01.03.2013 Views

IJSRP JUNE 2012 Online Print Version - IJSRP.ORG

IJSRP JUNE 2012 Online Print Version - IJSRP.ORG

IJSRP JUNE 2012 Online Print Version - IJSRP.ORG

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Journal of Scientific<br />

and Research Publications<br />

<strong>Print</strong> <strong>Version</strong>, Volume 2, Issue 6<br />

<strong>JUNE</strong> <strong>2012</strong> Edition<br />

ISSN 2250-3153<br />

<strong>IJSRP</strong><br />

www.ijsrp.org<br />

<strong>IJSRP</strong> INC.<br />

<strong>JUNE</strong> <strong>2012</strong><br />

<strong>Online</strong> <strong>Print</strong> <strong>Version</strong>


International Journal of Scientific and Research Publications, Volume 2, Issue 1, January <strong>2012</strong> 1<br />

ISSN 2250-3153<br />

International Journal of Scientific and Research Publications<br />

GENERAL INFORMAION:<br />

<strong>IJSRP</strong>, International Journal of Scientific and Research Publications publish monthly journal under ISSN<br />

2250-3153.<br />

ONLINE VERSION<br />

http://www.ijsrp.org/e-journal.html<br />

PRINT VERSION<br />

http://www.ijsrp.org/print-journal.html<br />

All the respective authors are the sole owner and responsible of published research and research papers<br />

are published after full consent of respective author or co-author(s).<br />

For any discussion on research subject or research matter, the reader should directly contact to<br />

undersigned authors.<br />

COPYRIGHT<br />

Copyright©<strong>2012</strong> <strong>IJSRP</strong>.<strong>ORG</strong>,<br />

<strong>IJSRP</strong> INC.<br />

All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or<br />

transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or<br />

otherwise, except as described below, without the permission in writing of the Publisher.<br />

Copying of articles is not permitted except for personal and internal use, to the extent permitted by<br />

national copyright law, or under the terms of a license issued by the national Reproduction Rights<br />

Organization.<br />

All the published research can be referenced by readers/scholars/researchers in their further research with<br />

proper citation given to original authors.<br />

DISCLAIMER<br />

Statements and opinions expressed in the published papers are those of the individual contributors and not<br />

the statements and opinion of <strong>IJSRP</strong>. We assumes no responsibility or liability for any damage or injury<br />

to persons or property arising out of the use of any materials, instructions, methods or ideas contained<br />

herein. We expressly disclaim any implied warranties of merchantability or fitness for a particular<br />

purpose. If expert assistance is required, the services of a competent professional person should be sought.<br />

Contact Information:<br />

Editor: editor@ijsrp.org<br />

Website: http://www.ijsrp.org<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 2<br />

ISSN 2250-3153<br />

Table of Contents<br />

Effect of Vedic Chanting (Homas, Yagyas, Meditation) on crime rate (Oct 2011) ............................................... 9<br />

Dr. Rohit Sabharwal, Ms. Kinjal Dalal................................................................................................... 9<br />

APPROXIMATION OF FUNCTION BELONGING TO W (Lp, () t<br />

) CLASS BY (E, q) (N, pn) MEANS OF<br />

ITS FOURIER SERIES ........................................................................................................................................ 13<br />

H. L. RATHORE*, U. K. SHRIVASTAVA** ..................................................................................... 13<br />

Design and Implementation of Cipher Algorithm using Randomized Alphanumeric Characters ....................... 20<br />

Sudhakar Kumar Singh ......................................................................................................................... 20<br />

Nutritional Status of Children (0-24 Months) In Jammu Kashmir and Ladakh Regions .............................. 23<br />

Yasmeen Khan and Nelofar Khan ........................................................................................................ 23<br />

The Correlational Study of the Vertical Jump Test and Wingate Cycle Test as a Method to Assess Anaerobic<br />

Power in High School Basketball Players ............................................................................................................ 30<br />

Purvi K. Changela, Sarla Bhatt ............................................................................................................. 30<br />

SQL Server Query Optimization Techniques - Tips for Writing Efficient and Faster Queries ........................... 36<br />

Navita Kumari ......................................................................................................................................... 36<br />

A Comparative Study on Concomitant of Order Statistics and Record Statistics for Weighted Inverse Gaussian<br />

Distribution ........................................................................................................................................................... 40<br />

Kishore K. Das*, Bhanita Das** and Bhupen K. Baruah*** ............................................................. 40<br />

Design and Stress Analysis of Watt and Porter Governor .................................................................................... 48<br />

*Ravindra Singh Rana, **Rajesh Purohit, *Alok Singh..................................................................... 48<br />

Reviews on the Influences of Alloying elements on the Microstructure and Mechanical Properties of Aluminum<br />

Alloys and Aluminum Alloy Composites ............................................................................................................. 54<br />

R. S. Rana, Rajesh Purohit, and S Das ................................................................................................. 54<br />

Evaluating Demand Response of Hydro Plant with Mixed Pumped Storage ....................................................... 61<br />

N. Venkateswarlu, M. Velmurugan, and S.Udaya Baskar ............................................................................. 61<br />

Tamil Speech Recognition using Semi Continuous Models................................................................................. 65<br />

Hanitha Gnanathesigar .......................................................................................................................... 65<br />

Complex Dynamics in a Mathematical Model of Tumor Growth with Time Delays in the Cell Proliferation ... 70<br />

M. Saleem and Tanuja Agrawal ............................................................................................................ 70<br />

Fuzzy Spanning Tree Flow-Equivalent Algorithm ............................................................................................... 77<br />

Dr. G.Nirmala, K.Uma ........................................................................................................................... 77<br />

A Model Approach to Off-line English Character Recognition ........................................................................... 84<br />

Binod Kumar Prasad*, Goutam Sanyal** ........................................................................................... 84<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 3<br />

ISSN 2250-3153<br />

Fuzzy Sub - Trigroup – Trilevel Properties .......................................................................................................... 89<br />

1 G.Nirmala, 2 S.Suganthi ........................................................................................................................................ 89<br />

Adjustment problems of Educable Mentally Retarded ......................................................................................... 93<br />

Dr. Bharati ROY ..................................................................................................................................... 93<br />

Design of Efficient XTEA Using Verilog ............................................................................................................ 98<br />

Shweta Gaba, Iti Aggarwal, Dr. Sujata Pandey ................................................................................... 98<br />

Performance analysis & Optimization of WDM-EPON for Metropolitan Area Networking ............................ 103<br />

Tripuresh Joshi, Arvind Kumar Jaiswal, Mukesh Kumar ............................................................... 103<br />

Next Generation of Internet Protocol for TCP/IP Protocol Suite ....................................................................... 107<br />

Miss. Soni Samprati .............................................................................................................................. 107<br />

Evaluation of Anticarcinogenic and Antimutagenic Effects of Triphala Extract ............................................... 112<br />

R.C.Agrawal, Rajani............................................................................................................................. 112<br />

Object Detection in Remote Sensing Images: A Review ................................................................................... 118<br />

Er. Tanvi Madaan, Er. Himanshu Sharma ........................................................................................ 118<br />

Genetic Variability Studies for Qualitative and Quantitative traits in Popular Rice (Oryza sativa L.) Hybrids of<br />

India .................................................................................................................................................................... 121<br />

V. Ravindra Babu 1 *, K. Shreya 2 , Kuldeep Singh Dangi 2 , G. Usharani 2 , P. Nagesh 3 ..................... 121<br />

Thyristor Based Speed Control Techniques of DC Motor: A Comparative Analysis ........................................ 126<br />

Rohit Gupta, Ruchika Lamba, Subhransu Padhee ........................................................................... 126<br />

Automatic Face Detection Using Color Based Segmentation ............................................................................ 133<br />

Yogesh Tayal, Ruchika Lamba, Subhransu Padhee.......................................................................... 133<br />

DESIGN AND EVALUATION OF CHITOSAN CONTAINING MUCOADHESIVE BUCCAL PATCH OF<br />

FLUXOTINE HCL ............................................................................................................................................. 140<br />

NARESH KSHIRASAGAR*, NARESH THAMADA, V.N.BALAJI KUMAR NAIK, M.SUSHMA<br />

GOPAL .................................................................................................................................................. 140<br />

CHILD WELFARE PROGRAMME IN COLONIAL MYSORE ..................................................................... 145<br />

Dr. THRIVENI ...................................................................................................................................... 145<br />

Live Migration of Virtual Machines in Cloud .................................................................................................... 148<br />

Ashima Agarwal, Shangruff Raina ..................................................................................................... 148<br />

Regulation and Accounting Treatment of Future and Option in Indian Derivative Market ............................... 153<br />

Matloob Ullah Khan, Dr. Ambrish Gupta and Dr. Sadaf Siraj ....................................................... 153<br />

P-FUZZY SUBALGEBRA AND ITS PROPERTIES ....................................................................................... 159<br />

Dr. G. NIRMALA 1 , S.PRIYADARSHINI 2 ......................................................................................... 159<br />

Energy Conservation through Roof Surface Evaporative Cooling for Air Conditioning System ...................... 162<br />

R.B. Lokapure, J.D.Joshi ..................................................................................................................... 162<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 4<br />

ISSN 2250-3153<br />

A Carrier Based Compact Model for Long Channel Undoped and Doped Body Symmetric Double Gate<br />

MOSFETS........................................................................................................................................................... 167<br />

Neha Goel, Dr.Vandana Nath .............................................................................................................. 167<br />

Removal of Multiple Access Interference in DS-CDMA System ...................................................................... 171<br />

And ................................................................................................ 171<br />

Modeling of Liquid-Liquid Extraction in Spray Column Using Artificial Neural Network .............................. 177<br />

S.L. Pandharipande, Aashish Nagdive, Yogesh Moharkar .............................................................. 177<br />

Testing Market Efficiency of Indian Stock Market ............................................................................................ 187<br />

Mr. Divyang J Joshi .............................................................................................................................. 187<br />

<strong>Online</strong> Shopping and the Transaction Protection in E-Commerce: A case Of <strong>Online</strong> Purchasing in Libya. ..... 191<br />

Abdulghader.A.Ahmed, Hadya.S.Hawedi .......................................................................................... 191<br />

DIEL Variations of Physico-Chemical Factors and Planktonpopulation in a Swamp Of Harda, Purnia, Bihar<br />

(India) .................................................................................................................................................................. 205<br />

R.SIDDHARTHA, RANJANA KUMARI, K.D.TANTI* AND B.N.PANDEY .............................. 205<br />

Effect of Various Concentration of Octacosane, Pentacosane and Tricosane on Foraging Behavior of<br />

Trichogrammatids ............................................................................................................................................... 209<br />

Shipra Mathur, Asfiya Zayeem, Srikanth Kanameni, Monica Tibrewal, Nitish Wadhwa, Priti<br />

Arora and Archna Kumar ................................................................................................................... 209<br />

Awareness of Health Insurance in Andhra Pradesh ............................................................................................ 214<br />

Jangati Yellaiah ..................................................................................................................................... 214<br />

Comparative Study of Sign Language Recognition Systems ............................................................................. 219<br />

Ms. Rashmi D. Kyatanavar, Prof. P. R. Futane ................................................................................. 219<br />

Age Related Changes in the Parasympathetic Control of the Heart ................................................................... 222<br />

Vinutha Shankar MS, Shivakumar Veeraiah .................................................................................... 222<br />

The Folk Medicinal Plants of the Mao Naga in Manipur, North East India ....................................................... 228<br />

Adani Lokho .......................................................................................................................................... 228<br />

Women and Soap-Operas: Popularity, Portrayal and Perception ....................................................................... 236<br />

Dr. Aaliya Ahmed ................................................................................................................................. 236<br />

Global and Factor Domination in Fuzzy Graph .................................................................................................. 242<br />

G.Nirmala 1 , M.Sheela 2 ......................................................................................................................... 242<br />

Active Device Usage in Filter Design – An Overview ....................................................................................... 246<br />

SHEIKH AJAZ BASHIR ....................................................................................................................... 246<br />

N.A.SHAH .............................................................................................................................................. 246<br />

Tracking of Reference Signals by Advanced Unified Power Flow Controller .................................................. 253<br />

K. Manoz Kumar Reddy ...................................................................................................................... 253<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 5<br />

ISSN 2250-3153<br />

Robust Digital Watermarking Using MDKP ...................................................................................................... 259<br />

Mr A. Chandra, Ms. T. Kavitha .......................................................................................................... 259<br />

Evaluation of antifungal activities of certain plant against Fusarium udum Butler causing wilt in pigeonpea<br />

(Cajanus cajan (L.) Millsp.) ............................................................................................................................... 263<br />

Tongbram Ranjana Devi and GKN Chhetry ..................................................................................... 263<br />

Recent Developments in Signal Encryption – A Critical Survey ....................................................................... 267<br />

S. Rajanarayanan and A. Pushparaghavan ....................................................................................... 267<br />

Impact of Seasonal and Habitat variation on composition of Total Lipid content in Muscle and Liver of Labeo<br />

gonius (Ham) ...................................................................................................................................................... 274<br />

B.K. Deka*, R. Mahanta* and U.C. Goswami** ............................................................................... 274<br />

Retrieving Stream of Video Frames Using Query Processing............................................................................ 279<br />

Ramancha Sandhyarani 1 , Shiramshetty Gouthami 2 and Baggani Ratna 3 ..................................... 279<br />

Screening of phaseolus vulgaris Cultivars Growing in Various Areas of Jammu and Kashmir for Anthracnose<br />

Resistance ........................................................................................................................................................... 283<br />

Balbir Kour, Gurmeet Kour, Sanjana Kaul, Manoj K. Dhar .......................................................... 283<br />

Love, Desire, and Theological Issues in Indo-Iranian Myths: A Comparative Introduction ............................ 291<br />

Abbas Saeedipour ................................................................................................................................. 291<br />

Performance Evaluation of DHT Based multi-path Routing Protocol for MANETs ......................................... 296<br />

Gurmukh Singh, Dr. Savita Gupta, Sukhvir Singh ........................................................................... 296<br />

Secure Data Hiding Algorithm Using Encrypted Secret message ...................................................................... 301<br />

Harshitha K M, Dr. P. A. Vijaya ......................................................................................................... 301<br />

Biodiesel Production and Process Optimization ................................................................................................. 305<br />

Rajarshi Kar, Oindrila Gupta, Mukundu Kumar Das ..................................................................... 305<br />

A study of Intellectual Property Management in Industries & Academics & ways for collaboration in India .. 311<br />

First Author - Pankaj Prabhakar Borkar .......................................................................................... 311<br />

Second Author - Dr. Ashutosh A. Paturkar ....................................................................................... 311<br />

Prequalification Science Practical Activities for the Production of Effective Science Teachers: a Strategy for<br />

Sustainable National Development ..................................................................................................................... 316<br />

Jamil Mikhail Y..................................................................................................................................... 316<br />

Education: A Solution to the Contemporary Challenges of a Common Woman in a typical Hausa-Fulani<br />

Dominated Society in Nigeria ............................................................................................................................. 320<br />

Jamil Mikhail Y..................................................................................................................................... 320<br />

Circular Disk Monopole Antenna for Broadband Applications ......................................................................... 325<br />

B.Saidaiah #1 , A.Sudhakar *2 , K. Padma Raju #3 .................................................................................. 325<br />

Implementation Scheme for <strong>Online</strong> Medical Diagnosis System Using Multi Agent System with JADE ......... 329<br />

Mr.Shibakali Gupta, Arindam Sarkar, Indrani Pramanik, Banani Mukherjee ............................ 329<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 6<br />

ISSN 2250-3153<br />

Multicarrier modulation with OFDM for 4G networks ...................................................................................... 335<br />

M.Gopu*, Dr. Ritesh Khanna** ......................................................................................................... 335<br />

Study and Comparison Performance of On-demand AODV and DSR, along with the traditional proactive<br />

DSDV Routing Protocols for MANET ............................................................................................................... 339<br />

Vijendra Rai*, Jaishree Jain** ............................................................................................................ 339<br />

―Automated Innovation Analysis & Human Resource Management System‖ .................................................. 345<br />

Prashik Nagkirti, Sagar Kunjir, Ganesh Rajput, Swapnil Patil ...................................................... 345<br />

X-Ray Satellites in the Lα1 Region of 4d Transition Element ........................................................................... 348<br />

Dr. Sameer Sinha *, Ajay Vikram Singh**, Kedar Nath Singh*** ................................................. 348<br />

Characterization of Sulphamic Acid Single Crystal by Optical Techniques ...................................................... 353<br />

Dr. Rita A. Gharde, Divakar T. Chunarkar....................................................................................... 353<br />

Design of a 32 DOF Andro Humanoid Robot using Cascaded Computational Intelligence .............................. 357<br />

S Shyam.R.Nair, Prof. Manjula Pramod ............................................................................................ 357<br />

Image Processing Operations for 3d Image ........................................................................................................ 364<br />

Mrs. A. Padmapriya, S.Vigneshnarthi ................................................................................................ 364<br />

Transient Analysis of Mac Protocol in Sensor Networks ................................................................................... 370<br />

Mada Amarnadh, M. Venkata Dasu ................................................................................................... 370<br />

Measures to combat tuberculosis in colonial Mysore ......................................................................................... 374<br />

Dr. Thriveni ........................................................................................................................................... 374<br />

Condition based reporting of multi-machine monitoring system using GSM .................................................... 380<br />

Jinia Datta(Das), Soumyajit Datta, Sumana Chowdhuri and Jitendranath Bera .......................... 380<br />

Income Elasticities of Demand for major consumption items. ........................................................................... 385<br />

Case study of Kashmir University Teachers ....................................................................................................... 385<br />

Samira Khan.......................................................................................................................................... 385<br />

Enhancing a Future version of the Nigerian SME Technology Incubation Model: Lessons for other developing<br />

countries .............................................................................................................................................................. 390<br />

Nkem Okpa Obaji 1 , Aslan Amat Senin 2 , Cameron Keith Richards 3 ............................................... 390<br />

The Effect of Ionic Composition on Structural and Optical Properties of CdxZn1-xS Thin films Grown by Spray<br />

pyrolysis .............................................................................................................................................................. 393<br />

Ravangave L. S. 1 , Biradar U. V. 2 , Misal S. D. 3 ................................................................................. 393<br />

Hybrid Algorithm for Segmentation of Left Ventricle in Cardiac MRI ............................................................. 398<br />

R.Sreemathy 1 , Rekha S. Patil 2 , Priyanka Shirude 3 ............................................................................ 398<br />

Effect of in-plane forces on frequency parameters ............................................................................................. 402<br />

A.K.L. Srivastava, S.R.Pandey ............................................................................................................ 402<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 7<br />

ISSN 2250-3153<br />

An Efficient Synthesis of Bio Active Azetidinones and Thiazolidinones of 3-METHYL-1-PHENYL-1H-<br />

PYRAZOL-5-OL ................................................................................................................................................ 421<br />

Ravindra Kumar*, Abha Shukla**, and D.S.Tyagi*** .................................................................... 421<br />

Colposcopy and carcinoma buccal mucosa: finding significance, a pilot study ................................................. 428<br />

Dr.Abhishek Singh Nayyar 1 , Dr.Gayitri H.C. 2 , Dr.Mubeen Khan 3 , Dr.U.D.Bafna 4 , Dr.Siddique<br />

Ahmed 5 ................................................................................................................................................... 428<br />

On a class of g**-closed sets in topological spaces and some mappings ...................................................... 435<br />

Dr. D.Saravanakumar, K.M.Sathishkumar ....................................................................................... 435<br />

The White Tiger: Quest of Existence.................................................................................................................. 440<br />

Prof. Sakate Bharat Shamarao ............................................................................................................ 440<br />

Integrity Checking Mechanism with Effective 1nd Realistic Approach in Distributed Database ..................... 442<br />

Pallavi Saxena, Nitin Dubey, Sonali Pathak ....................................................................................... 442<br />

Empowerment of Women in India- An Attempt to Fill the Gender Gap (June, <strong>2012</strong>) ...................................... 447<br />

Dr. Ravi N. Kadam ............................................................................................................................... 447<br />

Energy Efficient Multi Hop Clustering Protocol for Wireless Networks ........................................................... 450<br />

M.Shankar, G.JegaJothi, S. Karthigaiveni, M.Ganesan, L Dinesh ................................................. 450<br />

Migration of Mobicents SIP Servlets on Cloud Platform ................................................................................... 457<br />

Mr. Manish Giri, Sachin Waghmare, Balaji Bandhu, Akshay Sawwashere, Atul Khaire ............ 457<br />

Study of Fast Frequency Hopping Spread Spectrum and Jamming Systems ..................................................... 461<br />

Er.Nilesh Agrwal**, Er.Navendu Nitin**, Manjay Yadav* ............................................................. 461<br />

The Compliance of Temporary Soft Lining Materials-An in vivo & vitro study ............................................... 464<br />

Dr. N.Shanmuganathan, Dr.T.V.Padamanabhan, Dr.R.Subramaniam, Dr.S.Madhankumar ..... 464<br />

A Case Report – MELAS Syndrome .................................................................................................................. 471<br />

Dr Hariom Meena*, Dr Ramraj Meena*, Dr Surendra Khosya * ................................................... 471<br />

Research Directions in Quantum Cryptography and Quantum Key Distribution .............................................. 474<br />

Ms. Deepa Harihar Kulkarni ............................................................................................................... 474<br />

Controller Performance Evaluation for Concentration Control of Isothermal Continuous Stirred Tank Reactor<br />

............................................................................................................................................................................. 477<br />

Vishal Vishnoi, Subhransu Padhee, Gagandeep Kaur ...................................................................... 477<br />

Design of Fractional Order PID Controller for Speed Control of DC Motor ..................................................... 484<br />

Rinku Singhal, Subhransu Padhee, Gagandeep Kaur ...................................................................... 484<br />

FUZZY GRAPHS ON COMPOSITION, TENSOR AND NORMAL PRODUCTS ........................................ 493<br />

Dr. G.NIRMALA* and M.VIJAYA** ................................................................................................ 493<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 8<br />

ISSN 2250-3153<br />

Text Fusion in Medical Images Using Fuzzy Logic Based Matrix Scanning Algorithm ................................... 499<br />

Pinki Jain, Anu Aggarwal (Guide) ...................................................................................................... 499<br />

Impact of Peace and Disturbances on Tourism and Horticulture in Jammu and Kashmir ................................. 506<br />

RAJNI SHARMA, VINOD KUMAR SHARMA AND VAR INDER SINGH WARIS ................. 506<br />

Fate of Metals in Fish under Variable Sewage Input in Fish Ponds ................................................................... 513<br />

Paulami Maiti * and Samir Banerjee ** ........................................................................................... 513<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 9<br />

