aerobic capacity, muscle oxidative<br />
metabolism, the mitochondrial respiratory chain, and decrease<br />
secondary physical deconditioning.[5,6] th and decreased muscle<br />
fatigability. Long term follow up of MELAS patients is required.<br />
Both pt. and family members should receive genetics<br />
counseling and the family should be educated about further<br />
deterioration and possible complication.<br />
Clinical course is usually unpredictable with fluctuation and<br />
gradual determination leading to coma or death(usually from<br />
respiratory failure).<br />
REFERENCES<br />
[1] Tarnopolsky MA, Raha S. Mitochondrial myopathies:diagnosis, exercise<br />
intolerance, and treatment options.Med Sci Sports Exerc 2005;37:2086-93.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 473<br />
ISSN 2250-3153<br />
[2] Chinnery P, Majamaa K, Turnbull D, et al. Treatment for mitochondrial<br />
disorders. Cochrane Database Syst Rev 2006;1:CD004426.<br />
[3] Taivassalo T, De Stefano N, Argov Z, et al. Effects of aerobic training in<br />
patients with mitochondrial myopathies. Neurology 1998;50:1055-60.<br />
[4] Clay AS, Behnia M, Brown KK. Mitochondrial disease: a pulmonary and<br />
critical-care medicine perspective.Chest 2001;120:634-48.Rehabilitation in<br />
MELAS Syndrome 187<br />
[5] Mahoney DJ, Parise G, Tarnopolsky MA. Nutritional and exercise-based<br />
therapies in the treatment of mitochondrial disease. Curr Opin Clin Nutr<br />
Metab Care 2002;5:619-29.<br />
[6] Taivassalo T, Shoubridge EA, Chen J, et al. Aerobic physiological,<br />
biochemical and genetic effects. Ann Neurol 2001;50:133-41.<br />
[7] Taivassalo T, Haller RG. Exercise and training in mitochondrial<br />
myopathies. Med Sci Sports Exerc 2005; 37:2094-101.<br />
[8] Coyle EF, Martin WH 3rd, Sinacore DR, et al. Time course of loss of<br />
adaptations after stopping prolonged intense endurance training. J Appl<br />
Physiol 1984;57: 1857-64.<br />
[9] Finsterer J, Milvay E. Stress lactate in mitochondrial myopathy under<br />
constant, unadjusted workload. Eur J Neurol 2004;11:811-6. Gold DR,<br />
Cohen BH. Treatment of mitochondrial cytopathies. Semin Neurol<br />
2000;21:309-25.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 474<br />
ISSN 2250-3153<br />
Research Directions in Quantum Cryptography and<br />
Quantum Key Distribution<br />
Abstract- Quantum cryptography is an approach to securing<br />
communications by applying the phenomena of quantum physics.<br />
Quantum cryptography provides secure communication whose<br />
security depends only on the validity of quantum theory.<br />
Interesting characteristics of quantum mechanics includes the<br />
existence of indivisible quanta and of entangled systems, both of<br />
which lie at the root of the quantum cryptography (QC). QC is<br />
one of the few commercial applications of quantum physics at<br />
the single quantum level. Computers and Telecommunications<br />
system would become safe havens for criminal activity. Even<br />
may himself unknowns that crypto anarchy provides a means for<br />
tax evasion money laundering, espionage (with digital dead<br />
drops), contract killings, and implementation of data havens for<br />
Monitoring and marketing illegal or controversial material.<br />
Encryption also threatens national Security by interfering with<br />
foreign intelligence operations.<br />
T<br />
Index Terms- Quantum Cryptography, Quantum level<br />
I. CLASSICAL CRYPTOGRAPHY<br />
o achieve cryptography an algorithm also called<br />
(cryptosystem or cipher) is used to combine a message with<br />
some additional information (known as the key) and produce a<br />
cryptogram. The primary application of cryptography is to send<br />
secret messages. Many cryptographic systems are based on<br />
computational assumptions. Decrypting is equivalent to solving<br />
some computationally difficult problem. Based on mathematics<br />
is the classical cryptography and one based on physics quantum<br />
cryptography. Classical cryptography relies on the computational<br />
difficulty of factoring large integers; quantum cryptography<br />
relies on what we believe to be the universal laws of at quantum<br />
mechanics.<br />
These classical cryptosystems come in two flavors: Symmetric<br />
systems and asymmetric systems. The security of public key<br />
cryptosystem is based on competition complexity.<br />
II. SYMMETRICAL (SECRET KEY) CRYPTOSYSTEMS<br />
Symmetrical ciphers require the use of a single key, both for<br />
encryption and decryption. The symmetrical cryptosystems in<br />
use for routine applications such as e-commerce employ rather<br />
short keys.<br />
Asymmetrical allegorizing is used not so much for encryption,<br />
because of their slowness, but rather for distribution of session<br />
Ms. Deepa Harihar Kulkarni<br />
Assistant Professor, SKN College of Engineering<br />
University of Pune, Maharshtra, India<br />
deepakulkarniskn@gmail.com<br />
keys for symmetric cryptosystems such as DES. Barriers of<br />
classical cryptography<br />
2.1 Secret key cryptography<br />
• Require secure channel for key distribution.<br />
• In practice principle every classical channel can be<br />
monitored passively.<br />
• Security is mostly based on complicated, non proven<br />
algorithms.<br />
2.2 Public key cryptography<br />
• Security is based on non proven mathematical<br />
assumptions (ex. in RSA cipher, difficulty of factoring large<br />
numbers.<br />
III. QUANTUM CRYPTOGRAPHY<br />
The main advantage of quantum cryptography is that it gives<br />
us perfectly secure data transfer the first successful quantum<br />
cryptographic device could translate a secret key over 30<br />
centimeters using polarized light, calcite crystals(s), and other<br />
elect optical devices.<br />
Figure 3.1: A Quantum Cryptographic Communication<br />
System for Securely Transferring Random Key<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 475<br />
ISSN 2250-3153<br />
IV. QUANTUM ENTANGLEMENT<br />
Entanglement is a kind of quantum correlation that is<br />
stronger, in certain sense, than any classical one. If some<br />
quantum system, consisting of several subsystems, then it is in<br />
entangled state (even in a pure entangled state) its individual<br />
subsystems cannot be described by pure quantum stages.<br />
Entangled states can be used to serve for quantum key<br />
distribution and quantum teleportation.<br />
Quantum entanglement is a quantum mechanical phenomenon<br />
in which the quantum of two or more objects has to be described<br />
with reference to each other, even though the individual objects<br />
may be spatially separated. This leads to correlations between<br />
observable physical properties of the systems. As the results,<br />
measurements performed on one system seen to be<br />
instantaneously influencing. Other systems entangled cipher.<br />
V. QUANTUM KEY DISTRIBUTION<br />
Quantum mechanics has multiple cryptographic applications<br />
as well. The best known is quantum key distribution (QKD)<br />
which enables Alice and Bob to create a secure classical secret<br />
key despite the potential presence of an eavesdropper. QKD<br />
requires only an insecure quantum channel and authenticated<br />
classical channels, but unfortunately requires multiple rounds of<br />
back and forth communication between Alice and Bob.<br />
QKD is a means of distributing keys from one party to<br />
another, and detecting eavesdropping. It always two parties to<br />
establish a common random secret key by taking advantage of<br />
the fact that quantum mechanics does not allow for<br />
distinguishing non-orthogonal states with certainty.<br />
The primary proposed application of QKD is to create a secret<br />
key, which is then used with the one-time pad to send<br />
unconditionally secure messages.<br />
One of the best-known protocols for quantum key distribution<br />
is usually called BB84. (In 1984, by Bennett and Brassard) In<br />
BB84, Alice sends Bob a random sequence of quantum bits (on<br />
cubits). These quantum bits are equally likely to be in one of four<br />
possible states, as follows<br />
State Basis value<br />
0 │0> Z<br />
1 │1> Z<br />
0 │0>+ │1> X<br />
1 │0>- │1> X<br />
VI. INTEGRATION OF QUANTUM CRYPTOGRAPHY IN 802.11<br />
NETWORKS<br />
Quantum cryptography is considered as a promising solution<br />
towards absolute security in long term cryptosystems. The<br />
application of quantum cryptography in fiber networks has<br />
significant advances.<br />
The appealing characteristics of quantum cryptography is the<br />
possibility of distributing secret key between two users in a<br />
manner that it is impossible for a third party to eavesdrop without<br />
disturbing the quantum transmission and hence the<br />
eavesdropping is detected by legitimate users. With this<br />
characteristic, quantum cryptography is considered as a<br />
promising key distribution solution towards long-term<br />
unconditionally secure cryptosystems.<br />
In fiber networks, some products have been commercialized to<br />
provide a turnkey service for widely used encryption algorithms.<br />
While the application of quantum cryptography in fiber networks<br />
has significant advances, the application of quantum<br />
cryptography in fiber networks has significant advances; the<br />
application of quantum cryptography in mobile networks is still<br />
premature. Some advanced topics in this field concern satellite<br />
communications. In satellite networks, the ground stations and<br />
the satellites are main communication entities of the quantum<br />
key distribution process.<br />
There are a large verity of kinds of mobile wireless network<br />
such as GSM (Global System for Mobile communications),<br />
GPRS (General Packet Radio Service, WLAN (Wireless Local<br />
Area Network) has its own characteristics concerning the<br />
mobility level of the users, the environment where it could be<br />
deployed, the size of the coverage area etc. our first tentative is<br />
towards WLAN 802.11 networks because of the four following<br />
reasons. First, WLAN 802.11 is mainly used in office and<br />
campus environments (e.g. offices, class rooms, meeting rooms,<br />
halls in airports). This building oriented environment facilitates<br />
the deployment of a quantum key distribution network with a<br />
high density of quantum apparatus if necessary.<br />
Second, the mobility speed of mobile users in WLAN 802.11<br />
is relatively slower in comparison with cellular networks. Third<br />
WLAN 802.11 terminals (e.g. laptop) usually have more<br />
computational capacity and more energy for the autonomy than<br />
cellular network‘s terminals (e.g. cell phones). This characteristic<br />
may allow a sufficient amount of control and protocol related<br />
tasks in the quantum key distribution process.<br />
Fourth, from on application point of view, WLAN 802.11 is<br />
usually used to provide access to the internet through an access<br />
point installed by an organization or by a wireless ISP (Internet<br />
Service Provider). In comparison with another kind of network<br />
such as Bluetooth which is mainly used only to replace the wired<br />
links between personal devices (e.g. mouse, PDA, desktop), the<br />
WLAN 802.11 in an apt environment for an enhancement of<br />
security provided by quantum cryptography.<br />
We are interested in the aspect of network protocol design for<br />
the integration of quantum key distribution in currently specified<br />
802.11 security mechanisms.<br />
In 802.11 we distinguish three aspects: Authentication,<br />
encryption key establishment and encryption algorithm.802.11<br />
Security Mechanisms.<br />
6.1 Authentication:<br />
Authentication is the first thing to do when a mobile terminal<br />
wants to join a network. In order to rectify the flaw at the WEP<br />
(Wired Equivalent Privacy) based authentication mechanism<br />
specified in the 802.11 standard, 802.11 defines the 802.1x<br />
authentication based on EAP( Extensible authentication protocol)<br />
The architecture of 802.ix authentication with three elements:<br />
The supplicant, the authenticator, and the authentication server.<br />
The supplicant corresponds to the mobile terminal which wants<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 476<br />
ISSN 2250-3153<br />
to join a network. The authenticator corresponds to the access<br />
point which relies the 802.1x access control and only admits data<br />
traffic from supplicants who are authenticated by the<br />
authentication server.<br />
6.2 Key management: - 802.11i uses many keys at different<br />
levels, constituting a key hierarchy.<br />
Figure 6.2: Pair Wise Key Hierarchy<br />
Figure depicts this key hierarchy. At the top level, we have the<br />
master key called pair wise master key (PMK) which is used to<br />
derive the other keys. Upon having the PMK, the access point<br />
start the 4 way handshake with the mobile terminal to derive the<br />
PTK. This PTK is then split into three final temperate keys:<br />
EAPOL- Key key confirmation key (KCK), EAPAL – Key key<br />
Encryption key (KEK), and Temporal key (TK). The KCK is<br />
used to calculate the MIC (Message Integrity Code) at the<br />
EAPOL – Key message during the 4- way handshake. The TK is<br />
used to encrypt unicast user data traffic.<br />
6.3 Encryption Algorithms: The 802.11i standard<br />
specifies into encryption algorithms: TKIP (Temporal Kay<br />
Integrity Protocol) and CCMP (Counter Mode with CBC – MAC<br />
Protocol). CCMP is mandatory and TKIP is optional. TKIP is<br />
considered as transient solution towards CCMP – based system<br />
because TKIP is based on the RC4 algorithm and only requires a<br />
software upgrade on WEP – based systems. CCMP is based on<br />
AES (Advanced Encryption Standard) and requires hardware<br />
modification for the translation from WEP – based systems.<br />
VII. CONCLUSION AND FUTURE WORK<br />
Other applications of quantum mechanics to cryptography and<br />
future scope which tend to come in three flavors:<br />
Quantum mechanics can be used to break classical<br />
cryptographic protocols.<br />
Quantum states can make possible new or improved<br />
cryptographic protocols protecting classical<br />
information.<br />
Cryptographic methods can be applied to protect<br />
quantum information instead of classical information.<br />
Examples would include quantum secret sharing<br />
schemes and quantum authentication protocols.<br />
REFERENCES<br />
[1] William Stalling, ―Cryptography and Network Security (Principles and<br />
Practices)‖, Fourth Edition, Pearson Publishers, pp. 259-281,<br />
[2] Othman O. Khalifa, ―Communication Cryptography‖, IEEE transaction on<br />
Cryptography, 2004, pp. 1-15.<br />
[3] National Bureau of Standard, Security Requirement for Cryptographic<br />
modules, Federal Information processing standards publication FIPs<br />
Publication, 1994, p.188 – 199.<br />
[4] J. Watson, ―Data Security Hits Home‖, IEEE micro, Oct. 1995, P 88<br />
[5] IEEE Standard 802.1x, part based network access control, December 2004,<br />
pp. 47-53<br />
[6] http://www.IEEEXPLORE.com<br />
[7] SC51 User‘s Manual Edition 2.1<br />
AUTHORS<br />
Ms. Deepa Harihar Kulkarni is presently working as an<br />
Assistant Professor in Computer Department, SKN college of<br />
Engineering, Pune , Maharashtra, India. She has completed her<br />
graduate and post graduate from Maharashtra, India. Research<br />
areas are Data Mining, Pattern Recognition and Computer<br />
Networking.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 477<br />
ISSN 2250-3153<br />
Controller Performance Evaluation for Concentration<br />
Control of Isothermal Continuous Stirred Tank<br />
Reactor<br />
Vishal Vishnoi, Subhransu Padhee, Gagandeep Kaur<br />
Department of Electrical and Instrumentation Engineering<br />
Thapar University, Patiala, 147004, Punjab<br />
vishalvishnoi07@gmail.com, subhransu_padhee@yahoo.com, gagan_deep_kaur@yahoo.com<br />
Abstract: This paper presents a comparative analysis of<br />
performance of PID controller and hybrid fuzzy controller for<br />
concentration control of isothermal continuous stirred tank<br />
reactor, which is used to carry out chemical reactions in an<br />
industry. Isothermal continuous stirred tank reactor is one of<br />
the types of reactor which operates at a constant temperature.<br />
The authors developed a mathematical model of the isothermal<br />
CSTR and implemented PID controller and PD-fuzzy<br />
controller to control the product concentration of the reactor<br />
irrespective of the disturbances and delays. Time domain<br />
analysis of the controller is performed to study the<br />
performance of different controllers and it is observed that PDfuzzy<br />
controller performs better than the conventional PID<br />
controller to control the product concentration of isothermal<br />
CSTR.<br />
Keywords: CSTR, PID, PD-Fuzzy<br />
PID<br />
I. INTRODUCTION<br />
controllers are most widely used controllers in past<br />
two decades. There are many tuning methods<br />
available and most of the PID controller tuning uses frequency<br />
response methods for example Zeigler-Nichols rule, symmetric<br />
optimum rule, Cohen-Coon tuning, internal model control,<br />
ITAE tuning rules etc. These tuning rules provide a simple way<br />
to calculate the parameters of PID controllers. But in most of<br />
the cases, it doesn‘t provide satisfactory closed loop<br />
performance.<br />
The widespread use of chemical reactors has led to design<br />
of different control mechanism to control different parameters<br />
of the reactor. The control mechanism can be a conventional<br />
control or an intelligent control. This paper considers an<br />
isothermal CSTR and models the system to obtain the state<br />
space and transfer function model of the system. The primary<br />
objective of the control mechanism developed for the<br />
isothermal CSTR is that the product concentration should be<br />
controlled irrespective of the different disturbances and delays.<br />
To obtain this control mechanism, conventional and intelligent<br />
controller is developed and a comparative study of controller is<br />
performed.<br />
II. NOMENCLATURE<br />
CSTR Continuous Stirred Tank Reactor<br />
A Cyclopentadine<br />
B Cyclopentenol<br />
C Cylcopentanediol<br />
D Dicyclopentadiene<br />
k Rate constant for A B<br />
1<br />
min <br />
1<br />
k 2 Rate constant for B C<br />
k 3 Rate constant for 2A D<br />
r A<br />
r<br />
r<br />
r<br />
B<br />
C<br />
D<br />
C<br />
C<br />
A<br />
B<br />
Molar rate of formation of A<br />
Molar rate of formation of B<br />
Molar rate of formation of A<br />
Molar rate of formation of A<br />
Concentration of A<br />
Concentration of B<br />
<br />
<br />
1 min <br />
C Steady state concentration of A<br />
As<br />
C Steady state concentration of B<br />
Bs<br />
III. CHEMICAL REACTOR<br />
mol / l min<br />
Chemical reactors are the most important unit of a<br />
chemical plant used for unit operations. Basically a chemical<br />
reactor is a device in which chemical reaction takes place.<br />
Chemical reactors can be classified according to different<br />
properties<br />
1. Reaction phase<br />
2. Operating modes<br />
According to the reaction phase chemical reactor can be<br />
classified as<br />
1. Homogeneous reactor<br />
2. Heterogeneous reactor<br />
According to the operating modes chemical reactors can be<br />
classified as<br />
1. Continuous stirred tank reactor<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 478<br />
ISSN 2250-3153<br />
2. Batch stirred tank reactor<br />
3. Semi batch<br />
4. Tubular reactor<br />
While designing a chemical reactor following factor has to be<br />
considered, (i) Overall size of reactor, (ii) Products emerging<br />
from reactor, (iii) Temperature inside the reactor (iv) Pressure<br />
inside the reactor (v) Rate of reaction (vi) Activity and mode of<br />
catalyst (vii) Stability and controllability of reactor<br />
IV. ISOTHERMAL REACTOR & MODELLING<br />
Isothermal CSTR is a type of CSTR which is<br />
operating at a constant temperature. The volume is also<br />
assumed to be constant. The reaction scheme consists of the<br />
following irreversible reactions. The feed stream contains only<br />
component A. The isothermal CSTR has following reaction<br />
scheme which is called Van de Vusse reaction.<br />
k1 k2<br />
A B C<br />
k3<br />
2A<br />
D<br />
For the above reaction the values of rate constant are<br />
1 1<br />
k150h 0.83min<br />
1 1<br />
k2100h 1.66min<br />
k 10mollh 0.166moll min<br />
3<br />
1 1 1 1<br />
Steady state feed concentration is<br />
Overall material balance is given as<br />
C 10gmoll<br />
<br />
<br />
Afs<br />
<br />
d V<br />
dt<br />
i<br />
1<br />
F F<br />
So, F Fi<br />
(1)<br />
(2)<br />
Component material balance can be shown as<br />
<br />
d VC<br />
dt<br />
A<br />
2<br />
Af A 1 A 3 A<br />
F C C Vk C Vk C (3)<br />
Simplifying eq(3) we obtain eq(4)<br />
dCA F<br />
C C k C k C<br />
2<br />
Af A 1 A 3 A<br />
dt<br />
<br />
V<br />
(4)<br />
dCB F<br />
CB k1CA k2CB dt V<br />
(5)<br />
dCC F<br />
CC k2CB dt V<br />
(6)<br />
dCD F 1 2<br />
CD k3CA dt V 2<br />
(7)<br />
The molar rate of formation for each component (per unit<br />
volume) is<br />
r k C k C<br />
(8)<br />
A 1 A 3<br />
2<br />
A<br />
r kC k C<br />
(9)<br />
B 1 A 2 B<br />
r k C<br />
(10)<br />
C 2 B<br />
1<br />
r k C<br />
2<br />
(11)<br />
D 3<br />
2<br />
A<br />
Solving eq(4) and eq(5)<br />
F F<br />
k C kCC V V<br />
2<br />
s s<br />
3 As 1 As Afs 0<br />
(12)<br />
Steady state concentration of A and B is defined as<br />
C<br />
C<br />
As<br />
Bs<br />
2<br />
Fs<br />
Fs Fs<br />
k1<br />
1 43<br />
<br />
<br />
V <br />
<br />
2k3 k<br />
V <br />
2k3<br />
k CAfs<br />
V<br />
(13)<br />
kC 1 As <br />
Fs<br />
k2<br />
V<br />
(14)<br />
The linear state space model is represented as<br />
x Ax Bu<br />
y Cx Du<br />
The state variable is represented as<br />
The output variable is represented as<br />
The input variable is represented as<br />
CA x <br />
CB CAs<br />
C<br />
<br />
Bs <br />
CA y <br />
CB CAs<br />
C<br />
<br />
Bs <br />
F u <br />
V Fs<br />
<br />
V <br />
<br />
Two dynamic functional equation is represented as<br />
dCA F F<br />
f C, C , <br />
dt V V<br />
C C k C k C<br />
dCB F F<br />
f2 CA, CB, CBk1CAk2CB<br />
dt V V<br />
2<br />
1 A B Af A 1 A 3 A<br />
The elements of state space A matrix is found by<br />
A<br />
ij<br />
fi<br />
<br />
x<br />
j<br />
xs, us<br />
The elements of state space B matrix is found by<br />
B<br />
ij<br />
fi<br />
<br />
u<br />
j<br />
xs, us<br />
The state space model is represented as<br />
Fs k12k3CAs V<br />
A <br />
k1 <br />
0 <br />
<br />
Fs<br />
k <br />
2<br />
V <br />
<br />
CAfs CAs<br />
B <br />
<br />
CBs<br />
Fs<br />
<br />
V <br />
<br />
0 <br />
C 0 1<br />
<br />
D 0 0<br />
Based on steady state operating point<br />
C gmoll <br />
1<br />
Bs 1.117 ,<br />
Fs<br />
V<br />
<br />
0.5714min<br />
C gmoll <br />
1<br />
As 3 ,<br />
1<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 479<br />
ISSN 2250-3153<br />
2.4 A <br />
0.83 0 <br />
2.23<br />
<br />
<br />
7<br />
B <br />
1.117 0.57<br />
0<br />
<br />
<br />
C 0 1<br />
D <br />
<br />
0 0<br />
Converting the state space model to transfer function<br />
1 <br />
G() s CsI A B<br />
1.117s3.1472 gp() s 2<br />
s 4.6429s5.3821 0.5s<br />
1.117s3.1472e gp() s 2<br />
s 4.6429s5.3821 0.4762<br />
gd() s 2<br />
s 4.6429s5.3821 (15)<br />
(16)<br />
(17)<br />
Eq(15) represents the process transfer function, eq(16)<br />
represents the process transfer function with delay and eq(17)<br />
represents the disturbance transfer function.<br />
V. CONVENTIONAL CONTROL OF REACTOR<br />
Control of isothermal CSTR has generated a lot<br />
of research interest and a large number of literatures<br />
can be found in this area. Some of the research<br />
findings are discussed in this section.<br />
Jose Alvarez-Ramirez et.al presents proportional-integral<br />
(PI) control of continuously stirred tank reactors (CSTR). The<br />
main ingredient in the formulation is the use of a novel PI<br />
control configuration derived from modeling error<br />
compensation ideas. The main theoretical contribution is a<br />
novel stability analysis of a wide class of CSTR. It is shown<br />
that the performance of an inverse dynamics feedback control<br />
can be recovered by classical PI control. This performance<br />
recovery includes the region of attraction and transient<br />
response [6].<br />
Nina F. Thornhill et.al presents the simulation of<br />
CSTR. In this article, volumetric and heat balance equations<br />
are presented along with algebraic equations derived from<br />
experimental data for calibration of sensors and actuators and<br />
unknown quantities such heat transfer through the heating<br />
coils. Many of these relationships have nonlinearities, and hard<br />
constraints such as the tank being full are also captured. A<br />
valuable feature is that the model uses measured, not<br />
simulated, noise and disturbances and therefore provides a<br />
realistic platform for data-driven identification and fault<br />
detection [14].<br />
S M Giriraj Kumar et.al has proposed Genetic<br />
Algorithm to improve the performance of bioreactor [16].<br />
J Prakash et.al has presented a design criterion for<br />
nonlinear PID controller and non linear model predictive<br />
controller for a CSTR system which exhibits dynamic<br />
nonlinearity [19].<br />
R Suja Mani Malar et.al has propsed the use of<br />
Artificial Neural Network to model and control the CSTR [20,<br />
21].<br />
In this research paper, the primary control objective is<br />
to control the product concentration of isothermal CSTR by<br />
varying the rate of dilution of the feed flow. The schematic<br />
diagram of the feedback control loop of isothermal CSTR is<br />
shown in figure 1.<br />
Rate of dilution<br />
F<br />
V<br />
CC<br />
CM<br />
Product Concentration<br />
Figure 1: Feedback control mechanism for concentration control of<br />
isothermal CSTR<br />
Here CM represents the measurement of<br />
concentration and CC represents the concentration controller.<br />
Figure 2 shows the block diagram approach of feedback<br />
control scheme.<br />
Set point<br />
(Ks)<br />
+<br />
mA<br />
-<br />
Controller<br />
(Ka)<br />
(Q m)<br />
mA psig kg/min<br />
Actuator<br />
(Ke)<br />
mA<br />
Input Flow<br />
Sensor<br />
(Ks)<br />
Valve<br />
(Kv)<br />
Input flow<br />
disturbance<br />
Process<br />
Gp(s)<br />
Figure 2: Block diagram based feedback control approach for<br />
concentration control of isothermal CSTR<br />
+<br />
PID<br />
0.4762<br />
4.64295.3821 2<br />
s s<br />
1.117s3.1472 4.64295.3821 2<br />
s s<br />
Figure 3: Transfer function based feedback control approach for<br />
concentration control of isothermal CSTR<br />
Figure 3 shows the transfer function model of the<br />
feedback control scheme for concentration control of<br />
isothermal CSTR. The transfer function for process and the<br />
disturbance is derived in section IV. Ideal PID controller in<br />
continuous time is given as<br />
t 1 de( t)<br />
<br />
u( t) Kce( t) e( t) dt d<br />
<br />
<br />
i<br />
dt<br />
0<br />
<br />
+<br />
+<br />
+<br />
+<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 480<br />
ISSN 2250-3153<br />
The PID controller is tuned using Zeigler-Nichols criteria of<br />
tuning and the unit step response of feedback control is shown<br />
in figure 4. The values of proportional gain, integral gain and<br />
derivative gain of PID controller are 0.2, 0.95 and 0.23<br />
respectively.<br />
Figure 4: Unit step response of PID controller for concentration<br />
control<br />
Figure 4 represents the unit step response of PID controller<br />
Figure 5 shows the unit step response of feedback control<br />
scheme with a disturbance. Due to this disturbance, the peak<br />
overshoot increases.<br />
Figure 5: Unit step response of PID controller with disturbances<br />
Figure 6: Unit step response of PID controller with delay and<br />
disturbances<br />
VI. FUZZY CONTROL OF ISOTHERMAL REACTOR<br />
Fuzzy logic is a form of logic that is the extension<br />
of boolean logic, which incorporates partial values<br />
of truth. Instead of sentences being "completely<br />
true" or "completely false," they are assigned a value<br />
that represents their degree of truth. In fuzzy<br />
systems, values are indicated by a number (called a<br />
truth value) in the range from 0 to 1, where 0.0<br />
represents absolute false and 1.0 represents absolute<br />
truth.<br />
The fuzzy logic controller provides an algorithm, which<br />
converts the expert knowledge into an automatic control<br />
strategy. Fuzzy logic is capable of handling approximate<br />
information in a systematic way and therefore it is suited for<br />
controlling non linear systems and is used for modeling<br />
complex systems, where an inexact model exists or systems<br />
where ambiguity or vagueness is common. The fuzzy control<br />
systems are rule-based systems in which a set of fuzzy rules<br />
represent a control decision mechanism for adjusting the<br />
effects of certain system stimuli. With an effective rule base,<br />
the fuzzy control systems can replace a skilled human operator.<br />
The rule base reflects the human expert knowledge, expressed<br />
as linguistic variables, while the membership functions<br />
represent expert interpretation of those variables.<br />
Rule Base<br />
Pre Processing Fuzzification<br />
Fuzzy Inference<br />
System<br />
De-fuzzification Post Processing<br />
Crisp<br />
Crisp<br />
Input<br />
Processed<br />
Crisp Input<br />
Fuzzified<br />
Input<br />
Fuzzified<br />
Output<br />
De-fuzzified<br />
Output<br />
Output<br />
Figure 7: Block diagram of fuzzy inference system<br />
Hybrid PD-Fuzzy Controller<br />
Although it is possible to design a fuzzy logic<br />
type of PID controller by a simple modification of<br />
the conventional ones, via inserting some<br />
meaningful fuzzy logic IF- THEN rules into the<br />
control system, these approaches in general<br />
complicate the overall design and do not come up<br />
with new fuzzy PID controllers that capture the<br />
essential characteristics and nature of the<br />
conventional PID controllers. Besides, they<br />
generally do not have analytic formulas to use for<br />
control specification and stability analysis. The<br />
fuzzy PD, PI, and PI+D controllers to be introduced<br />
below are natural extensions of their conventional<br />
versions, which preserve the linear structures of the<br />
PID controllers, with simple and conventional<br />
analytical formulas as the final results of the design.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 481<br />
ISSN 2250-3153<br />
Thus, they can directly replace the conventional PID<br />
controllers in any operating control systems (plants,<br />
processes).<br />
et ()<br />
P<br />
I<br />
D<br />
Figure 8: Parallel form of PID controller<br />
+<br />
ut ()<br />
The conventional design of PID controller was some what<br />
modified and a new hybrid fuzzy PID controller was designed.<br />
Instead of summation effect a mamdani based fuzzy inference<br />
system is implemented. The inputs to the mamdani based fuzzy<br />
inference system are error and change in error.<br />
et ()<br />
et<br />
()<br />
Gd<br />
Gi<br />
G p<br />
d<br />
dt<br />
<br />
Fuzzy Inference<br />
System<br />
Figure 9: Fuzzy inference system<br />
Fuzzy Inference<br />
System<br />
(MAMDANI)<br />
SUM<br />
ut ()<br />
Figure 10: Architecture of proposed hybrid fuzzy<br />
controller<br />
Figure 9 shows the fuzzy inference system developed<br />
for hybrid fuzzy controller. Figure 10 shows the structure of<br />
hybrid fuzzy logic controller, which keeps the general<br />
architecture of PID controller as shown in figure 8 with some<br />
slight modifications. A mamdani based fuzzy inference system<br />
is implemented in between proportional and derivative term.<br />
The integral term is then added to the output of fuzzy inference<br />
system.<br />
G , d G and G i are scaling factors for the input where<br />
p<br />
as G u is the scaling factor for the output. In this design the<br />
input and output scaling factors are determined by trial and<br />
error methods and are taken very small. The linguistic<br />
variables used in the membership functions are described in<br />
table 1.<br />
Table 1: Linguistic variable for fuzzy logic<br />
Gu<br />
Error e(t) Change in error Controller output<br />
∆e(t)<br />
u(t)<br />
NB Negative NB Negative NB Negative<br />
Big<br />
Big<br />
Big<br />
NM Negative NM Negative NM Negative<br />
Medium<br />
Medium<br />
Medium<br />
NS Negative NS Negative NS Negative<br />
Small<br />
Small<br />
Small<br />
ZO Zero ZO Zero ZO Zero<br />
PS Positive PS Positive PS Positive<br />
Small<br />
Small<br />
Small<br />
PM Positive PM Positive PM Positive<br />
Medium<br />
Medium<br />
Medium<br />
PB Positive PB Positive Big PB Positive<br />
Big<br />
Big<br />
Figure 11 (a), (b) and (c) shows the inputs and output<br />
membership functions for mamdani based fuzzy inference<br />
system.<br />
(a)<br />
(b)<br />
(c)<br />
Figure 11 (a), (b) and (c): Membership function for error, change in<br />
error and output<br />
u(t)<br />
Table 2: Fuzzy rule base<br />
e(t)<br />
NB NM NS ZO PS PM PB<br />
NB NB NB NB NB NM NS ZO<br />
NM NB NB NB NM NS ZO PS<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 482<br />
ISSN 2250-3153<br />
∆e(t)<br />
NS NB NB NM NS NS PS PS<br />
ZO NB NM NS ZO ZO PM PM<br />
PS NM NS ZO PS PS PB PB<br />
PM NS ZO PS PM PM PB PB<br />
PB ZO PS PM PB PB PB PB<br />
Table 2 shows the fuzzy rule base for mamdani fuzzy inference<br />
system.<br />
Figure 12: Unit step response of hybrid fuzzy controller for<br />
concentration control of isothermal CSTR<br />
Figure 12 shows the unit step response of hybrid fuzzy<br />
controller for concentration control of isothermal CSTR. It is<br />
evident from the response that the overshoot is less as<br />
compared to the PID controller, which shows the efficiency of<br />
fuzzy based controllers.<br />
Figure 13: Comparative response of unit step response of different<br />
controller<br />
Figure 13 shows comparative response of controller.<br />
VII. RESULTS & DISCUSSION<br />
This section evaluates the controller perfromance on the basis<br />
of tranisent response and error criteria. Table 3 shows the<br />
comparative tranisent response of conventional PID controller<br />
and fuzzy controller.<br />
Table 3: Transient response<br />
Parameters/<br />
type<br />
Peak<br />
overshoot<br />
(%)<br />
Rise<br />
time<br />
(Sec)<br />
Delay<br />
time<br />
(Sec)<br />
Sett<br />
time<br />
(Sec)<br />
Peak<br />
time<br />
(Sec)<br />
PID 9.1251 4.679 3.0459 7.4062 6.1049<br />
PID with<br />
disturbances<br />
PID with<br />
disturbances<br />
and delay<br />
Fuzzy<br />
Controller<br />
20.3425 4.365 2.956 7.0852 5.6760<br />
16.0946 4.379 2.982 7.5983 6.0825<br />
5.5092 4.580 3.115 6.5306 6.0402<br />
Table 4: Performance criteria of controllers<br />
IAE ISE ITAE<br />
PID 2.279 1.579 6.226<br />
PID with disturbance 2.49 1.552 8.2<br />
PID with<br />
disturbance with delay<br />
2.528 1.661 7.974<br />
Fuzzy controller 2.342 1.872 5.702<br />
Table 4 shows the error criteria for different controllers. From<br />
transient response analysis in table 3 and error analysis in table<br />
4 it is evident that the hybrid fuzzy controller is best for<br />
concentration control.<br />
VIII. CONCLUSION<br />
This paper presents a comparative study of performance of<br />
different conventional and fuzzy based controllers. The aim of<br />
the proposed controller is to regulate the product concentration<br />
of isothermal CSTR. After time response analysis it is<br />
observed that hybrid fuzzy controller provides a satisfactory<br />
control performance.<br />
REFERENCES<br />
[1] Chuen Chien Lee, ―Fuzzy logic in control systems: Fuzzy logic<br />
controller, part I,‖ IEEE Transactions on Systems, Man and Cybernetics,<br />
vol. 20, no. 2, 1990, pp. 404-418<br />
[2] Chuen Chien Lee, ―Fuzzy logic in control systems: Fuzzy logic<br />
controller, part II,‖ IEEE Transactions on Systems, Man and Cybernetics,<br />
vol. 20, no. 2, 1990, pp. 419-435<br />
[3] Stuart Bennett, ―A brief history of automatic control,‖ IEEE Control<br />
Systems, June 1996, pp. 17-25<br />
[4] Sng Hong Lian, Messom H Christopher, Yue Pik Kong, ―Fuzzy hybrid<br />
PID controller of a steam heated dryer,‖ in Proceedings of 1999 IEEE<br />
International Fuzzy System Conference, Aug 1999, pp. 1707-1711<br />
[5] Mygunsoo Jun and Michael G. Safonov, ―Automatic PID tuning: An<br />
application of unfalsified control,‖ IEEE Symposium on CACSD, August<br />
1999, pp. 1-5<br />
[6] Jose Alvarez-Ramirez, America Morales, ―PI control of continuously<br />
stirred tank reactors: stability and performance,‖ Chemical Engineering<br />
Sciences, 55, 2000, pp. 5497 – 5507<br />