ISSN 2250-3153<br />

“Jai Guru Dev”<br />

Effect of Vedic Chanting (Homas, Yagyas, Meditation) on<br />

crime rate (Oct 2011)<br />

Abstract- Every sound generated in this universe has great<br />

impact on human body and its surroundings. Ancient sages;<br />

through power of meditation had found the benefits of various<br />

chants and its impact on the surroundings. Vedic Chantings<br />

(Homas, Yagyas, Meditation) leads to healthy body, mind and<br />

soul which is more in sync with law of nature. Today there are<br />

meditation, chantings been performed for holistic growth of<br />

human and nature. This was studied by analyzing crime<br />

registrations in four zones of Mumbai. The study has shown that<br />

Vedic chants reduce crime rate.<br />

Keywords- Crime - an action or an instance of negligence that<br />

is deemed injurious to the public welfare or morals or to the<br />

interests of the state and that is legally prohibited , Navratri –<br />

Festival of lord Durga celebrated for 9 days in India, Sattva –<br />

positive vibes and energy, Vedic Chanting - Homas, Yagyas,<br />

Meditation<br />

T<br />

I. INTRODUCTION<br />

here is negativity spread all over the planet, mainly due to<br />

change in lifestyle, global warming, pollution and the rising<br />

population. Due to excessive working hours, unemployment,<br />

competition and corruption a common man falls prey to<br />

depression, anxiety, helplessness, leading to violence betrayal of<br />

trust, loss of brotherhood in the family and society etc.<br />

Our ancient rishis and yogis used to chant mantras and perform<br />

various pujas, to eradicate negativity from the surroundings. This<br />

ancient technique, which when followed as per the rites and<br />

rituals of the vedic culture, brings positivity in the environment.<br />

The environment includes all the living beings in the cosmos.<br />

Each and every small organism is influenced by the chanting and<br />

the vibrations created in the space. The positive energy in the<br />

surrounding increases, leading to more of peace and nonviolence<br />

and an up-liftment in thoughts, work, health and<br />

reduction of stress in individuals and society.<br />

Meaning of Navratri: Nava‘ means ‗nine‘ and ‗Ratri‘ is made up<br />

of ‗Ra‘, which also means ‗night‘ and ‗Tri‘ meaning the ‗the<br />

three aspects of our life – the Body, the Mind and the Soul. So<br />

‗Navaratri‘ means ‗giving rest to all the three aspects of our life,<br />

for nine days‘.<br />

Each day during Navratri has special implications: yagyas,<br />

poojas and homas are performed. Among the things offered to<br />

the fire are hundreds of different herbs, fruits, garments, and<br />

mantras, all creating a gloriously divine atmosphere to drown in.<br />

The significance of Vedic Chanting (Homas, Yagyas,<br />

Meditation): These are not for the sages, who perform them, but<br />

Dr. Rohit Sabharwal, Ms. Kinjal Dalal<br />

The Art of Living<br />

for the entire Universe, for all the misery, sorrow, and pain in the<br />

world. The blessings of the yagyas and poojas teach the whole of<br />

humanity and a lot of good comes out of these – peace, strength,<br />

prosperity, success and faith.<br />

II. LITERATURE REVIEW<br />

There is research conducted on effects of various vedic<br />

chantings on intellect. It was concluded that vedic chanting<br />

showed significant increase scoring in both the memory tests and<br />

considerable reduction in total error and total time taken for<br />

cancellation tests compared to non-chanting practitioners (Sripad<br />

Ghaligi 1 ,H.R. Nagendra & Ramachandra Bhatt, 2006).<br />

Every one attending to such Homas, Yagyas, Meditation (Vedic<br />

Chanting) before has given a review that they experience peace<br />

of mind, there is more relaxation which gives a feeling of<br />

something settling within, experiencing meditative state of mind.<br />

They have experienced decrease in illness and more of positive<br />

energy within. However, there is no specific research conducted<br />

which studies and proves to have reduced the crime rate due to<br />

Vedic chanting (Homas, Yagyas, Meditation).<br />

METHODOLOGY<br />

The data as made available by Assistant Commissioner of<br />

Police (ACP), West Region, Mumbai, record of the crimes in the<br />

zones of Bandra Kurla Complex, Kherwadi, Bandra and Mahim<br />

for the above mentioned dates has been used.<br />

TYPE OF RESEARCH<br />

This is an ex-post facto research. As the variables tested are<br />

assumed to have relation among themselves. Researcher can only<br />

report on what is happened. The aim is to look for patterns,<br />

hypotheses or ideas that can be tested and will form the basis for<br />

further research and betterment for society.<br />

STUDY DESIGN<br />

The objective of this study is to demonstrate the effect of<br />

Vedic Chanting (Homas, Yagyas, Meditation) on crime rate. It is<br />

opinionated that attending pujas and homas bring in high level of<br />

sattva or positive energy in self and surroundings thereby<br />

reduction in crime will be seen.<br />

Zone Data: The data was collected as per that given by the<br />

Assistant Commissioner of Police research cell. The Mumbai<br />

Police has designed format for recording the crime rate for the<br />

entire Brihan Mumbai. On the basis of the format; the following<br />

1 Corresponding Author<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 10<br />

ISSN 2250-3153<br />

zones were selected as sample for study namely Bandra Kurla<br />

Complex, Kherwadi, Bandra and Mahim. The Zone, where the<br />

chanting was performed was the Bandra zone.<br />

HYPOTHESES<br />

Vedic Chanting (Homas, Yagyas, Meditation) reduce the crime<br />

rate during the period it is performed.<br />

Independent Variable: The period chosen: previous to the<br />

Navratri week, during Navratri and after the Navratri week.<br />

Dependent Variable: The crime rate for the period prior to<br />

Navratri, During Navratri and after Navratri is chosen.<br />

PLACE OF CONDUCTING RESEARCH<br />

Mumbai. Maharashtra, India.<br />

The vedic chants are performed in Mumbai 2011, Bandra Kurla<br />

Complex zone during the Navratri period. Thus four surrounding<br />

zones from Mumbai are selected namely Bandra Kurla Complex,<br />

Kherwadi, Bandra and Mahim for the concentric evaluation of<br />

research.<br />

DATA COLLECTION<br />

Data was collected from the Mumbai police website and<br />

Assistant Commissioner of Police, West Region Bandra and<br />

Mahim region.<br />

Period<br />

considered<br />

Table 1: Details of Week considered for research<br />

Abbrevation: R - Registered Crime<br />

O=Observed<br />

E=Expected<br />

Week 1 Week 2 Week 3 Week 4<br />

19.09.11<br />

to<br />

25.09.2011<br />

(Pre - event)<br />

Week1<br />

26.09.2011 to<br />

02.10.2011<br />

DATES CHOSEN FOR RESEARCH<br />

Data for the year 2011 - previous to the Navratri week<br />

(19.09.2011 – 25.09.2011), during Navratri (average of the two<br />

weeks – 26.09.2011 – 02.10.2011 and 03.10.2011 - 09.10.2011)<br />

and after the Navratri week (10.10.2011 – 16.10.2011) is<br />

considered.<br />

During Navratri Dates for data:<br />

The festival of Navratri was held from 26 th September<br />

2011(Wednesday) to 5 th October 2011 (Wednesday). For<br />

research; average of data of the following two weeks specifically,<br />

from Monday to Sunday 26 th September 2011 – 2 nd October 2011<br />

(2 nd week) and 3 rd October 2011 to 9 th October 2011 (3 rd week) is<br />

considered as Navratri week.<br />

III. RESEARCH AND FINDINGS<br />

Data was run through the Chi-square test. Since the calculated<br />

value was found to be 0.57 which was lesser than table value of<br />

5.99, thus, null hypothesis was accepted at 5% level of<br />

significance.<br />

03.10.2011<br />

to<br />

09.10.2011<br />

Table 2: Period considered and No. of crime registered<br />

(During event) Week<br />

2&3<br />

No. of<br />

crime<br />

registered 26 31 31<br />

Expected Frequency = Sum of week 1 + Week 2&3 + Week 4 / 3<br />

= 26+31+31/3<br />

= 88/3<br />

=29.33<br />

10.10.2011<br />

to<br />

16.10.2011<br />

(Post - event)<br />

Week 4<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 11<br />

ISSN 2250-3153<br />

Computation<br />

Ho = Homas, Yagyas, Meditation (Vedic Chanting) reduce the crime rate during the period it is performed<br />

H1 = Homas, Yagyas, Meditation (Vedic Chanting) does not reduce the crime rate during the period it is<br />

performed<br />

Table 3: Calculation of observed and expected frequency<br />

(O-<br />

Period O E O-E E)2 (O-E)2/E<br />

29.3 -<br />

1 26 3 3.33 11 0.38<br />

29.3<br />

2 31 3 1.67 3 0.10<br />

29.3<br />

3 31 3 1.67 3 0.10<br />

88 88<br />

x2 = Sumation (O-E)2/E = 0.57<br />

df = 3 - 1 = 2<br />

table value at 5% for 2 df = 5.99<br />

Since the calculated value = 0.57 is lesser than table value of 5.99, null hypothesis is accepted at 5% level of<br />

significance.<br />

The results show that vedic chants reduce crime rate.<br />

Details of the calculations has been mentioned in the<br />

Annexure<br />

In addition to the data collected the public opinion was summed<br />

up to:<br />

i. During any festival where there are masses of people<br />

the Police security is increased; Inorder to avoid<br />

adverse conditions there are many rules set prior to<br />

any public event. This is helps the police to<br />

maintain discipline among the crowd; leading to<br />

decrease in crime.<br />

ii. People have become more aware and avoid going to<br />

places where there are mishaps likely to happen.<br />

iii. People who attended meditations and various vedic<br />

chants experienced happy and meditative state of<br />

mind, they felt light, positive towards life and their<br />

goals and experienced more productive in their<br />

routine life. They became more inclined towards<br />

doing work for betterment of themselves their<br />

family members and their society.<br />

IV. CONCLUSION<br />

The data collected shows that there is reduction of crime,<br />

during the period of Navratri when the vedic chants are<br />

performed.<br />

Generally, Navratri is associated with Garba or Dandiya; a<br />

festival celebrated at night and chances are high for a greater<br />

number of mishaps to take place, due to there being more people<br />

0.57<br />

around the city, outside their homes, at night. However, the data<br />

collected shows that there were less crimes reported during the<br />

Navratri period for the selected sample zones. Thus, it is proved<br />

that Vedic Chants reduce crime rate during the period it is<br />

performed.<br />

LIMITATIONS<br />

The crimes which are registered only are taken into<br />

consideration.<br />

RECOMMENDATIONS<br />

The results prove that vedic chants reduce crime rate, thus, to<br />

maintain the impact of positivity in the surrounding these chants<br />

should take place more frequently.<br />

ACKNOWLEDGEMENT<br />

Special thanks to Mrs. Nayana, Mr. Sujit Bankar, Mr. S.<br />

Kadam, Prof.Preeti Shirodkar, Prof. Pallavi Mhatre, Dr.Nirmala<br />

Joshi, Prof. Pranjal Muley, our family members, friends and well<br />

wishers.<br />

REFERENCES<br />

[1] http://nopr.niscair.res.in/handle/123456789/6747<br />

[2] http://www.mumbaipolice.org/<br />

[3] Murthy S N, Bhojanna U. Business Research Methods – 2 nd Edition. New<br />

Delhi: Excel Books, 2007.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 12<br />

ISSN 2250-3153<br />

AUTHORS<br />

First Author - Dr. Rohit Sabharwal, B.D.S, M.D.S<br />

(Periodontist), MAR Dental College, Pune,<br />

drrohitsab@gmail.com<br />

Second Author - Ms. Kinjal Dalal, MA (Industrial<br />

Psychology), Don Bosco Institute of Management and Research,<br />

Mumbai, kinjal.dbit@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 13<br />

ISSN 2250-3153<br />

APPROXIMATION OF FUNCTION BELONGING TO<br />

W (Lp, () t ) CLASS BY (E, q) (N, pn) MEANS OF ITS<br />

FOURIER SERIES<br />

H. L. RATHORE*, U. K. SHRIVASTAVA**<br />

* Department of Mathematics, J. K. Institute of Engineering, Bilaspur (C. G.), India<br />

E-mail: hemlalrathore@gmail.com<br />

** Department of Mathematics, Govt. Girl‘s P. G. College, Bilaspur (C. G.), India<br />

Abstract- The present paper deal with approximation of a function belonging to the W(Lp, (t)) class by product summability method.<br />

Here product of Euler (E,q) summability method and Nörlund (N, pn) method has been taken. A new estimate on degree of<br />

approximation of a function belonging to W(Lp, (t)) class has been determined by (E, q) (N, pn) summability of a Fourier series.<br />

Mathematics Subject Classification: 42B05, 42B08<br />

Index Terms- Degree of approximation, W(Lp, (t)) class, (E, q) (N, pn) summability, Fourier series, Conjugate series of a Fourier<br />

series<br />

L<br />

I. DEFINITION AND NOTATIONS<br />

et f be a 2π-periodic function in L[-π, π]. The Fourier series associated with f at a point x is defined by<br />

<br />

1 1<br />

f ( x) a0 ancosnxbnsinnxa0Anx (1.1)<br />

2 n1 2 n1<br />

With partial sum sn (f; x)<br />

where<br />

<br />

1<br />

an f x cos<br />

nx dx<br />

and<br />

The Lp norm is defined by<br />

<br />

<br />

1<br />

bn f x sin<br />

nx dx<br />

<br />

<br />

1<br />

2<br />

p<br />

p <br />

<br />

<br />

1<br />

a0 f x dx<br />

<br />

f p <br />

0<br />

f x dx<br />

,<br />

p 1<br />

and the degree of approximation En (f) is given by (Zygmund [6]).<br />

Enfmin Tn<br />

f x Tnxp<br />

,<br />

in term of n, where Tn (x) is a trigonometric polynomial of degree n.<br />

A function<br />

f Lip <br />

if<br />

f x t f x t <br />

<br />

<br />

for n = 1.2.3……….<br />

for 0 1 ,<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 14<br />

ISSN 2250-3153<br />

f x Lip , p<br />

and<br />

1<br />

2<br />

<br />

<br />

for 0x 2if.<br />

p<br />

p<br />

<br />

<br />

<br />

f x t f x dx t<br />

0<br />

<br />

t <br />

Given a positive increasing function ,<br />

and<br />

p 1<br />

,<br />

1<br />

2<br />

p<br />

<br />

<br />

p,<br />

<br />

f W<br />

L t<br />

We observe that<br />

We write<br />

, 0 1,<br />

,<br />

<br />

f Lip t p<br />

p<br />

<br />

<br />

f x t f x dx t<br />

0<br />

<br />

if<br />

1<br />

2<br />

p<br />

<br />

<br />

p<br />

<br />

sin <br />

<br />

fxtfx x dx t<br />

0<br />

<br />

0<br />

p <br />

<br />

<br />

<br />

<br />

if<br />

<br />

t t<br />

p<br />

,<br />

0<br />

<br />

W L , t Lip t , p Lip , p Lip<br />

1<br />

<br />

2<br />

t f x t f x t 2 f x <br />

<br />

n<br />

un sn uk<br />

Let n0<br />

th<br />

be an infinite series with sequence of n partial sum k 0<br />

<br />

<br />

P p 0<br />

n k<br />

n0<br />

P 0 p<br />

, 1 1<br />

The Nörlund means of the sequence {sn} is given by (Hardy [2])<br />

1 n<br />

t p s<br />

N<br />

n<br />

Pn<br />

k0<br />

nk k<br />

p 1<br />

(Mc Fadden [3])<br />

and a sequence {pn} of real constant such that<br />

N<br />

t<br />

If n s<br />

as n , then the sequence {sn} is summable to s by Nörlund method.<br />

The Euler means (E, q) is given by (Hardy [2])<br />

n<br />

q 1 n nk En n <br />

q<br />

sk<br />

1 q<br />

k0<br />

k ,<br />

q<br />

E<br />

If n s<br />

as n , then the sequence {sn} is summable to s by Euler method. The (E, q) transform of the (N, pn)<br />

un<br />

transform define the (E, q) (N, pn) transform of the partial sum {sn} of series n0<br />

. The (E, q) (N, pn) means defines a sequence<br />

q<br />

E N tn <br />

q<br />

E N<br />

n<br />

by<br />

n<br />

q<br />

E N 1 n tn q<br />

k n 1 q<br />

k0<br />

nk k 1<br />

P<br />

pkr<br />

k r0<br />

sr<br />

t s<br />

If<br />

as n , then the sequence {sn} is said to summable by (E, q) (N, pn) method to s.<br />

1 1 <br />

<br />

t <br />

<br />

, where denotes the greatest integer not greater than t .<br />

<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 15<br />

ISSN 2250-3153<br />

Particular Cases : Two particular cases of (E, q) (N, pn) means are :<br />

1) (E, q) (C, 1) if pn = 1, n<br />

n1 pn<br />

<br />

1<br />

, 0<br />

2) (E, q) (C, ) if<br />

The following theorems are due to Binod Prasad Dhakal [1].<br />

Theorem A : If<br />

1<br />

1<br />

p <br />

,<br />

f : R R<br />

is 2π – periodic function, Lebesgue integrable on [-π , π] and Lip(α, p) class function for<br />

p 1<br />

, then the degree of approximation of f by the (E,1) (N, pn) mean of its Fourier series is given by :<br />

EN<br />

n<br />

<br />

t x f x<br />

<br />

1<br />

<br />

<br />

<br />

p<br />

1<br />

p <br />

1 n 1<br />

n 1<br />

n k<br />

EN<br />

tn n pkrsr<br />

2 k0 k P r 0<br />

Where, k <br />

(E, 1) (N, pn) means of Fourier series (1.1).<br />

,<br />

is<br />

II. MAIN THEOREM<br />

The degree of approximation of function belonging to the Lipschitz class by (E, q) (C, 1) and by (E, 1) (N, p n) mean has discussed<br />

by a number of researchers like S.K. Tiwari and Chandrashekhar Bariwal [5] and Binod Prasad Dhakal [1]. But till now no work seem<br />

to have been done to obtain the degree of approximation of the function belonging to<br />

mean of its Fourier series.<br />

p,<br />

<br />

W L t<br />

In an attempt to make study in this direction, one theorem on the degree of approximation of function of<br />

product summability mean of the form (E, q) (N, pn) has been determined as following.<br />

Theorem : If<br />

q<br />

<br />

f : R R<br />

is 2π – periodic, Lebesgue integrable [-π, π] and belonging to the class<br />

E N<br />

tnx using on its Fourier series (1.1) is given by.<br />

(2.1)<br />

Provided<br />

(2.2)<br />

and<br />

(2.3)<br />

<br />

t<br />

q<br />

1<br />

E N 1 P <br />

tn f ( n 1) <br />

p<br />

n 1<br />

<br />

<br />

satisfies the following conditions :<br />

1<br />

p<br />

<br />

P<br />

n1<br />

t ()<br />

t<br />

<br />

p 1 <br />

sin t dt<br />

<br />

<br />

(<br />

t) n1<br />

<br />

<br />

<br />

n1<br />

<br />

1<br />

p<br />

P<br />

<br />

<br />

t (<br />

t) sin t <br />

<br />

<br />

dt n <br />

()<br />

t <br />

<br />

1<br />

<br />

class by (E, q) (N, pn) product<br />

p,<br />

<br />

W L t<br />

p,<br />

<br />

W L t<br />

,<br />

class by<br />

p 1<br />

by<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 16<br />

ISSN 2250-3153<br />

Where is an arbitrary number such that<br />

such that<br />

1 p .<br />

n k<br />

q<br />

E N 1 n nk 1<br />

t q . p<br />

n <br />

1<br />

q k k Pk<br />

r<br />

n kr and 0 0<br />

Lemma 1 : If<br />

q(1 ) 1 0<br />

, conditions (2.2) and (2.3) hold uniformly in x and where<br />

sr is (E,q) (N,pn) means of Fourier series (1.1).<br />

q <br />

q E N t n 1<br />

Then n<br />

Proof :<br />

q <br />

1 <br />

n k<br />

1 n 1 sin r t<br />

nk E N t .<br />

2<br />

n n q<br />

p<br />

kr 21qk 0 k Pk<br />

r 0 sin t<br />

<br />

<br />

2<br />

<br />

0 t for n 1<br />

1 <br />

n 1 n nk k q<br />

sin r t<br />

E N t <br />

2<br />

n n p<br />

kr 21qk 0 k P r 0 sin t<br />

<br />

k<br />

2<br />

r <br />

n k 2 1 sin t<br />

1 n 1 nk 2<br />

n q<br />

p<br />

kr 21qk 0 k P r 0 sin t<br />

<br />

<br />

k<br />

2<br />

q<br />

2 1<br />

n k<br />

1 n k<br />

nk q p<br />

n <br />

21 k P<br />

q<br />

n<br />

kr <br />

k0 r0<br />

k<br />

k0<br />

n 1 n nk <br />

q<br />

k<br />

21 k<br />

( n 1)<br />

q <br />

n<br />

k0<br />

<br />

Lemma 2 : If n<br />

q 1 E N t <br />

n <br />

t for 1 t<br />

<br />

<br />

n and<br />

Proof :<br />

q <br />

2 1<br />

E N t is given as in lemma 1, then<br />

<br />

n<br />

<br />

k0<br />

p P<br />

nk n nk n<br />

q q<br />

<br />

<br />

k sin 1 kt , sin 2<br />

t t <br />

<br />

1 <br />

n k<br />

1 n 1 sin r t<br />

nk E N t <br />

2<br />

n n q<br />

p<br />

kr 21qk 0 k P r 0 sin t<br />

<br />

<br />

k<br />

2<br />

1 <br />

n k<br />

1 n 1<br />

sin r t<br />

2<br />

q<br />

p<br />

<br />

nk n<br />

kr 21qk0k P r0<br />

k sin t<br />

2<br />

n k<br />

1 n 1 nk q<br />

p<br />

21<br />

n qt k0k P r0<br />

n<br />

1 <br />

<br />

p P<br />

nk n<br />

t k0<br />

<br />

,<br />

k<br />

kr n<br />

<br />

k0<br />

n n k<br />

n <br />

<br />

q<br />

1q k <br />

1 <br />

n<br />

1 1<br />

1<br />

p q<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 17<br />

ISSN 2250-3153<br />

III. PROOF OF THEOREM<br />

Following Titchmarsh [4], the n th partial sum sn(x) of the Fourier series is given by<br />