[7] G. P Liu and S. Daley, ―Optimal-tuning PID control for industrial<br />
systems,‖ Control Engineering Practice, 9, 2001, pp. 1185-1194<br />
[8] K J Astrom and T Hagglund, ―The future of PID control,‖ Control<br />
Engineering Practice, vol. 9, 2001, pp. 1163-1175<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 483<br />
ISSN 2250-3153<br />
[9] G K I Mann, B G Hu and R.G Gosine, ―Time domain based design and<br />
analysis of new PID tuning rules,‖ IEEE Proceedings of Control Theory<br />
Applications, vol. 148, no. 3, May 2001, pp. 251-261<br />
[10] P. Cominos and N. Munro, ―PID controllers: recent tuning methods and<br />
design to specification,‖ IEE Proceedings of Control Theory Application,<br />
vol. 149, no. 2, Jan 2002, pp. 46-53<br />
[11] Fernando G. Martins, ―Tuning PID controllers using the ITAE criterion,‖<br />
International Journal of Engineering Education, vol. 21, no. 3, June 2005,<br />
pp. 1-7<br />
[12] Kiam Heong Ang, Gregory Chong and Yun Li, ―PID control system<br />
analysis, design and technology,‖ IEEE Transactions on Control System<br />
Technology, vol. 13, no. 4, July 2005, pp. 559-576<br />
[13] Yun Li, Kiam Heong Ang and Gregory C Y Chong, ―PID control system<br />
analysis and design,‖ IEEE Control Systems Magazine, Feb 2006, pp. 32-<br />
41<br />
[14] Nina F Thornhill, Sachin C Patwardhan, Sirish L Shah, ―A continuous<br />
stirred tank heater simulation model with applications,‖ Journal of<br />
Process Control, 18, 2008, pp. 347 – 360<br />
[15] B M Mohan and Arpita Sinha, ―Analytical structure for fuzzy PID<br />
controllers,‖ IEEE Transactions on Fuzzy Systems, vol. 16, no. 1, Feb<br />
2008, pp. 52-60<br />
[16] S M Giriraj Kumar, R Jain, N Anantharaman, V Dharmaingam and K M<br />
M Sheriffa Begum, ―Genetic algorithm based PID controller tuning for a<br />
model bioreactor,‖ Indian Chemical Engineer, vol. 50, no. 3, July-Sep<br />
2008, pp. 214 – 226<br />
[17] C R Madhuranthakam, A Elkamel, H Budman, ―Optimal tuning of PID<br />
controllers for FOPTD, SOPTD and SOPTD with lead processes,‖<br />
Chemical Engineering and Processing, 47, 2008, pp. 251 – 264<br />
[18] Ahmad Ali and Somanath Majhi, ―PI/PID controller design based on<br />
IMC and percentage overshoot specification to controller set point<br />
change,‖ ISA Transactions, vol. 48, 2009, pp. 10-15<br />
[19] J Prakash and K Srinivasan, ―Design of nonlinear PID controller and<br />
nonlinear model predictive controller for a continuous stirred tank<br />
reactor,‖ ISA Transactions, 48, 2009, pp. 273 – 282<br />
[20] R Suja Mani Malar and T Thyagarajan, ―Artificial neural networks based<br />
modeling and control of continuous stirred tank reactor,‖ American<br />
Journal of Engineering and Applied Sciences, vol. 2, no. 1, 2009, pp. 229<br />
– 235<br />
[21] R M Suja Malar, T Thyagarajan, ―Modeling of continuous stirred tank<br />
reactor using artificial intelligence techniques,‖ International Journal of<br />
Modelling, 8, 3, 2009, pp. 145 - 155<br />
[22] V Rajinikanth and K Latha, ―Identification and control of unstable<br />
biochemical reactor,‖ International Journal of Chemical Engineering and<br />
Applications, vol. 1, no. 1, June 2010, pp. 106 – 111<br />
[23] G Glandevadhas, S Pushpakumar and S V Muruga Prasad, ―Optimum<br />
setting of controller using soft computing techniques for a chemical<br />
system,‖ American Journal of Engineering and Applied Sciences, vol. 8,<br />
no. 11, 2011, pp. 1140 – 1148<br />
[24] B Wayne Bequette, Process Control: Modeling, Design and Simulation,<br />
Prentice Hall India, 2008.<br />
AUTHORS<br />
First Author– Vishal Vishnoi, M.E. (Instrumentation &<br />
Control), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID- vishalvishnoi07@gmail.com<br />
Second Author– Subhransu Padhee, M.E. (Instrumentation &<br />
Control), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID- subhransu_padhee@yahoo.com<br />
Third Author– Gagandeep Kaur, M.E. (Instrumentation &<br />
Control), Thapar University, Patiala, Punjab, India-147004<br />
E-mail ID- gagan_deep_kaur@yahoo.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 484<br />
ISSN 2250-3153<br />
Design of Fractional Order PID Controller for Speed<br />
Control of DC Motor<br />
Abstract- Conventional PID controller is one of the most<br />
widely used controllers in industry, but the recent advancement<br />
in fractional calculus has introduced applications of fractional<br />
order calculus in control theory. One of the prime applications of<br />
fractional calculus is fractional order PID controller and it has<br />
received a considerable attention in academic studies and in<br />
industrial applications. Fractional order PID controller is an<br />
advancement of classical integer order PID controller. In many a<br />
cases fractional order PID controller has outperformed classical<br />
integer order PID controller. This research paper, studies the<br />
control aspect of fractional order controller in speed control of<br />
DC motor. A comparative study of classical PID controller and<br />
fractional order PID controller has been performed.<br />
Index Terms- PID controller, Fractional order PID controller,<br />
DC motor<br />
F<br />
I. INTRODUCTION<br />
ractional order calculus has gained acceptance in last couple<br />
of decades. J Liouville made the first major study of<br />
fractional calculus in 1832. In 1867, A. K. Grunwald worked on<br />
the fractional operations. G. F. B. Riemann developed the theory<br />
of fractional integration in 1892. Fractional order mathematical<br />
phenomena allow us to describe and model a real object more<br />
accurately than the classical ―integer‖ methods. Earlier due to<br />
lack of available methods, a fractional order system was used to<br />
be approximated as an integer order model. But at the present<br />
time, there are many available numerical techniques which are<br />
used to approximate the fractional order derivatives and<br />
integrals. A typical example of a non-integer (fractional) order<br />
system is the voltage-current relation of a semiinfinite lossy<br />
transmission line [30].<br />
The past decade has seen an increase in research efforts<br />
related to fractional calculus and use of fractional calculus in<br />
control system. For a control loop perspective there are four<br />
situations like (i) integer order plant with integer order controller,<br />
(ii) integer order plant with fractional order controller, (iii)<br />
fractional order plant with integer order controller, (iv) fractional<br />
order plant with fractional order controller. Fractional order<br />
control enhances the dynamic system control performance.<br />
This paper studies the control effect of fractional order PID<br />
controller in speed control of DC motor and performs a<br />
comparative study of classical PID controller and fractional order<br />
PID controller for speed control of DC motor.<br />
Rinku Singhal, Subhransu Padhee, Gagandeep Kaur<br />
Department of Electrical and Instrumentation Engineering<br />
Thapar University, Patiala, Punjab<br />
srinku1987@gmail.com<br />
II. FRACTIONAL ORDER CALCULUS: MATHEMATICAL<br />
OVERVIEW<br />
Fractional order calculus is an area where the mathematicians<br />
deal with derivatives and integrals from non-integer orders.<br />
Gamma function is simply the generalization of the factorial for<br />
all real numbers. The definition of the gamma function is given<br />
<br />
x1z by ( x) z e dz (1)<br />
0<br />
<br />
( x) x<br />
1 !<br />
Differintegral operator is denoted by aDt . It is the<br />
combination of differentiation and integration operation<br />
commonly used in fractional calculus. Reimann- Liouville<br />
D is<br />
definition for a t<br />
D<br />
<br />
a t<br />
<br />
d<br />
0<br />
<br />
dt<br />
<br />
1 0<br />
t<br />
<br />
d 0<br />
<br />
a<br />
(2)<br />
Here is the fractional order. a and t are the limits.<br />
There are two commonly used definitions for<br />
D .<br />
1. Grunwald - Letnikov<br />
2. Riemann- Liouville<br />
general Differintegral a t<br />
Grunwald – Letnikov definition<br />
ta <br />
<br />
<br />
1 D f ( t) lim 1 f t jh<br />
h0<br />
<br />
h j0<br />
j <br />
a t<br />
h<br />
j<br />
(3)<br />
. is a flooring-operator<br />
1 Here j j1j1 <br />
(4)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 485<br />
ISSN 2250-3153<br />
Riemann- Liouville definition<br />
f <br />
<br />
<br />
n t<br />
1 d<br />
a t () n<br />
n1 ndtat <br />
D f t d<br />
(5)<br />
The condition for above equation is n1 n.<br />
. is called the gamma function.<br />
<br />
Laplace Transform of Differintegral operator<br />
Differintegral operator is denoted by aDt and the<br />
Laplace transform of Differintegral operator is<br />
represented as<br />
<br />
t st t<br />
a a <br />
0<br />
<br />
L <br />
D f t e D f t dt<br />
(6)<br />
t<br />
n1<br />
m<br />
a <br />
m0<br />
0 t<br />
j <br />
1<br />
1<br />
<br />
L <br />
D f t s F s s D f t<br />
Here n lies in between n1 n<br />
III. FRACTIONAL ORDER CALCULUS IN CONTROL<br />
One of the primary controllers is PID controller, which is<br />
widely used. Fractional controller is denoted by PI D<br />
was<br />
proposed by Igor Podlubny in 1997 [1], here and have<br />
non-integer values. Figure 1 shows the block diagram of<br />
fractional order PID controller.<br />
Figure 1: Fractional PID Controller<br />
The transfer function for conventional PID controller<br />
is<br />
us ( ) 1<br />
GPID ( s) Kc 1<br />
ds<br />
e() s is<br />
<br />
<br />
(7)<br />
<br />
Transfer function for fractional order PID controller is<br />
us ( ) 1 <br />
GFOPID ( s) Kc 1ds (8)<br />
e() s is<br />
<br />
Where λ and µ are an arbitrary real numbers, Kp is amplification<br />
(gain), Ti is integration constant and Td is differentiation constant.<br />
Taking λ=1 and µ=1, a classical PID controller is obtained. For<br />
further practical digital realization, the derivative part has to be<br />
complemented by first order filter. The filter is used to remove<br />
high frequency noise.<br />
<br />
<br />
1 ds<br />
<br />
GFOPID ( s) Kc<br />
1 <br />
is<br />
<br />
<br />
d s 1<br />
<br />
N <br />
(9)<br />
The PI λ D µ controller is more flexible and gives an opportunity to<br />
better adjust the dynamics of control system. Its compact and<br />
simple but the analog realization of fractional order system is<br />
very difficult.<br />
Intuitively, the FOPID has more degree of freedom than<br />
the conventional PID. It can be expected that the FOPID can<br />
provide better performance with proper choice of controller<br />
parameters. However, with more parameters to be tuned, the<br />
associated optimization problem will be more difficult to deal<br />
with. It is motivated to develop a systematic procedure for the<br />
FOPID optimization to achieve a certain performance.<br />
Different fractional controllers are summarized below.<br />
CRONE Controller (Commande Robuste d’Ordre<br />
Non Entier)<br />
CRONE has a French acronym which means<br />
fractional order robust control.<br />
TID Controller (Tilted Proportional Integral<br />
Controller)<br />
TID controller has the same structure as<br />
classical PID controller, but the proportional gain is<br />
replaced with a function s <br />
Fractional Lead-Lag Controller<br />
Fractional lead-lag controller is an extension<br />
of classical lead-lag controller.<br />
Related Works<br />
Fractional order PID controllers are used in<br />
many control applications. This section summarizes<br />
some of the contribution in this field.<br />
Schlegel Milos et.al [5], performed a comparison<br />
between classical controller and fractional controller<br />
and summarized that the fractional order controller<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 486<br />
ISSN 2250-3153<br />
outperforms the classical controller. D Xue et.al [6],<br />
implemented fractional order PID control in DC<br />
motor. Chuang Zhao et.al [9], Ramiro S Barbosa et.al<br />
[12] and Ying Luo et.al [17], implemented fractional<br />
order controller in position servo mechanism. Varsha<br />
Bhambhani et.al [11] implemented fractional order<br />
controller in water level control. Hyo-Sung Ahn et.al<br />
[15] implemented fractional order integral derivative<br />
controller for temperature profile control. Concepcion<br />
A. Monje et.al [16], and Fabrizio Padula et.al [26],<br />
devised methods for tuning and auto tuning of<br />
fractional order controller for industry level control.<br />
Venu Kishore Kadiyala et.al [21] implemented<br />
fractional order controller for aerofin control.<br />
Jun-Yi Cao et.al [2, 4] implemented genetic<br />
algorithm and particle swarm optimization methods<br />
for optimization of fractional order controller. Majid<br />
Zamani et.al [7] implemented particle swarm<br />
optimization for robust performance of fractional<br />
order controller. Deepyaman Maiti et.al [8],<br />
implemented particle swarm optimization for design<br />
of fractional order controller. Li Meng et.al [18]<br />
implemented multi objective genetic algorithm<br />
optimization for fractional order PID controller. Arijit<br />
Biswas et.al [20] implemented improved differential<br />
evolution techniques for design of fractional PID<br />
controller. Ammar A Aldair et.al [23] implemented<br />
evolutionary algorithm based fractional order<br />
controller for a full vehicle nonlinear activation<br />
suspension system.<br />
IV. SPEED CONTROL OF DC MOTOR USING FRACTIONAL<br />
ORDER PID CONTROLLER<br />
In this section the authors investigate the control<br />
performance of fractional order PID controller by<br />
designing a fractional order PID controller to control<br />
the speed of an armature controlled DC motor. Figure<br />
2 shows the schematic diagram of armature controlled<br />
DC motor.<br />
Figure 2: Schematic diagram of armature controlled DC motor<br />
Notations<br />
R = Armature Resistance (Ω).<br />
L = Inductance of armature winding (H).<br />
ia = Armature current (A).<br />
if = Field current (A).<br />
ea = applied armature voltage (V)<br />
eb = back emf (V)<br />
Tm = torque developed by motor (Nm)<br />
θ = angular displacement of motor shaft (rad).<br />
ω = angular speed of motor shaft (rad/sec.)<br />
J = equivalent moment of inertia of motor and load referred to<br />
motor shaft (kg-m 2 )<br />
B = equivalent friction coefficient of motor and load referred to<br />
motor shaft (Nm*s/rad)<br />
Mathematical Modeling<br />
In servo applications, the DC motors are generally used<br />
in the linear range of magnetization curve. Therefore, the air gap<br />
Ki<br />
flux ϕ is proportional of field current, i.e. f f<br />
Where K f is constant.<br />
The torque Tm developed by the motor is proportional to the<br />
product of armature current and air gap flux, i.e.<br />
T K K i i<br />
(10)<br />
m 1 f f a<br />
Here 1<br />
K is constant.<br />
In armature controlled dc motor, the field current is kept<br />
T K i<br />
(11)<br />
constant, so m T a<br />
Here K T is known as the motor torque constant.<br />
The motor back EMF being proportional to speed is given as<br />
d<br />
eb Kb dt<br />
(12)<br />
Here K b is the back EMF constant.<br />
The differential equation of the armature circuit is<br />
dia<br />
L Ria eb ea<br />
dt<br />
0<br />
(13)<br />
2<br />
d d<br />
J B T 2 m KTia (14)<br />
dt dt<br />
The torque equation is<br />
Applying Laplace transform<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 487<br />
ISSN 2250-3153<br />
ebsKbss Ls R I s e s e s (15)<br />
(16)<br />
a a b<br />
2 Js Bs s Tm s KTia s (17)<br />
So the final transfer function will be<br />
<br />
s KT<br />
<br />
<br />
Eas s R Ls Js B KTKb <br />
G s<br />
s KT<br />
<br />
<br />
<br />
Eas R Ls Js B KTKb (a)<br />
(b)<br />
Figure 3(a) (b): Block diagram of armature controlled DC Motor<br />
(18)<br />
(19)<br />
After applying the values of DC motor parameters<br />
as mentioned in appendix A, final transfer function<br />
can be represent as:<br />
0.0924<br />
Gs () <br />
(20)<br />
7<br />
2<br />
8.4910 s 0.00585s0.01729 Eq(20) represents the transfer function of DC<br />
motor. The primary objective is to control the speed of<br />
DC motor using fractional order PID controller.<br />
Section V shows the results of speed control using<br />
conventional and fractional PID controller.<br />
V. RESULTS AND DISCUSSIONS<br />
This section shows the results of speed control of<br />
DC motor using conventional PID controller and<br />
fractional order PID controller. Ziegler-Nicholas<br />
tuning method is used to tune the conventional PID<br />
controller. Proportional Gain Kp, Derivative Gain Kd<br />
and Integral Gain Ki of conventional PID controller<br />
are 0.05, 0.0525 and 0.98 respectively. Unit step<br />
response of DC motor for different values of Kp, Kd,<br />
Ki are shown in figure 4.<br />
Figure 4: Unit step response for different values of Kp, Kd, Ki<br />
To evaluate the performance of the unit step response<br />
different steady state and transient state parameters<br />
are taken in to consideration. The parameters are peak<br />
overshoot, peak time and settling time. For different<br />
values of proportional gain, derivative gain and<br />
integral gain the values of the parameter are shown in<br />
table 1.<br />
Table 1: Performance parameters for different values of Kp, Kd, Ki<br />
Kp Ki Kd %Overshoot Peak Time<br />
Settling<br />
Time<br />
0.05 0.98 0.0525 29.5939 1.9937 5.5025<br />
0.09 1.456 0.0929 37.9562 2.0736 6.5158<br />
0.785 1.39 0.099 39.3546 2.0241 6.7980<br />
0.06 1.2 0.059 33.3067 1.9835 5.7706<br />
The unit step response gives an overshoot of 29.5%<br />
which is undesirable. To minimize the overshoot,<br />
fractional order PID controller can be used in place of<br />
conventional PID controller. In fractional order PID<br />
controller the order of the integral and derivative are<br />
in fractions. This paper evaluates the performance of<br />
the controller with different combinations of µ and λ,<br />
and tries to find the best combination of µ and λ in a<br />
heuristic method. Different combinations of µ and λ<br />
are shown below.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 488<br />
ISSN 2250-3153<br />
i. λ=1 and µ1<br />
vii. λ1<br />
viii. λ>1 and µ
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 489<br />
ISSN 2250-3153<br />
Figure 7: Unit Step Response of DC motor Control using FOPID for Different<br />
Values of λ1<br />
The transient and steady state parameters of unit step<br />
response with different combinations of λ and µ are shown in<br />
table 5.<br />