(3.1)<br />

The (N, pn) transform of the sequence {sn (x)} is given by<br />

(3.2)<br />

The (E, q) transform of<br />

1 <br />

<br />

1 (<br />

t)sin n t<br />

s ( ) ( )<br />

2<br />

n x f x <br />

dt<br />

t<br />

2 0 sin<br />

2<br />

1 <br />

1 sin n t<br />

t x f x t p<br />

2<br />

dt<br />

n<br />

N<br />

n ( ) ( ) (<br />

) k r<br />

2 P <br />

n 0 k 0 sin t<br />

<br />

2<br />

N tnx is given by<br />

<br />

n k<br />

q<br />

E N 1 (<br />

t)<br />

n nk 1<br />

t ( ) . sin 1<br />

n f x k r<br />

n<br />

2 1 <br />

<br />

q p r tdt<br />

q<br />

2<br />

0 sin t <br />

k0 k Pk<br />

r0<br />

2<br />

<br />

<br />

n1<br />

q q<br />

( ) (<br />

) <br />

n <br />

n<br />

t E N t dt t E N t dt<br />

0<br />

<br />

<br />

n1<br />

(3.3)<br />

I1 I2<br />

(say)<br />

Applying Hölder‘s inequality,<br />

1<br />

1<br />

1<br />

q q<br />

p p <br />

q<br />

n 1 <br />

t 1<br />

t sin t n<br />

tENt n <br />

<br />

<br />

0 t t sin t <br />

0<br />

<br />

<br />

<br />

<br />

I dt dt<br />

1<br />

<br />

q q<br />

n1 n t <br />

1<br />

<br />

<br />

<br />

dt<br />

1<br />

<br />

n1 t<br />

0 <br />

<br />

<br />

1<br />

1<br />

q<br />

n t <br />

<br />

.<br />

n 1 dt<br />

1<br />

<br />

n1 <br />

t 0 <br />

<br />

<br />

n1<br />

1<br />

<br />

1q <br />

t dt<br />

n 1 <br />

<br />

<br />

0 <br />

<br />

1 1 q <br />

1<br />

q<br />

<br />

<br />

1 n1<br />

t<br />

n 1<br />

<br />

<br />

0<br />

1 1 1 q<br />

.<br />

n 1<br />

n 1<br />

<br />

<br />

<br />

1 1<br />

p <br />

n1 . <br />

n 1<br />

<br />

<br />

(3.4)<br />

1<br />

q<br />

<br />

0<br />

q <br />

()<br />

t E N t dt<br />

n<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 18<br />

ISSN 2250-3153<br />

Now,<br />

2<br />

1<br />

1<br />

p p q q<br />

<br />

<br />

q<br />

<br />

t t sin t ENt. t <br />

<br />

<br />

n<br />

. <br />

<br />

<br />

<br />

t <br />

t sin t <br />

<br />

<br />

n1 n1<br />

<br />

I dt dt<br />

1<br />

1<br />

q<br />

<br />

q<br />

t <br />

<br />

<br />

1 <br />

t <br />

<br />

<br />

n1<br />

<br />

1<br />

q q<br />

n dt<br />

<br />

y dy <br />

1 2<br />

1 y y <br />

<br />

<br />

n1<br />

1<br />

<br />

<br />

n 1 .<br />

n1<br />

1 <br />

q <br />

1<br />

(3.5)<br />

Now combining (3.3), (3.4) & (3.5), we get<br />

1 1q1 <br />

n y<br />

n 1<br />

<br />

<br />

q<br />

1<br />

E N 1 p <br />

tn x f x n1 <br />

n1 1 <br />

1 1<br />

q<br />

n1 n1<br />

n1 1 1 1 q<br />

.<br />

n 1<br />

<br />

n1 <br />

1 1 p<br />

.<br />

n 1<br />

<br />

n1 <br />

1 1 p <br />

n1 <br />

n1 since<br />

1<br />

<br />

1<br />

p p<br />

2<br />

q<br />

<br />

1<br />

E N 1 p <br />

<br />

tn x f x n 1<br />

dx<br />

p<br />

n 1<br />

0 <br />

<br />

1<br />

2<br />

p <br />

1 1 p <br />

n 1<br />

dx n 1<br />

<br />

<br />

<br />

0<br />

<br />

<br />

<br />

1 1 p <br />

n1 <br />

n1 This completes the proof of the main theorem.<br />

IV. COROLLARIES<br />

1 1<br />

1<br />

p q<br />

Following corollaries can be derived from our main theorem.<br />

tt Corollary – 1 : β = 0 and <br />

f W<br />

Lp , t ,<br />

then the degree of approximation of a function<br />

0 1 is given by<br />

q<br />

E N<br />

1<br />

<br />

<br />

tn x f x 1 <br />

p n1 www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 19<br />

ISSN 2250-3153<br />

Which is reduces to the Theorem A due to Binod Prasad Dhakal<br />

Corollary – 2 : If p in corollary 1, then for 0 1.<br />

Where<br />

q q<br />

E N sub<br />

1 <br />

E N<br />

tn x f x tn x f x <br />

x <br />

n1 , for 0 1<br />

n k<br />

q<br />

E N 1 n nk 1<br />

t q<br />

p<br />

kk Pk<br />

r<br />

n<br />

1 q<br />

0<br />

sr<br />

n kr in the (E, q) (N, pn) means of Fourier series (1.1).<br />

REFERENCES<br />

[1] Dhakal, Binod Prasad, Approximation of Function Belonging to Lip , p<br />

Class by (E, 1) (N, pn) Means of<br />

its Fourier series, KATHMANDU University Journal of Science, Engg. and Technology Vol. 7 No.1, Sept.<br />

2011, PP, 1 – 8.<br />

[2] Hardy G.H., Divergent Series, Oxford University Press, 1949.<br />

[3] McFadden L, Absolute Nörlund Summability, Duke Math. J., 9 (1942) 168 - 207.<br />

[4] Titchmarsh, E.C., The Theory of functions, Second Edition, Oxford University Press, 1939.<br />

[5] Tiwari, Sandeep Kumar and Bariwal Chandrashekhar, Degree of Approximation of Function Belonging to the Lipschitz Class by (E, q) (C, 1) Means of its<br />

Fourier Series. IJMA 1 (1), Oct. – 2010, 2 – 4.<br />

[6] Zygmund A, Trigonometric series, Cambridge University Press, 1959.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 20<br />

ISSN 2250-3153<br />

Design and Implementation of Cipher Algorithm using<br />

Randomized Alphanumeric Characters<br />

Sudhakar Kumar Singh<br />

School of Computing Science and Engineering, VIT University, Vellore - 632014,<br />

TamilNadu India<br />

Abstract- Cryptography is the technique that is used to ensure<br />

the safety of communication over the network in most of the<br />

computer communication systems. The strength of a<br />

cryptographic algorithm is based on the difficulty of<br />

cryptanalysis imposed over system. Our proposed Algorithm<br />

provides the best security analysis, in terms of computational<br />

time and effective environment over the network. As we are<br />

aware of the security of communication has attracted the<br />

attention towards the design of new Algorithm.<br />

It is a combination of some of the best known encryption<br />

algorithms in existence. Here, we apply the concept of RAC<br />

(Randomized Alphanumeric Characters) proceeding with some<br />

computation to reach the goal of cipher text. The algorithm that<br />

we are proposing in our work is the resultant of some existing<br />

algorithms that uses the strengths of one algorithm to compensate<br />

the weakness of other by applying RAC as well as applying a<br />

technique which is similar to Bit-Stuffing.<br />

Keyword- Cryptography, Security, RAC, cipher text.<br />

I. INTRODUCTION<br />

The concept of cryptography begins thousands of years ago; it<br />

takes number of versions based on the standards and the analysis<br />

which ensures the standards of cryptography. Encryption is the<br />

technique of changing the format of plaintext to cipher text<br />

which is unrecognizable and useless to unauthorized party.<br />

Decryption is the just reverse of encryption. It can be done in<br />

three ways (I) Secret key (symmetric): uses a single key for both<br />

encryption and decryption (II) Public key (asymmetric): uses two<br />

keys one for encryption and other for decryption. (III) Hash<br />

function (one way cryptography). In our proposed algorithm we<br />

are using concept of XOR operation and bit stuffing in a specific<br />

way.<br />

II. EXISTING ALGORITHMS:<br />

Several algorithms are available for the cryptography like<br />

RSA, IDEA etc all these are used for the purpose of data<br />

security. Each and every algorithm has its own public keys and<br />

private keys with some special features and may use different<br />

mathematical concepts to maintain the standards of<br />

cryptography.<br />

RSA: RSA is based on Public Key and Private Key, where<br />

Public Key is made known to others while private key must be<br />

kept in secret.<br />

The step below shows how RSA keys are generated.<br />

1. Two large prime numbers, p and q are chosen.<br />

2. Compute the product of these two N=p.q.<br />

3. Compute υ (N) = (p − 1) (q − 1)<br />

4. e is the public key, chosen randomly<br />

5. Find private key, d. d must be satisfy<br />

e.d = 1 mod υ (N)<br />

For encryption: - Cipher, c = me mod υ (N)<br />

For decryption: - Message, m = ce mod υ (N)<br />

IDEA: IDEA is based on public key.<br />

The steps below show how IDEA key are generated.<br />

1. Original text is divided into 64-bit blocks.<br />

2. Each 64-bit block is further divided into four 16-bit subblocks:<br />

X1, X2, X3, X4.<br />

3. The 128-bit IDEA session key is divided into eight 16-bit keyblocks:<br />

Ki, 1, Ki, 2, Ki, 3, Ki, 4, Ki, 5, Ki, 6, Ki, 7, Ki, 8.<br />

4. Addition and Multiplication are perform on each block of Xn<br />

and Ki, j.<br />

5. The combination of operations is performed eight times to get<br />

the final encryption.<br />

III. PROPOSED ALGORITHM<br />

Our proposed algorithm uses Randomized Alphanumeric<br />

Character and applying XOR operation with message and the<br />

technique of Bit-stuffing in specific way. We used asymmetric<br />

private key and the public key which increases the efficiency<br />

level of encryption algorithm .Here one 8-bit public key is<br />

randomly selected among several generated Alphanumeric<br />

Characters and one 5-bit private key. These may vary in real life<br />

environment.<br />

Encryption Flowchart of our proposed algorithm is given below.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 21<br />

ISSN 2250-3153<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 22<br />

ISSN 2250-3153<br />

IV. PROPOSED ALGORITHM PROCESS<br />

Encryption Algorithm<br />

1. Generate N number of 8-bit Alphanumeric Characters<br />

randomly.<br />

2. Randomly select any one among them, denoted as ‗A‘, and 5-<br />

bit SECRET KEY assigned as ‗B‘.<br />

3. Convert ‗A‘ and ‗B‘ in binary format.<br />

4. Compute the quotient of these two Q=A/B.<br />

5. Perform XOR operation with Message ‗M‘ and quotient ‗Q‘,<br />

TEXT = M XOR Q.<br />

6. Scanned TEXT and perform the Bit-Stuffing as per flowchart.<br />

7. In this way we get the encrypted message as CIPHERTEXT.<br />

Decryption Algorithm<br />

1. Remove the extra bit from CIPHERTEXT.<br />

2. Perform the XOR operation with ‗TEXT‘ and quotient ‗Q‘.<br />

3. In this way we get the original message ‗M‘.<br />

V. WORKING EXAMPLE<br />

Encryption:<br />

1. Input: Public Key as ‗A‘=SCSE04, Secret Key as ‗B‘=VIT<br />

and Message as ‗M‘=11MSC<br />

2. Conversion to binary format:<br />

Message as M=11MSC<br />

[1=0000001, 1=0000001, M=1001101, S=1010011, C=1000011]<br />

M=00000010000001100110110100111000011 (11MSC)<br />

Public key A= SCSE04<br />

[S=1010011, C = 1000011, S= 1010011, E=1000101, 0=<br />

0000000, 4= 0000100]<br />

A= 101001110000111010011100010100000000000100<br />

(SCSE04)<br />

Secret key B=VIT<br />

[V=1010110, I=1001001, T=1010100]<br />

B=101011010010011010100 (VIT)<br />

3. Quotient ‗Q‘; Q=A/B=111101101111110110001<br />

4. TEXT = M XOR Q.<br />

TEXT=100000010110110110110011.<br />

5. CIPHERTEXT = TEXT with Bit-stuffing using SECRET<br />

KEY, (Case: 2)<br />

CIPHERTEXT =<br />

100000010111011001110110001111010010011010100<br />

[Encrypted Message (CIPHERTEXT) =<br />

100000010111011001110110001111010010011010100]<br />

Decryption:<br />

It is just reverse of encryption.<br />

1. Input as CIPHERTEXT =<br />

100000010111011001110110001111010010011010100<br />

Case 1: Remove the bit after 111 patterns and concatenate.<br />

Removed bits =001010010011010100<br />

Comparison of removed bits with SECRET KEY bits,<br />

here mismatched, so break and go to next case.<br />

Case 2: Remove the bit after 11 patterns and concatenate.<br />

Removed bits=101011010010011010100<br />

Comparison of removed bit with SECRET KEY bits,<br />

here it matched, so go to next phase.<br />

2. Performing XOR operation with TEXT and Quotient. In this<br />

manner we get the original message.<br />

Message M = 00000010000001100110110100111000011<br />

(11MSC)<br />

VI. CONCLUSION<br />

Overall RSA, DES and IDEA are very strong encrypting<br />

algorithms in existence, they do have their weaknesses: RSA<br />

contains lengthy and complex computations, while the purpose<br />

of initial and final permutation is not clear in DES algorithm,<br />

whereas IDEA uses a single and lengthy key. By combining the<br />

concept of above mentioned algorithms, our proposed algorithm<br />

uses the strength of these two algorithms to in order to reduce the<br />

weaknesses. As the result, our proposed cipher algorithm is one<br />

of the strongest, simplest and fastest encryption algorithms.<br />

REFERENCES<br />

[1] S.C. Coutinho,University Press (India) Private Limited (2003).The<br />

Mathematics of Ciphers ,Number Theory and RSA Cryptography.<br />

Department of Computer science Federal University of Rio de Janeiro Rio<br />

de Janerio, Brazil<br />

[2] Evolution of Cryptography Mohd Zaid Waqiyuddin Mohd Zulkifli,<br />

Evolution of Cryptography, 17th January 2007.<br />

[3] Data Encryption and Decryption process Using Bit Shifting and Stuffing<br />

(BSS) Methodology, B.Ravi Kumar et al. / International Journal on<br />

Computer Science and Engineering (IJCSE).<br />

[4] Wikipedia, The Free Encyclopedia, from http://en.wikipedia.org/wiki/RSA<br />

[5] Wikipedia, the Free Encyclopedia, from<br />

[6] http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm<br />

[7] Wikipedia, The Free Encyclopedia, from<br />

http://en.wikipedia.org/wiki/Data_Encryption_Standard<br />

[8] CareerRide.com, from http://www.careerride.com/Networking-DESweakness-and-strength.aspx<br />

AUTHORS<br />

First Author – Sudhakar Kumar Singh, M.SC (Computer<br />

Science), VIT University Vellore, Sksingh<strong>2012</strong>@yahoo.com.<br />

Second Author – Hariom Kumar, M.SC (Computer Science)<br />

Third Author – K Praveen Kumar, M.SC (Computer Science)<br />

Fourth Author – K Ramesh Babu, Faculty of VIT University.<br />

Vellore.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 23<br />

ISSN 2250-3153<br />

Nutritional Status of Children (0-24 Months) In<br />

Jammu Kashmir and Ladakh Regions<br />

Abstract- This paper discusses the results of an analysis on<br />

community based cross sectional study of infant growth faltering<br />

and feeding practices in three regions of Jammu Kashmir and<br />

ladakh for which data has been collected during 2004-2006 and<br />

compiled in March 2007.results indicate a statistically significant<br />

positive association between malnutrition and feeding practices.<br />

Feeding practices in all the three regions studied were not as per<br />

internationally accepted recommendations. Around 66% of<br />

mothers gave pre-lacteal feeds, most common being sugar water,<br />

honey, plain water, artificial milk and Jaggery. Pre-lacteal<br />

feeding was common in Jammu and Kashmir regions but was not<br />

very common in Ladakh. In all the three regions, as the age of<br />

the studied children advanced from 0 to 2 years, the prevalence<br />

rate of malnutrition exhibited a parallel increase. This pattern<br />

was observed in higher frequency among infants from middle<br />

and lower income groups. Chronic malnutrition evidenced by<br />

stunting with insignificant inter-regional differences (P>0.01)<br />

was observed in 14.1%, 17.2% and 16.8% of the children in<br />

Jammu, Kashmir and Ladakh.<br />

Current malnutrition was more prominent in Kashmir as<br />

29.3% children were underweight as against 16.2% in Jammu<br />

and 15.8% in Ladakh (p< 0.01). Acute malnutrition also showed<br />

significant inter-regional difference (P


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 24<br />

ISSN 2250-3153<br />

crushing the hair at a right angle to the scale and the height read<br />

from the lower edge of the ruler to the nearest 0.5cm. (Jelliffe<br />

DB 1966).<br />

Children were categorized as malnourished or normal by<br />

placing their measurements on the three most commonly used<br />

anthropometric indices viz weight-for-height, height-for-age and<br />

weight-for-age. The calculation of the three indices of child<br />

malnutrition involved comparison with an international reference<br />

population as recommended by the World Health Organization<br />

(Dibley etal 1987a) (Dibley etal 1987 b).A Z-score cut-off point<br />

of


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 25<br />

ISSN 2250-3153<br />

(10.0)<br />

Normal 540<br />

(79.0)<br />

379<br />

(74.0)<br />

7.233 (.124)ns<br />

parenthesis represents percentage<br />

** Association is found highly significant (p0.01).<br />

TABLE 2<br />

73 (72.0) 992 (76.7)<br />

Nutritional Present NFHS-2 All India<br />

Status<br />

Study J&K Levels<br />

Stunting 15.5% 39% 47%<br />

Wasting 13.8% 12% 16%<br />

Under Weight 21.3% 35% 46%<br />

UNICEF (2000) shows the prevalence of nutritional stunting among under age five children in India as 47% which is among the<br />

highest in world, wasting as 16% and underweight problem as 46%. NFHS-2 Jammu and Kashmir reported 35% as underweight, 12%<br />

as wasted and 39% stunted in the age group less than three years.<br />

TABLE 3: INFLUENCE OF FEEDING PRACTICES ON WEIGHT OF INFANTS<br />

Feeding Practices<br />

Under weight<br />

Normal<br />

Type of first feed given<br />

after birth<br />

Prelacteal feed 181(21.2) 672(78.8)ns<br />

Breast milk 95(21.6) 345(78.4)<br />

Exclusive breast 0-6months 72(17.3) 345(82.7)<br />

**<br />

>=6 months 72(32.7) 148(67.3)<br />

Colostrums<br />

Fed 197(19.2) 831(80.8)<br />

**<br />

Not fed 79(29.8) 186(70.2)<br />

Initiation of top milk ns 0-3months 62(21.0) 233(70.0)<br />

4-6 months 20(19.8) 81(80.2)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 26<br />

ISSN 2250-3153<br />

Type of top milk<br />

ns<br />

Weaning<br />

**<br />

Type of first semi solid<br />

ns<br />

>6months 73(24.5) 225(75.5)<br />

Commercial 62(22.8) 210(77.2)<br />

Animal 93(22.0) 329(78.0)<br />

Early 23(15.4) 126(84.6)<br />

Timely 34(21.3) 126(78.8)<br />

Late 71(34.9) 137(65.9)<br />

Commercial 40(18.8) 173(81.2)<br />

Home made 88(28.9) 216(71.1)<br />

** Association is found highly significant (p6months 47(15.8) 251(84.2)<br />

commercial 41(15.1) 231(84.9)<br />

animal 63(14.9) 359(85.1)<br />

early 11(07.4) 138(92.6)<br />

timely 15(9.4) 145(90.6)<br />

late 54(26.0) 154(74.0)<br />

Type of first semi solid ns commercial 26(12.2) 187(87.8)<br />

Home made 54(17.8) 250(82.2)<br />

** Association is found highly significant (p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 27<br />

ISSN 2250-3153<br />

TABLE 5: INFLUENCE OF FEEDING PRACTICES ON HEIGHT FOR AGE<br />

Feeding practices<br />

Type of first feed given after<br />

birth<br />

Ns<br />

Exclusive breast<br />

**<br />

Colostrums<br />

Ns<br />

Initiation of top milk<br />

Ns<br />

Type of top milk<br />

Ns<br />

Weaning<br />

**<br />

Stunted<br />

Normal<br />

Prelacteal feed 122(14.3) 731(85.7)<br />

Breast milk 79(18.0) 361(82.0)<br />

0-6months 39(09.4) 378(90.6)<br />

> =6 months 66(30.0) 154(70.0)<br />

Fed 154(15.0) 874(85.0)<br />

Not fed 47(17.7) 218(82.3)<br />

0-3months 46(15.6) 249(84.4)<br />

4-6 months 07(06.9) 94(93.1)<br />

>6months 63(21.1) 235(78.9)<br />

Commercial 45(16.5) 227(83.5)<br />

Animal 71(16.8) 351(83.2)<br />

Early 22(14.8) 127(85.2)<br />

Timely 24(15.0 136(85.0)<br />

Late 65(31.3) 143(68.0)<br />

Type of first semi solid* Commercial 32(15.0) 181(65.0)<br />

Home made 79(26.0) 225(74.0)<br />

**Association is found highly significant (p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 28<br />

ISSN 2250-3153<br />

Lesser percentage of stunting was observed when Children were exclusively breast fed at


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 29<br />

ISSN 2250-3153<br />

of commercial infant foods. Scientific report No.4 Nutrition foundation of<br />

India.<br />

[5] Jones, G; Steketee, R.W; Blake, R.E. et al (2003). Child survival study,<br />

Lancet, 362. July 5, 65-71.<br />

[6] Jelliffe DB. (1966). the Assessment of Nutritional Status of the<br />

Community, Monograph Series No. 53, World Health Organization<br />

Geneva: 10<br />

[7] National Family Health Survey; (NFHS-2) Jammu and Kashmir (1998-99),<br />

International Institute for Population Sciences, Mumbai,<br />

[8] International Institute for Population Sciences (IIPS). 1995. National<br />

Family Health Survey (MCH and Family Planning), India 1992-93.<br />

Bombay: IIPS.<br />

[9] WHO/ UNICEF; (2000); protecting promoting and supporting<br />

breastfeeding. The special role of maternity services. Joint WHO/UNICEF<br />

statement WHO Geneva.<br />

[10] Victoria C.G. Vanghan P.J. (1984) prolonged breastfeeding associated with<br />

malnutrition Am J. Clin Nutr. 39: 307.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 30<br />

ISSN 2250-3153<br />

The Correlational Study of the Vertical Jump Test and<br />

Wingate Cycle Test as a Method to Assess Anaerobic<br />

Power in High School Basketball Players<br />

Abstract- Basketball is a prime example of a sport that<br />

predominantly utilizes anaerobic metabolism. The Wingate cycle<br />

and vertical jump tests have been used to assess anaerobic power<br />

in athletes for the purpose of providing information of anaerobic<br />

performance in a given sports. The lack of research in the field of<br />

more sport specific tests to assess anaerobic performance has<br />

lead to the development of the present proposed investigation.<br />

Aims & Objectives: A study to correlate the vertical jump test<br />

and wingate cycle test as a method to assess anaerobic power in<br />

high school basketball players.<br />

Materials & Methods: A correlational study was conducted on<br />

100 high school basketball players between the age group of 14-<br />

18 years (15.6000 ± 1.14286 (SD)) was included from various<br />

sprts institutes of Rajkot. Subjects were selected by simple<br />

random sampling techniques. On the first day, anthropometric<br />

measurements and the vertical jump test were performed. Peak<br />

and mean anaerobic power were determined using equations<br />

based on each subject‘s individual vertical jump height in<br />

centimeters (cm), body mass in kilograms (kg), and height in<br />

centimeters (cm). On the second day, the subjects were<br />

performed the 30-second Wingate cycle ergometer test. Peak and<br />

mean anaerobic power over the 30-seconds, were calculated by a<br />

computer program during the test.<br />

Results: Data were analyzed by Pearson Correlation coefficient<br />

which showed significant positive correlation between average<br />

power (r = 0.970, p > 0.05) & peak power of vertical jump test<br />

and Wingate test (r = 0.263, p > 0.05), demonstrating the validity<br />

of the vertical jump as a field test of anaerobic power.<br />

Conclusion: The result suggested that vertical jump tests may be<br />

accept as field measures of anaerobic power in high school<br />

basketball players.<br />

Keywords- Vertical jump test, Wingate cycle test, Anaerobic<br />

power<br />

A<br />

I. INTRODUCTION<br />

naerobic power, or anaerobic fitness, represents a local<br />

characteristic of a muscle that exists independent of blood<br />

and oxygen supply to that muscle. 1 It is the ability of the body‘s<br />

musculature to generate significant amounts of power is<br />

considered to be a strong predictor of athletic success. 2 Currently<br />

anaerobic power tests are implemented in both clinical and field<br />

settings and assess an athlete‘s capability to produce both power<br />

Purvi K. Changela, Sarla Bhatt<br />

Shri K K Sheth Physiotherapy College, Rajkot, India<br />

Email: changelapurvi@gmail.com<br />

and speed in a short period of time or over a relatively short<br />

distance. 3<br />

Basketball is a sport that mainly utilizes anaerobic<br />

metabolism 4 that would benefit from anaerobic testing<br />

procedures which incorporate sport specific movements.<br />

Functional movements, such as jumping and sprinting, are<br />

significantly related to playing time and performance in<br />

basketball. 3,4 Therefore, it seems logical that testing procedures<br />

that incorporate anaerobic power and sports specific movements<br />

would provide a valuable tool to assess and monitor components<br />

of basketball performance. 3<br />

To date, numerous tests have been used in an attempt to<br />

successfully measure anaerobic power and output in basketball<br />

players, however no particular test has gained acceptance as a<br />

standard measure of anaerobic power in basketball players. 3 The<br />

Wingate cycle and vertical jump tests have been commonly used<br />

tests to assess anaerobic power in athletes for the purpose of<br />

providing vital information regarding anaerobic performance of<br />

athletes in a given sports. 5,6<br />

The Wingate anaerobic test on a cycle ergometer has been<br />

used in laboratory settings both as an assessment of anaerobic<br />

performance and as a means to analyze physiological responses<br />

to supramaximal exercise. 6 The test was designed to be simple to<br />

administer; non-invasive; intended to measure muscle<br />

performance; 6 safe to assume that peak power which is a<br />

reflection of the ability of either the arms or the legs to produce<br />

high amounts of mechanical power and mean power reflects the<br />

endurance of the muscle groups involved in the test, 3 but the<br />

major drawback of it is expensive method and require equipment<br />

which is not feasible for administration to a wide variety of<br />

population.<br />

The most common field test which is used is the vertical jump<br />

test to evaluate anaerobic fitness improvements. It has been<br />

stated the vertical jump test is a more true power test used to<br />

measure both vertical jumping distance and power output. 3 The<br />

height that is achieved on the vertical jump has a direct<br />

correlation with the amount of force that is produced by muscle<br />

fibers. 7 During the vertical jump, total jump height and peak<br />

power can be measured and the mechanical work performed to<br />

accomplish the jump could be determined by using the distance<br />

that was measured. 5 Compare to wingate cycle ergometer test,<br />

this test is inexpensive, easy to aseess and equipment is also not<br />

needed, so we can easily use it as a field test.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 31<br />