Table 5: Comparison of Parameters for Different Combinations of λ and µ<br />
<br />
Mp Tp Ts ISE IAE ITAE<br />
1 1.05 27.8089 2.0473 5.5645 .2777 .5891 .9141<br />
1 1.1 23.7612 2.0413 4.6560 .232 .5226 .8725<br />
1 1.15 17.1389 2.1465 4.7784 .1523 .4428 1.052<br />
It can be seen that from the above table 5 that with the increase in<br />
the value of µ, control parameters are reduce upto the value of λ<br />
=1 and µ=1.15.after these response will be more slow and more<br />
oscillatory.<br />
(iv) With varying values of λ>1 and µ=1<br />
Figure 9 shows the unit step response of speed control of DC<br />
motor with λ> 1 and µ=1<br />
Figure 9: Unit Step Response of DC motor using FOPID for Different Values of<br />
λ >1<br />
Table 6: Comparison of Parameters for Different Combinations of λ and µ<br />
Mp Tp Ts ISE IAE ITAE<br />
1.1 1 28.1038 2.213 5.8632 .3186 .6525 1.199<br />
1.2 1 26.9088 2.1637 5.906 .3354 .668 1.22<br />
1.3 1 25.9522 2.2026 5.8922 .3521 .684 1.243<br />
1.4 1 25.1895 2.2377 5.2537 .3686 .7003 1.267<br />
1.5 1 24.5857 2.2695 5.2965 .3847 .7167 1.293<br />
1.6 1 24.1127 2.2978 5.3295 .4005 .733 1.319<br />
1.7 1 23.7982 2.3228 5.3536 .4158 .7491 1.345<br />
1.8 1 23.476 2.3457 5.3705 .4307 .965 1.373<br />
1.9 1 23.2754 2.3669 5.3817 .445 .7805 1.4<br />
It can be seen that from the above table 6 with the increase in the<br />
value of λ, peak overshoot reduces but system will be slow.<br />
(v) With varying values of λ>1 and µ>1<br />
Figure 10 shows the unit step response of speed control of DC<br />
motor with λ> 1 and µ>1<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 490<br />
ISSN 2250-3153<br />
Figure 10: Unit Step Response of DC motor using FPID for Different Values of λ<br />
>1 and µ>1<br />
Table 7: Comparison of Parameters for Different Combinations of λ and µ<br />
<br />
Mp Tp Ts ISE IAE ITAE<br />
1.5 1.05 22.6561 2.2488 5.1095 .3588 .669 1.166<br />
1.5 1.1 19.3614 2.2628 5.0276 .3143 .6149 1.054<br />
1.5 1.15 15.2327 2.4100 5.1690 .2349 .5083 1.091<br />
1.7 1.05 21.7979 2.3060 5.1665 .3895 .7018 1.222<br />
1.7 1.1 18.7298 2.3235 5.0846 .3453 .652 1.116<br />
1.7 1.15 15.2073 2.1774 5.0176 .266 .6141 1.033<br />
1.9 1.05 21.3166 2.3520 5.1959 .4183 .7342 1.275<br />
1.9 1.1 18.4303 2.3738 5.1230 .3744 .6873 1.178<br />
1.9 1.15 15.3788 2.5293 5.3213 .2952 .657 1.262<br />
It can be seen from the above table 7 that all the different<br />
combinations of λ and µ, control parameters for the values of<br />
λ=1.7 and µ=1.15 are less than other values of λ and µ.<br />
(vii) With varying values of λ1<br />
Figure 11 shows the unit step response of speed control of DC<br />
motor with λ1<br />
Figure 11: Unit Step Response of DC motor using FOPID for different Values of<br />
λ1<br />
Table 8: Comparison of Parameters for Different Combinations of λ and µ<br />
Mp Tp Ts ISE IAE ITAE<br />
.5 1.01 43.5083 1.7294 5.4501 .2147 .5439 1.012<br />
.5 1.1 38.8578 1.6955 4.8685 .1687 .4679 .8576<br />
.5 1.15 27.1098 1.6918 4.9308 .08584 .3453 .7442<br />
.7 1.01 36.4376 1.8956 5.7249 .2532 .5946 1.12<br />
.7 1.1 30.6041 1.8496 4.7835 .188 .4819 .866<br />
.7 1.15 21.3701 1.8986 4.8358 .1074 .3751 .7721<br />
.9 1.01 31.1797 2.0156 5.5637 .282 .6155 1.139<br />
.9 1.1 25.5206 1.9830 5.1964 .2162 .5062 .8874<br />
.9 1.15 18.1406 2.0724 4.6213 .1363 .4186 .836<br />
It can be seen from the above table 8 that all the different<br />
combinations of λ and µ,peak overshoot will be less for the<br />
combination for λ=.9 and µ=1.15.<br />
(viii) With varying values of λ>1 and µ 1 and µ
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 491<br />
ISSN 2250-3153<br />
Figure 12: Unit Step Response of DC motor using FOPID for different Values of<br />
λ >1 and µ
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 492<br />
ISSN 2250-3153<br />
[14] Mithun Chakraborty, Deepyaman Maiti and Amit Konar, ―The application<br />
of stochastic optimization algorithms to the design of a fractional-order PID<br />
controller,‖ 2008 IEEE region 10 colloquium, 3 rd ICIIS, 2008, pp. 1-6<br />
[15] Hyo-Sung Ahn, Varsha Bhambhani and YangQuan Chen, ―Fractional-order<br />
integral and derivative controller design for temperature profile control,‖ in<br />
Proc. 2008 CCDC-2008, pp. 4767-4771<br />
[16] Concepcion A. Monje, Blas M. Vinagre, Vicente Feliu, YangQuan Chen,<br />
―Tuning and auto-tuning of fractional order controllers for industry<br />
applications,‖ Control Engineering Practice, 16, 2008, pp. 792 – 812<br />
[17] Ying Luo and YangQuan Chen, ―Fractional order [PD] controller for robust<br />
motion control: Tuning procedure and validation,‖ 2009 American control<br />
conf., 2009, pp. 1412-1417<br />
[18] Li Meng, Dingyu Xue, ―Design of an optimal fractional-order PID<br />
controller using multi-objective GA optimization,‖ Proc. Chinese Contr.<br />
Desi. Conf., 2009, pp. 3849-3853<br />
[19] Ivo Petras, ―Fractional-order feedback control of a DC motor,‖ J. Elect.<br />
Engg., vol. 60, no. 3, 2009, pp. 117-128<br />
[20] Arijit Biswas, Swagatam Das, Ajith Abraham, Sambarta Dasgupta, ―Design<br />
of fractional order PI λ D μ controller with improved differential evolution,‖<br />
Engineering Applications of Artificial Intelligence, 22, 2009, pp. 343-350<br />
[21] Venu Kishore Kadiyala, Ravi Kumar Jathoth, Sake Pothalaiah, ―Design and<br />
implementation of fractional order PID controller for aerofin control<br />
system,‖ Proc. 2009 World Congress NaBIC, 2009, pp. 696-701<br />
[22] Mohamed Karim Bouafoura, Naceur Benhadj Braiek, ―PID controller<br />
design for integer and fractional plants using piecewise orthogonal<br />
functions,‖ Commun Nonlinear Sci Number Simulat 15, 2010, pp. 1267-<br />
1278<br />
[23] Ammar A Aldair, and Weiji J Wang, ―Design of fractional order controller<br />
based on evolutionary algorithm for a full vehicle nonlinear active<br />
suspension system,‖ Int. J. Contr Automation, vol. 3, no. 4, 2010, pp. 33-46<br />
[24] Juan J. Gude and Evaristo Kahoraho, ―Analysis and performance<br />
comparison of PID and fractional PI controllers,‖ Proc. 9 th Int. Symps.<br />
Dynamics and Control of Process Systems, 2010, pp. 503-508<br />
[25] Ricardo Enrique Gutierrez, Joao Mauricio Rosario, Jose Tenreio Machado,<br />
―Fractional order calculus: Basic concepts and engineering applications,‖<br />
Mathematical Problems in Engineering, Hindwai Publishing Corporation,<br />
vol. 2010. 2010. pp. 1- 19<br />
[26] Fabrizio Padula, Antonio Visioli, ―Tuning rules for optimal PID and<br />
fractional order PID controllers,‖ Journal of Process Control, 21, 2011, pp.<br />
69-81<br />
[27] S A David, J L Linares e EMJA Pallone, ―Fractional order calculus:<br />
Historical apologia, basic concepts and some applications,‖ Revista<br />
Brasileira de Ensino de Fisica, vol. 33, no. 4, 2011<br />
[28] Abir De, Sidhartha Sen, ―Root locus method for any fractional order<br />
commensurate system,‖ in Proceedings of IEEE TechSym-2011,2011<br />
[29] Radek Matusu, ―Application of fractional order calculus to control theory,‖<br />
International Journal of Mathematical Models and Methods in Applied<br />
Sciences, issue 7, vol 5, 2011, pp. 1162 – 1169<br />
[30] Ivo Petras, Fractional-order nonlinear systems: Modeling, Analysis and<br />
Simulation, Springer, 2010<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 493<br />
ISSN 2250-3153<br />
FUZZY GRAPHS ON COMPOSITION, TENSOR AND<br />
NORMAL PRODUCTS<br />
Dr. G.NIRMALA* and M.VIJAYA**<br />
*Associate Professor, P.G & Research Department of Mathematics,<br />
K.N.G Arts College for Women (Autonomous), Thanjavur- 613007.Tamil Nadu, India<br />
nirmalamanohar11@yahoo.com<br />
**Head, Department of Mathematics, Marudupandiyar College, Thanjavur- 613403,<br />
Tamil Nadu, India. mathvijaya79@yahoo.com<br />
Abstract<br />
Special fuzzy graph can be obtained from two given fuzzy graphs using the operations, Cartesian product, composition, tensor and<br />
normal products. In this paper, we find the degree of a vertex in fuzzy graphs formed by these operations in terms of the degree of<br />
vertices in the given fuzzy graphs in some particular cases.<br />
Index Terms- Cartesian product, Composition, Degree of a vertex, Tensor product, Normal product.<br />
1. Introduction<br />
Fuzzy graphs introduced by Rosenfeld in 1975[1-2,9,10]. The operations of union, join, Cartesian product and composition<br />
on two fuzzy graphs were defined by Moderson.J.N. and Peng.C.S [3-8]. In this paper, we study about the degree of a vertex in fuzzy<br />
graphs which are obtained from two given fuzzy graphs using the operations Cartesian product and composition of two fuzzy graphs,<br />
tensor and normal product of two fuzzy .In general, the degree of vertices in Cartesian product and composition of two fuzzy graphs,<br />
tensor and normal product of two fuzzy graphs G1 andG2 cannot be expressed in terms of those in G1 andG2. In this paper, we find the<br />
degree of vertices in Cartesian product, composition, tensor and normal product of G1 andG2 in some particular cases.<br />
2. Research Elaborations<br />
Definition 2.1: A fuzzy subset of a set V is a mapping σ from V to [0, 1]. A fuzzy graph G is a pair of<br />
functions G: (σ, μ) where σ is a fuzzy subset of a non empty set V and μ is a symmetric fuzzy relation on σ,<br />
(i.e.) μ (uv) ≤ σ (u) ∧ σ (v). The underlying crisp graph of G: (σ, µ) is denoted by G*: (V, E) where E⊆ V× V.<br />
Definition 2.2: Let G: (σ, µ) be a fuzzy graph. The degree of a vertex u in G is defined by<br />
dG(u) =<br />
=<br />
Definition 2.3: The order of a fuzzy graph G is defined by O (G) =<br />
Note: Throughout this paper G₁: (σ₁, μ₁) and G₂ :( σ₂, μ₂) denote two fuzzy graphs with<br />
underlying crisp graphs G₁*: (V₁, E₁) and G₂* :( V₂, E₂) with | Vi | =Pi, i = 1, 2. Also d (Gi*) (ui)<br />
denotes the degree of ui in Gi*<br />
Definition 2.4: The cartesian product of two fuzzy graphs G₁ and G₂ is defined as a fuzzy graph G = G₁ x<br />
G₂ : ( σ₁x σ₂ , μ₁ x μ₂ ) on G*: (V, E) where V=V₁ x V₂ and E= {((u₁,u₂)(v₁,v₂)) /<br />
u₁=v₁, u₂v₂ E₂ or u₂=v₂ ,u₁v₁ E₁} with<br />
(σ1 x σ2)(u1, u2) = σ₁(u₁) ∧ σ2(u2), for all (u1,u2) V₁ × V₂<br />
& (µ1 × µ2)(( u1,u2)( v1,v2)) =<br />
Definition 2.5: The Composition of two fuzzy graphs G₁ and G₂ is defined as a fuzzy graph G= G1 [ G₂ ] :<br />
( σ₁ ⃘ σ₂ , μ₁ ⃘ μ₂ ) on G*:(V,E) where V= V₁ × V₂ and E={((u1,u2)(v1,v2)) / u1=v1 , u2v2 E2 or<br />
u2 ≠ v2 ,u₁v₁ E1} with<br />
(σ1 x σ2)(u1, u2) = σ₁(u₁) ∧ σ2(u2), for all (u1,u2) V₁ × V₂<br />
& (µ1 × µ2)(( u1,u2)( v1,v2)) =<br />
3. Results<br />
Definition 3.1: The normal product of two fuzzy graphs (σi, µi) on Gi = (Vi , Xi), i=1,2 is defined as a fuzzy graph (σ1 ⃘ σ2 ,<br />
µ1 ⃘ µ2) on G = (V,X) where V= V1 X V2 and X ={((u,u2)(u,v2) \<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 494<br />
ISSN 2250-3153<br />
u V1, (u2v2) X2} {((u1,w)(v1,w))\ (u1,v1) X1,w V2} ∪{(u1, u2)(v1,v2)\(u₁v₁)∈X₁,(u₂v₂)∈X₂} Fuzzy sets σ1 ⃘ σ2 and µ1 ⃘ µ2 are<br />
defined as (σ1 ⃘σ2) (u1, u2) = (σ1(u1) ∧<br />
σ2(u2) ) (u1, u2) V1xV2 ( 1 ⃘ 2) ((u, u2)(v1, v2)) = { 1(u)∧ 2 (u2v2) }<br />
u V1 and (u2v2) X2 1 ⃘ 2) ((u1, w)(v1, w)) = { 1 (u1v1)∧ 2(w)}<br />
w V2 and (u1v1) X1 (µ1 ⃘ 2) ((u1,u₂)(v₁,v2)) = {µ1(u₁v₁)∧µ2(u₂v2)}<br />
(u1u2) X1 and (v1v2) X2<br />
Definition 3.2: The tensor Product of two fuzzy graphs (σi, µi) on Gi = (Vi , Xi), i=1,2 is defined as a fuzzy graph (σ₁⊗ σ2<br />
, µ1 ⊗ µ2) on G = (V,X) where V= V1 X V2 and X ={(u1, u2), (v1, v2)\(u₁,v₁)∈X₁,(u₂,v₂)∈X₂}. Fuzzy sets σ1⊗ σ2 and µ₁⊗<br />
µ2 are defined as 1 ⊗ 2) (u1, u2) = {( 1 (u1) ∧ 2<br />
(u2)} for all (u1, u2) V ( 1 ⊗ 2) {(u1, u2), (v1, v2)} = 1<br />
(u1, v1) ∧ 2 (u2, v2)} (u1, u2) X1 and (v1, v2) X2<br />
3.1 Degree of a vertex in Cartesian product By the<br />
definition, for any vertex (u1, u2) ∈ V1 x V2, dG xG₂ (u₁,u₂) =<br />
= +<br />
In the following theorems, we find the degree of (u1, u2) in G1 X G2 in terms of those in G1 and G2 in some particular cases.<br />
Theorem 3.1: Let G1:(σ₁,µ₁) and G2:(σ₂,µ₂) be two fuzzy graphs. If σ1≥ µ2 and σ2 ≥ µ1 then d G₁ x G₂ (u₁,u₂) =<br />
dG₁(u₁) +dG₂(u₂).<br />
Proof: From the definition of a degree of a vertex in cartesian product<br />
d G₁ x G₂ (u₁,u₂) = +<br />
= + (since σ1≥ µ2 and σ2 ≥ µ1) = dG₁ (u1) +dG₂<br />
(u2). Example 3.1<br />
u₁ (.6)<br />
.5<br />
u₁ (.7)<br />
G1<br />
u₂ (.5) v₂ (.7)<br />
.4<br />
.5<br />
.5<br />
G2<br />
σ₁≥µ₂<br />
σ₂≥µ₁<br />
(u₁, u₂).5 (u₁, v₂) .6<br />
.4<br />
.5<br />
(v₁, u₂).5 .4 (v₁, u₂) .7<br />
Figure. 1. Cartesian product of G₁ & G₂ (G₁ x G₂)<br />
Here G₁, G₂ are two fuzzy graphs d G₁ x G₂<br />
(u₁,u₂) = dG₁(u₁) + dG₂ (u2). ( since σ₁≥µ₂, σ₂≥µ₁ & by theorem 3.1 )<br />
= .5 + .4<br />
= .9<br />
d G₁ x G₂ (u₁,v₂) = .5 + .4<br />
= .9 Similarly<br />
we can find the degrees of all the vertices in G₁ x G₂. This can be verified in the figure 1.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 495<br />
ISSN 2250-3153<br />
3.2 Degree of a vertex in composition By the<br />
definition, for any vertex (u1,u2) ∈ V1 x V2, d G₁ x G₂<br />
(u1,u2) = µ₂)((<br />
= + + µ₁ (u₁ v₁)<br />
Theorem 3.2 Let G1: (σ₁, µ₁) and G2 :(σ2,µ2) be two fuzzy graphs. If σ1≥ µ2 and σ2 ≥ µ1 then<br />
dG₁[G2](u₁,u₂) =P₂ dG₁(u₁) +dG₂(u₂).<br />
Proof: d G₁ [G₂]<br />
(u1,u2) = + + µ₁ (u₁v₁) =<br />
+ + (since σ₁ ≥ µ₂ and σ₂ ≥ µ₁) = d G₂ (u2) +| V2 |<br />
= d G₂ (u2) + p₂ d G₁(u₁).<br />
Example 3.2<br />
u₁ (.6)<br />
.5<br />
u₁ (.7)<br />
G1<br />
Consider the fuzzy graphs G₁, G₂ and G₁ [G₂] in figure 2 .<br />
u₂ (.5) v₂ (.7)<br />
.4<br />
G2<br />
(u₁, u₂).5 (u₁, v₂) .7<br />
.4<br />
.5<br />
.5 .5<br />
.5<br />
.4<br />
(v₁, u₂).5 (v₁, u₂) .7<br />
Figure .2. Composition of G₁ & G₂ (G₁ [G₂])<br />
Here σ₁ ≥ µ₂ and σ₂ ≥ µ₁ and by theorem 3.2 d G₁ [G₂] (u₁,u₂) =<br />
dG₂(u₂) +P₂dG₁(u₁).<br />
= .4 + 2 (.5)<br />
=1.4 d G₁ [G₂] (u₁,v₂) = dG₂(v₂)<br />
+P₂dG₁(u₁).<br />
= .4 + 2(.5)<br />
= 1.4<br />
Similarly we can find the degrees of all the vertices in G₁[ G₂]. This<br />
can be verified in the figure 2.<br />
3.3 Degree of a vertex in tensor product<br />
By definition, for any (u₁, u₂) ∈ V₁ × V₂<br />
d G₁ ⊗ G₂ (u₁, u₂) = ∑ (µ₁ ⊗ µ₂)(( u₁, u₂)( v₁, v₂)) =<br />
Theorem 3.3: Let G₁ : (σ₁, µ₁) and G₂ : (σ₂, µ₂) be two fuzzy graphs. If µ₂ ≥ µ₁ then<br />
d G₁ ⊗ G₂ (u₁, u₂) = dG₁(u₁).And if µ₁≥µ₂ then d G₁ ⊗ G₂ (u₁, u₂)<br />
= dG₂(u₂). Proof: d G₁ ⊗<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 496<br />
ISSN 2250-3153<br />
G₂ (u₁, u₂) = = ∑ µ₁ (u₁,<br />
v₁) = dG₁(u₁)<br />
Example 3.3<br />
Consider the fuzzy graphs G₁ and G₂ in fig 3. Here µ₂ ≥ µ₁ and by theorem 3.3 d G₁ ⊗ G₂<br />
(u₁, u₂) = dG₁(u₁) = .6<br />
d G₁ ⊗ G₂(v₁,v₂) = dG₁(v₁)<br />
= .6 This can be<br />
verified in the fig 3.<br />
3.4 Degree of a vertex in normal product By definition,<br />
for any (u₁, u₂) ∈ V₁ × V₂ dG₁ ⃘ G₂ (u₁, u₂) =<br />
=<br />
Theorem 3.4 Let G1: (σ₁,µ₁) and G2:(σ2,µ2) be two fuzzy graphs. If σ1≥ µ2 , σ2 ≥ µ1 and µ₁≤µ₂ then dG₁ ⃘G₂(u1,u2) =P2 dG1(u1)<br />
+dG2(u2).<br />
Proof:<br />
dG₁ ⃘ G₂ (u₁, u₂) =<br />
=<br />
G₁(u₁).<br />
u₁ (.9)<br />
.6<br />
v₁ (.7)<br />
u₂ (.9)<br />
.7<br />
v₂ (.8)<br />
( u₁, u₂)(.9) ( u₁, v₂)(.8)<br />
.6 .6<br />
(v₁, u₂)(.7) (v₁, v₂)(.7)<br />
G₁ G₂ G₁⊗ G₂<br />
Figure. 3. Tensor product of G₁& G₂ (G₁⊗ G₂)<br />
= +<br />
+ (since σ₁ ≥ µ₂, σ₂ ≥ µ₁ and µ₁≤µ₂)<br />
= d G₂ (u2) +| V2 | d G₁(u₁). = d G₂ (u2) + p₂ d<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 497<br />
ISSN 2250-3153<br />
Example 3.4 u₁ (.6)<br />
Consider the fuzzy graphs G₁ and G₂ in figure 4. Here σ1≥ µ2 , σ2 ≥ µ1 and µ₁≤µ₂ and by theorem 3.4 d G₁ ⃘ G₂(u₁,u₂)<br />
= dG₂(u₂) + P₂dG₁(u₁)<br />
=.4 + 2( .3)<br />
=1 d G₁ ⃘<br />
G₂(v₁,v₂) = dG₂(v₂) + P₂dG₁(v₁)<br />
= .4 + 2( .3 )<br />
= 1 Similarly we can find the<br />
degrees of all the vertices in G₁ x G₂. This can be verified in the figure 3.<br />
Conclusion<br />
In this paper ,we have found the degree of vertices in G₁ x G₂, G₁[G₂], G₁ ⊗ G₂, G₁ ⃘ G₂ in terms of the degree of<br />
vertices in G₁ and G₂ under some conditions and illustrated them through examples. This will be helpful when the graphs are very<br />
large. Also they will be very useful in studying various properties of cartesian product, composition, tensor product, normal product of<br />
two fuzzy graphs.<br />
REFERENCES<br />
.3<br />
5<br />
v₁ (.7)<br />
G1<br />
u₂ (.5) v₂ (.7)<br />
.4<br />
G2<br />
(u₁, u₂).5 (u₁, v₂) .7<br />
.4<br />
.3<br />
5<br />
.3<br />
45<br />
.3<br />
45<br />
.4 (v₁,<br />
u₂).5 G₁ ⃘ G₂ (v₁, v₂) .7<br />
Figure.4. Normal product of G₁ & G₂ (G₁ ⃘ G₂)<br />
[1] R.Balakrishnan and K.Ranganathan, A text book of Graph Theory, Spinger, 2000.<br />
[2] A.Roseneld, fuzzy graphs, in: L.A.Zadeh, K.S. Fu,, K .Tanaka, M.Shimura (Eds), Fuzzy sets and Their Applications to Cognitive and Decision Processes,<br />
Academic Press, New York,1975,pp77-95.<br />
[3] J.N.Mordeson, C.S.Peng, ―Operation on fuzzy graphs‖. Information Sciences 79 (1994) 159-170.<br />
[4] J.N.Mordeson, & P.S.Nair, Information Sciences 90 (1996) 39-49.<br />
[5] John N.Mordeson and Premchand S.Nair, Fuzzy Graphs and Fuzzy hypergraphs, Physica – Verlag, Heidelberg 2000.<br />
[6] A.Nagoorgani and V.T.Chandrasekaran, ―Fuzzy graph Theory‖, Allied Publishers pvt. Ltd<br />
[7] A.Nagoorgani & M.Basheer Ahamed, 2003, ―Order and Size of fuzzy graphs‖, Bullet ion of pure and applied sciences. 22E (1), pp. 145-148.<br />
[8] A.Nagoorgani & K.Radha,2009,‖The degree of a vertex in some fuzzy graphs‖,International Journal of Algorithms,Computing and Mathematics‖,vol 2 (107-<br />
116).<br />
[9] Harary.‖F,.Graph Theory‖, Addition Wesly, Third printing, October 1972.<br />
[10] Zimmermann, H.J., ―Fuzzy Set Theory and its applications‖,Kluwer-Nijhoff,Boston,1985.<br />
.3<br />
5<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 498<br />
ISSN 2250-3153<br />
AUTHORS<br />
Dr. G. NIRMALA<br />
Associate Professor, P.G & Research Department of Mathematics,<br />
K.N.G Arts College for Women (Autonomous), Thanjavur- 613007.Tamil Nadu, India.<br />
nirmalamanohar11@yahoo.com<br />
Correspondence Author:<br />
M.VIJAYA<br />
Head, Department of Mathematics,<br />
Marudupandiyar College, Thanjavur- 613403, Tamil nadu, India.<br />
mathvijaya79@yahoo.com<br />
M. No:+91 9443560178<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 499<br />
ISSN 2250-3153<br />
Text Fusion in Medical Images Using Fuzzy Logic Based<br />
Matrix Scanning Algorithm<br />
Pinki Jain, Anu Aggarwal (Guide)<br />
Doon Valley Institute of Engineering and Technology, Kurukshetra University, Karnal, India<br />
Faculty of Doon Valley Institute of Engineering and Technology, Kurukshetra University, Karnal, India<br />
Abstract- Text fusion in medical images is an important<br />
technology for image processing. We have lots of important<br />
information related to the patient‘s reports and need lots of space<br />
to store and the proper position and name which relates that<br />
image with that data.<br />
In our work we are going to find out the AOI (area of interest)<br />
for the particular image and will fuse the related document in the<br />
NAOI (non area of interest) of the image, till yet we have many<br />
techniques to fuse text data in the medical images one of form<br />
them is to fuse data at the boarders of the images and build the<br />
particular and pre defined boarder space.<br />
We are going to propose an algorithm called fuzzy logic based<br />
matrix scanning algorithm in which we will first find out the area<br />
of interest and after that we find noisy pixels of the image to<br />
embed data in that noisy portions to save the boarder size. Our<br />
proposed technique is LSB to store text data in pixels. We use<br />
MATLAB for carrying out implementation on our proposed<br />
work.<br />
Index Terms- Electronic Patient Record, medical images, Text<br />
data, text fusion<br />
D<br />
I. INTRODUCTION<br />
ue to the development of latest technologies in<br />
communication and computer networks, exchange of<br />
medical images between hospitals has become a usual practice<br />
now days. Healthcare institution that handles a number of<br />
patients, opinions is often sought from different experts. It<br />
demands the exchange of the medical history of the patient<br />
among the experts which includes the clinical images,<br />
prescriptions, initial diagnosis etc. With the increasing use of<br />
Internet, these digital images can be easily accessed and<br />
manipulated. Considering patient‘s privacy and diagnostic<br />
accuracy, the prevention of medical images from tampering tends<br />
to be an urgent task. It is required to imbibe the aspects of<br />
confidentiality, authentication and integrity with the distribution<br />
of these images in the Health Information System. Medical<br />
images are exchanged for number of reasons, for example<br />
teleconferences among clinicians, interdisciplinary exchange<br />
between radiologists for consultative purposes, and distant<br />
learning of medical personnel. Most hospitals and health care<br />
systems involve a large amount of data storage and transmission<br />
such as administrative documents, patient information, and<br />
medical images, and graphs. Among these data, the patient<br />
information and medical images need to be organized in an<br />
appropriate manner in order to facilitate using and retrieving<br />
such data and to avoid mishandling and loss of data. In order to<br />
overcome the capacity problem and to reduce storage and<br />
transmission cost, data hiding techniques are used for concealing<br />
patient information with medical images. Those data hiding<br />
techniques can be also used for authentication. These<br />
applications demand large amount of patient information<br />
available in one single image rather than over several entities.<br />
In medical images, AOI is an area which contains important<br />
information and must be stored without any distortion. In this<br />
paper , we present an fuzzy logic based matrix scanning<br />
algorithm which finds the noisy pixels in the medical images by<br />
scanning the whole image in several directions using 3*3<br />
scanning window .Then patient data is hidden inside these pixel.<br />
A. Related Researches<br />
1. In 2005, Hung kyo lee proposed digital watermarking<br />
technique for medical image that prevents illegal forgery that can<br />
be caused after transmitting medical image data remotely[1]. A<br />
wrong diagnosis may be occurred if the watermark is embedded<br />
into the whole area of image. Therefore, they embed the<br />
watermark into some area of medical image, except the decision<br />
area that makes a diagnosis so called region of interest (ROI)<br />
area in our paper, to increase invisibility. The watermark is the<br />
value of bit-plane in wavelet transform of the decision area for<br />
certification method of integrity verification. The experimental<br />
results show that the watermark embedded by the proposed<br />
algorithm can survive successfully in image processing<br />
operations such as JPEG lossy compression.<br />
2. In 2007, Rodríguez-Colín Raúl, Feregrino-Uribe Claudia,<br />
Trinidad-Blas Gershom de J. proposed watermarking scheme<br />
that combines data compression, encryption and watermarking<br />
techniques and image moment theory applied to radiological<br />
medical images[2]. In this work we use DICOM data as a<br />
watermark to embed in medical images. Image quality is<br />
measured with metrics which are used in image processing such<br />
as PSNR and MSE. Our results show good accuracy in the<br />
watermark extraction process.<br />
3. In 2009, Liu Xin a semi-fragile digital watermarking<br />
algorithm[3] is proposed based on integer wavelet transform to<br />
estimate integrity and authenticity of medical images. Using<br />
matrix norm quantization, it embeds watermarks into mediumfrequency<br />
an high-frequency detail sub-bands of medical images‘<br />
integer wavelet domain and it is a blind-testing watermarking<br />
algorithm. Attacking experiments show that the algorithm not<br />
only has both robustness and sensitivity, but also exactly locates<br />
distorted area, so it is an effective semi-fragile digital<br />
watermarking algorithm for medical image field. Semi-fragile<br />
watermarks require not only certain robustness but also<br />
sensitivity, so this paper proposes a semi-fragile watermarking<br />
algorithm based on integer wavelet transform and matrix norm<br />
quantization, in which watermarks are separately embedded into<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 500<br />
ISSN 2250-3153<br />
medium-frequency and high frequency in medical images‘<br />
integer wavelet domain.<br />
II. PROPOSED METHOD<br />
Our proposed work consists of two modules:<br />
A. Module 1<br />
It is the first module we read the host image file on which we are<br />
going to implement our algorithm to MATLAB workspace and<br />
do the needful changes on that like if the image is in RGB format<br />
we convert it into grayscale and if the size of the image is too big<br />
then convert it to the nominal size.Then the normalization of<br />
light intensity for the image is to be done so that we can get more<br />
specific intensities to work with that.After the normalization we<br />
proceed with the finding the noisy pixels in the image by various<br />
scanning methods. We are going to implement a new fuzzy logic<br />
based (5x5) and (3x3) matrix scanning algorithm which will scan<br />
the whole picture in several directions and according to the<br />
direction of the majority carries the direction on the preceding<br />
pixel will be decided. According to which we can able to decide<br />
whether the point is a noise or not.<br />
B. Module 2<br />
After detecting the noisy coordinates of the image we add our<br />
data to them as a watermarking content and save the positions<br />
where we are going to fuse our patient data in image. After<br />
fusing the data in noisy coordinates we again calculates the<br />
reaming data to be hide or not and if there will be any data left to<br />
fuse in the image then our algorithm proceed towards hiding the<br />
data in the image boarder and generates only that much of<br />
boarder which is needed to be store the remaining data and cuts<br />
rest of the non area of interest to save image.<br />
C. Fusion of patient data in medical image<br />
Fuzzy logic based matrix scanning algorithm<br />
As we propose an algorithm which finds the non area of interest<br />
in the medical image. A 3*3 scanning window is used to find the<br />
non area of interest in medical image. Our algorithm works as<br />
follows:<br />
1. Initialize Naoi (non area of interest) equal to zero.<br />
2. Then, separate the color planes of the image .We will<br />
embed the patient data in any one color plane of the<br />
image. We separate green color plane and starts work on<br />
this.<br />
3. The size of the resulting image is determined.<br />
4. Our algorithm completes when<br />
The total length of the data > Naoi<br />
5. For j = 1 to col -2<br />
For i= 1 to row – 2<br />
Where i,j are the elements of the scanning window.and<br />
row and col are the total no of rows and columns of the<br />
window.<br />
6. Initialize votes = 0;<br />
Where votes are the predictions of finding noisy pixels<br />
by the neigbours.<br />
7. For m= 0 to 2<br />
For n= 0 to 2<br />
Subtract the image (i+1,j+1) from the image (i+m,i+n)<br />
if its subtraction is greater than the threshold value<br />
then<br />
otes = votes+1;<br />
end<br />
end<br />
end<br />
8. If(votes>4)<br />
9. Naoi _add=[naoi_add;i+1 j+1];<br />
Naoi=naoi+1;<br />
end<br />
end<br />
end<br />
th = th -2;<br />
end<br />
10. Noisy pixels computed.<br />
Hence noisy pixels computed.we hide the patient data into these<br />
pixels .our hiding technique is LSB (Least significant bit).<br />
D. Methodology<br />
Fig 1: Fusion process of patient data in medical image<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 501<br />
ISSN 2250-3153<br />
Fig 2: Defusion of patient data from the watermarked image<br />
E. Defusion of patient data from the fused image<br />
This is the reverse process of fusion of patient data in medical<br />
image .<br />
1) we finds the noisy pixels in watermarked image.<br />
2) after finding the non area of interest, we can extract the patient<br />
data from the image.<br />
III. RESULTS<br />
In this section, we present the results obtained with our work<br />
.To evaluate our proposed algorithm, we simulated with the<br />
medical images; Ctscan, Brain and liver with the size of 512*512<br />
that converted patient files of DICOM to image data using<br />
MATLAB 7.7.0(R2008b). In our scheme ,the extracted<br />
watermark is a visually recognizable pattern. The viewer can<br />
compare the results with referenced watermark subjectively.<br />
However ,.the subjective measurement is dependent on factors<br />
such as the expertise of the viewers and the experimental<br />
conditions. Therefore. a quantitative measurement is needed to<br />
provide objective judgment of the extracting fidelity. We define<br />
the similarity measurement between the original image and the<br />
defused image by the two quality metrices.<br />
1. PSNR( power signal-to-noise ratio)<br />
2. MSE is mean square error<br />
The mathematical representation of PSNR and MSE is given<br />
below:<br />
where m and n are the rows and columns of the image .f(i,j) is<br />
the original image and g(i, j) is the fused image.<br />
Fig 3 shows original ctscan image and watermarked image<br />
(a) (b)<br />
Fig 3: (a) Original ctscan image and (b) Watermarked image<br />
Table 1 below shows the variation of PSNR ,MSE and time taken<br />
to hide the patient data based on data capacity in bytes for ctscan<br />
image.then,fig 4 shows the graphical representation for variation<br />
of PSNR ,MSE and time taken vs data capacity.High value of<br />
PSNR shows the less image degradation .<br />
Table 1: Variation of PSNR and MSE based data capacity (ctscan<br />
image)<br />
Data<br />
PSNR(dB) MSE(dB) Time<br />
fused(bytes)<br />
taken(sec)<br />
10 60.5629 0.0576 0.3213<br />
100 51.8303 0.4300 0.3099<br />
500 40.7794 5.4769 0.3696<br />
1000 37.8313 10.7981 0.9373<br />
1500 36.4688 14.7776 2.1020<br />
2000 35.3967 18.9150 2.4407<br />
2500 34.5596 22.9361 2.8748<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 502<br />
ISSN 2250-3153<br />
(a)<br />
(b)<br />
(c)<br />
Fig 4: Graphs for ctscan images (a) PSNR vs data fused ,<br />
(b)MSE vs data fused and (c) bytes fused vs time taken to hide<br />
Fig 5 shows the original brain image and watermarked image<br />
after hiding patient and table 2 shows the variation of PSNR,<br />
MSE and time taken to hide the patient data based data capacity.<br />
(a) (b)<br />
Fig 5: Brain images (a) original brain image, (b) fused brain<br />
image<br />
Table 2: Variation of PSNR, MSE and time taken to hide data<br />
based on data capacity (Brain image)<br />
Data<br />
PSNR(dB) MSE(dB) Time<br />
fused(bytes)<br />
taken(sec)<br />
10 62.3068 0.0385 0.3316<br />
100 54.7907 0.2175 0.3187<br />
500 44.5106 2.3197 0.8918<br />
1000 41.4401 4.7040 2.3093<br />
1500 39.4699 7.4044 3.0069<br />
2000 38.0103 10.3622 3.2750<br />
2500 36.5773 14.4129 3.5736<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 503<br />
ISSN 2250-3153<br />
(a)<br />
(b)<br />
(c)<br />
Fig 6: Graphs (a) PSNR vs data fused, (b) MSE vs data fused and<br />
(c) bytes fused vs time taken<br />
Fig 7 shows the original liver image and fused image with size<br />
512*512 and table 3 shows the below shows the variation of<br />
PSNR ,MSE and time taken to hide the patient data based on data<br />
capacity in bytes for ctscan<br />
(a) (b)<br />
Fig 7 : liver images (a) original image , (b) fused liver image<br />
Table 3: Variation of PSNR, MSE and time taken to hide data<br />
based on data capacity (liver image)<br />
Data<br />
PSNR(dB) MSE(dB) Time<br />
fused(bytes)<br />
taken(sec)<br />
10 55.2368 0.1962 0.2988<br />
100 48.6952 0.8850 1.8745<br />
500 44.1132 2.5419 3.3767<br />
1000 42.2025 3.9467 3.8616<br />
1500 40.2472 6.1910 4.1885<br />
2000 39.0200 8.2125 4.2970<br />
2500 37.9861 10.4200 4.3339<br />
(a)<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 504<br />
ISSN 2250-3153<br />
(b)<br />
(c)<br />
Fig 8: Graphical representation (a) PSNR VS data fused , (b)<br />
MSE VS data fused and (c) time taken VS data fused<br />
IV. CONCLUSION<br />
Digital medical imaging technologies have become<br />
increasingly important in medical practice and health care for<br />
providing assistant tools for diagnosis: treatment, and surgery.<br />
Due to the volume of medical images is huge and has grown<br />
rapidly. Especially on CT (computer tomography) and MRI<br />
(magnetic resonance imaging), the compression technique must<br />
be applied. Our proposed work is very effective for hiding the<br />
large amount of patient data. As it finds the non area of interest<br />
in the medical image. Then, patient data is embedded onto noisy<br />
pixels. This algorithm is an effective algorithm providing good<br />
results with accuracy because it selects the region of non area of<br />
interest which is unusable part of the image. Hence there is not<br />
any problem at the time diagonosis of the image .Image does not<br />
lose its originality also. Results have shown the accuracy of non<br />
area of interest detection using fuzzy logic based matrix scanning<br />
algorithm over other algorithms. The fuzzy logic based algorithm<br />
has been successful in obtaining the noisy pixels that are present<br />
in an image after the its implementation and execution with<br />
various sets of images. Sample outputs have been shown to make<br />
the readers understand the accuracy of the algorithm. Thus<br />
developed algorithm exhibits tremendous scope of application in<br />
various areas of digital image processing.<br />
V. FUTURE SCOPE<br />
1. In future, we will extend our proposed algorithm in order to<br />
obtain the less degradation and results with more accuracy .<br />
2. We can use 5*5 and 7*7 Scanning mask window in future for<br />
predicting the noisy pixels in the medical image.<br />
3. In our proposed work, the image is first to be converted into<br />
gray image. This limitation can be eliminated and algorithm can<br />
be applied directly to color images, and the detection would then<br />
become significantly more complex.<br />
REFERENCES<br />
[1] Hyung-Kyo Lee, Hee-Jung Kim, Ki-Ryong Kwon, Jong-Keuk Lee, ―Digital<br />
Watermarking of Medical Image Using R01 Information‖ 2005 IEEE.<br />
[2] Rodríguez-Colín Raúl, Feregrino-Uribe Claudia, Trinidad-Blas Gershom de<br />
J., ― Data Hiding Scheme for Medical Images‖ 2007 IEEE .<br />
[3] Liu Xin, Lv Xiaoqi, A Semi-fragile Digital Watermarking Algorithm Based<br />
on Integer Wavelet Matrix Norm Quantization For Medical ImagesWang<br />
Ying,‖2009 IEEE.<br />
[4] Henning M¨uller, Jayashree Kalpathy–Cramer,‖ The ImageCLEFMedical<br />
Retrieval Task at ICPR 2010 Information Fusion,IEEE 2010.<br />
[5] Xinde Sun and Shukui Bo, ―A Blind Digital Watermarking for Color<br />
Medical Images Based on PCA‖ 2010 IEEE.<br />
[6] Osamah M. Al-Qershi, Bee Ee Khoo,‖ ROI–based Tamper Detection and<br />
Recovery for Medical Images Using Reversible Watermarking<br />
Technique‖,IEEE 2010.<br />
[7] Hsiang-Cheh Huang A, Wai-Chi Fang B, Shin-Chang Chen ―Privacy<br />
Protection and Authentication for Medical Images with Record-Based<br />
Watermarking‖ 2009 IEEE .<br />
[8] P.Viswanathan, Dr.P.Venkata Krishna,‖ Text fusion watermarking in<br />
Medical image with Semi-reversible for Secure transfer and<br />
Authentication‖, IEEE 2009.<br />
[9] Nisar Ahmed Memon , Syed Asif Mehmood Gilani ,‖ Adaptive Data Hiding<br />
Scheme for Medical Images using Integer Wavelet Transform ,IEEE 2009.<br />
[10] Khurram Khurshid1, Claudie Faure2, Nicole Vincent,‖ Fusion of Word<br />
Spotting and Spatial Information for Figure Caption Retrieval in Historical<br />
Document Images‖, IEEE 2009.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 505<br />
ISSN 2250-3153<br />
[11] P.Viswanathan, Dr.P.Venkata Krishna,‖ Text fusion watermarking in<br />
Medical image with Semi-reversible for Secure transfer and<br />
Authentication‖, IEEE 2009.<br />
[12] M.C. D´ıaz-Galiano, M.T. Mart´ın-Valdivia,A. Montejo-R´aez, L.A.<br />
Ure˜na-L´opez,"improving Performance of Medical Images Retrieval by<br />
Combining Textual and Visual Information‖IEEE 2008.<br />
[13] Amrinder Singh Brar, Mandeep Kaur, ―Reversible Watermarking<br />
Techniques for Medical Images with ROI-Temper Detection and Recovery<br />
- A Survey‖ IJETAE 2010.<br />
[14] Caroline Lacoste, Joo-Hwee Lim, Jean-Pierre Chevallet, and Diem Thi<br />
Hoang Le ―Medical-Image Retrieval Based on Knowledge- Assisted Text<br />
and Image Indexing‖ 2007 IEEE .<br />
[15] Joo-Hwee Lim, Caroline Lacoste, Jean-Pierre Chevallet, and Diem Thi,‖<br />
Hoang Le,‖knowledge assisted medical image retrieval‖ IEEE 2007.<br />
[16] Pedro R. Kalva, Fabricio Enembreck and Alessandro L. Koerich,‖web<br />
Image Classification Based on the Fusion of Image and Text<br />
Classifiers‖IEEE 2007.<br />
[17] S.Poonkuntran, R.S.Rajesh, ―A Messy Watermarking for Medical Image<br />