ISSN 2250-3153<br />

There exists conflicting opinions on the nature of<br />

contributions of various energy systems used in anaerobic power<br />

tests. 3 During a vertical jump test, power output required to<br />

attain maximal jump height and complete a single test is reached<br />

between one and two seconds which suggests that only the ATP-<br />

PC energy system is utilized since the test duration is so short. 8,9<br />

However, the Wingate anaerobic cycle test requires contributions<br />

was estimated to be 84% from all of the three main energy<br />

systems. 3<br />

Despite the introduction of the previously mentioned<br />

anaerobic power tests, research in the area of anaerobic<br />

performance is still lacking. A prevailing lack of interest in<br />

anaerobic performance as a component of health and fitness has<br />

led to the development of anaerobic tests used today. 3 Even<br />

today, health professionals and fitness appraisers exclusively<br />

associate physical fitness and work capacity with only aerobic<br />

fitness. Reasons associated with a lack of interest in measuring<br />

anaerobic power to assess fitness levels can be the lack of<br />

motivation of subjects, use of suboptimal resistance when<br />

calculating power output, measuring mean power rather than<br />

peak power, and the limitation of exercise equipment. 10<br />

Assessment of anaerobic power by various tests are frequent in<br />

the literatures, however, to date there has been no single test<br />

recognized as both a general indicator of anaerobic power as well<br />

as sport-specific in nature that has lead to the development of the<br />

present proposed investigation.<br />

II. METHODOLOGY<br />

Study design: Correlational study design<br />

Sampling Technique: Simple Random Sampling<br />

Sample collection: 100 high school basketball players between<br />

the age group of 14-18 years15.6000 ± 1.14286 (SD)) were<br />

included.<br />

Study Setting: Various Sports academic institute of Rajkot.<br />

Inclusion Criteria:<br />

1. Age 14-20 years.<br />

2. Healthy male and female high school basketball players.<br />

3. Subjects with regular participation of more than 2 hours<br />

a day, 3 days per week.<br />

Exclusion Criteria:<br />

1. History of any cardiovascular, musculoskeletal,<br />

neurological problem.<br />

2. History of smoking.<br />

3. Subjects with regular participation in any athletic<br />

activity<br />

4. Anemia.<br />

5. History of metabolic disorders.<br />

6. Uncooperative subjects<br />

Materials used:<br />

1. Monark Cycle (894 E)<br />

2. Weighing machine<br />

3. Wall<br />

4. Chalk<br />

5. Inch tape<br />

6. Paper and Pen<br />

III. TESTING PROCEDURE<br />

The proposed title and procedure were being approved by<br />

ethical committee members. The potential risk and benefits, as<br />

well as the underlying rationale for the investigation, were<br />

explained to 100 high school Basketball players, written consent<br />

was taken from subjects who fulfilled the inclusion and exclusion<br />

criteria and they were randomly selected.<br />

All the pariticipants had to undergo 2 days of study<br />

investigation. On the 1 st day, participants were given overview of<br />

the study. All the participants then were given opportunity to ask<br />

the question about the test that they would be performing.<br />

Anthropometric data that includes weight (kg), height (cms) and<br />

BMI were taken and the Verticle Jump Test were asked to<br />

perform. On Day 2, Wingate cycle ergometer test were done on<br />

the participants.<br />

The procedures of the Verticle Jump Test and Wingate Cycle<br />

Ergometer Test were performed as follows:<br />

PROCEDURE:<br />

Day 1: Vertical Jump Test: 9<br />

Prior to the vertical jump test, the subjects were lead<br />

through an 8-10 minute dynamic warm-up which consisted of<br />

squats, lunges, quad stretches and 20, 30, and 40 yard<br />

progressive jogging exercises. The player chalks the end of her<br />

finger tips and stands side onto the wall, keeping both feet<br />

remaining on the ground, reached up as high as possible with one<br />

hand and marked the wall with the tips of the fingers (M1) The<br />

player from a static position jumped as high as possible and<br />

marked the wall with the chalk on her fingers (M2). The therapist<br />

measured and record the distance between M1 and M2.The<br />

player repeated the test 3 times. The therapist recorded the best<br />

of the 3 distance and used this value to assess the player‘s<br />

performance.<br />

Powerpeak (W) = [78.6 · VJ (cm)] + [60.3 · BM (kg)] –[15.3 ·<br />

ht (cm)] -1,308<br />

Poweravg (W) = [43.8 · VJ (cm)] + [32.7 · BM (kg)] –[16.8 ·<br />

ht (cm)] + 431<br />

Where: VJ = Vertical Jump BM = Body Mass<br />

(Weight) ht = Height<br />

Day 2: Wingate cycle ergometer test: 3<br />

This test required the player cycle as fast as possible for<br />

30 seconds. The therapist weighs the player (kg). The player<br />

warm up for 10 minutes. The therapist recorded the flywheel<br />

resistance required as follows:<br />

Player‘s weight x 0.08.<br />

The therapist gave the command ―GO‖ and starts the<br />

stopwatch and the player pedals as fast as possible with no<br />

flywheel resistance. After maximum rpm had reached, flywheel<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 32<br />

ISSN 2250-3153<br />

resistance was applied and the player continued to pedal as fast<br />

as possible until 30 seconds has elapsed.After 30 seconds the<br />

player was aked to stop pedalling. Peak power and mean power<br />

were calculated by using computarized softwear.<br />

Outcome Measure:<br />

1. Peak Anaerobic Power<br />

2. Mean Anaerobiv Power<br />

IV. DATA ANALYSIS<br />

Data were analyzed by Pearson Correlation Coefficient to<br />

show the correlation between average power & peak power of<br />

vertical jump test and Wingate cycle test to measure the anerobic<br />

power in high school athletes at ≤ 0.05 with Cl of 95%<br />

V. RESULTS<br />

Table 1: Distribution of age groups<br />

Frequency Percent<br />

Cumulative<br />

Percent<br />

14 10 20.0 20.0<br />

15 14 28.0 48.0<br />

16 14 28.0 76.0<br />

17 10 20.0 96.0<br />

18 2 4.0 100.0<br />

Total 50 100.0<br />

Table 2: Gender Proposition<br />

Frequency Percent<br />

male 27 54.0<br />

female 23 46.0<br />

Total 50 100.0<br />

Table 3: Correlation of average power of vertical jump test & wingate cycle test in high school basketball players.<br />

Pearson<br />

Correlation<br />

Sig (2-tailed)<br />

Pearson<br />

Correlation<br />

Sig. (2-tailed)<br />

Mean<br />

668.0200<br />

SD N Verticle jump test<br />

mean power<br />

231.15314<br />

50 1<br />

394.7080<br />

43.23900<br />

50<br />

0.031<br />

0.833<br />

Wingate<br />

power<br />

0.031<br />

0.833<br />

cycle mean<br />

1<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 33<br />

ISSN 2250-3153<br />

Table 4: Correlation of peak power of vertical jump test & wingate cycle test in high school basketball players.<br />

Pearson<br />

Correlation<br />

Sig (2-tailed)<br />

Pearson<br />

Correlation<br />

Sig. (2-<br />

tailed)<br />

Mean SD<br />

773.7200 221.65951<br />

447.5940 65.82322<br />

N<br />

50<br />

50<br />

Verticle jump<br />

test mean<br />

power<br />

1<br />

Wingate cycle mean<br />

power<br />

The above table shows there was a positive correlation between the two variables i.e. average power (r = 0.031, p > 0.05) and & peak<br />

power (r = 0.044, p > 0.05) of vertical jump test and Wingate cycle test, demonstrating the validity of the vertical jump test as a field<br />

test of anaerobic power in high school athletes.<br />

0.044<br />

0.759<br />

0.044<br />

0.759<br />

Graph 1: Correlation of average power of vertical jump test & wingate cycle test in high school basketball players.<br />

Graph 2: Correlation of average power of vertical jump test & wingate cycle test in high school basketball players.<br />

1<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 34<br />

ISSN 2250-3153<br />

VI. DISCUSSION<br />

The results of the present study indicated that there was a<br />

positive correlation between the average power (r = 0.031, p ><br />

0.05) & peak power (r = 0.044, p > 0.05) of vertical jump test<br />

and Wingate cycle test, thereby supporting the experimental<br />

hypothesis.<br />

Vertical Jump and Wingate anaerobic power tests rely<br />

heavily on ATP/PC energy system contributions to<br />

produce/sustain maximal anaerobic power. Also, weight had a<br />

considerable impact on performance on these two tests. The<br />

heavier subjects in the current investigation had higher anaerobic<br />

power outputs on both the Vertical Jump and Wingate tests.<br />

Previously, the vertical jump and Wingate power tests have been<br />

administered to athletes and recreationally active individuals to<br />

assess anaerobic contributions, and are considered relatively<br />

valid and reliable as suggested in the literatures. 3<br />

The results of this study appear consistent with other studies<br />

examining power performance in both a jump test and the<br />

WAnT. The moderate correlations observed (r= 0.031 and r =<br />

0.044 ) in both peak and mean power, respectively between these<br />

2 modes of anaerobic power assessments were greater than that<br />

recently reported by Hoffman et al., 11 but less than that<br />

previously reported by Bosco et al.. 12 The differences between<br />

these studies are not easily explainable.However, in the study<br />

conducted by Hoffman et al., the subjects were elite-level<br />

basketball players. Considering that the jumping test is a more<br />

specific anaerobic power test for these athletes, their ability to<br />

generate power may be quite different when using other modes<br />

of assessment. Perhaps in a more diverse subject population, as<br />

seen in this present study and that of Bosco et al, the less specific<br />

the test is to the subject group the stronger the correlation<br />

between 2 different modes of assessment.<br />

The differences between these modes of anaerobic power<br />

assessment (cycling vs. jumping) may also relate to the<br />

significant differences observed in power outputs between these<br />

tests. By recruiting a greater muscle mass (both legs acting<br />

simultaneously and the inclusion of upper-body musculature), the<br />

jump tests appears to result in a significantly greater power<br />

expression. This is consistent with several studies examining<br />

power performance using different modes of assessment. 11,12 In<br />

addition, the greater power outputs observed in the jumping test<br />

may also be related to a greater recovery of mechanical energy<br />

that is stored in the elastic elements of the body during the<br />

countermovement.<br />

The present study used equations developed by Johnson and<br />

Bahamonde (1996) to predict vertical jump power in watts (W)<br />

from height, mass, and vertical jump height. When performing<br />

the tests, the subjects with greater heights and/or weights<br />

exhibited an ability to generate greater power outputs.This<br />

suggests that individuals taller and/or heavier would be predicted<br />

to a have higher anaerobic power output shows increased<br />

dependency of anthropometric variables (especially body weight)<br />

in the determination of anaerobic power in the tests. 9<br />

The limited ability to predict basketball performance from<br />

tests of anaerobic power is an indication that other variables are<br />

responsible for success on the basketball court. Basketball<br />

performance may be better predicted if the anaerobic tests mimic<br />

sport-specific movements and skills. Tests that incorporate<br />

jumping, sprinting speed, agility, muscular strength and<br />

endurance, and hand-eye coordination would provide a valuable<br />

tool to assess and monitor basketball performance. 3<br />

VII. CONCLUSION<br />

The result suggested that vertical jump tests may be accept as<br />

a field measures of anaerobic power in high school female<br />

basketball players.<br />

LIMITATION AND FURTHER RECOMMENDATION<br />

The sample size was small for the study. Verbal<br />

encouragement can be administered by all people monitoring the<br />

testing procedures will give false positive result. Fatigue could<br />

have been limiting factors since test were performed. We can<br />

recreate the current investigation using a larger sample size with<br />

female athletic populations in Anaerobic Power tests.<br />

Comparison of anaerobic power test can be done with result of a<br />

similar age, gender, and anthropometric measurements can be<br />

done.<br />

ACKNOWLEDGMENT<br />

I wish to express my thanks to respectable Principal of the<br />

institute Dr Sarla Bhatt & Milin Nandani, student of MPT for<br />

their kind support and guidance in making the research easy and<br />

providing all the help in completion of the research and all my<br />

colleagues and students for their valuable suggestions. Last but<br />

not least I would like to thank all participants for their<br />

contribution in the present study.<br />

REFERENCES<br />

[1] Fleck, S.J., and Kraemer, W.J. Designing Resistence Training Programs,<br />

2nd ed. Champaign,IL: Human Kinetics, 1997.<br />

[2] Bompa, T.O. Periodization of Strength. Toronto, Ontario: Veritas<br />

Publishing Inc, 1993.<br />

[3] Stauffer KA. The comparison of the Max Jones Quadrathlon With the<br />

verticle jump and Wingate Cycle Tests as a method to access anaerobic<br />

power in female Division I College Basketball Players. University of<br />

Pittsburgh 2005.<br />

[4] Hoffman JR., Epstein S., Einbinder M., and Weinstein Y. The Influence of<br />

Aerobic Capacity on Anaerobic Performance and Recovery Indices in<br />

Basketball Players. Journal of Strength and Conditioning Research,1999;<br />

13(4), 407-11.<br />

[5] Adams, G.M. Exercise Physiology Laboratory Manual, 3rd ed. Boston,<br />

MA: McGraw- Hill, 1998.<br />

[6] Inbar, O., Bar-Or, O., and Skinner, J.S. The Wingate Anaerobic Test.<br />

Champaign, IL: Human Kinetics, 1996.<br />

[7] Tom Evans. The Effects of Static Stretching on Vertical Jump<br />

Performance. Thesis submitted toThe Graduate College of Marshall<br />

UniversityIn partial fulfillment of the Requirements for the Degree of<br />

Master of Science in Health and Physical Education. Marshall University,<br />

May 2006.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 35<br />

ISSN 2250-3153<br />

[8] Harman, E.A., Rosenstein, M.T., Frykman, P.N., Rosenstein, R.M., and<br />

Kraemer, W.J.. Estimation of Human Power Output From Vertical Jump.<br />

Journal of Applied Sport Science Research, 1991; 5(3), 116-20.<br />

[9] Johnson DL and Bahamonde R.. Power Output Estimate in University<br />

Athletes. Journal of strength and Conditioning Research, 1996 ; 10(3), 161-<br />

66.<br />

[10] Brooks, G.A., Fahey, T.D., White, T.P., and Baldwin, K.M. Exercise<br />

Physiology:Human Bioenergetics and its Applications, 3rd ed. Mountain<br />

View, CA: Mayfield Publishing<br />

Company, 2000.<br />

[11] Hoffman, J.R., S. Epstein, M. Einbinder & Y. Weinstein. A comparison<br />

between the Wingate anaerobic power test to both vertical jump and line<br />

drill tests in basketball players. J. Strength Cond. Res. 2000 : 14:261–64.<br />

[12] Bosco, C., P. Luhtanen & P.V. Komi. A simple method for measurement<br />

of mechanical power in jumping. Eur. J. Appl. Physiol. 1983 ; 50:273–82.<br />

First Author – Purvi K. Changela, Lecturer, Shri K K Sheth<br />

Physiotherapy College, Rajkot<br />

Second Author – Sarla Bhatt, Principle, Shri K K Sheth<br />

Physiotherapy College, Rajkot<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 36<br />

ISSN 2250-3153<br />

SQL Server Query Optimization Techniques - Tips for<br />

Writing Efficient and Faster Queries<br />

Abstract- SQL statements can be used to retrieve data from<br />

the any database. To get same results we need to write different<br />

SQL queries. For better performance we need to use best, faster<br />

and efficient queries. So we need SQL query tuning based on the<br />

business and user requirements. This paper covers how these<br />

SQL queries can be optimized for better performance. Query<br />

optimization subject is very deep but we will try to cover the<br />

most important points. In this paper I am not focusing on, indepth<br />

analysis of database but simple query tuning tips & tricks<br />

which can be applied to gain immediate performance gain.<br />

T<br />

I. INTRODUCTION<br />

he best way to tune performance is to try to write your<br />

queries in a number of different ways and compare their<br />

reads and execution plans. Here are various techniques that you<br />

can use to try to optimize your database queries. Query<br />

optimization is an important skill for SQL developers and<br />

database administrators (DBAs). In order to improve the<br />

performance of SQL queries, developers and DBAs need to<br />

understand the query optimizer and the techniques it uses to<br />

select an access path and prepare a query execution plan. Query<br />

tuning involves knowledge of techniques such as cost-based and<br />

heuristic-based optimizers, plus the tools an SQL platform<br />

provides for explaining a query execution plan.<br />

II. QUERY PERFORMANCE OVERVIEW USING<br />

STATISTICS IO<br />

There are different ways to determine the best way to write<br />

queries. Two of common methods are looking at the number of<br />

logical reads produced by the query and looking at graphical<br />

execution plans provided by SQL Server Management Studio.<br />

For determining the number of logical reads, you can turn the<br />

STATISTICS IO option ON. Consider this query:<br />

SET STATISTICS IO ON<br />

SELECT * FROM tablename<br />

The following is returned in the Messages window in SQL<br />

Server Management Studio:<br />

Table ‗tablename‘. Scan count 1, logical reads 33, physical reads<br />

0, read-ahead reads 0, lob logical reads 0, lob physical reads 0,<br />

lob read-ahead reads 0.<br />

There are several bits of data returned by STATISTICS IO, but<br />

we are concerned with the logical reads portion because it will<br />

tell us the number of pages read from the data cache. This is the<br />

most helpful because it will stay constant when I run the same<br />

Navita Kumari<br />

Innovation Centre - Baba Farid Group of Institutions<br />

query, which is important because there are sometimes external<br />

factors that might vary the execution time of my queries, such as<br />

locking by other queries. When tuning SQL queries, our goal<br />

should be to get the number of logical reads as low as possible.<br />

As fewer logical reads typically lead to faster execution times.<br />

III. GENERAL TIPS FOR QUERY OPTIMIZATION<br />

Specific Column Names instead of * in SELECT Query<br />

The SQL query becomes faster if you use the actual columns<br />

names in SELECT statement instead of than '*'. So we need to<br />

restrict the queries result set by selecting only the particular<br />

columns from the table, rather than all columns from a particular<br />

table. This results in performance benefits, as SQL Server will<br />

return only particular columns to the client, not all columns of a<br />

table. This will help reduce the network traffic and also boost the<br />

overall performance of the query.<br />

Example: Write the query as<br />

SELECT col_1, col_2, col_3, col_4, subject FROM<br />

table_name;<br />

Instead of:<br />

SELECT * FROM table_name;<br />

Alternatives of COUNT (*) for returning total tables row count<br />

If we need to return the table's row count, we can use alternative<br />

ways instead of the SELECT COUNT (*) statement. As<br />

SELECT COUNT (*) statement makes a full table scan to return<br />

the table's row count, it can take much time for the large tables.<br />

There is another way to determine the total row count of a table.<br />

We can use sysindexes system table. There is a ROWS column in<br />

the sysindexes table. This ROWS column contains the total row<br />

count for each table in a particular database. So, we can use the<br />

following select statement instead of ―SELECT COUNT (*):<br />

SELECT rows FROM sysindexes WHERE id = OBJECT_ID<br />

('table_name') AND indid < 2‖. So we can improve the speed of<br />

such queries thus resulting in better performance.<br />

Try to avoid HAVING Clause in Select statements<br />

HAVING clause is used to filter the rows after all the rows are<br />

selected and is used like a filter. Try not to use HAVING clause<br />

for any other purposes.<br />

For Example: Write the query as<br />

SELECT Col_1, count (Col_1)<br />

FROM table_name<br />

WHERE col_1!= ‗testvalue1‘<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 37<br />

ISSN 2250-3153<br />

AND col_1!= ‗testvalue1‘<br />

GROUP BY col_1;<br />

Instead of:<br />

SELECT Col_1, count (Col_1)<br />

FROM table_name<br />

GROUP BY Col_1<br />

HAVING Col_1!= ‗testvalue1‘ AND Col_1!= ‗testvalue2‘;<br />

Try to minimize number of sub query blocks within a query<br />

Sometimes we may have more than one sub query in our main<br />

query. We should try to minimize the number of sub query block<br />

in our query.<br />

For Example: Write the query as<br />

SELECT col_1<br />

FROM table_name1<br />

WHERE (col_2, col_3) = (SELECT MAX (col_2), MAX<br />

(col_3)<br />

FROM table_name2)<br />

AND col_4 = ‗testvalue1‘;<br />

Instead of:<br />

SELECT col_1<br />

FROM table_name1<br />

WHERE col_2 = (SELECT MAX (col_2) FROM<br />

table_name2)<br />

AND col_3 = (SELECT MAX (col_3) FROM table_name2)<br />

AND col_4 = ‗testvalue1‘;<br />

Try to use operators like EXISTS, IN and JOINS appropriately<br />

in your query<br />

a) Usually IN has the slowest performance.<br />

b) IN is efficient, only when most of the filter criteria<br />

for selection are placed in the sub-query of a SQL<br />

statement.<br />

c) EXISTS is efficient when most of the filter criteria<br />

for selection is in the main query of a SQL statement.<br />

For Example: Write the query as<br />

SELECT * FROM table1 t1<br />

WHERE EXISTS (SELECT * FROM table2 t2 WHERE<br />

t2.col_id = t1.col_id)<br />

Instead of:<br />

SELECT * FROM table1 t1<br />

WHERE t1.col_id IN (SELECT t2.col_id FROM table2 t2)<br />

Use EXISTS instead of DISTINCT when using table joins that<br />

involves tables having one-to-many relationships.<br />

For Example: Write the query as<br />

SELECT d.col_id, d.col2<br />

FROM table1 d<br />

WHERE EXISTS (SELECT 'X' FROM table2 e WHERE<br />

e.col2 = d.col2);<br />

Instead of:<br />

SELECT DISTINCT d.col_id, d.col2<br />

FROM table1 d, table2 e<br />

WHERE e.col2 = e.col2;<br />

Try to use UNION ALL instead of UNION, whenever possible.<br />

The UNION ALL statement is faster than UNION, because<br />

UNION ALL statement does not consider duplicate s, and<br />

UNION statement does look for duplicates in a table while<br />

selection of rows, whether or not they exist.<br />

For Example: Write the query as<br />

SELECT id, col1<br />

FROM table1<br />

UNION ALL<br />

SELECT id, col1<br />

FROM table2;<br />

Instead of:<br />

SELECT id, col1, col2<br />

FROM table1<br />

UNION<br />

SELECT id, col1<br />

FROM table2;<br />

We should try to carefully use conditions in WHERE<br />

clause.<br />

For Example: Write the query as<br />

SELECT id, col1, col2 FROM table WHERE col2 > 10;<br />

Instead of:<br />

SELECT id, col1, col2 FROM table WHERE col2 != 10;<br />

Write the query as<br />

SELECT id, col1, col2<br />

FROM table<br />

WHERE col1 LIKE 'Nav%';<br />

Instead of:<br />

SELECT id, col1, col2<br />

FROM table<br />

WHERE SUBSTR(col1,1,3) = 'Nav';<br />

Write the query as<br />

SELECT Col1, Col2<br />

FROM table<br />

WHERE Col3 BETWEEN MAX (Col3) and MIN (Col3)<br />

Instead of:<br />

SELECT Col1, Col2<br />

FROM table<br />

WHERE Col3 >= MAX (Col3)<br />

and Col3


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 38<br />

ISSN 2250-3153<br />

SELECT id, Col1, Col2<br />

FROM table<br />

WHERE Col2 < 25000;<br />

Instead of:<br />

SELECT id, Col1, Col2<br />

FROM Table<br />

WHERE Col2 + 10000 < 35000;<br />

IV. SOME MORE TIPS FOR OPTIMIZATION OF<br />

QUERIES/ TABLES/ STORED PROCEDURES IN<br />

SQL SERVER<br />

a. Table should have minimum of one clustered<br />

index and appropriate number of non clustered<br />

indexes, which should be created on columns<br />

of table based on query which is running<br />

following the priority order as WHERE<br />

clause, then JOIN clause, then ORDER BY<br />

clause and finally the SELECT clause.<br />

b. Avoid using Triggers if possible; incorporate<br />

the logic of trigger in a stored procedure.<br />

c. Table should have a primary key.<br />

d. Try to use constraints for selection instead of<br />

using triggers, whenever possible. Constraints<br />

are efficient than triggers enhance<br />

performance. So, you should use constraints<br />

instead of triggers, whenever possible.<br />

e. Try to use table variables instead of temporary<br />

tables as table variables require less locking<br />

resources as well as less logging resources than<br />

the temporary tables, so table variables should<br />

be used whenever possible.<br />

f. Avoid the use of views or replace views with<br />

original tables.<br />

g. Try to avoid the use of DISTINCT clause,<br />

where ever possible. As the DISTINCT clause<br />

will result in performance degradation, we<br />

should use this clause only when it is necessary<br />

or unavoidable.<br />

h. Try to add SET NOCOUNT ON statement into<br />

your stored procedures as it stops the message<br />

indicating the number of rows affected by a<br />

SQL statement.<br />

It also reduces network traffic, because our<br />

client will not receive any message indicating<br />

the number of rows affected by a SQL<br />

statement.<br />

i. Try to use TOP keyword or the SET<br />

ROWCOUNT statement in the select<br />

statements, if we need to return only the first n<br />

rows. This can improve performance of our<br />

queries, as the smaller result set will be<br />

returned. It can also reduce the traffic between<br />

the server and the clients.<br />

j. Try to use user-defined functions to keep the<br />

encapsulated code for reuse in future.<br />

The user-defined functions (UDFs) contain one<br />

or more SQL statements that can be used to<br />

encapsulate code for reuse. Using UDFs can<br />

also reduce the network traffic.<br />

k. If possible move the logic of UDF to SP as<br />

well.<br />

l. If you need to delete all rows of a table, try to<br />

use TRUNCATE TABLE command instead of<br />

DELETE command. Using the TRUNCATE<br />

TABLE is a faster way to delete all rows of a<br />

tables, because it removes all rows from a table<br />

without logging each row delete.<br />

m. Remove any unnecessary joins from tables.<br />

n. If there is cursor used in query, see if there is<br />

any other way to avoid the usage of this (either<br />

by SELECT … INTO or INSERT … INTO,<br />

etc).<br />

Try to avoid using cursors whenever possible.<br />

As SQL Server cursors can result in some<br />

performance degradation as compared to select<br />

statements. Try to use correlated sub-queries or<br />

derived tables for row-by-row operations on<br />

tables.<br />

o. When writing a sub-query (a SELECT<br />

statement within the WHERE or HAVING<br />

clause of another SQL statement):<br />

1. Try to use a correlated (refers<br />

to at least one value from the<br />

outer query) sub-query when<br />

the return is relatively small<br />

and/or other criteria are<br />

efficient i.e. if the tables<br />

within the sub-query have<br />

efficient indexes.<br />

2. Try to use a non-correlated<br />

(does not refer to the outer<br />

query) sub-query when<br />

dealing with large tables<br />

from which you expect a<br />

large return (many rows)<br />

and/or if the tables within the<br />

sub-query do not have<br />

efficient indexes.<br />

3. Ensure that multiple subqueries<br />

are in the most<br />

efficient order.<br />

4. Remember that rewriting a<br />

sub-query as a join can<br />

sometimes increase<br />

efficiency.<br />

p. Use char/varchar columns data type, instead of<br />

nchar/nvarchar data type if we do not need to<br />

store Unicode data. The char/varchar data<br />

value uses only one byte to store one character;<br />

whereas the nchar/nvarchar value uses two<br />

bytes to store one character, so the char/varchar<br />

columns use two times less space to store data<br />

as compared to nchar/nvarchar data columns.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 39<br />

ISSN 2250-3153<br />

q. Try to use stored procedures instead of heavy<br />

queries as they can reduce network traffic,<br />

because our client will send to server only<br />

stored procedure name (along with some<br />

parameters) instead of heavy and lengthy<br />

queries text. Stored procedures can be used to<br />

enhance security. For example, we can give<br />

different users, different set of permissions to<br />

execute the stored procedure to work with the<br />

restricted set of the columns and data.<br />

r. We should try to return an integer value from a<br />

RETURN statement instead of returning an<br />

integer value as a part of a record set. As the<br />

RETURN statement exits from a stored<br />

procedure unconditionally, so the statements<br />

following the RETURN statement are not<br />

executed. The RETURN statement is generally<br />

used for error checking, but we can also use<br />

this statement to return an integer value for any<br />

other reason. Using RETURN statement can<br />

improve performance as SQL Server will not<br />

create a record set.<br />

s. Try to drop indexes that are not being used.<br />

Because each index takes up disk space and<br />

slow the DML operations, we should drop<br />

indexes that are not used. We can use Index<br />

Wizard to identify indexes that are not being<br />

used in our SQL queries.<br />

t. We should try to create indexes on columns<br />

that have integer values rather than character<br />

values. Because the integer values have less<br />

size than the size of characters values, so we<br />

can reduce the number of index pages which<br />

are being used to store the index keys. This<br />

finally reduces the number of reads required to<br />

read the index and enhances the overall index<br />

performance.<br />

u. If we need to join several tables very<br />

frequently, then we should consider creating<br />

index on the joined columns which can<br />

significantly improve performance of the<br />

queries against the joined tables.<br />

v. Try to avoid any operations on the fields,<br />

where ever possible. Some operations will<br />

prevent the use of index on a field even if it<br />

exists—for example,<br />

ltrim(rtrim(FieldColumnName)) as such<br />

operations will degrade the performance. For<br />

example, instead of using the<br />

condition cast(DateColumn as varchar(20)) =<br />

@dateStr, we should try to convert @dateStr to<br />

an expression of datetime type and then<br />

compare it to DateColumn value.<br />

V. CONCLUSION<br />

Query optimization has a very big impact on the performance<br />

of a DBMS and it continuously evolves with new, more<br />

sophisticated optimization strategies. Query optimization is a<br />

common task performed by database administrators and<br />

application designers in order to tune the overall performance of<br />

the database system. Even if you have a powerful infrastructure,<br />

the performance can be significantly degraded by inefficient<br />

queries. So, we should try to follow the general tips as mentioned<br />

above to get a better performance of queries. Optimization can be<br />

achieved with some efforts if we make it a general practice to<br />

follow the rules. The techniques described in this paper allow<br />

basic optimization of queries, tables, indexes and stored<br />

procedures for performance gains. The main focus was on query<br />

optimizations.<br />

REFERENCES<br />

[1] Sunderi Dejan, Microsoft SQL Server 2005 Stored Procedure Programming<br />

in T-SQL & .NET, Third Edition, McGraw-Hill, 2006, ISBN:0072262281.<br />

[2] Dave Pinal, SQL SERVER – Optimization Rules of Thumb – Best Practices<br />

– Reader's Article. April 26, 2008.<br />

http://blog.sqlauthority.com/2008/04/26/sql-server-optimization-rules-ofthumb-best-practices-readers-article/<br />

[3] Andrei Volkov, SQL Server Optimization, http://msdn.microsoft.com/enus/library/aa964133(v=sql.90).aspx.<br />

[4] SQL Server 2005 Books <strong>Online</strong>, Introducing SQL Trace.<br />

http://technet.microsoft.com/en-us/library/ms191006.aspx.<br />

[5] SQL Server 2005 Books <strong>Online</strong>, Understanding plan forcing.<br />

http://msdn2.microsoft.com/en-us/library/ms186343.aspx.<br />

[6] SQL Tuning or SQL Optimization. http://beginner-sql-tutorial.com/sqlquery-tuning.htm<br />

[7] SQL Server Optimization Tips.<br />

http://santhoshgudise.weebly.com/uploads/8/5/4/7/8547208/sql_server_opti<br />

mization_tips-1.doc<br />

[8] Optimize MS SQL Server. http://omarabid.hubpages.com/hub/Optimize-<br />

MS-SQL-Server<br />

[9] SQL Spark. http://sqlspark.blogspot.in/2011/07/best-ways-to-write-sqlquery.html<br />

[10] MySQL Load Balancing PHP script. http://www.f1teksolutions.com/<br />

[11] What are the most common SQL Optimizations.<br />

http://stackoverflow.com/questions/1332778/what-are-your-most-commonsql-optimizations<br />

[12] Index Optimization Tips. http://www.mssqlcity.com/Tips/tipInd.htm<br />

[13] Review, Change, or Delete Transferred or Imported data.<br />

http://turbotax.intuit.com/support/iq/Import/Review--Change--or-Delete-<br />

Transferred-or-Imported-Data/GEN12079.html.<br />

AUTHORS<br />

Navita Kumari, M.C.A., Innovation Centre - Baba Farid Group<br />

of Institutions and navitakamra@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 40<br />

ISSN 2250-3153<br />

A Comparative Study on Concomitant of Order Statistics<br />

and Record Statistics for Weighted Inverse Gaussian<br />

Distribution<br />

Kishore K. Das*, Bhanita Das** and Bhupen K. Baruah***<br />

Abstract- A study on bivariate and trivariate weighted<br />

inverse Gaussian distribution (WIGD) using a specific concept of<br />

pseudo distribution has been attempted in this paper. Product<br />

moment of bivariate pseudo WIGD has been obtained.<br />

Distribution of -th concomitant of order statistics for the<br />

resulting distribution has been obtained with some ordering<br />

properties. An extension to bivariate concomitant for trivariate<br />

pseudo WIGD also has been discussed. Concomitant of second<br />

order upper record statistics and joint distribution of second and<br />

fourth order concomitant of upper record statistics for bivariate<br />

pseudo WIGD have been studied along with their properties.<br />

Numerical values of survival functions have been computed for<br />

comparison of concomitant of order statistics and record<br />

statistics. This study reveals that for both concomitant of order<br />

statistics and concomitant of second order upper record statistics<br />

for WIGD survival probability decreases as time increases for<br />

fixed values of the parameters and it increases for increasing<br />

value of shape parameter holding time and scale parameter as<br />

fixed.<br />

Index Terms- WIGD, Bivariate pseudo distribution,<br />

Concomitant, Order statistics, Record statistics.<br />

O<br />

*Department of Statistics, Gauhati University, Guwahati-781014, India<br />

***Department of Chemistry, Gauhati University, Guwahati-781014, India<br />

I. INTRODUCTION<br />

rder statistics and record statistics are used extensively in<br />

statistical models and inference and both describes random<br />

variables arranged in order of magnitude. Usually, the ordered<br />

values of independent and identically distributed (IID) samples<br />

arranged in ascending order of magnitude are known as order<br />

statistics (Aleem, 1998). The simplest and most important<br />

functions of order statistics is the sample cumulative distribution<br />

function (cdf) . Suppose are jointly<br />

distributed random variables then arranging the in increasing<br />

order of magnitude, are said to be smallest,<br />

second smallest and largest order statistics.<br />

**Corresponding Author<br />

Bhanita Das<br />

Department of Statistics<br />

Gauhati University, Guwahati-781014<br />

Assam, India<br />

Phone: +9108822233531(M); Fax: +91- 0361-2700288<br />

E-mail: bhanitadas83@gmail.com<br />

According to David, (1981) if is a random sample<br />

from a continuous population with probability density function<br />

(pdf) and cumulative distribution function (cdf) and<br />

are the order statistics obtained by arranging<br />

the random sample in increasing order of magnitude, then the<br />

probability density function (pdf) of -th order statistics<br />

is given by<br />

Study of bivariate order statistics motivated us to go for<br />

concomitant of order statistics. To develop order statistics, for<br />

bivariate and multivariate distributions, concomitant variables<br />

play a significant role and are used in situations where<br />

knowledge of initial values of a characteristic is important. The<br />

term concomitant of order statistics was first induced and applied<br />

extensively by David, (1973). According to Hanif, (2007) in<br />

collecting any data for an observation several characteristics are<br />

often recorded, some of them are considered as primary and<br />

others can be observed from the primary data automatically. The<br />

later one is called concomitant or going along with variables,<br />

explanatory variables or covariables. Suppose we have a random<br />

sample of size from an absolutely continuous bivariate<br />

population . For , let and be the order<br />

statistics of and sample values respectively, then the value<br />

associated with is called concomitant of the -th order<br />

statistics or an induced order statistics and is denoted by<br />

(Bhattacharya, 1974). The distribution of -th concomitant<br />

is given by David and Nagaraja, (2003) as<br />

where is the -th order statistics and is the<br />

conditional distribution. Shahbaz and Shahbaz, (2011) have<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 41<br />

ISSN 2250-3153<br />

extended the distribution of concomitant of order statistics to<br />

bivariate concomitant of order statistics when a random sample is<br />

available from trivariate distribution function .<br />

According to Shahbaz and Shahbaz, (2011) the distribution of<br />

bivariate concomitant is given as<br />

where is the conditional distribution.<br />

Literature review reported that concomitant of order statistics<br />

were studied for several bivariate pseudo distributions under<br />

assumption of identically and independently distributed (IID) or<br />

independent samples (Shahbaz et al., 2009b; Shahbaz and<br />

Ahamad, 2009a and Shahbaz and Shahbaz, 2010). The pseudo<br />

distributions are new induction to statistical probability<br />

distribution theory and the idea was developed by Filus and<br />

Filus, (2006) and concept is used by various authors to derive<br />

several bivariate distributions from the existing univariate<br />

distribution to measure the failure rate of reliability. These<br />

distributions have found applications in situations where standard<br />

probability distributions are not suitable. The general setup for<br />

the density function of bivariate pseudo distributions is given by<br />

Filus and Filus, (2006) as<br />

where is some function of random variable .<br />

Concomitant of record statistics is also a new branch of<br />

statistics with several applications to measure the failure rate of<br />

reliability (Chandler, 1952 and Ahsanullah, 2010). Concomitant<br />

of record statistics can arise in several applications. Suppose<br />

individuals are to be selected on the basis of measurement of an<br />

attribute (say income) whose high value is desirable. Suppose<br />

(say expenditure) is an associated attribute which is known to<br />

be correlated with . While is easy to measure, is not. So the<br />

individuals are first measured on the basis of their values and<br />

only those having value bigger (or smaller) than all previous<br />

observations on qualify to be measured for their values and<br />

sequence of values thus measured are concomitant of records.<br />

Many such examples arise in the real field where concomitant of<br />

records are useful.<br />

In many practical situations it has been found that the only<br />

available data are records. Record values are observations that<br />

exceed or fall below current extreme value on a sequence of<br />

random variables. Considering a sequence of pair wise r.v.'s<br />

when the experimenter is interested in studying just<br />

the sequence of records of the first component, the second<br />

component associated with a record value of the first one is<br />

termed as the concomitant of that record value (Amini and<br />

Ahmadi, 2005). Record values were first discussed by Chandler,<br />

(1952). Feller, (1966) has given some examples of record values<br />

in the context of gambling problems. Nevzorov, (1988)<br />

mentioned several applications of record values. Various<br />

distributional properties of upper record values have been found<br />

in Ahsanullah, (1995) and Nagaraja, (1988).<br />

For a random variable distribution of -th upper record,<br />

has been given by Ahsanullah, (1995) as<br />

Where and is the distribution<br />

function of .<br />

The joint distribution of -th and -th upper records,<br />

and has been obtained by Ahsanullah, (1995) using<br />

the following expression<br />

where .<br />

Ahsanullah, (1995) obtained the distribution of -th concomitant<br />

of upper record statistics as<br />

where is the distribution of -th upper record statistics<br />

given in equation (1.5). Ahsanullah, (1995) has also given joint<br />

distribution of concomitant of -th and -th upper record values<br />

as<br />

where is given in equation (1.6).<br />

According to David and Galambos, (1974); Balasubramanian and<br />

Beg, (1998) and Beg and Ahsanullah, (2008) concomitants of<br />

order statistics attracted a considerable amount of attention in the<br />

literature but concomitants of record statistics received<br />

comparatively little attention. Therefore, in this paper an attempt<br />

has been made to study concomitant of order statistics and<br />

concomitant of record statistics for WIGD which has its<br />

applicability in drinking water quality data (Das et al., (2011))<br />

using the concept of bivariate pseudo distribution.<br />

In the estimation of water quality parameters a large number<br />

physico-chemical parameters are found to be interrelated with<br />

each other showing positive or negative correlation among them.<br />

So bivariate distribution theory is applicable in such cases. In<br />

water quality data it is reported that iron (Fe) and arsenic (As) are<br />

positively correlated with each other, whereas, Fe and fluoride (F)<br />

are negatively correlated. From the estimated value of Fe we can<br />

observe the probable concentration of As as well as F in water.<br />

Similarly, microbial concentration in water also can be estimated<br />

from DO data. For these type of situations the concept of<br />

concomitant arises naturally.<br />

Bivariate Pseudo WIGD<br />

II. RESULTS AND FINDINGS<br />

According to Das et al., (2011) the pdf of WIGD is given by<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 42<br />

ISSN 2250-3153<br />

Suppose that the random variable (r.v.) also has WIGD with parameter where is some function of having pdf<br />

Defining equation (2.1) and (2.2) as a compound distribution of two r.v.‘s the bivariate pseudo WIGD has the density<br />

Considering in equation (2.3) the distribution becomes<br />

The product moment of equation (2.4) is<br />

Concomitant of Order Statistics for Bivariate Pseudo WIGD<br />

To obtain the distribution of -th concomitant we first find out the distribution of -th order statistics for marginal distribution of<br />

given in equation (2.1) as<br />

Also the conditional distribution of given for equation (2.4) is<br />

Using equations (3.1) and (3.2) in equation (1.2), the distribution of -th concomitant of order statistics for bivariate pseudo WIGD is<br />

obtained as<br />

Where<br />

The expression for -th moment of the -th concomitant for bivariate pseudo WIGD is obtained as<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 43<br />

ISSN 2250-3153<br />

Survival function for -th concomitant of order statistics for bivariate pseudo WIGD is<br />

The conditional hazard rate of given is<br />

Which is decreasing function in and .<br />

Again the conditional survival function<br />

is decreasing function in , therefore according to properties given by Tahmasebi and Behboodian, (2010) it follows that has<br />

increasing failure rate (IFR) distribution and (entropy ordering) for and is stochastically decreasing and is<br />

denoted by SD( .<br />

Extention to Bivariate Concomitant from Trivariate Pseudo Distributions<br />

The trivariate pseudo WIGD has been defined as a compound distribution of three random variables. Suppose that the random<br />

variable has WIGD with pdf given in equation (2.1) and the r.v. and also has WIGD with parameter and<br />

respectively with pdf<br />

And<br />

Then the compound distribution of equations (2.1), (4.1) and (4.2) gives trivariate pseudo WIGD as<br />

Using and , the density given in (4.3) becomes<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 44<br />

ISSN 2250-3153<br />

The product moment of trivariate WIGD is obtained as<br />

The conditional distribution of given and can be obtained by using<br />

Therefore,<br />

For trivariate pseudo WBSD the -th order moment is<br />

Considering , the conditional mean for trivariate pseudo WIGD is<br />

And , gives<br />

Variance of trivariate pseudo WIGD is<br />

Again we have,<br />

Using equations (3.1) and (4.5) in equation (1.3) the pdf of bivariate concomitant from trivariate pseudo WIGD is obtained as<br />

Distribution of Concomitant of Record Statistics for WIGD<br />

Distribution of -th concomitant of upper record statistics for bivariate pseudo WIGD has been obtained as a particular case of<br />

and only for identically and independently distributed cases. The distribution of -th concomitant of record statistics can be obtained<br />

by using equation (1.7). The distribution given in equation (1.7) requires the distribution of -th record statistics given in equation<br />

(1.5) for r.v. and conditional distribution. If r.v. follows WIGD, then using the cdf of WIGD and equation (1.5) the distribution of<br />

-th record statistics for WIGD is obtained by using<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 45<br />

ISSN 2250-3153<br />

Where . Using equation (1.5) the distribution of second order upper record statistics for bivariate pseudo WIGD is<br />

Using the distribution of second order upper record statistics for WIGD and conditional distribution of WIGD distribution of<br />

second order concomitant of upper record statistics for bivariate pseudo WIGD is obtained as<br />

The -th moment about origin for concomitant of upper record statistics for bivariate pseudo WIGD is obtained as<br />

The survival function of the second order concomitant of upper record statistics for bivariate pseudo WIGD is<br />

Joint Distribution of Second and Fourth Order Concomitant of Upper Record Statistics for Bivariate Pseudo WIGD<br />

The joint distribution of two concomitant of record statistics can be obtained using equation (1.8).But expression (1.8) requires the<br />

joint distribution of two record statistics given in equation (1.6). Therefore first we derive the joint distribution of two record statistics.<br />