Authentication‖ 2011 IEEE.<br />
AUTHORS<br />
First Author – Pinki Jain, Doon Valley Institute of Engineering<br />
and Technology, Kurukshetra University, Karnal<br />
Email id - Pinki.jain 1988@gmail.com<br />
Second Author – Anu Aggarwal, Faculty of Doon Valley<br />
Institute of Engineering and Technology, Kurukshetra<br />
University, Karnal.<br />
Email id - anu.cse.diet@gmail.com.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 506<br />
ISSN 2250-3153<br />
Impact of Peace and Disturbances on Tourism and<br />
Horticulture in Jammu and Kashmir<br />
RAJNI SHARMA, VINOD KUMAR SHARMA AND VAR INDER SINGH WARIS<br />
Abstract- J&K is an important tourist destination of the<br />
country and has been a place of attraction for tourists since<br />
centuries. The lush green forests, sweet springs, perennial rivers,<br />
pictures que, alpines scenery and pleasant climate of Kashmir<br />
valley has remained an internationally acclaimed tourist<br />
destination, whereas Jammu region- the land of temples is<br />
attracting a large number of pilgrim, tourists and the important<br />
destination has been Shri Mata Vaishno Devi (SMVD). J&K is<br />
also well known for its horticulture produce both in India and<br />
abroad. The state offer good scope for cultivation of all types of<br />
horticulture crops covering a variety of temperate fruits like<br />
apple, chestnut, apricot, pear, peach, plum etc. This paper<br />
emphasized the growth of tourism and horticulture in different<br />
periods, peace and disturbances. Under this paper impact of<br />
peace and disturbances are shown by showing the growth of<br />
tourism and horticulture.<br />
Index Terms- Depuration, fish, habitat, metals, wastewater,<br />
wetlands<br />
J<br />
I. INTRODUCTION<br />
ammu and Kashmir occupies a strategic place on the country's<br />
map with its borders touching Pakistan, Tibet and China. The<br />
state has three distinct regions of Kashmir, Jammu and ladakh.<br />
Each region has a specific resources base. it has a mountainous<br />
terrain, except for some portion of Jammu region and Kashmir<br />
valley. Jammu and Kashmir has a unique economic feature. It as<br />
many innate economic disadvantages, like remoteness and poor<br />
connectivity, hilly and often inhospitable terrain, susceptibility to<br />
natural disasters, poor infrastructure, sparse population density<br />
etc. in J&K all these factors resulted in a classic backwardness<br />
trap arising from low economic activity leading to low<br />
employment opportunity and subsequently resulting in low<br />
income generation. In spite of all these disadvantages, the<br />
economy has suffered badly due to extremely adverse law and<br />
order situation prevailing in the state for more than two decades<br />
now. These economic disadvantages together with disturbed<br />
conditions have their significant implications on the size and<br />
nature of development problem influencing the approach to be<br />
adopted.<br />
II. PEACE AND DEVELOPMENT: THE LINKAGE<br />
Recent decades have seen the emergence and escalation of a<br />
wide variety of violent conflicts around the globe. Regardless of<br />
the motives, violent conflicts are usually disastrous socially as<br />
well as culturally; economically as well as politically. Apart from<br />
a few beneficiaries in the arms industry, economic disruption is<br />
(P.HD Scholars Deptt of Economics University of Jammu)<br />
Email id - remmi2pangotra@gmail.com<br />
an integral part of conflicts, negatively affecting people‘s<br />
livelihoods and the longer-term development process.<br />
With violence becoming a part of the everyday life, the whole<br />
system becomes ―conflict habituated‖, with an emphasis from<br />
both sides on getting an edge and in this scenario, development<br />
takes a back seat. This has led some to question whether<br />
sustainable development can be advanced during times of<br />
protracted armed conflict. Most often the cause or spur of<br />
conflict in many cases is lack of development – economic,<br />
political, or social – or a combination of all. The relationship<br />
between conflict and development is strong, and is a two way<br />
process: conflict retards development; and equally, failures in<br />
development substantially increase proneness to conflict.<br />
Tourism, one of the main industries in the Kashmir valley and<br />
Jammu, has suffered tremendously due to violent activities. It has<br />
declined substantially since the late 1980s when militancy gained<br />
momentum. The number of tourists visiting the state per year had<br />
gone down from around 7,000,000 in the pre-militancy days to a<br />
few thousands in the following years. It is estimated that the state<br />
lost 27 million tourists from 1989-2002 leading to tourism<br />
revenue loss of $3.6 billion. According to the records, while as<br />
many as 557974 tourists visited the state in 1989, in 1993 the<br />
number reduced to 8026. In the year 2002, 27358 tourists visited<br />
the state. Since then the number of tourists keeps on increasing or<br />
decreasing depending on the level of violence at that particular<br />
point of time. However, the number of tourists has never come<br />
anywhere near the level of tourists that visited the state in the<br />
pre-militancy period.<br />
Another issue that remains almost elusive in the context of<br />
tourism sector in the state is that, while in the pre-militancy era<br />
the favourite destination was the beautiful Kashmir valley, the<br />
present period has witnessed increase in number of the tourists to<br />
Vaishno Devi shrine, in Jammu region and to Leh in Ladakh.<br />
During their surveys in Leh the authors interacted with many<br />
local and foreign tourists who regularly visit the area and are<br />
quite keen to visit Srinagar but prefer not to go (Personal<br />
Communications, May 21-June 1, 2007). Though the number of<br />
tourists to Srinagar has increased with the launch of the peace<br />
process, their specific targeting by the militants have led to<br />
decline in their numbers. The local people bemoan this tragedy<br />
befalling on them. Junaid Hussain, a shopkeeper in Srinagar<br />
(personal communication, July 26, 2006) told the authors, ―The<br />
local economy has been completely shattered due to ongoing<br />
turmoil. While earlier thousands of outsiders thronged to the city,<br />
now only hundreds visit the valley.‖<br />
Violence has also directly affected other important sources of<br />
livelihood such as agriculture, horticulture, and the handicraft<br />
industry. These sectors have become the survival mechanisms for<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 507<br />
ISSN 2250-3153<br />
the local people but are not flourishing. The state is known for<br />
wide variety of agricultural and horticulture products. However,<br />
the conflict environment has prevented people from maximally<br />
utilizing this gift of the nature. The horticulture industry has also<br />
suffered directly as well as indirectly due to conflict situation.<br />
These issues are discussed in detail in the section on challenges<br />
and opportunities.<br />
III. OBJECTIVES OF THE STUDY<br />
The present study has certain specific research objectives.<br />
They are as follows:<br />
1. To evaluate the impact of peace and disturbance on the growth<br />
of tourism and horticulture sector in J&K.<br />
2. To find out the role of horticulture and Tourism in the GDP of<br />
J&K economy<br />
3. To evaluate the growth of employment in Tourism and<br />
horticulture sector<br />
4. To find out the major problems development by tourism in<br />
Jammu and Kashmir<br />
5. Lastly provide the feasible suggestion for sustainable<br />
development of tourism in J&K<br />
IV. METHODOLOGY<br />
In the present study secondary data has been used. Secondary<br />
data has been collected from the tourism department and<br />
Economic survey of Jammu and Kashmir. The underlying idea of<br />
the Inskeep methodology is to know the impact of peace and<br />
disturbance on the tourism and horticulture development. To find<br />
out the result of peace and disturbance on both the sector tourism<br />
and horticulture is shown by using regression method.<br />
V. IMPACT OF PEACE AND DISTURBANCE ON TOURISM IN<br />
JAMMU AND KASHMIR<br />
Tourism constitutes one of the main sources of income for vast<br />
sections of the Kashmiri population. Tourist destinations like<br />
Sonmarg and Gulmarg are known internationally for winter<br />
games such as skiing. Gulmarg is also known as the highest<br />
Table 1: Tourist‘s arrival from 1988 to 2010 in Jammu and Kashmir<br />
green golf course in the world, and boasts the world‘s largest<br />
cable car lift. The famous Dal Lake in the Kashmir valley needs<br />
special mention in this context. Adventure sports in J&K include<br />
trekking, mountaineering, winter sports, water sports, golf and<br />
fishing. However, most of these tourist attractions remain<br />
underdeveloped. Many other tourist attractions in the state<br />
remained untapped partly due to the conflict. Like in the Kashmir<br />
valley, the regions of Jammu and Ladakh also have lot of tourism<br />
potential. Some of the tourist spots in Jammu, which need<br />
development, are Patni Top, the Forts of Ramnagar, the temples<br />
of Babor and Krimchi, Sudh Mahadev and Mantalai, Shiv Khori,<br />
the saint-soldier Banda Bairagi‘s memorial, as well as the<br />
Kishtwar and Bhaderwah hills, all of which can be developed<br />
with modern facilities in order to attract wider cross-section of<br />
people from different parts of the world. In Jammu and Kashmir<br />
tourism sector accounts for 5.92% of india's GDP. Tourism<br />
sector is a labour intensive and as per world Travel and tourism<br />
Council (WTTC 2010) world wide estimates, is expected to<br />
contribute 8.1% to total employment. WTTC(2010) projects that<br />
india will generate 2nd largest travel and tourism employment by<br />
2010 and 2020 at 49 & 58 millon jobs respectively, coming at<br />
2nd place only after China.<br />
It is a stark reality that till late 1980s, the state of J&K used to<br />
attract huge numbers of national as well as foreign tourist, but the<br />
tourist sector received a serious jolt with the out break of<br />
militancy in the year 1989. The tourist‘s influx declined<br />
considerably up to 2002 during which the state heavily suffered<br />
in this sector due to militancy and insurgency. The tourist rush in<br />
the year 1988 was recorded as the highest. The infrastructure<br />
created over the years suffered huge damage, besides<br />
destructions to the gardens and parks and with the improvement<br />
in the security and scenario, the govt made all possible efforts<br />
and took all possible steps for the revival of tourism sector by<br />
raising the requisite infrastructure for restoration of the pristine<br />
glory of the places of the tourist attraction and the average flow<br />
of tourist between 1990 and 1996 was just around 10000 per<br />
annum. But the flow of tourist registered a considerable increase<br />
as shown by the figure in table1<br />
Year Amarnath Kashmir Foreign Total Jammu Ladkh Foreign Total Grand<br />
ji<br />
Domestic<br />
Domestic<br />
Total<br />
1988 259891 662097 59938 722035 19926965 8608 16256 24864 21680654<br />
1989 262691 490212 67762 557977 2312001 6689 16079 22748 3736159<br />
1990 395202 6095 4627 10722 2169202 396 8342 6738 2601324<br />
1991 439722 1400 4887 6267 3151310 1041 8014 9055 3621696<br />
1992 445580 1175 9149 10324 3527289 2438 13580 16018 4025553<br />
1993 461443 450 8026 8026 3368735 2000 12401 14401 3875482<br />
1994 471101 500 9314 9814 3705945 2080 15369 17449 4231572<br />
1995 549778 322 8198 8520 4032127 5594 12391 17985 4634915<br />
1996 582213 375 9592 9967 4335532 3537 13036 16573 4970825<br />
1997 495165 7027 9111 16131 4434233 3991 12810 16801 4995269<br />
1998 540453 99636 10247 109883 4622097 6792 15238 22030 5426376<br />
1999 635042 200162 17130 217292 4667340 1905 96669 11574 5847114<br />
2000 - 104337 7575 111912 5109575 6217 11825 18042 5369483<br />
2001 - 66732 5859 72591 5056919 4260 15439 19699 5241499<br />
2002 - 7993 1015 9008 1053771 87 361 448 1072683<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 508<br />
ISSN 2250-3153<br />
2004 400000 358000 19000 777000 6100000 13000 22000 35000 7724000<br />
2005 388000 585702 19680 993382 6251998 13781 24665 38446 8315654<br />
2006 265000 412879 20009 697888 6950573 17822 26078 43900 8434149<br />
2007 213565 417264 24576 655405 7222318 22102 28477 50579 8634286<br />
2008 498075 550100 22000 1070175 6576000 39000 33000 72000 8860350<br />
2009 373419 520454 20809 914682 7657000 48127 30446 78573 9643510<br />
2010 458046 698564 24376 1180986 8239474 54684 21371 76055 10753556<br />
In the above table it is shown that after 2000 the flow of tourist in<br />
J&K has increasing but tourist inflow to J&K has continuously<br />
been increasing steadily from 69.12 lakhs in 2004 to 94.97 lakhs<br />
in 2010, which indicates increases of 37.39%. There is an<br />
increase in pilgrim visitors to Mata Vaishno Devi by 35.7% and<br />
domestic tourist by more than double i.e. (103%) and in the same<br />
period the percentage of the foreign tourist by 11.57.<br />
The perspective of overall, tourist inflow to all the three<br />
regions of the state, the percentage has increased during the years<br />
2004 to 2010 by 37.39%. The number of foreign tourist to<br />
Kashmir Valley has drastically dwindled from the figure of 0.60<br />
lakhs to 0.24 lakhs during the years 1988 to 2010. Contrary to<br />
this, the number of foreign tourist to ladkh has increased during<br />
the same period of time from 0.16 lakhs in 1988 to 0.21 lakhs in<br />
2010.<br />
Table 2: Jammu and Kashmir‘s share in foreign arrivals to india<br />
The Jammu and Kashmir has been witnessing resilience in the<br />
tourism sector as Foreign Tourist Arrivals (FTA) increases from<br />
0.41 lakhs in 2004 to 0.46 lakhs in 2010. Despite global<br />
economic slow down effecting the tourism sector worldwide and<br />
the prevailing political conditions in the state, the Foreign Tourist<br />
Arrival (FTA) to J&K in the year 2009 showed a marginal<br />
decreases of 6.8% over the year 2008. The state is now<br />
witnessing a turn around in FTA; by 2010 it is 0.46 lakhs.<br />
Jammu and Kashmir‘s share in foreign arrivals to India is<br />
shown in table 2 which indicates that in 2000 the share is 0.78<br />
percent and it was increase 0.80 percent in 2001. In 2002 the<br />
J&K ‗s share in foreign arrivals decline to 0.31, after 2002 the<br />
percentage of share has increased to 1.02 % in 2003 and<br />
increasing onwards up to 2008, but again in 2009 it decline 0.97<br />
percent.<br />
Year India J&K Percentage share<br />
2000 2481928 19400 0.78<br />
2001 2649378 21295 0.80<br />
2002 2537282 7806 0.31<br />
2003 2384364 24330 1.02<br />
2004 3457477 41000 1.19<br />
2005 3918160 44345 1.13<br />
2006 4447167 46087 1.04<br />
2007 5081504 53053 1.04<br />
2008 5356966 55000 1.03<br />
2009 5280361 51255 0.97<br />
Sources: M/o Tourism, Gol/Dte. Tourism Kashmir<br />
The tourism industry in Jammu and Kashmir is supposed to be<br />
one of the most flourishing industries in the state. This industry is<br />
very important for the development of the regions of Ladakh,<br />
Jammu and Kashmir. As there are not much industrial<br />
developments in the other sectors of this place so the industry<br />
related to tourism is considered with much seriousness by the<br />
state government. Apart from agriculture economic activities<br />
related to Kashmir tourism is the most popular source of income<br />
here.<br />
VI. INCOME FROM REVENUE EARNING<br />
The tourism sector also generates sufficient revenue for<br />
government and public sector undertaking which has shown<br />
significant increase over the years, the revenue generations is<br />
expected to increase manifold provide the situation remains<br />
normal and the tourist influx increases in a desired manner. The<br />
state has sufficient potential to exploit more and more revenue<br />
generation and the revenue made under the public sector during<br />
last six years is about Rs. 167.39 Crore the details of which are<br />
summarized as under in table 3.<br />
Table 3: Income from revenue earning in J&K from Tourist Department<br />
Name of the deptt/organisation Revenue<br />
earned in<br />
lakhs<br />
2004-05<br />
2005-06 2006-07 2007-08 2008-09 2009-10<br />
Director Tourism Kashmir 11.46 14.83 35.25 62.06 54.00 56.65<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 509<br />
ISSN 2250-3153<br />
/Jammu (DGT)<br />
SKICC 46.00 49.34 52.00 64.00 71.20 65.00<br />
Gulmarg Dev Authority 19.7 21.86 32.46 48.50 51.17 34.35<br />
Phalgam Dev Authority 5.12 9.16 9.95 19.00 12.73 6.68<br />
Sonamarg Dev Authority 0.00 13.78 36.35 32.50 45.00 39.00<br />
Patnitop Dev Authority 11.00 10.15 15.62 79.00 20.00 19.54<br />
Royal Spring Golf Course 57.26 35.09 34.73 50.06 45.66 44.25<br />
Cable car Corporation 289.00 754.41 676.00 798.81 839.14 1116.00<br />
J&K TDC 1642.41 1796.44 1763.00 1763.00 1963.00 1894.00<br />
Total 2081.95 2705.06 657.75 2916.93 3101.9 3275.47<br />
In the above table the total revenue from the last six years are<br />
14739.06 lakhs to Jammu and Kashmir. But this revenue was<br />
hampered because of the massive political disturbances here. The<br />
tourist footfall in this region gradually decreased in and after the<br />
nineties. The economic structure of the state suffered a sudden<br />
downfall as a result, since the state economy was primarily<br />
dependent on this sector.<br />
Most of the people here were into professions related to tourist<br />
activities. The financial conditions of the people in Jammu and<br />
Kashmir suffered badly after the sudden setback.<br />
The state of Jammu and Kashmir is yet to recover from this<br />
sudden decline in the tourist industry. But the department of<br />
tourism is trying hard to improve the condition of the tourism<br />
industry in Kashmir and bring back the past glory of the state.<br />
They are trying to beautify the existing tourist spots and increase<br />
the facilities for the visitors in order to attract more people to the<br />
state.<br />
To reconstruct the tourism industry here the state government<br />
has declared many incentives and facilities for those who are<br />
interested in business related to this field of activity.<br />
VII. IMPACT OF PEACE AND DISTURBANCE ON HORTICULTURE<br />