The joint distribution for random variables and for WIGD is as follows<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 46<br />

ISSN 2250-3153<br />

Now, using the conditional distribution of given of bivariate pseudo WIGD and joint distribution of and in<br />

equation (6.1), the joint distribution of second and fourth concomitant is obtained as<br />

Where<br />

Numerical Values of Survival Functions for Concomitant of Order Statistics and Concomitant of Record Statistics for<br />

Bivariate Pseudo WIGD<br />

To study the survivability of concomitant of order statistics and<br />

second order upper record statistics numerical values of the<br />

survival functions for bivariate pseudo WIGD have been<br />

obtained for different values of the parameter and using<br />

equations (3.5) and (5.3). From Table 1 and Table 2 it is clear<br />

that for both concomitant of order statistics and concomitant of<br />

second order upper record statistics for WIGD survival<br />

[1]<br />

[2]<br />

[3]<br />

Ahsanullah, M. (2010). ―Concomitant of upper<br />

record statistics for bivariate pseudo Weibull<br />

distribution‖. Applications and Applied<br />

Mathematics, 5(10):1379-1388.<br />

Aleem, M. (2006). ―Concomitant of order statistics from inverse Rayleigh<br />

distribution‖. Pakistan Journal of Statistics and Operation Research,<br />

2(1):45-48.<br />

Amini, M., & Ahmadi, J. (2005). ―On moments of the concomitants of<br />

probability decreases as increases for fixed values of the<br />

parameters and and it increases for increasing value of<br />

holding and as fixed.<br />

[4]<br />

classic record values and nonparametric upper bounds for the mean under<br />

the Farlie-Gumbel-Morgenstern model‖. Journal Statistical Research of<br />

Iran, 1(2):123-125.<br />

Balasubramanian, K., & Beg, M. I. (1998). ―Concomitant of order statistics<br />

in Gumbel‘s bivariate exponential distribution‖. Sankhya, 60, Series B:<br />

Table 1: Numerical values for survival functions of -th concomitant of 399-406.<br />

order statistics for WIGD<br />

[5] Beg, M. I., & Ahsanullah, M. (2008). ―Concomitants of generalized<br />

2.0 3.0 4.0 5.0 6.0 7.0<br />

order statistics from Farlie Gumbel Morgenstern distributions‖.<br />

Statistical Methodology, 5:1-20.<br />

0.01 0.99569<br />

0.02 0.98784<br />

0.03 0.97774<br />

0.04 0.96583<br />

0.05 0.95239<br />

0.06 0.93762<br />

0.99765 0.99847 0.99890 0.99916 0.99946<br />

0.99337 0.99569 0.99691 0.99765 0.99847<br />

0.98784 0.99209 0.99433 0.99569 0.99719<br />

0.98132 0.98784 0.99129 0.99337 0.99569<br />

0.97395 0.98304 0.98784 0.99074 0.99398<br />

0.96583 0.97774 0.98404 0.98784 0.99209<br />

[6]<br />

[7]<br />

[8]<br />

Bhattacharya, P. K. (1974). ―Convergence of sample paths of<br />

normalized sums of induced order statistics‖. The Annals of Statistics,<br />

2:1034-1039.<br />

Chandler, K. N. (1952). ―The distribution and frequency of record<br />

values‖. Journal of Royal Statistical Society, 14:220-228.<br />

Das, K. K., Das, B., & Baruah, B. K. (2011). ―Development of New<br />

Probability Model with Application in Drinking Water Quality Data‖,<br />

0.07 0.92163 0.95703 0.97199 0.97991 0.98470 0.99004 Advances in Applied Science Research, 2(4):306-313.<br />

0.08 0.90456 0.94761 0.96583 0.97549 0.98132 0.98784 [9] David, H. A. (1981). ―Order Statistics”. Wiley, New York, 2nd edition.<br />

0.09 0.88648 0.93762 0.95929 0.97079 0.97774 0.98550 [10] David, H. A. (1973). ―Concomitants of order statistics‖. Bulletin of<br />

0.10 0.86747 0.92709 0.95239 0.96583 0.97395 0.98304<br />

Table 2: Numerical values for survival functions second order<br />

concomitant of upper record statistics for WIGD<br />

5.0 5.1 5.2 5.3 5.4 5.5<br />

REFERENCES<br />

[9] Ahsanullah, M. (1995). ―Record Statistics”. Nova Science, USA.<br />

(6.2)<br />

.001 0.97918 0.97979 0.98037 0.98092 0.98145 0.98195<br />

.002 0.94121 0.94293 0.94456 0.94612 0.94761 0.94903<br />

.003 0.89217 0.89532 0.89832 0.90117 0.90390 0.90650<br />

.004 0.83425 0.83908 0.84368 0.84807 0.85225 0.85625<br />

.005 0.76872 0.77546 0.78187 0.78799 0.79382 0.79939<br />

.006 0.69645 0.70528 0.71369 0.72171 0.72936 0.73667<br />

.007 0.61809 0.62918 0.63975 0.64983 0.65945 0.66863<br />

.008<br />

.009<br />

0.53412<br />

0.44496<br />

0.54764<br />

0.46105<br />

0.56053<br />

0.47639<br />

0.57281<br />

0.49101<br />

0.58453 0.59572<br />

www.ijsrp.org<br />

0.50496 0.51828<br />

0.01 0.35094 0.36974 0.38766 0.40474 0.42104 0.43661


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 47<br />

ISSN 2250-3153<br />

International Statistical Institute, 45:295-300.<br />

[11] David, H. A., & Galambos, J., (1974). ―The asymptotic theory of<br />

concomitants of order statistics‖. Journal of Applied Probability, 11:762-<br />

770.<br />

[12] David, H. A., & Nagaraja, H. (2003). ―Order Statistics”. John Wiley &<br />

Sons, New York, 3rd edition.<br />

[13] Feller, W. (1966). ―An Introduction to Probability Theory and its<br />

Applications‖.Volume 2. Wiley, New York.<br />

[14] Filus, J. K., & Filus, L. Z. (2006). ―On some new classes of multivariate<br />

probability distributions‖. Pakistan J. Statistics, 21(1):21-42.<br />

[15] Hanif, S. (2007). ―Concomitants of Ordered Random Variables‖. Ph.D<br />

Thesis, National College of Business Administration & Economics, Lahore.<br />

[16] Nagaraja, H. N. (1988). ―Record values and related statistics: A review‖.<br />

Communication in Statistics: Theory and Methods, 17:2223–2238.<br />

[17] Nevzorov, V. B. (1988). ―Records‖. Theory of Probability and its<br />

Aplications, 32:201-228.<br />

[18] Shahbaz, S., & Shahbaz, M. Q. (2011). ―The trivariate pseudo Rayleigh<br />

distribution‖. World Applied Sciences Journal, 12(12):2279-2282.<br />

[19] Shahbaz, S., & Shahbaz, M. Q. (2010). ―On bivariate concomitants of order<br />

statistics for pseudo exponential distribution‖. Middle East J. Scientific<br />

Research, 6(1):22-24.<br />

[20] Shahbaz, S., Shahbaz, M. Q., & Mohsin, M. (2009b). ―On concomitants of<br />

order statistics for bivariate pseudo exponential distribution‖. World<br />

Applied Sciences Journal, 6(8):1151-1156.<br />

[21] Shahbaz, S., & Ahmad, M. (2009a). ―Concomitants of order statistics for<br />

bivariate pseudo Weibull distribution‖. World Applied Sciences Journal,<br />

6(10):1409-1412.<br />

[22] Tahmasebi, S., & Behboodian, J. (2010). ―A short note on entropy ordering<br />

property for concomitants of order statistics‖. World Applied Sciences<br />

Journal, 9(3):257-258.<br />

AUTHORS<br />

First Author – Kishore K. Das, M. Sc., Ph.D<br />

Department of Statistics, Gauhati University,<br />

Guwahati, Assam, India<br />

Second Author – Bhanita Das, M. Sc., Ph.D<br />

Department of Statistics, Gauhati University,<br />

Guwahati, Assam, India<br />

Third Author – Bhupen K. Baruah, M. Sc., Ph.D<br />

.<br />

.<br />

Department of Chemistry, Gauhati University,<br />

Guwahati, Assam, India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 48<br />

ISSN 2250-3153<br />

Design and Stress Analysis of Watt and Porter Governor<br />

*Ravindra Singh Rana, **Rajesh Purohit, *Alok Singh<br />

*Assistant Professor Department of Mechanical Engineering M.A.N.I.T, Bhopal (M.P.), India<br />

**Associate Professor Department of Mechanical Engineering M.A.N.I.T, Bhopal (M.P.), India<br />

Abstract- The function of the governor is to maintain the speed<br />

of an engine within specified limits whenever there is a variation<br />

of load.. This device can be used in almost all vehicles. The<br />

objective our investigation to identify the stress concentration<br />

areas, areas which are most susceptible to failure when governor<br />

is rotating about its axis, also the value of these stresses is<br />

measured. This analysis is carried out with the help of PRO E.<br />

The displacement of the various elements of the SPINDLE from<br />

the base is also calculated and the graphs are plotted. Effect of<br />

the ―WEIGHT OF THE ARMS‖ is the major area of concern for<br />

our study and all the calculations are done considering the weight<br />

of the arms. Weight of the arms acts on the centroid of the arms<br />

and when the governor assembly rotates, centrifugal force starts<br />

acting on the centroid of the arms and tends to deflect the arms,<br />

this deflection or bending is to be minimized. In our work, we<br />

have done the Stress analysis on a particular configuration of<br />

governor assembly and then various materials are suggested on a<br />

theoretical basis.<br />

Index Terms- PRO E, Spindle, Weight of the Arms.<br />

A<br />

I. INTRODUCTION<br />

Governor, or speed limiter, is a device used to measure and<br />

regulate the speed of a machine, such as an engine. A<br />

classic example is the centrifugal governor, also known as the<br />

watt. [1-3] Centrifugal governors were used to regulate the<br />

distance and pressure between millstones in windmills since the<br />

17th century. Early steam engines employed a purely<br />

reciprocating motion, and were used for pumping water an<br />

application that could tolerate variations in the working speed. It<br />

was not until the Scottish engineer James Watt introduced the<br />

rotative steam engine, for driving factory machinery, that a<br />

constant operating speed became necessary. Between the years<br />

1775 and 1800, Watt, in partnership with industrialist Matthew<br />

Bolton, produced some 500 rotati-vebeam engines. At the heart<br />

of these engines was Watts self-designed "conical pendulum"<br />

governor: a set of revolving steel balls attached to a vertical<br />

spindle by link arms, where the controlling force consists of the<br />

weight of the balls. Building on Watts design was American<br />

engineer Willard Gibbs who in 1872 theoretically analyzed<br />

Watts‘s conical pendulum governor from a mathematical energy<br />

balance perspective. During his graduate school years at Yale<br />

University, Gibbs observed that the operation of the device in<br />

practice was beset with the disadvantages of sluggishness and a<br />

tendency to overcorrect for the changes in speed it was supposed<br />

to control. The objective our investigation to identify the stress<br />

concentration areas, areas which are most susceptible to failure<br />

when governor is rotating about its axis, also the value of these<br />

stresses is measured. Analysis is carried out with the help of PRO<br />

E. The displacement of the various elements of the SPINDLE<br />

from the base is also calculated using PRO E and the graphs are<br />

plotted. Different materials for different parts are used that are<br />

theoretically justified.<br />

II. MATERIALS FOR DIFFERENT PARTS<br />

2.1 Spindle and Arms: The spindle of the governor is made<br />

of STAINLESS STEEL. The properties of stainless steel are<br />

given below: Physical Properties, Density= 0.29 lbs/in3(8.03<br />

g/cm3) ,Modulus of Elasticity ksi (MPa) 28.0 x 103 (193 x 10^3)<br />

in tension 11.2 x 103 (78 x 10^3) in torsion. STAINLESS<br />

STEEL is used because of its high MODULUS OF<br />

ELASTICITY in tension and the high modulus of elasticity in<br />

tension means high bending strength, which is the major cause<br />

for failure of the spindle, it is for this reason that stainless steel is<br />

used for the design of spindle. Apart from that the Corrosion<br />

resistant property of stainless steel and its stress concentration<br />

corrosion resistance justify the use of stainless steel for both<br />

spindle and arms.<br />

2.2 Base: The base of the governor assembly is made up of<br />

Fe30. This material is used because it has very good Vibrations<br />

Damping capacity. It is a prerequisite for the governor or any<br />

machine that the base should be stable and it should not vibrate,<br />

it is for this reason that Fe30 is used.<br />

2.3 Sleeve and Head: The sleeve of the governor is made up<br />

of BRONZE. Sleeve is that part of governor which moves<br />

relatives to spindle so there is always FRICTION associated with<br />

it, and when there is friction, then when the sleeve is moving<br />

upwards friction acts downwards and retards its speed and when<br />

it moves downwards friction acts upwards, in this way for a<br />

given height of governor there are two speeds on the controlling<br />

curve which results in the INSTABILITY of the governor. The<br />

friction of the governor is therefore be kept as low as possible,<br />

Bronze is a material which is self-lubrication and it has very low<br />

coefficient of friction.<br />

2.4 Pins and Bushes: Self-lubricating bushings (lubrication<br />

free bushings) are made up of one of two basic compositions:<br />

PTFE-Based Metal-Polymer Materials<br />

Thermoplastic-Based Metal-Polymer Materials<br />

III. DESIGN OF GOVERNOR<br />

3.1 Design of Watt Governor: The Design of Watt Governor<br />

involves determining the Minimum and maximum speed of the<br />

Governor. The minimum speed occurs when the sleeve is at its<br />

rest or initial position.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 49<br />

ISSN 2250-3153<br />

.<br />

Here, AB- length of the arm (cm),BC = r = Radius of rotation<br />

(cm) ,AC =h = Height of the Governor (cm)<br />

30° = α = Angle of inclination Length AB =41cm; BC= 146mm;<br />

α= 30º Height of governor, WKT hı = AB * cosα<br />

= 14.6 * cos30º= 12.64 cm or .126 m<br />

But hı= 895/Nı² , Nı²= 895/.126<br />

Minimum speed, Nı=84.2 rpm. ,Assume sleeve lift =20mm<br />

h2 = hı – 20 mm= 106.4 mm or .1064 mMax speed N2² =<br />

895/h2=> 895/ .335N2= 91.46 rpm<br />

Speed range % = (N1 ≈ N2)/ N2= (91.77 – 84.22) / 84.22= 8.37<br />

%<br />

DESIGN OF SHAFT:<br />

Diameter of the shaft„d‟ = 13 mm, For d< 20 mm;<br />

τ=σy / 2 where σy is the yield stress (N/mm^2) ,σy = 380<br />

N/mm^2. From DDB.=><br />

τ= 190 N /mm², where τ is the shear stress in N/mm^2<br />

Basic Specifications:<br />

W.K.T.T=п /16 *τd³ , Where T-torque in the shaft „Nmm‟<br />

=п /16 * 190* 13³= 81962.18 Nmm => 81.962 Nm<br />

Power = 2пNT/60, Max speed N= 91.77<br />

rpm= 2*п*91.77* 81.962 / 60=454.94 W<br />

The power obtained is less than that of the power rating of a<br />

FHP motor which is 746 W and hence the design is safe for 13<br />

mm diameter of shaft.<br />

3.2 Design of Porter Governor: The porter governor is a<br />

modification of a watts governor; with central load attached to<br />

the sleeve. This leads to larger centrifugal forces here high<br />

speeds are required to bring the fly balls to the same radius. The<br />

design of porter governor involves determining the minimum and<br />

maximum speed of the governor. The minimum speed occurs<br />

when the sleeve is at its rest or initial position. The only<br />

difference between the watt and porter governor is the inclusion<br />

of a dead weight as shown in the figure.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 50<br />

ISSN 2250-3153<br />

(1) Power supply (2) 230 V AC, Single phase, Variance.<br />

Materials :( 1) Spindle: Stainless Steel (2) Fly balls:<br />

Cast Iron (3) Arms: Stainless steel(4) Frame: Mild<br />

steel(5) Dead weight: cast Iron<br />

Governor Mechanism: Speed of rotation, N= (m+M)/m *<br />

895/h,Where m is Mass of the ball (kg)M – Mass of the dead<br />

weight (kg)h – Height of the governor (cm) ,r– Radius of rotation<br />

(cm),α – Angle of inclination,Fc– Centrifugal force = m ώ^2 r.,<br />

Where ώ= 2 π N/ 60. N- Speed of rotation (rpm), Here m= .4 kg<br />

M= 1.6 kgi) Height of Governor: h =√ (AB²- BC²), Here the<br />

Length of the arms is equal, Radius of rotation, r ı = AB sin α=<br />

.146 * sin 30º= .534 m Hı = AB cosα = 12.64 cm Speed N² = (m<br />

+ M)/m * 895 / h1= (.4 + 1.4)/.4*895/ .1246N =179.21 rpm<br />

DESIGN OF SHAFT:<br />

For solid shaft d= 13 mm,<br />

τ=σy/ 2 where τ is the shear stress in N/mm² ,σy = 380 N/mm^2.<br />

From DDB. τ= 380/ 2 = 190 N/mm²<br />

Torque ,T =п / 16 *τd³=п / 16 * 190 * 13³=81.962 Nmiv)<br />

Power = 2пNT/60= 2п*179.21*81.962/60 = 723.26 WP < [P] i.e.<br />

The power obtained is less than that of the power rating of a FHP<br />

motor which is 746 W and hence the design is safe for 13 mm<br />

diameter of shaft. Hence design is safe<br />

Specifications of Bearing: A Bearing is a machine element<br />

which is mounted on shafts for free and smooth rotation. The<br />

bearing facilitates the rotation of the shaft along its axis without<br />

any vibration. Generally for this purpose roller ball bearing is<br />

chosen and we have done the same. The various stresses acting<br />

on a roller ball bearing are (i) Radial force acting on the<br />

bearing.(ii) Axial thrust on the bearing The design of bearings is<br />

done on the basis of the stresses induced, the size of the setup<br />

and its specifications<br />

(i)The figure shows the dimensions of the bearing chosen. A<br />

roller ball bearing of ID 26 mm and OD 52mm<br />

(ii)The ID is chosen as 26mm so as to fix the sleeve rigidly on<br />

the bearing.<br />

Design Procedure:<br />

(i)The design of bearings is done on the basis of the stresses<br />

induced and the size of the setup.<br />

(ii) The radial force acting on the governor is given by F = torque<br />

/ distance. (N)F = 81.951 / .30Radial force F = 275 N<br />

(iii) For F = 275 N and the inner diameter d = 26 mm, The<br />

bearing to be chosen is SKF 6006. SKF 6206 and SKF 6306. Out<br />

of which SKF6206 is highly recommended and chosen by us.<br />

Additional Bearing:<br />

Two more bearings are required for free flow movement of the<br />

spindle connected to the motor with the help of a pulley. The<br />

bearing of inner diameter13 mm is required so that the Shaft is<br />

rigidly supported by the frame.<br />

Design:<br />

The Radial Force acting on the Governor is given by F = torque /<br />

distance. (N)=81.962/ 36Radial Force F = 216.75 N. For F =<br />

216.75 N and the inner diameter d = 12 mm, The Bearing to be<br />

chosen is SKF 6006. SKF 6206 and SKF 6306. Out of which<br />

SKF 6206 is highly recommended and chosen by us.<br />

Hurdles Faced: (i)We experienced bending the spindle while trying to fix the<br />

bearing in position which later led to wobbling of the spindle.<br />

Hence we changed a new one later.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 51<br />

ISSN 2250-3153<br />

(ii) Due to irregular speed control the arms bent while rotating<br />

which we replaced later with a new arm of harder material to<br />

overcome that problem.<br />

(iii) We also experienced turbulence of the entire setup while<br />

operating due to less weight of frame for which we added some<br />

extra weight for stability.<br />

(iv)Fixing the bearing in position caused failure of bearings<br />

because of hard impact by hammer for which we replaced the<br />

faulty bearing later.<br />

IV. RESULTS AND DISCUSSION<br />

(1.) From the stress analysis of the various parts of the<br />

governor assembly we are able to identify the stress<br />

Displacement of the Spindle<br />

STRESSES on various elements<br />

concentration areas, which are most susceptible to fail, so to<br />

avoid failure we have to increase the strength in those areas and<br />

to achieve this diameter of the shaft should be increased near the<br />

base because this is the portion where stress concentration is<br />

highest, so we have to provide a step a to increase the area which<br />

is accompanied by fillet which has some radius to avoid stress<br />

concentration.<br />

(2.) As can be seen from the stress analysis the area near the<br />

joint of the arm and the spindle head has high stress<br />

concentration so the thickness of the arms should be a SPLINE<br />

with high thickness near the joint and low at the centre, spline<br />

design is chosen because we do not have to increase the weight<br />

of the arms.<br />

Strain at various elements of the assembly<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 52<br />

ISSN 2250-3153<br />

Limitations of our Study:<br />

(i) Bending of the spindle, because of the forces acting on the<br />

spindle head by the arms.<br />

(ii) High sensitivity which results in HUNTING.<br />

(iii) Woobling of the whole structure because of low weight.<br />

V. FUTURE SCOPE<br />

(i) Analysis on different materials for spindles and arms.<br />

(ii) Dynamic analysis of the governor will give more accurate<br />

results and also calculate the combined stresses acting on the<br />

various parts of the governor.<br />

(iii) Application of springs to avoid the problem of HUNTING.<br />

(iv) The governors extend their scope in all kind of vehicles.<br />

They can be employed in hydro plants assessment.<br />

(v)They can also be used in speed sensing devices which employ<br />

digital speed governors.<br />

(vi) The introduction of analog and digital speed governors have<br />

created a rage among the automobile industries<br />

Stress Curve with respect to spindle head semi perimeter<br />

Strain energy curve wrt spindle head<br />

Displacement Magnitude w.r.t. spindle head<br />

VI. CONCLUSION<br />

(i) Thus governor plays an important role in speed control.<br />

(ii) It ensures regulation of speed at any conditions<br />

(iii)To study the effect of varying the mass of the center sleeve in<br />

porter governor<br />

REFERENCES<br />

[1] WWW.ANSWERS.COM/TOPIC/GOVER-DE<br />

[2] WWW.ENOTES.COM/TOPIC/GOVER-DE<br />

[3] HTTP//EN.WIKIPEDIA.<strong>ORG</strong>/WIKI/GOVER-DE<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 53<br />

ISSN 2250-3153<br />

AUTHORS<br />

First Author –Ravindra Singh Rana, Assistant Professor<br />

Department of Mechanical Engineering<br />

M.A.N.I.T.Bhopal(M.P.), Email: ravindrarana74@gmanil.com<br />

Second Author – Rajesh Purohit, Associate Professor<br />

Department of Mechanical Engineering M.A.N.I.T.Bhopal(M.P.)<br />

Third Author – Alok Singh, Assistant Professor Department of<br />

Mechanical Engineering M.A.N.I.T.Bhopal(M.P.)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 54<br />

ISSN 2250-3153<br />

Reviews on the Influences of Alloying elements on the<br />

Microstructure and Mechanical Properties of Aluminum<br />

Alloys and Aluminum Alloy Composites<br />

R. S. Rana, Rajesh Purohit, and S Das<br />

Department of Mechanical Engineering, Maulana Azad National Institute of Technology,<br />

Bhoapl-462051, India<br />

Abstract- In recent year‘s aluminum and aluminum alloys are<br />

widely used in automotive industries. These are light weight<br />

(density of about 2.7g/cc),having good malleability and<br />

formability, high corrosion resistance and high electrical and<br />

thermal conductivity. High machinability and workability of<br />

aluminum alloys are prone to porosity due to gases dissolved<br />

during melting processes. However, in the engineering<br />

application pure aluminum and its alloys still have some<br />

problems such as relatively low strength, unstable mechanical<br />

properties. The microstructure can be modified and mechanical<br />

properties can be improved by alloying, cold working and heat<br />

treatment in this regards, this paper reports the influences of<br />

some alloying elements on the microstructures and mechanical<br />

properties of Aluminum alloys and aluminum alloy composites.<br />

Keywords- Aluminum alloy, aluminum alloy composites,<br />

Machinability, alloying, Heat treatment, Cold working<br />

A<br />

I. INTRODUCTION<br />

luminium and aluminium alloy are gaining huge industrial<br />

significance because of their outstanding combination of<br />

mechanical, physical and tribological properties over the base<br />

alloys. These properties include high specific strength, high wear<br />

and seizure resistance, high stiffness, better high temperature<br />

strength, controlled thermal expansion coefficient and improved<br />

damping capacity.[1]. These properties obtained through addition<br />

of alloy elements, cold working and heat treatment. Alloying<br />

elements are selected based on their effects and suitability. The<br />

alloying elements may be classified as major and minor<br />

elements, microstructure modifiers or impurities, however the<br />

impurity elements in some alloys could be major elements in<br />

others[2]. In this paper the influences of alloying Such as Major<br />

elements (Si ,Cu ,Mg), Minor elements(Ni, Sn) ,Microstructure<br />

modifier elements(Ti, B, Sr ,Be ,Mn ,Cr) and Impurity<br />

elements(Fe, Zn) on microstructures and mechanical properties<br />

of aluminium alloys are reviewed.<br />

II. EFFECTS OF MAJOR ALLOYING ELEMENTS IN ALUMINIUM<br />

It's the foremost preliminary step for proceeding with any<br />

research work writing. While doing this go through a complete<br />

thought process of your Journal subject and research for it's<br />

viability by following means:<br />

The major alloying elements in Aluminum and aluminium alloys<br />

typically include Silicon (Si), copper (Cu) and magnesium (Mg).<br />

2.1 Silicon(Si): Silicon is the most important single alloying<br />

element used in majority of aluminum casting alloys.[2] It is<br />

primarily responsible for so –called good castability (high<br />

fluidity,low shrinkage),low density(2.34g/cm3)which may be<br />

advantage in reducing total weight of cast component and has<br />

very low solubility in Aluminum therefore precipitates as<br />

virtually pure Si which is hard and improve the abrasion<br />

resistance. Si reduces thermal expansion coefficient of Al-Si<br />

alloys. Machinability is poor with addition of silicon in<br />

Aluminum. [3].Depending on the Si concentration in weight<br />

percentage, the Al-Si alloy systems are divided into three major<br />

categories: Hypoeutectic (


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 55<br />

ISSN 2250-3153<br />

2.2 Effect of Cu addition: copper effect the strength and<br />

hardness of aluminum casting alloys, both heat treated and not<br />

heat treated and at both ambient and elevated service<br />

temperature. It also improve the machinability of alloys by<br />

increasing matrix hardness,.[2] On the down side, copper<br />

generally it reduces the corrosion resistance of aluminum and in<br />

certain alloys and tempers, it increase stress corrosion<br />

susceptibility[2].S.G. Shabestari et al [5] Investigate the effect of<br />

copper and solidification condition on the microstructure and<br />

mechanical properties of Al-Si-Mg alloys . copper in the range<br />

of 0.2-2.5wt% has been used in A356 aluminum alloy and cast at<br />

different solidification condition(sand, graphite, copper and cast<br />

iron molds). It has been found that Ultimate tensile strength of<br />

the alloys increased with heat treatment(T6), mold cooling<br />

rate(graphite) and copper content upto 1.5% . UTS increase<br />

because of precipitation of copper bearing phase in the<br />

interdendritc space cause by increasing copper. It has been found<br />

that the best mechanical properties with about 1.5% Cu in Al si-<br />

Mg alloy solidified in the graphite moulds.<br />

2.3 Effect of Mg addition: Magnesium (Mg). Provides<br />

substantial strengthening and improvement of the workhardening<br />

characteristics of aluminium. It can impart good<br />

corrosion resistance and weldability or extremely high Strength<br />

[6, 7]. . Silicon combine with magnesium to form the hardening<br />

phase Mg2Si that provides the strengthening [2]..Zhengang Liu<br />

at el[8] investigate the influence of Mg addition on graphite<br />

particle distribution in the Aluminum alloy matrix composites.in<br />

this studied Mg as surface active agent was added into<br />

commercial alumimum to prevent the graghite particles from<br />

clustering and improve the physical and mechanical properties of<br />

aluminum matrix. The results show that contents of graphite<br />

increase with increasing Mg contents. The graphite particle<br />

distribute uniformly in the particle reinforced PMMC with<br />

0.6Wt%Mg. however, the agglomeration of graphite particles is<br />

observed in matrix when Mg contents is more than 1Wt% Mg.<br />

the proper Mg addition amount is beneficial to enhance the<br />

mechanical properties of the graphite particles reinforced<br />

aluminum alloy matrix composites and the abrasion resistance of<br />

the materials due to uniformaly distribution of hard particles and<br />

reduction of friction coefficient.<br />

2.4 Effect of Mg and Si addition: Shubin Ren et.al[9]<br />

Investigate the effect of Mg and Si alloy element in the<br />

aluminum on the thermo-mechanical properties of pressureless<br />

infiltrated SiCp/Al composites. Si and Mg addition to the<br />

aluminum can improve the wettability of SiC by the aluminum<br />

The results showed that, when the Si content was lower than 6<br />

wt% or the Mg content was lower than 4 wt%, the composites<br />

showed poor thermo-physical properties because of higher<br />

porosity due to relative density of infiltrating SiCp/Al composites<br />

is very low in the composites resulting from the poor wettability<br />

between Al and Si. Increasing the Si content to the aluminum can<br />

enhance the elastic modulus, thermal dimensional stability and<br />

thermal conductivity of the composites and reduce the coefficient<br />

of thermal expansion (CTE) of the composites. However,<br />

excessive Si beyond 12 wt% can reduce the thermal conductivity<br />

and bending strength of the composites. An optimum content of<br />

Mg addition to aluminum was found to be 4–8 wt%, at which the<br />

composites exhibited good thermo-mechanical properties.<br />

However, as the Mg content was increased beyond 8 wt%, the<br />

higher porosity in the composites resulting from the lower<br />

pressure of the magnesium led to lower thermo-mechanical<br />

properties.<br />

III. EFFECT OF MINOR ELEMENTS:<br />

3.1 Effect of Ni addition: JE Hanafee et al[10] Investigate the<br />

effect of nickel on hot hardness of aluminum alloys It is shown<br />

that nickel can be utilized to improve the hot hardness (up to 600<br />

F) of aluminum-silicon (10 to 16 per cent silicon) casting and<br />

forging alloys. The maximum benefits are realized by developing<br />

a large volume and favourable distribution of nickel aluminide.<br />

The addition of more than the eutectic amount of silicon was not<br />

particularly helpful in improving hot hardness. While the<br />

addition of more than the eutectic amount of nickel did improve<br />

hot hardness.<br />

F. Hernández-Méndez, A. Altamira no-Torres et al[11]<br />

Investigate the Effect of Nickel Addition on Microstructure and<br />

Mechanical Properties of Aluminum-Based Alloys. Alloys were<br />

produced by powders metallurgy. Characterization results<br />

indicate that the microstructure of the aluminum-nickel alloys<br />

present a thin and homogeneous distribution of an intermetallic<br />

compound in the aluminum‘s matrix, identified as Al3Ni.<br />

Furthermore, it was find out that the amount of intermetallic<br />

Al3Ni increase as the nickel content in the alloy rises. Regarding<br />

the mechanical properties evaluated; it was establishes that the<br />

hardness, compression and flexion resistances also were<br />

improved due to the presence of the intermetallic compound.<br />

3.2 Effect of tin addition: Tin (Sn) used in aluminum casting<br />

alloys for reducing friction in bearing and bushing applications.<br />

Alloying element Tin in emergency conditions can provide<br />

short-term liquid lubrication to rubbing surfaces if such<br />

bearings/bushings severely overheat in service..[2]<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 56<br />

ISSN 2250-3153<br />

IV. MICROSTRUCTURE MODIFYING ELEMENTS<br />

Include titanium (Ti), boron (B), strontium (Sr),phosphorus (P),<br />

beryllium (Be), manganese (Mn) and chromium (Cr)[2]<br />

4. 1 Effect of Ti addition:<br />

Majed Jaradeh, et al[12] investigate the Effect of titanium<br />

additions on the microstructure of DC-cast AA 3003 aluminium<br />

alloys. Some improved corrosion properties can be obtained<br />

from increasing the Ti contents in aluminium alloys to a level<br />

above the normal practice for grain refinement. However,<br />

increasing the Ti content above the peritectic point, 0.15%, can<br />

influence the grain refinement and cause casting difficulties. It<br />

was found that with normal Ti contents in the range of 0.015%,<br />

the grain refinement is effective. However, upon larger Ti<br />

additions to levels around 0.15% the grain structure becomes<br />

coarser .N. Saheb , T. Laoui et al[13] Investigate the effect of Ti<br />

addition(up to 4Wt%) to Al–Si eutectic alloy. The addition of Ti<br />

to Al–Si eutectic alloy resulted in the precipitation of the<br />

intermetallic compound Al3Ti phase, which induced an increase<br />

in the micro hardness of the binary alloy. Among the Ticontaining<br />

alloys, the increase in Ti content improved their wear<br />

resistance as a result of increase in the microhardness due to the<br />

presence of relatively hard-phase Al3Ti. However, these alloys<br />

showed higher wear rates (thus lower wear resistance) compared<br />

with the binary alloy due to the tendency for embrittlement and<br />

microcracking brought about by Al3Ti particles. Heat treatment<br />

of the Ti-containing alloys at 200◦C for 6 h improved further<br />

their wear resistance.<br />

4.2 Effect of Titanium & Boron:<br />

Titanium (Ti) and boron (B) are used to refine primary<br />

aluminum grains. Titanium, added in aluminum alloy, forms<br />

TiAl3, which serves to nucleate primary aluminum dendrites.<br />

More frequent nucleation of dendrites means a large number of<br />

smaller grains. Grain refinement is illustrated in Figure 1<br />

Figure 1: Illustration of grain-refined aluminium<br />

Grain refining is better when titanium and boron are used in<br />

combination. Master alloys of aluminum with 5% titanium and<br />

1% boron are commonly used additives for this purpose.<br />

Titanium with boron form TiB2 and TiAl3, which together are<br />

more effective grain refiners than TiAl3 alone..[2]<br />

4.3 Effect of strontium addition: Strontium, Sodium, Calcium<br />

and Antimony These elements are added to eutectic or<br />

hypoeutectic aluminum silicon casting alloys to modify the<br />

morphology and microstructure of the eutectic silicon phase,<br />

eutectic silicon solidifies in a relatively coarse continuous<br />

network of thin platelets, shown in Figure 2. That morphology<br />

provides abundant stress risers and thus limits to achieve<br />

maximum strength and ductility. Modification with one of the<br />

above elements can changes the eutectic silicon into a fine<br />

fibrous or lamellar structure (Figures 2b and 2c).[2]<br />

Figure 2a:Unmodified Figure 2 b: Modified Figure 2c: Supermodified<br />

A. Razaghia, M. Emamy et al[14] Investigate the effect of<br />

strontium as a modifier on the microstructures and tensile<br />

properties of two castable particulate metal matrix composites<br />

The particulate metal matrix composites had similar matrix alloy<br />

(A357) but different reinforcing fine particles (silicon carbide<br />

and alumina). Results showed that the addition of 0.03%<br />

strontium makes a modest improvement to the yield strength,<br />

ultimate tensile strength and elongation percentage values, and<br />

the scatter of these properties, but makes a significant<br />

improvement to minimum strength and elongation results.<br />

Microstructural examinations by scanning electron microscope<br />

and energy dispersive spectroscopy analysis of metal matrix<br />

composites showed segregation of strontium on both the silicon<br />

carbide and alumina particles. Further results showed that the<br />

addition of higher strontium levels contributes to the overmodification<br />

of the eutectic silicon and promotes the formation<br />

of an Al–Si–Sr intermetallic compound on the particle/matrix<br />

interface.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 57<br />

ISSN 2250-3153<br />

Fig. 3: Optical micrograph of A357: (a) non-modified, (b) modified with 0.01%Sr, (c) modified with 0.02%Sr, (d) Modified with<br />

0.03%Sr, (e) modified with 0.05%Sr, and (f) modified with 0.1%S<br />

4.4 Effect of Manganese & Chromium: Manganese or in<br />

combination,with manganese (Mn) and chromium (Cr) change<br />

the morphology of the iron-rich Al5FeSi phase (Figure 4a) from<br />

its typical platelet/acicular form to a more cubic<br />

Al15(MnFe)3Si2 form (Figure 4b) that is improve the ductility.<br />

[2]‘‘.<br />

Figure 4a: Fe-richAl5FeSi Figure4b: Cubic Al15(MnFe)3Si2<br />

form.phase in platelet form<br />

4.5 Effect of Mn addition: Soo Woo Nam and Duck Hee<br />

Lee[15] Investigate the effect of Mn on the Mechanical Behavior<br />

of Al Alloys.. Recently, it was found that as the manganese<br />

content increases over 0.5 wt.% in aluminum alloys, both yield<br />

and ultimate tensile strength increase significantly without<br />

decreasing ductility. Adding manganese to aluminum<br />

alloys enhances the tensile strength as well as<br />

significantly improves low-cycle fatigue resistance.<br />

Corrosion resistance is also improved by the addition<br />

of manganese.<br />

V. EFFECT OF IMPURITY ELEMENTS :<br />

5.1 Effect of zinc addition: Zinc is only present in aluminum<br />

casting alloys of 7XX series,. Otherwise, zinc is present merely<br />

as an acceptable impurity element in many secondary (scrapbased)<br />

die casting alloys. As such, zinc is quite neutral; it neither<br />

enhances nor detracts from an alloy‘s properties. [2]. ZHU Meijun,<br />

DING Dong-yan et al[16] Investigate the effect of Zn<br />

content on tensile and electrochemical properties of 3003 Al<br />

alloy. The effect of Zn addition on the microstructure, tensile<br />

properties and electrochemical properties of as-annealed 3003 Al<br />

alloy was investigated. It was found that High density<br />

precipitates are observed in the Zn-containing alloys and the<br />

alloy with 1.8% Zn addition also has rod-like precipitates.. The<br />

alloy with 1.5% Zn addition has the highest ultimate tensile<br />

strength. M.C. Carroll, P.I. Gouma et al [17]. Studied effect<br />

of Zn addition on the grain boundry precipitation and corrosion<br />

of Al. Stress corrosion cracking (SCC) concerns in aluminum<br />

alloys containing Mg levels greater than 3.5%have been largely<br />

attributed to the formation of the beta-phase (Al3Mg2) at grain<br />

boundaries. It has been demonstrated that the beta-phase need not<br />

be continuous in order to provide a path for crack propagation,<br />

but aging treatments, exposure to intermediate to high<br />

temperatures, and excessively corrosive environments can all<br />

contribute to early failure of Al-Mg alloys due to SCC. Proof of<br />

the presence of a corrosion-prone secondary phase can be<br />

demonstrated easily through exfoliation testing and the<br />

associated lining of grain boundaries, which can be confirmed<br />

optically. Additions of Zn to these Al-Mg alloys in levels of 1–<br />

2wt% have been shown to be more SCC resistant due to the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 58<br />

ISSN 2250-3153<br />

formation of a stable ternary Al-Mg-Zn phase , the pie phase.<br />

Recent studies have shown that Al-5083 variants which contain<br />

even minor levels of Zn (0.68–0.70wt%) perform much better<br />

during exfoliation testing. Zinc additions of 0.68–0.70wt% to<br />

sensitized 5083-based Al-Mg-Mn alloys precludes the formation<br />

of b-phase precipitates, resulting instead in the formation of a<br />

chemically and structurally distinct Al-Mg-Zn t-phase at grain<br />

and subgrain boundaries. The t-phase appears to be more<br />

resistant to corrosion than the b-phase.<br />

5.2 Effect of iron addition: John A. Taylor [18] Investigate the<br />

effect of Iron in Al-Si Casting Alloys This paper discusses the<br />

various sources of iron and how it enters aluminum alloys, the<br />

way that iron leads to the formation of complex inter-metallic<br />

phases during solidification, and how these phases can adversely<br />

affect mechanical properties, especially ductility, and also lead to<br />

the formation of excessive shrinkage porosity defects in castings.<br />

The paper offers guidelines to the levels of iron that can be<br />

tolerated, how to maintain these levels and how to minimize the<br />

negative effects of iron. Author suggested some Practical<br />

guidelines for addition of iron in Al-Si casting alloys:<br />

Wherever possible, iron levels in Al-Si alloys should be<br />

kept as low as practical in order to avoid the detrimental<br />

effects on mechanical properties, particularly ductility<br />

and fracture toughness. This means minimizing iron<br />

contamination through careful selection of raw materials<br />

(i.e. ingots, silicon, etc.) and the maintenance of good<br />

refractory coatings on all steel tools used to prepare and<br />

handle melts.<br />

Iron levels above the critical level for the silicon content<br />

of the alloy should be avoided as these can cause serious<br />

loss of ductility in the final cast product and decreased<br />

casting productivity through increased rejects due to<br />

shrinkage porosity, and particularly ―leakers‖.<br />

The critical iron content (in wt%) for an alloy can be<br />

calculated using Fe crit ≈ 0.075 x [%Si] – 0.05.<br />

If solidification/cooling rates are very high (e.g. high<br />

pressure die casting), super critical iron contents may<br />

not be detrimental, but as the cooling rate decreases<br />

(gravity die casting → sand casting, etc.) the probability<br />

of super critical iron levels causing problems<br />

dramatically increases<br />

Traditional heat treatment regimes for Al-Si alloys, e.g.<br />

T6, do not alter the nature of the offending Fecontaining<br />

phases. As-cast inter-metallic is retained and<br />

although the overall performance of an alloy may be<br />

improved by heat treatment, it would be better still with<br />

low iron levels initially.<br />

Additions of Mn to neutralize the effects of iron are<br />

common, at Mn:Fe ratios of ~ 0.5, however, the benefits<br />

of this treatment are not always apparent. Excess Mn<br />

may reduce β-phase and promote α-phase formation,<br />

and this may improve ductility but it can lead to hard<br />

spots and difficulties in machining. Mn additions do not<br />

always improve castability and reduce porosity in high<br />

Fe alloys. Its affect is sensitive to alloy composition.<br />

The addition of Mn to melts with high iron levels can<br />

also promote the formation of sludge, if the sludge<br />

factor (derived by [%Fe] + 2[%Mn] + 3[%Cr]) exceeds<br />

a particular value for a given alloy and melt holding<br />

temperature. This is a serious problem for die-casters<br />

who use low melt temperatures and high impurity<br />

secondary alloys<br />

5.3 Effects of beryllium addition: Y. Wang, Y. Xiong [19]<br />

Investigate effects of beryllium (Be) in Al–7Si–0.4Mg–0.2Ti–<br />

xFe–xBe cast alloy. The results show that beryllium addition<br />

changes the shape of iron-rich compound from needle or plate<br />

shapes to Chinese scripts or polygons. And the iron-rich<br />

compound (named Be–Fe) is aggregated when the composition<br />

of Fe is high. The aggregation of Be–Fe phase is the main crack<br />

nucleus in the alloy. It is also found that Be–Fe is formed during<br />

peritectic reaction on titanium-rich particle and located inside the<br />

a-Al. These lead to the higher mechanical properties of the alloy<br />

with Be addition.& findings are-<br />

(1) The Fe phase is one of the main deterioration to the<br />

mechanical properties of cast aluminium alloy, especially the bphase<br />

in the alloy leads to poor mechanical properties.<br />

(2) Beryllium addition changes the morphology of iron-rich<br />

compounds to Chinese scripts and polygons And aggregative<br />

Be–Fe phases are found in high Fe contained alloy. Be–Fe<br />

phases are local inside the a-Al.<br />

(3) The fracture always takes place on iron-rich compounds. In<br />

the Be-containing alloy with iron, the crack propagation on Fephase<br />

was deterred during fracture, and this is considered to be<br />

beneficial to the fracture toughness of the alloy.<br />

(4) The mechanical properties of Be-containing alloy improve<br />

significantly. This is contributed to the alternation of Fe phase<br />

shape.<br />

(5) It is expected to exceed the permissible exposure limit in the<br />

low beryllium content alloy(B0.5%) industry.<br />

5.4 Effect of iron and beryallium addition: Murali, S and<br />

Trivedi, A and Shamanna et[20] al investigate the effect of iron<br />

and combined iron and beryllium additions on the fracture<br />

toughness and microstructures of squeeze-cast Al-7Si-0.3Mg<br />

alloy. An increase in iron content significantly decreases fracture<br />

toughness. Trace additions of beryllium completely neutralize the<br />

detrimental effect of iron.<br />

5.5 Effect of rare earth elements: It is well known that trace<br />

element additions to aluminum alloys can strongly influence the<br />

precipitation process, including modifying the dispersion,<br />

morphology and crystal structure of the resulting<br />

precipitations[21-23].Studies on rare-earths as micro-alloying<br />

elements showed that they had beneficial effects on the<br />

mechanical properties of aluminum alloys. It was reported that<br />

addition of Ce to Al-Cu-Mg-Ag alloy improved the thermal<br />

stability of the Ω phase thus raised the service temperature of this<br />

alloy[24]. LI et al[25]demonstrated that adding 0.1%−0.2%<br />

(mass fraction) Y improved the tensile properties of 2519 alloy at<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 59<br />