SECTOR IN J&K<br />
Horticulture industry in Kashmir is considered the bulwark of<br />
rural economy in the state. Nearly 75 per cent of temperate fruits<br />
in India are grown in the state. The cultivated orchards yield fine<br />
quality of pears, apples, peaches, cherries, walnut, almond,<br />
saffron, apricot, strawberry, plums, etc. The industry earns<br />
revenue of over INR 500 million yearly and provides job<br />
facilities for the thousands of people directly and indirectly<br />
involved in the agricultural sector. This sector is adversely<br />
affected due to lack of marketing strategy and violence-prone<br />
image of the state. Considering the growth prospects of this<br />
sector, the state government needs to plan for higher and more<br />
quality production. The state should shift its agriculture<br />
development strategy from food security mode to that of value<br />
addition by growing certain products like high value fruits,<br />
vegetables and cash crops like saffron that can give high returns.<br />
The modernization of all these sectors can play a vital role in<br />
economic reconstruction of the state. Besides providing the<br />
professional guidance, there is a need to ensure availability of<br />
basic inputs such as seeds, fertilizers, pesticides, storage facilities<br />
etc. to develop agriculture and allied sectors. There is also a need<br />
to develop an aggressive sector specific marketing strategy and<br />
explore new markets.<br />
Horticulture is the cultivation of garden plants, fruits, berries,<br />
nuts, vegetables, flowers, trees, shrubs and turf. Horticulturists<br />
work for plant propagation, crop production, plant breeding,<br />
genetic engineering, plant biochemistry, plant physiology,<br />
storage, processing and transportation. They work to better crop<br />
yield, quality, nutritional value and resistance to insects, diseases,<br />
and environmental pollution. Horticulturalists use modern<br />
nurseries for the production of seedlings and mother plants.<br />
These plants are propagated through different methods such as<br />
seeds, inarching, budding, veneer grafting, patch budding and<br />
soft wood grafting.<br />
The growth of horticulture sector can be attributed to the<br />
various incentives towards market interventions like established<br />
of fruit mandies, provision for support prices, technological<br />
support awareness options research and extension. Area under<br />
fruits in J&K State has increased from 3.06 lakhs hectares in<br />
2008-09 to 3.15 lakhs hectares in 2009-10, showing an increase<br />
of 2.94 percent and the production has increased from 16.19<br />
lakhs MTs in 2008-09 to 17.13lakhs MTs in 2009-10, showing<br />
an increase of 1.3 percent.<br />
Table 4: Area, Production and Productivity of fruits(All fruits)J&K State<br />
Year Kind of Fruits Area Lakhs in (Ha) Production<br />
Lakhs MTs<br />
in Productivity<br />
2005-06 Fresh<br />
1.75<br />
12.89<br />
7.36<br />
Dry<br />
0.93<br />
1.24<br />
1.33<br />
Total<br />
2.68<br />
14.13<br />
5.27<br />
2006-07 Fresh<br />
1.85<br />
13.77<br />
7.43<br />
Dry<br />
0.99<br />
1.31<br />
1.33<br />
Total<br />
2.84<br />
15.08<br />
5.31<br />
2007-08 Fresh 1.96 14.78 7.54<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 510<br />
ISSN 2250-3153<br />
Dry<br />
0.99<br />
Total<br />
2.95<br />
2008-09 Fresh<br />
2.06<br />
Dry<br />
1.00<br />
Total<br />
3.06<br />
2009-10 Fresh<br />
2.10<br />
Dry<br />
1.05<br />
Total<br />
3.15<br />
2010-11 Fresh<br />
2.17<br />
Dry<br />
1.08<br />
Total<br />
3.25<br />
Sources: Agriculture Production Deptt, J&K<br />
In the above table 4 the productivity of the total dry and fresh<br />
fruits are 5.27 in 2005-06 and it was slightly increased in 2006-<br />
2007 to 5.31 percent. In the year 2008-09 the productivity of<br />
total fruits are 5.53 and reaches 6.84 in 2010-11. This shows that<br />
with the peace in the State the productivity of the Horticulture<br />
sector are increased.<br />
VIII. PRODUCTION OF HORTICULTURE PRODUCTS<br />
The overall production of fruits has been recoded to be 17.12<br />
lakhs metric tones for the year 2009-10, recoding a net addition<br />
1.58<br />
16.36<br />
15.26<br />
1.65<br />
16.91<br />
15.35<br />
1.78<br />
17.13<br />
20.46<br />
1.76<br />
22.22<br />
Table 5: Production of fruits during 2004-05 to 2010-11<br />
1.60<br />
5.55<br />
7.41<br />
1.65<br />
5.53<br />
7.31<br />
1.70<br />
5.44<br />
9.43<br />
1.63<br />
6.84<br />
of 21.45 lakhs MTs over the production figures of n previous<br />
year measuring 1.27 percent rate of growth. In the production<br />
figures, share of fresh and dry fruits is 89.62 percent and 10.38<br />
percent with 15.35 lakhs MTs and 1.78 lakhs MTs respectively.<br />
Apple ranks first with a share of 80.18 percent followed by<br />
walnut with 9.64 percent.<br />
Year Fresh<br />
Dry<br />
Total<br />
Fruits<br />
fruits<br />
Fruits<br />
Apple Pear Other Total Walnuts Almonds Other Total<br />
2004 -<br />
05<br />
1093.33 40.25 84.02 1217.60 100.60 13.47 0.19 114.26 1331.86<br />
2005-<br />
06<br />
1151.34 42.36 86.73 1280.43 108.27 14.33 0.20 122.80 1403.23<br />
2006-<br />
07<br />
1222.18 43.09 108.41 1373.68 114.93 15.18 0.22 130.33 1504.01<br />
2007-<br />
08<br />
1311.85 45.86 120.31 1478.02 146.78 11.26 0.24 158.28 1636.27<br />
2008-<br />
09<br />
1332.81 47.38 150.74 1530.93 147.64 12.17 0.25 160.06 1690.99<br />
2009-<br />
10<br />
1373.00 47.98 113.73 1534.71 165.02 12.52 0.19 177.73 1712.44<br />
2010-<br />
11<br />
1852.41 50.50 140.65 2045.56 163.74 12.51 0.22 176.47 2222.03<br />
IX. EXPORT OF THE FRUIT OUTSIDE THE STATE<br />
In J&K the export of fruits outside of the state has occupied a<br />
prominent place in trade of the State. Export of fruit has shown<br />
considerable progress. The total quantity exported during 2009-<br />
10 was 9.57 lakhs MTs, which is 55.9 percent of the production<br />
figure of the same year. The production under horticulture is<br />
increasing year by year while as there is no significant growth in<br />
Table 6: Export of Fruits outside the State (lakh Metric Tonnes)<br />
the export of horticulture produced outside the state. The decline<br />
in the export of fruits outside the state is due the introduction of<br />
market intervention scheme (MIS) under which ―C‖ grade apples<br />
are produced at a support price of rupee 6 per kg for processing<br />
into juice concentrates in the locally established juice processing<br />
units. Secondly India is importing fruit from foreign countries as<br />
free trade policy is in force at the country level.<br />
Production Export<br />
Year Fresh Dry Total Fresh Dry Total<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 511<br />
ISSN 2250-3153<br />
2003-04 11.65 1.08 12.74 7.63(98.32) 0.13(1.68) 7.76(60.83)<br />
2004-05 12.18 1.14 13.32 8.20(98.3) 0.14(1.68) 8.34(62.61)<br />
2005-06 12.80 1.23 14.03 8.58(98.62) 0.12(1.38) 8.70(62.01)<br />
2006-07 13.74 1.30 15.04 7.35(98.00) 0.15(2.0) 7.50(49.87)<br />
2007-08 14.78 1.58 16.36 7.34(97.86) 0.16(2.13) 7.50(45.84)<br />
2008-09 15.26 1.65 16.91 11.01(98.56) 0.16(1.43) 11.17(66.06)<br />
2009-10 15.35 1.76 17.12 9.34(60.84) 0.23(12.99) 9.57(55.90)<br />
2010-11 20.46 1.76 22.22 8.51(42.59) 0.51(8.52) 8.66(38.97)<br />
X. FOREIGN EXCHANGE EARNING<br />
In J&K the govt is promoting exports from Jammu and<br />
Kashmir State. State‘s fruits especially dry fruits, go also to the<br />
other countries and in turns earn substantial foreign exchange.<br />
The export of the dry fruits viz, almond and walnut during the<br />
year 2007-08 was 6889.11 MTs comprising of 197.11 MTs of<br />
Table 7: Foreign Exchange Earned on Horticulture Produce<br />
Almond, 6692 MTS of walnuts. The foreign exchange earning<br />
were Rs. 115.95 Crore during 2005-06 and Rs 161.44 Cros<br />
during 2007-08. the export of dry fruits viz almond sand walnuts<br />
during the year 2009-10 was 9132.687 MTs, which has increased<br />
by 55.72 percent over previous years figures of 5864.74 MTs<br />
foreign exchange earning has increased from Rs. 142.24 Crs in<br />
2008-09 to Rs. 198.86 Crs in 2009-10 i.e. by 39.81 percent.<br />
Quantity exported in MTs Foreign Exchange earns in Crs<br />
Kinds 2005- 2006- 2007- 2008- 2009-10 2005- 2006- 2007- 2008- 2009-<br />
Dry<br />
Fruit<br />
06 07 08 09<br />
06 07 08 09 10<br />
a)<br />
Almond<br />
296.45 260.88 197.11 168.42 60.97 1.48 1.82 0.91 1.02 1.05<br />
Total<br />
Walnut<br />
5256 5437 6692 5696.32 9071.71 114.47 118.02 160.53 141.22 197.80<br />
i)<br />
shell<br />
in 179 376 161 294.73 364.52 N.A N.A N.A 2.61 2.87<br />
ii) in 5077 5061 6531 5401.59 8707.18 N.A NA NA 138.61 194.93<br />
kernal<br />
Total<br />
Dry<br />
Fruit<br />
5552.45 5697.88 6889.11 5864.74 9132.68 115.95 119.84 161.44 142.24 198.86<br />
XI. ECONOMIC BENEFITS BY TOURISM AND HORTICULTURE<br />
SECTOR IN J&K<br />
In Jammu and Kashmir State the scope of large scale industrial<br />
development is very limited and due to hilly terrains and small<br />
size of land holdings agriculture is unable to meet the<br />
expectations of the state economy, tourism is considered to be an<br />
economic bonanza. Being a labour intensive industry the scope<br />
of employment is varying vast. It requires very low level of<br />
investment and employments provided under this industry are<br />
comparatively higher than many other industries. Tourism is<br />
regarded multi- segmental industry, therefore, provides different<br />
types of jobs like hotel managers, receptionist, accountant‘s<br />
clerks, guides, tour conductors, travel agents, transport operators,<br />
chef etc and many other jobs which are required to strengthen the<br />
tourism. The positive economic benefits of tourism are given<br />
below.<br />
1. Contribution to State‘s income generations.<br />
2. Expansion of employment opportunities.<br />
3. Raising Tax Revenue.<br />
4. Generation of Foreign Exchange.<br />
5. Transformation of regional economy<br />
6. Social Effects<br />
7. Culture effect<br />
8. Impact on environment<br />
XII. PROBLEMS FACED BY TOURISM AND HORTICULTURE<br />
SECTOR IN J&K<br />
1. Mismanagement<br />
2. Problems of Infrastructure<br />
3. Lack of Transport Facilities<br />
4. Lack of Basic Facilities<br />
5. Militancy in the State<br />
6. Natural factors<br />
7. Lack of coordination<br />
XIII. SUGGESTIONS FOR SUSTAINABLE TOURISM<br />
DEVELOPMENT<br />
The main point to keep in mind is the inter-relationship of<br />
sustainability, planning, development and tourism.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 512<br />
ISSN 2250-3153<br />
Integrated planning in the tourism sector should include<br />
consideration of the following issues:<br />
1. Impact on the natural environment, the host communities,<br />
the local (regional, national) economy, the indigenous<br />
culture;<br />
2. Demands made on human resources, including knowledge,<br />
skills, aptitudes, and numbers;<br />
3. Impact of and on transport and infrastructure systems,<br />
regional development, resource use and distribution;<br />
4. Responsibilities derived from international agreements,<br />
accords and protocols;<br />
5. Impact of and on other sectors of the economy, especially<br />
the primary sectors of agriculture, forestry, mining and<br />
fishing, but also some industrial sectors, transportation and<br />
various aspects of commerce;<br />
6. Implications of tourism development for land ownership<br />
and land tenure, land and property values, alternative or<br />
substitute uses;<br />
7. Linkages through the different levels of planning; and<br />
8. Linkages with governments and agencies, tourism industry,<br />
interest groups, host communities, indigenous communities,<br />
development industry (other than in tourism).<br />
These issues can be dealt with when developing tourism<br />
policies and plans at various levels as long as the following<br />
strategic elements are also included:<br />
1. Tourism-related infrastructure – transportation, water<br />
supply, energy and power supply, waste disposal,<br />
pollution control, telecommunications;<br />
2. Tourism-specific development – accommodations of<br />
various types, integrated resorts, restaurants, shopping,<br />
support services, travel services, recreation and<br />
entertainment, health and emergency services, safety<br />
systems and visitor attractions;<br />
3. Appraisals and impacts (including carrying capacity<br />
assessments) of tourism development on, for example,<br />
the economy, the environment, the host community,<br />
culture and heritage;<br />
4. Financing, marketing, promotion and information<br />
systems;<br />
5. Tourism awareness in the host community and human<br />
resources development programmes.<br />
Integrated tourism planning also means integration of goals,<br />
objectives, programmes, projects, investment, and resource use.<br />
Resource use is of central importance, particularly for sustainable<br />
development, because it involves the relationship between<br />
economic development and the conservation of natural resources.<br />
In recent years, conservation of cultural and human resources has<br />
been added.<br />
XIV. CONCLUSION<br />
In conclusion, integrated planning for sustainable tourism and<br />
horticulture development needs to be considered as one<br />
important component within a broad policy framework. In this<br />
situation, tourism is one means for achieving sustainable<br />
development. Achievement will be influenced by the degree to<br />
which planning for tourism is integrated both horizontally and<br />
vertically. Integrated tourism and horticulture planning should be<br />
seen as an exercise in the creative and innovative management of<br />
resources to achieve sustainable outcomes.<br />
REFERENCES<br />
[1] Agriculture Production Department Jammu and Kashmir, Govt of J&K<br />
[2] Government of J&K, Digest of Statistics 2010, Directorate of Economic<br />
and Statistical Planning, J&K.<br />
[3] Government of J&K, Handbook of J&K State Jammu Directorate of<br />
Economics, Statistics and Planning, Government of Jammu and Kashmir<br />
[4] Government of Jammu and Kashmir, Economics Survey 2010-2011,<br />
Directorate of Economic and Statistical Planning, J&K.<br />
[5] Michel Peter‘s, International Tourism, Economies and Development of<br />
International Tourist Trade.<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 513<br />
ISSN 2250-3153<br />
Fate of Metals in Fish under Variable Sewage Input in<br />
Fish Ponds<br />
Abstract- Use of raw sewage in aquaculture spelling prosperity<br />
to farmers is actually a veritable threat to the environment. Metal<br />
contaminated fish grown in the sewage-fed East Kolkata<br />
Wetlands, is potentially hazardous for the consumers. Alarmed<br />
by the increase of these persistent elements, an in-depth study<br />
was carried out to find out a possible way to reduce metal body<br />
burden in fish. The first part of the study deals with the<br />
quantitative analyses of metals in several species of fish reared in<br />
the sewage fed system. In the second part, sewage input in the<br />
ponds was temporarily stopped for six months that helped us to<br />
understand the depuration pattern of the accumulated metals<br />
from fish tissues. It was observed that, copper accumulates<br />
maximally with age in the fish liver especially in the benthic<br />
species such as Cirrhinus mrigala and Oreochromis nilitica.<br />
However, its depuration rate from the organ is low. After six<br />
months, the metal is completely excreted from muscle, skin, gills<br />
and kidney. Gills of Catla catla accumulate excess of zinc. Lead<br />
and zinc show size dependent increase in muscle, liver, kidney,<br />
skin and gills of fish but are steadily depurated in the relatively<br />
uncontaminated system. The rate of cadmium uptake and release<br />
is extremely low in fish.<br />
Index Terms- Depuration, fish, habitat, metals, wastewater,<br />
wetlands<br />
T<br />
I. INTRODUCTION<br />
he East Kolkata Wetlands with an area of 25,000 hectares<br />
are the largest basin for natural purification of wastewater<br />
.Once occupied by the Bidyadhari River, these wetlands receive<br />
city sewage, storm water run off and effluents from thousands of<br />
industries. Underground sewers drain the untreated city sewage<br />
to several pumping stations from where it is led into open surface<br />
outfall channels networks that distributes this water into the<br />
different fish ponds. Here the recycled organic waste of the<br />
sewage provides nutrients for commercially grown fish.<br />
Aquaculture thus maintains a balanced ecologically efficient<br />
Paulami Maiti * and Samir Banerjee **<br />
*Corresponding Author<br />
*Lady Brabourne College,<br />
P 1/ 2 , Suhrawardy Avenue<br />
Park Circus, Kolkata – 700017.<br />
Mobile number - 967437345<br />
paulamim262@gmail.com<br />
**Aquaculture Research Unit, Department of Zoology,<br />
University of Calcutta,<br />
35 Ballygange Circular Road , Kolkata-700017.<br />
Mobile number - 9331021657<br />
samirbancu@gmail.com<br />
system where effluent quality comes down to an acceptable<br />
range, reducing the BOD value of the sewage water. About 308<br />
sewage-fed ponds show a turnover rate of 15,000 million tones<br />
of fish annually where average rate of organic loading vary<br />
between 20-70 kg per hectare. Efficient utilization of sewage is<br />
therefore crucial for aquaculture production that effectively<br />
meets the challenge of unemployment and protein crisis for the<br />
ever-increasing population of this area. ( Kundu et al., 2008 ) .<br />
However, these wetlands receive enormous pollutants<br />
including metals along with the effluents. In the natural waters,<br />
metals remain either in particulate or in soluble form but the<br />
labile fraction are more harmful.The impact of metal pollution<br />
depends upon the, source of wastewater, duration of their input<br />
or the presence of organic and inorganic particles in the water<br />
and sediment. Bioaccumulation of metals occurring in the food<br />
chain of the aquatic system, ultimately affects the human<br />
through, consumption of contaminated fish. In fish, metal levels<br />
vary as a function of their dietary difference and body size,<br />
which is closely related to their growth and metabolism.<br />
(Moriarty et al.,1984). All these interrelated factors determine the<br />
elemental concentration in the system and their relative<br />
availability, transport and toxicity to aquatic organisms.<br />
Bioaccumulation of metals in fish warrants our attention. The<br />
present study, firstly attempts to quantify metal level in the<br />
different tissues of four commercial important fish species with<br />
various body weights, feeding habits and habitats. This is to<br />
investigate the growth related changes in the level of metals in<br />
fish tissues. Secondly, to find out the depuration pattern of metals<br />
by the tissues, sewage input in the sewage fed ponds was<br />
temporarily stopped for a period of six months. Samples of<br />
water, soil and fish tissues were analyzed before and after the<br />
experimental period. Difference in body metal level in fish<br />
provided a picture of the amount of metal depurated by tissues, in<br />
the relatively uncontaminated environment.<br />
As fish, forms the major food for the people in this part of<br />
the country, attempt has been taken to reduce metal body burden<br />
by reducing the sewage input of the system. This would reduce<br />
the background level of metals that allowed the fish to excrete<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 514<br />
ISSN 2250-3153<br />
the accumulated ones. Metal bioaccumulation depends on the<br />
difference in uptake and depuration that varies with metals and<br />
fish species (Tawari-Fufeyin and Ekaye, 2007). Fish differing in<br />
food habit and its position in the tropic level show marked<br />
variation in depuration of metals. So different species with<br />
various body weights were chosen to determine the size related<br />
depuration pattern as younger fish have higher metabolic rate<br />
than the older ones.<br />
II. SITE OF STUDY<br />
The study was carried out in a sewage-fed farm ―The East<br />
Kolkata Fisherman‘s Cooperative Society‖, situated by the<br />
Eastern Metropolitan Bypass near the Kasba connector (22 o 30<br />
N; 88 o 25 E), West Bengal, India. The farm, a part of the East<br />
Kolkata Wetlands, covers an area of 44.55 hectares supporting<br />
about 109 sewage-fed ponds. Here five sewage fed ponds were<br />
chosen for experiment that nursed four commercially important<br />
species , such as Labeo rohita Cuvier (a column feeder), Catla<br />
catla Valenciennes (a surface planktivore ) , Cirrhinus mrigala (<br />
benthic fish) and Oreochromis nilotica Oken which is an exotic<br />
omnivore , ubiquitous in the derelict waters (Jayaram,1981) .<br />
Two different body weights (50g and 800g) of all the species<br />
were chosen for analyses.<br />
III. MATERIALS AND METHODS<br />
Fish were regularly collected from the sewage-fed ponds for<br />
quantitative analysis of the metals. These were dissected and the<br />
different tissues like muscles, liver, kidney, gills, skin and<br />
intestine were wiped dry and weighed accurately to 1g each for<br />
acid digestion. A modified wet digestion procedure was used to<br />
prepare biological samples for the determination of copper, lead,<br />
zinc and cadmium following the procedure of Chernoff (1975).<br />
Samples of fish tissues were taken in hard glass test tubes, and 5<br />
ml of conc. HNO3 acid was added to one gram of the sample, and<br />
left for overnight digestion at room temperature. The mixture<br />
was placed in a hot plate at 85 + 5 o C and 5 ml (3: 2, Conc.<br />
Sulfuric acid: Perchloric acid) was then added to it. The digestion<br />
was carried out until it turned into a pale transparent solution.<br />
The mixture was cooled and filtered through an acid soaked filter<br />
paper and was adjusted to the required volume, with distilled<br />
water. Metal levels in water and soil were determined by<br />
standard methods of APHA , (1998) and Nafde, et al., (1998)<br />
respectively. The concentrations were detected in atomic<br />
absorption spectrophotometer (Varian AA.575).<br />
Based on total amount of the sample taken, the actual<br />
concentration was calculated, and results were expressed in g/g.<br />
A standard reference material checked the accuracy of<br />
determination. Comparison between metal concentrations in the<br />
tissues of the fish with various body weights were performed by<br />
One Way Analysis of Variance, ANOVA (Gomez and Gomez,<br />
1984). Statistically significant differences were observed in the<br />
mean metal values of tissues and were evaluated at p
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 515<br />
ISSN 2250-3153<br />
excretion (McCarter and Roch, 1983). Within the cells, metals<br />
bound to this protein are incorporated into liposome, which are<br />
excreted through an electrochemical gradient that further<br />
facilitates metal uptake in a contaminated environment.<br />
However, when the capacity of the cell exceeds,<br />
histopathological changes may appear. Depuration process<br />
however may not always recover the lesions caused by chronic<br />
metal exposure.<br />
When sewage input in the ponds was stopped, rapid clearance<br />
of copper was observed from all the tissues excepting from the<br />
liver and intestine (Fig. 1, 2) .This suggests multiple elimination<br />
routes of the metal including urinary, branchial and faecal.<br />
Depuration rate from liver and intestine was very low especially<br />
in the benthic species due to the availability of the food borne<br />
metal from the sediment. Besides, the liver being a storage organ<br />
actively removes accumulated metals from the other tissues.<br />
According to the spill over theory, part of the accumulated metal<br />
in liver is depurated through bile, which is reabsorbed through<br />
the intestinal mucosa. Thus, intestinal mucosa has been observed<br />
to concentrate considerable amount of copper from where the<br />
excretion rate is very slow. Intestine forms the ultimate<br />
depository of metals that is taken through food hence C. mrigala<br />
and O. nilotica accumulate higher amount of copper in this<br />
organ. (Olowu et al., 2010)<br />
Results reveal that, younger C. mrigala accumulates higher<br />
levels of lead, the rate of which subsequently falls with chronic<br />
exposure in a polluted system (Fig. 3, 4). In the other species,<br />
lead rises only moderately with body weight. Gills and skin of<br />
catla also store the metal where the elimination rate is very slow.<br />
Generally, lead accumulation in tissues is proportional to the<br />
ambient concentration, (Tao et al., 1999) but the rate of its<br />
depuration is dependent on the overall body concentration<br />
(Schulz-Balder, 1974). Muscles of L. rohita and O nilotica shows<br />
higher depuration rate of the metal after six months. Liver and<br />
kidney of C. catla , O . nilitica and C. mrigala tend to retain the<br />
metal. However, from the hepatic tissue bile helps in elimination<br />
of the sulfhydryl reactive metals especially lead and cadmium<br />
through the formation of metal-glutathione complexes.<br />
Dissolved and particulate metals are usually absorbed through<br />
passive diffusion or carrier mediated transport over the gill<br />
epithelium. These are also absorbed through skin and food. Zinc<br />
accumulates maximally in the gills especially in the surface<br />
residing C. catla. Normoxic condition of the surface water<br />
probably pumps the available metal, which continues to<br />
accumulate in its gills (Hughes and Floss, 1978). Kidney and<br />
gills act as both storage and depuration sites. Although<br />
considerable release of zinc was observed in the fish under study<br />
(excepting younger benthic fish) yet kidney is hardly considered<br />
as an excretory organ for metals in teleost.<br />
Zinc content in the tissues is positively correlated with body<br />
weight of C. catla and L. rohita possibly due to the breakdown of<br />
their regulatory mechanism with continuous exposure in<br />
contaminated system. Juvenile fishes maintain higher proportion<br />
of this metal from their plantonic diet (Fig. 5, 6). However, in the<br />
two benthic species, the metal rises only slightly with body<br />
weight and after six months, these show very slow depuration<br />
rate. Zinc is retained in C. catla even in the uncontaminated<br />
environment. Mucus in gills and skin helps in considerable<br />
removal of metals..<br />
Cadmium concentration keeps low and constant in all the fish<br />
species under study and body concentration reflects its level in<br />
the environment (Ekeanyanwu et al., 2011). The uptake of the<br />
metal is non-linear, and is not correlated with the body weight of<br />
fish (Bohn and McElroy, 1976) .This complements our findings<br />
(Fig. 7, 8). In spite of this low bioaccumulation potential, the<br />
metal shows a high concentration factor and its average<br />
concentration in fish tissue rise above the mean international<br />
level.<br />
After six months, lead and zinc levels were reduced<br />
considerably than their initial value in the fish tissues while<br />
excretion rate of cadmium was low. Metal is excreted gradually<br />
in a metal free environment (Harrison and Klaverkamp, 1989).<br />
However, fish shows retention of lead and cadmium in the<br />
kidney and zinc in the gills.<br />
In general, muscular depuration is normally higher as binding<br />
proteins are present in only low levels in these tissues. However,<br />
after six months only copper and lead levels decreased below the<br />
set international standard, in the muscle. ( According to WHO<br />
standards , Maximum Permissible Limit for metals in the fish<br />
tissues are copper 20, lead 2 , zinc 45 and cadmium 0.3.) .<br />
Retention of metals in fish tissues, even at lower ambient<br />
environmental metal concentration is due to their binding in the<br />
non-exchangeable or slowly exchangeable pools of the body.<br />
Adjusting metal uptake and depuration are the primary means of<br />
maintaining metal homeostasis that occurs naturally for essential<br />
elements. This control is less evident for non-essential ones as<br />
lead and cadmium show lower excretory rate even in the<br />
uncontaminated environment. Tolerable dietary intake of metals<br />
exceeded among population consuming large amount of fish<br />
chronically exposed to sewage effluents. Trace metal<br />
contaminated fish from sewage-fed wetlands can predispose<br />
consumers to toxicity so there is a need for constant monitoring<br />
of this stressed environment.<br />
Measures to eliminate metals from commercial fish is a<br />
priority so regulation or temporary stoppage of sewage effluents<br />
in aquaculture ponds can reap positive results to reduce metal<br />
related health hazards for population that depend on fish as the<br />
major source of animal protein. In a contaminated environment<br />
the rate of metal uptake exceeds its excretion but fish exposed to<br />
polluted system, if allowed to stay in a relatively metal free<br />
environment, show a gradual decline of these xenotoxic<br />
substances.<br />
www.ijsrp.org
www.ijsrp.org
www.ijsrp.org
www.ijsrp.org
www.ijsrp.org
www.ijsrp.org
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
ISSN 2250-3153<br />
Metals Tissues L.<br />
rohita<br />
50g<br />
Table 1: Deputation percentage of metals from the tissues of Fish<br />
L.<br />
rohita<br />
800g<br />
C.<br />
calta<br />
50g<br />
C.<br />
catla<br />
800g<br />
C.<br />
mrigala<br />
50g<br />
C.<br />
mrigala<br />
800g<br />
O.<br />
nilitia<br />
50g<br />
O.<br />
nilitica<br />
800g<br />
Copper Muscle 100 100 100 100 100 100 100 100<br />
Liver 44.08 52.73 47.38 55.30 68 7.15 46.98 27.66<br />
Kidney 100 100 100 100 100 100 100 100<br />
Gills 100 100 100 100 100 100 100 100<br />
Skin 100 100 100 100 100 100 100 100<br />
Intestine 59.88 62.63 54.18 60.53 40.38 39.29 69.00 20<br />
Lead Muscle 58.88 61.35 31.07 48.15 55.58 28.95 73.96 58.63<br />
Liver 56.70 49.25 29.73 42.81 37.92 21.32 35.90 24.83<br />
Kidney 49.06 52.14 29.38 31.75 46.09 21.71 31.85 22.51<br />
Gills 44.43 51.94 26.61 16.74 58.19 23.73 64.01 35.08<br />
Skin 52.13 56.70 22.18 30.23 61.44 31.24 28.61 46.80-<br />
Intestine 38.75 48.85 22.86 54.13 52.33 25.36 20.22 25.41<br />
Zinc Muscle 44.42 58.14 30.78 18.89 51.36 54.04 63.32 44.08<br />
Liver 31.77 51.04 11.89 20.16 35.93 47.53 53.65 25.86<br />
Kidney 19.33 44.51 36.70 29.76 55.31 39.10 71.00 37.76<br />
Gills 12.54 27.06 14.22 8.73 27.24 39.73 33.43 44.11<br />
Skin 16.00 19.71 31.17 27.62 42.80 32.49 59.14 55.26<br />
Intestine 05.80 16.89 31.69 26.30 40.91 47.34 59.61 36.93<br />
Cadmium Muscle 40.17 35.97 22.28 40.22 35.99 38.59 35.58 36.67<br />
Liver 40.72 58.26 35.89 46.94 34.47 32.92 42.86 48.33<br />
Kidney 41.78 30.06 43.77 43.62 37.97 35.04 21.20 42.53<br />
Gills 43.97 24.54 44.32 59.53 31.66 20.27 39.89 40.05<br />
Skin 31.67 28.48 48.72 35.19 35.61 34.16 33.14 43.14<br />
Intestine 10.82 28.12 43.75 50.37 35.70 34.78 44.88 52.63<br />
Values are expressed in percentage<br />
Table 2: Concentration of Metals in Water and Sediment<br />
Copper Lead Zinc Cadmium<br />
Fresh water * Trace Trace Trace Trace<br />
Sewage Water * 10.97±<br />
2.87<br />
Sewage Water, after six months.<br />
*<br />
93.33 ±<br />
9.39<br />
2.11 ±0.07 17.79±<br />
1.88<br />
16.44±<br />
5.59<br />
3.99±<br />
0.74<br />
Pond sediment.* 41.00± 5.00 32.00± 2.18 60.80<br />
±9.11<br />
Pond Sediment , after six<br />
months. *<br />
*Mean ± SD of 5 different observations<br />
37.00±<br />
3.44<br />
28.11±<br />
2.99<br />
56.00±<br />
4.07<br />
2.23±<br />
0.74<br />
0.79±.01<br />
3.48± 1.11<br />
3.14±0.99<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
ISSN 2250-3153<br />
ACKNOWLEDGMENT<br />
Appreciation is due to The CSIR, New Delhi for their financial<br />
support and the Principal, Lady Brabourne College, Kolkata.<br />
REFERENCES<br />
[1] Aderinola, O.J., Clarke, E.O. Olarinmoye. O.M., Kusemiju V. and<br />
Anatekhai , M.A.. 2009. Heavy Metals in Surface Water, Sediments, Fish<br />
and Perwinkles of Lagos Lagoon. American-Eurasian J. Agric. & Environ.<br />
Sci., 5 (5): 609-617.<br />
[2] Ambedkar, G. and Muniyan, M. 2011. Accumulation of metals in the five<br />
commercially important freshwater fishes available in Vellar River, Tamil<br />
Nadu, India. Archives of Applied Science Research, 3 (3): 261-264.<br />
[3] APHA. 1998. Standard Methods for the Examination of Water and<br />
Wastewater. 20th Ed., American Public Health Association, New York,<br />
USA.<br />
[4] Authman , M.M.N. 2008. Oreochromis nilotica as a Biomonitor of Heavy<br />
Metal Pollution with emphasis on potential risk and relation to some<br />
biological aspects. Global Veterinaria 2(3): 104-109.<br />
[5] Bohn, A. and McElroy, R.O. 1976. Trace metals (As, Cd, Cu, Fe and Zn) in<br />
Arctic Cod, Boreogadus saida and selected zooplankton from Strath cona<br />
sound, Northern Baftin Island. J. Fish Res. Bd. Can. 33: 2836-2840.<br />
[6] Chernoff , B. 1975. A method for wet digestion of fish tissue for heavy<br />
metal analyses. Trans. Am. Fish. Soc. 4 : 803-804.<br />
[7] Ekeanyanwu, C.R., C. A. Ouguiya , and O.F. Etienajirhevwe . 2011.<br />
Trace metal distribution in fish tissues, bottom sediments and water from<br />
Okumeshi River in Delta state, Nigeria. Fish and Periwinkles of Lagos<br />
Lagoon. American-Eurasian J. Agric. & Environ. Sci., 5 (5): 609-617.<br />
[8] Gomez, K.A. and Gomez, A.A. 1984. Statistical Procedures for<br />
Agricultural Research, 2nd ed. Wiley / Interscience , New York.<br />
[9] Harrison, S.E. and Klaverkamp, J.F. 1989. Uptake elimination of and tissue<br />
distribution of dietary and aqueous cadmium by rainbow trout ( Salmo<br />
gairdneri Richardson ) and whitefish ( Caregonous clupeifomes Mitchill )<br />
. Environ. Toxicol . Chem. 8: 87-97.<br />
[10] Hughes, G.M. and R. Floss. 1978. Zinc treatment of the gills of rainbow<br />
trout (S. gairdneri) after treatment with zinc solutions under normoxic and<br />
hypoxic conditions. J. Fish. Biol. 13: 717-728.<br />
[11] Jayaram, K.C. 1981. The freshwater Fishes of India. A Handbook.<br />
Zoological Survey of India , Calcutta. pp : 116-131.<br />
[12] Jezierska, B. and Witeska, M. G. 2006.The Metal Uptake and<br />
Accumulation In Fish Living in Polluted Waters. Soil and Water Pollution<br />
Monitoring, Protection and Remediation. I. Twardowska et al Ed<br />
Springer. pp: 3–23.<br />
[13] Kundu, N., Pal, M. and Saha , S. 2008. East Kolkata Wetlands: A resource<br />
Recovery system through productive activities. In the Proceedings of Taal<br />
2007 . The 12 th world Lake Conference: pp: 868-881.<br />
[14] McCarter , J.A. and Roch, M. (1983). Hepatic metallothionein and<br />
resistance to Cu in juvenile coho salmon. Comp. Biochem. Physiol. 74C:<br />
133-137.<br />
[15] Moriarty, F., Hanson, H.M. and Freestone, P. 1984. Limitation of body<br />
burden as an index of environmental contamination of heavy metal in fish<br />
Cottus gobio L. from the River Ecclesbourne, Derbyshire. Environ. Pollut.<br />
Ser. A 34: 297-320.<br />
[16] Nafde, A.S., Kondawar, V.K. and Hasan. M.Z . 1998. Precision and<br />
accuracy control in the determination of heavy metals in sediment and water<br />
by atomic absorption spectrophotometry . JIEAM. 25:83-91.<br />
[17] Olowu , R. A. , Ayejuyo , O. O. , Adewuyi , G. O. , Adejoro , I. A.<br />
,Denloye, A. A. B. , Babatunde A. O. and Ogundajo , A. L. 2010 .<br />
Determination of Heavy Metals in Fish Tissues, Water and Sediment from<br />
Epe and Badagry Lagoons, Lagos, Nigeria. E-Journal of Chemistry. 7(1),<br />
215-221.<br />
[18] Schulz, B.M. (1974). Lead uptake from sea water and food and lead loss in<br />
common mussel , Mytitus edulis. Mar. Biol., 25: 177-193.<br />
[19] Tao, S., Liang, T. Cao, J. Dawson, R.W. and Liu, C. 1999 . Synergistic<br />
effect of Cu and Pb uptake by Fish. Ecotoxicol. Environ. Saf. 44: 190-<br />
195.<br />
[20] Tawari-Fufeyin, P. and Ekaye , S. A . 2007. Fish species diversity as<br />
indicator of pollution in Ikpoba River , Benin City, Nigeria. Rev. Fish Biol.<br />
Fisheries. 17:21-30.<br />
[21] WHO. 1992. Environmental Health Criteria, No. 134, Environmental<br />
Aspects, Geneva WHO.<br />
AUTHORS<br />
**Prof. Samir Banerjee (M.Sc. Ph.D.)<br />
Aquaculture Research Unit, Department of Zoology,<br />
University of Calcutta,<br />
35, Ballygange Circular Road, Kolkata- 700017.<br />
Mobile number - 9331021567<br />
samirbancu@gmail.com<br />
Correspondence Author: *Dr Paulami Maiti (M.Sc. Ph.D.)<br />
Lady Brabourne College,<br />
P 1/ 2 , Suhrawardy Avenue,<br />
Park Circus, Kolkata – 700017.<br />
Mobile number - 967437345<br />
paulamim262@gmail.com<br />
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />
ISSN 2250-3153<br />
www.ijsrp.org