ISSN 2250-3153<br />

room and elevated temperatures for Y changed the size and<br />

density of θ′ phase. It was indicated that Nd was mainly<br />

distributed in form of intermediate compound AlCuNd, which<br />

exerted a restraining force on the grain boundaries and enhanced<br />

the mechanical properties of 2519 alloy at high temperature<br />

[26].Some recent researches showed that Yb was considered as<br />

an effective micro-alloying element in aluminum alloys. It was<br />

reported that Yb addition improved the mechanical properties of<br />

Al-Cu-Mg-Ag alloy and Al-Zn-Mg-Cu-Zr alloy [27-28].<br />

Furthermore, complex additions of Yb, Cr and Zr to Al-Zn-Mg-<br />

Cu alloy significantly enhanced the resistance to recrystallization<br />

[29].<br />

VI. CONCLUSION<br />

Alloying elements are selected based on their effect and<br />

Suitability. Silicon lowers the melting point and increase the<br />

fluidity(improve casting characteristics ) of Aluminum. A<br />

moderate increase in strength is also provided by Silicon<br />

addition. Magnesium provides substantial strengthening and<br />

improvement of work harding characteristic of aluminium alloy.<br />

It can impart good corrosion resistance and weldability or<br />

extremely high strength. Copper has a greatest impact on the<br />

strength and hardness of aluminum casting alloys, both heat<br />

treated and not heat treated and at both ambient and elevated<br />

service temperature. It improve the machinability of alloys by<br />

increasing matrix hardness. Nickel (Ni) enhances the elevated<br />

temperature strength and hardness. Tin(Sn) improves antifriction<br />

characteristic and fluidity of aluminum casting alloys. it decrease<br />

electrolytic potential which is desirable in sacrificial anodes..It is<br />

concluded that selection of alloying element depends on use of<br />

materials requirement.<br />

REFERENCES<br />

[1] Das S., Mondal D.P., Sawla S., Ramkrishnan N.; Synergic effect of<br />

reinforcement and heat treatment on the two body abrasive wear of an<br />

Al–Si alloy under varying loads and abrasive sizes, Wear, Vol. 264 (2008):<br />

pp. 47–59.)<br />

[2] http://wpedia.goo.ne.jp/enwiki<br />

[3] http://www.keytometals.com/Article80.htm, retrieved on 16th April 2011<br />

[4] G.T. Abdel-Jaber et al ―Solidification and Mechanical Properties behavior<br />

of Al-Si Casting Alloys‖ International Journal of Mechanical &<br />

Mechatronics Engineering IJMME-IJENS Vol: 10 No: 04<br />

[5] S.G. Shabestari, H. Moemeni Effect of copper and solidification conditions<br />

on the microstructure and mechanical properties of Al–Si–Mg alloys<br />

Journal of Materials Processing Technology 153–154 (2004) 193–198<br />

[6] Davis, J. R., Corrosion of Aluminum and Aluminum alloys, 1999,<br />

Ohio,ASM International.<br />

[7] Mondolfo, L. F., Aluminum alloys: Structure and Properties, 1976,London,<br />

Butterworths<br />

[8] Zhengang Liuy, Guoyin Zu, Hongjie Luo, Yihan Liu and Guangchun Yao J.<br />

Influence of Mg addition on graphite particle distribution in the Aluminum<br />

alloy matrix composites Mater. Sci. Technol., 2010, 26(3), 244-250.<br />

[9] Shubin Ren , Xinbo He, Xuanhui Qu, Islam S. Humail, Yan Li ― Effect of<br />

Mg and Si in the aluminum on the thermo-mechanicalproperties of<br />

pressureless infiltrated SiCp/Al composites Composites‖ Science and<br />

Technology 67 (2007) 2103–2113.<br />

[10] J E Hanafee Effect of Nickel on Hot Hardness of Aluminum-Silicon Alloys<br />

Materials Science › Miscellaneous Papers volume 71<br />

page514-520<br />

[11] F. Hernández-Méndez, A. Altamira no-Torres et ―Effect of Nickel Addition<br />

on Microstructure and Mechanical Properties of Aluminum-Based Alloys‖<br />

[12] Majed Jaradeh, Torbjorn Carlberg ―Effect of titanium additions on the<br />

microstructure of DC-cast aluminium alloys‖, Materials Science and<br />

Engineering A 413–414 (2005) 277–282<br />

[13] N. Saheb , T. Laoui , A.R. Daud, M. Harun , S. Radiman, R. Yahaya<br />

―Influence of Ti addition on wear properties of Al–Si eutectic alloys‖Wear<br />

249 (2001) 656–662<br />

[14] A. Razaghia, M. Emamy et al ― Sr effect on the microstructure and tensile<br />

properties of A357aluminum alloy and Al2O3/SiC-A357 cast composites‖<br />

M A T E R I A L S C H A R A C T E R I Z A T I O N 6 0 ( 2 0 0 9 ) 1 3 6 1<br />

– 1 3 6 9<br />

[15] Soo Woo Nam and Duck Hee Lee ―the effect of Mn on the Mechanical<br />

Behavior of Al Alloys.‖ METALS AND MATERIALS, Vol. 6, No. 1 (2000),<br />

pp. 13-16<br />

[16] ZHU Mei-jun, DING Dong-yan ― Effect of Zn content on tensile and<br />

electrochemical properties of 3003 Al alloy‖ Transition of non ferrous<br />

metal society china 20(2010)2118-2123<br />

[17] M.C. Carroll, P.I. Gouma ―EFFECTS OF Zn ADDITIONS ON THE<br />

GRAIN BOUNDARYPRECIPITATION AND CORROSION OF Al-<br />

5083‘‘ Scripta mater. 42 (2000) 335–340<br />

[18] John A. Taylor ―The Effect of Iron in Al-Si Casting Alloys‖ Cooperative<br />

Research Centre for Cast Metals Manufacturing (CAST) The University of<br />

Queensland Brisbane, Australia page 1-10<br />

[19] Y. Wang *, Y. Xiong ―Effects of beryllium in Al–Si–Mg–Ti cast alloy‖<br />

Materials Science and Engineering A280 (2000) 124–127<br />

[20] Murali, S and Trivedi, A and Shamanna et al “Effect of iron and combined<br />

iron and beryllium additions on the fracture toughness and microstructures<br />

of squeeze-cast Al-7Si-0.3Mg alloy‟‟. In: Journal of Materials Engineering<br />

and Performance, 5 (4). pp. 462-468<br />

[21] [6] SOFYAN B T, RAVIPRASAD K, RINGER S P. ―Effects of<br />

microalloying with Cd and Ag on the precipitation process of Al-4Cu-<br />

0.3Mg(wt %) alloy at 200 ℃” [J]. Micron, 2001, 32:851−856.<br />

[22] RINGER S P, HONO K, POLMEAR I J, SAKURAL T. ―Nucleation of<br />

precipitation in aged Al-Cu-Mg-(Ag) alloys with high Cu: Mg ratios‖ [J].<br />

Acta Materialia, 1996, 44(5): 1883−1898.<br />

[23] BARLAT F, LIU J.‖ Precipitate-induced anisotropy in binary A1-Cu<br />

alloys‘‘ [J]. Materials Science and Engineering A, 1998, 257: 47−61<br />

[24] XIAO D H, WANG J N, DING D Y, YANG H L. ―Effect of rare earth Ce<br />

addition on the microstructure and mechanical properties of an Al-Cu-Mg-<br />

Ag alloy‖ . Journal of Alloys and Compounds, 2003,352: 84−88.<br />

[25] LI H Z, LING X P, LI F F, GUO F F, LI Z, ZHANG X M. ―Effect ofY on<br />

microstructure and mechanical properties of 2519 aluminum alloy [J].<br />

Transaction of Nonferrous Metals Society of China, 2007,17(6):<br />

1191−1198.<br />

[26] ZHANG X M, WANG W T, LIU B, CHEN M A, LIU Y, GAO Z G,YE L<br />

Y, JIA Y Z. ― Effect of Nd addition on microstructures and heat-resisting<br />

properties of 2519 aluminum alloy‖. The Chinese Journal of Nonferrous<br />

Metals, 2009, 19(1): 15−20. (in Chinese)<br />

[27] XIAO D H, HUANG B Y. ―Effect of Yb addition on precipitation and<br />

microstructure of Al-Cu-Mg-Ag alloys‖ Transactions of Nonferrous<br />

Metals Society of China, 2007, 17(6): 1181−1185.<br />

[28] FANG H C, CHEN K H, ZHANG Z, ZHU C J. ―Effect of Yb addition on<br />

microstructures and properties of 7A60 aluminum alloy‖ .Transactions of<br />

Nonferrous Metals Society of China, 2008, 18(1):28−32.<br />

[29] CHEN K H, FANG H C, ZHANG Z, CHEN X, LIU G. ―Effect of Yb, Cr<br />

and Zr additions on recrystallization and corrosion resistance of Al-Zn-Mg-<br />

Cu alloys‖ [J]. Materials Science and Engineering A, 2008,497: 426−431<br />

[30] FANG Hua-chan CHEN Kang-hua, ZHANG Zhuo, ZHU Chang-jun<br />

―investigate the Effect of Yb additions on microstructures and properties of<br />

7A60 aluminum alloy.‖transition non ferrous metals society china 18(2008)<br />

28-32<br />

First Author – Ravindra Singh RanaAssiatant Professor,<br />

Department of Mechanical Engineering Maulana Azad National<br />

Institute of Technology Bhopal (M.P.) India,<br />

ravindrarana74@gmail.com<br />

Second Author – Dr. Rajesh Purohit, Associate Professor,<br />

Department of Mechanical Engineering Maulana Azad National<br />

Institute of Technology Bhopal(M.P.)India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 60<br />

ISSN 2250-3153<br />

Third Author – Dr. S. Das Scientist, Advanced Materials<br />

Processing Research Institute Bhopal (M.P.) India,<br />

sdas88@hotmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 61<br />

ISSN 2250-3153<br />

Evaluating Demand Response of Hydro Plant with Mixed<br />

Pumped Storage<br />

Abstract- Demand response plays a key role in balancing<br />

the demand and supply in an electricity grid. Though the<br />

demand response measures implemented with industrial<br />

and large commercial consumers are very effective, some<br />

alternate solutions may be required in the case of systems<br />

predominated by domestic loads. Pumped storage schemes<br />

(PSS) are widely used for demand side management (DSM)<br />

applications due to their high efficiency and quick response rate.<br />

But PSS often become unavailable if the environmental<br />

issues are considered. A practical method is to upgrade an<br />

existing hydro plant to a mixed pumped storage plant. This<br />

paper proposes a method to determine the optimum capacity<br />

of a mixed pumped storage unit/units which can be augmented to<br />

an existing hydro plant. In addition the proposed approach can be<br />

easily extended for scheduling applications in deregulated<br />

environment.<br />

Index Terms- energy storage, power demand, hydrology,<br />

power system economics, pumped storage.<br />

.<br />

I<br />

N. Venkateswarlu, M. Velmurugan, and S.Udaya Baskar<br />

Department of EEE<br />

Audisankara College of Engineering & Technology, Gudur, Nellore Dist<br />

I. INTRODUCTION<br />

n an electricity grid, electricity consumption and<br />

production must balance at all times. Any mismatch in the load<br />

generation balance results in violation of power system<br />

parameters. To keep the parameters under limits, the system<br />

operator continuously monitors the grid and adjusts the<br />

generation to match the load. The small variations in demand get<br />

automatically adjusted with governor action. The capacity of the<br />

power system to respond to the changes in demand is crucial as<br />

system reliability and stability are also likely to be affected in<br />

extreme cases. In addition to the technical issues, commercial<br />

interests may have to be forgone unless sufficient planning is<br />

done.<br />

Usually the system operator manages the mismatch<br />

between demand and supply with the spare capacity available in<br />

the running units. Often, the mismatch is carried over to the<br />

nearby control areas through deliberate transactions (planned<br />

energy transfer involving open access) or otherwise<br />

(unscheduled interchange). However, during peak hours, which<br />

are remarkable in some parts of the country, where the demand is<br />

predominated by domestic and commercial load with low base<br />

industrial load, the spare capacity of running units is not<br />

sufficient to maintaining the load-generation balance. In areas<br />

where the irrigation requirement is high, part compensation can<br />

be provided by restricting the permitted hours of consumption of<br />

irrigation load. Kerala is a typical power system with high peak<br />

demand and load factor in the range of 70%. The change of<br />

demand during the onset and decay of evening peak hours runs to<br />

15 – 25 MW/minute.<br />

To keep the generation follow the demand so as to keep the<br />

system parameters under limits, the system operator has to<br />

ensure sufficient capacity to meet the peek demand.The<br />

additional requirement posed on the system during peak hours<br />

has to be met by the marginal capacity available with the<br />

power system. For turbine technology based thermal<br />

generation, the generally acceptable lower level of continuous<br />

generation is 75%. Hence, the additional requirement during<br />

peak hours which goes above 25% capacity of running thermal<br />

units pose a commercial question for the system operator. As<br />

internal combustion engine based generation which are capable<br />

to peaking operation to a certain extent are costly, the first<br />

alternative goes to hydro power. Economics of operation requires<br />

the management of incremental demand during peak with hydro<br />

power, which is operationally flexible for start stops at lowest<br />

cost and part load operation, ability for quick response to<br />

demand changes etc. However, the environmental concern,<br />

especially in the tropical area, is the main hurdle in tapping the<br />

hydro potential. Shortage of hydro potential to meet the peek<br />

demand results in underutilization of the capacity of thermal<br />

units, which are generally designed to operate for base load.<br />

This low utilization factor of generation plants and<br />

uneconomical operation have sparked utilities to invest in energy<br />

storage systems (ESS) such as pumped storage plants,<br />

compressed air energy storage plants, battery energy storage<br />

systems(BES) and superconducting magnetic energy storage<br />

systems(SMES) etc.[1]. Recently significant amount of<br />

researches are reported on ESS, especially on superconducting<br />

magnetic energy storage[2], battery storage[3],flywheel energy<br />

storage[4] and their applicability on power system[5] are<br />

described. With energy storage , energy can b stored on off- peak<br />

load period and dispatched on peak load period [6] proposes a<br />

determination methodology for optimizing the size of ESS<br />

integrated with a thermal power system. Schemes meant for<br />

reduction of peak demand by encouraging off-peak electricity<br />

usage and hence optimized energy efficiency are referred<br />

collectively as demand side management (DSM)[7]. Many<br />

utilities offer Demand Response (DR) programs that offer<br />

incentives for reducing loads for short periods during times of<br />

peak demand. Among the DSM schemes, pumped storage<br />

schemes are widely used because of their availability, high<br />

efficiency and quick response rate[8]. The PSS do not affect the<br />

natural load curve but it‘s double face characteristics (load or<br />

generator) helps to avoid the unnecessary peak plant construction<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 62<br />

ISSN 2250-3153<br />

and also the better utilization of the existing base power<br />

plants[9].<br />

II. MIXED PUMPED STORAGE OPERATION IN EXISTING<br />

PLANTS<br />

The principle behind a pumped storage plant is simple and<br />

proven. During off-peak time , water is pumped from a lower<br />

reservoir to a higher reservoir consuming energy at a cheap rate.<br />

The pumped water is stored in the upper reservoir and is released<br />

in a controlled way during peak time generating electricity. So a<br />

pumped storage plant can be considered as a pseudo customer<br />

who can shift its load from peak time to off peak time. One of the<br />

disadvantages of the pumped scheme from the cost point of view<br />

is the low utilization factor of the generator unit, especially when<br />

the market rate of power is not conducive due to the absence<br />

of price differential between generating mode and pumping<br />

mode operation schedules during some part of the year.<br />

A previous study [10] tried to estimate the optimum<br />

capacity of pumped storage generation that could be added to<br />

Kerala power system so as to optimize on the cost of energy<br />

procured. The results indicated around 300MW in the next 5 year<br />

horizon. However, conceiving a new pumped storage plant is<br />

just unthinkable in the environmentally fragile western ghat area,<br />

the only possible hydel source for Kerala. Hence alternate<br />

solutions were considered.<br />

In the design and conceptualization of hydro electric plants,<br />

the hydrology of the area and expected inflow are the main<br />

parameters deciding the total reservoir capacity. But, the size of<br />

the reservoir is often limited by the optimum submergence that<br />

can be permitted. Such optimization, however, leads to a<br />

situation of under utilization of the hydrological potential at the<br />

location. The unit size and total capacity of the generating<br />

station is to be optimized on cost, which again depends on the<br />

utilized hydro potential. Thus the reservoir is likely to spill<br />

during peak rainy season and may not be able to cater the peak<br />

demand fully.<br />

The present study is to explore the possibility of mixed<br />

pumped storage operation by introducing one or a set of pumped<br />

storage units in a station where the storage capacity of the<br />

reservoir is constrained by design. A mixed pumped storage is a<br />

plant where there is conventional hydro generation in addition to<br />

the pumped storage operation. It has the advantage of improved<br />

generation capacity of the plant and better utilization factor of the<br />

units, thereby reducing the overall cost of generation. In the<br />

proposed methodology such units function as generators during<br />

the monsoon period utilizing the extra capacity which is<br />

otherwise spilled off and operate as a pumped storage scheme<br />

when the inflow is less than the generation capacity of the station<br />

during other than monsoon season.<br />

III. PROPOSED METHODOLOGY<br />

For examining the scope of mixed pumped storage operation,<br />

an existing hydro plant with a significant spill during<br />

monsoon and extra storage capacity during summer is selected.<br />

The reservoir data of the plant for 5 years is collected. These<br />

data are classified into following 3 categories based on the<br />

reservoir storage level.<br />

1 storage between 80% to 100% of full storage capacity<br />

2 storage between 50% to 80% of full storage capacity<br />

3 storage less than 50% of full storage capacity<br />

Category 1<br />

This period mainly consists of the monsoon period which<br />

presents a situation of spillage of the reservoirs in spite of full<br />

generation from the station. This is due to the inflow through<br />

streams which are active only during the active monsoon period.<br />

An additional generation capacity can be thought of to utilize this<br />

spillage which is computed as follows:<br />

Let S be the average spillage in million units for a day during this<br />

season.<br />

The capacity P1 in MW to utilize this spillage = S.1000<br />

24<br />

The spillage during this season can be avoided by utilizing this<br />

additional capacity as a generator for 24 hours in a day.<br />

Category 2<br />

Category 2 is a period where the installed generation capacity in<br />

the station is capable of controlling the inflow. In this season<br />

the proposal is to introduce an additional generation<br />

capacity which is meant for peak hours by controlling the<br />

generation during off peak hours. The limiting capacity<br />

corresponds to the capability of reservoir to reduce the<br />

generation from the existing units so as to preserve water for the<br />

additional unit without compromising on the water discharge to<br />

the river. The additional generation is considered during peak<br />

hours (say 4 hours). The computation is based on the average rate<br />

of inflow during this period.<br />

Let i be the inflow rate in a day in this season.<br />

Total inflow for 4 hours I= i.4 mu.<br />

Unit size P2 in MW required to deplete this inflow= I.1000<br />

4<br />

Category 3<br />

In the situation represented by category 3, the inflow will not be<br />

sufficient to keep the existing generators work round the clock.<br />

This season correspond to pumped storage operation. The<br />

maximum limit of capacity is obtained from the extra storage<br />

possible. This is a very high value. But practically the size of the<br />

lower reservoir fixes the upper limit of the capacity whose<br />

computation is beyond the scope of this study.<br />

The unit size can be fixed by finding the optimum value on the<br />

basis of further studies on environment impact and other<br />

related matters.<br />

Case study<br />

As an illustration, Peringalkkutthu hydro plant operated by<br />

Kerala Electricity Board and connected to Southern Electricity<br />

Grid of Indian power system is considered. The plant has a total<br />

capacity of 48MW with 4 units of 8MW capacity and one unit<br />

having 16MW. The reservoir data is analyzed for 2006-10. The<br />

additional capacities that can be introduced in each category are<br />

found by the proposed methodology and the values are shown in<br />

table1.<br />

Table 1: Addition of Mixed Storage Capacity<br />

Category Capacity (MW)<br />

Duration of the<br />

year ( % )<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 63<br />

ISSN 2250-3153<br />

1 16 30<br />

2 12 15<br />

3 - 55<br />

IV. RESULTS AND DISCUSSION<br />

It is seen that the capacities that can be added to category 1<br />

and 2 are 16 MW and 12 MW respectively. The upper limit of<br />

the capacity suitable for category 3 is fixed on the basis of the<br />

extra storage possible in this season whereas the size of the lower<br />

reservoir fixes the lower end whose calculation is beyond the<br />

scope of this study. However, this capacity can be fixed as the<br />

optimum capacity that can produce maximum returns.<br />

A. Determination of optimum capacity<br />

The optimum capacity is the one which produces maximum<br />

annual returns. Since there is a maximum limit for the capacity<br />

for each mode of operation, the income for different capacities is<br />

not linear. The total annual income (B) for each capacity is<br />

calculated by calculating the income obtained in each mode of<br />

operation assuming an average market price for each season. The<br />

price is taken as the day ahead market clearing price (MCP) of<br />

the southern region (SR) in the Indian Energy Exchange for the<br />

year 2010 [11]. Commercial figures of plant characteristics are<br />

not readily available Indian context. Hence figures as shown in<br />

table 2 as per a study on European system [12] are considered for<br />

the analysis. The annual fixed cost (C) is calculated with the<br />

following assumptions:<br />

Investment =Rs.3crore/MW assuming the availability of upper<br />

reservoir and the power evacuation system<br />

Interest/returns @10%<br />

Life of the plant =35 years<br />

Depreciation (assuming straight line depreciation with<br />

10% residual value) =2.57%<br />

Operation & maintenance cost=1% of investment<br />

Then the annual returns R=B-C<br />

The annual returns for different capacities are shown below:<br />

Figure 1. Average annual returns Vs pump capacity<br />

Table 2: Pumped Storage Characteristics<br />

Efficiency 65-80%<br />

Duration of power<br />

supply<br />

Hours up to days<br />

Capacity 10MW -1GW<br />

Total capital cost<br />

2700-3300 USD/KW<br />

(upgrade<br />

600USD/KW)<br />

From the figure it is clear that the optimum capacity of pumped<br />

storage which can be installed in Peringalkkuthu station is 16<br />

MW. It can be seen that the annual returns come around 90<br />

million rupees so that the pay back period is almost 5 years. This<br />

methodology can be used to find the optimum capacity of the<br />

additional mixed pumped storage unit/units which can be<br />

augmented to any existing hydro plant where there is significant<br />

spillage during monsoon and excess storage capacity during<br />

summer.<br />

B. Determination of unit size:<br />

Determination of unit size has to take into account the<br />

possibility of full load operation in all possible cases of<br />

operation. Another point considered is regarding the availability<br />

of the unit in case of a breakdown. In consideration of<br />

these aspects, the additional 16 MW capacity can be installed as<br />

two units of 8 MW size.<br />

C. Sump reservoir capacity:<br />

The sump reservoir capacity corresponds to the maximum<br />

water that has to be stored in the sump for pumping to the main<br />

reservoir. The pumping is expected for a period which<br />

corresponds to the generation in the pumped storage mode of<br />

operation. This is assumed as 4 hours in this study. Hence, the<br />

effective sump capacity can be taken as the water equivalent<br />

corresponding to this generation. From the data of the existing<br />

station, assuming the water/energy ratio (2.86 for this plant) as<br />

almost the same as that of the existing unit, the effective storage<br />

of the sump reservoir can be determined as 0.185 MCM.<br />

V. CONCLUSION<br />

We have shown that there is a large hydro potential in many of<br />

the existing hydro plants which can be tapped easily for efficient<br />

and economic operation of power systems. Capacity addition of<br />

the station with a mixed pumped storage scheme is studied in<br />

detail in this paper. Though many studies have been made on the<br />

optimum operation of pumped storage schemes, the concept of a<br />

mixed plant and the part operation of the unit as a pure generator<br />

are not seen deliberated in detail in literatures. The cost impact<br />

is also studied with this mode of operation. The addition of<br />

capacity is ensured year round, contributing to the additional<br />

hydro requirement for effective demand side management and<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 64<br />

ISSN 2250-3153<br />

hence optimise the cost of power procurement. The proposed<br />

method is extremely simple for the system managers to adopt and<br />

implement.<br />

REFERENCES<br />

[1] V.T. Sulzberger and I. Zeinoski, "The Potential for Application of Energy<br />

Storage Capacity on Electrical Utility Systems in The United States-Part<br />

I," IEEE Transactions on Power Apparatus and Systems, Vol.PAS-95,<br />

No.6, pp. 1872-1881, November/December 1976.<br />

[2] Luongo C.A, ‗Superconducting storage systems‘, IEEETrans. Magn.,<br />

1996, 32, pp. 2214–2223<br />

[3] Mcdowall. J, ‗Conventional battery technologies-Present and future‘.<br />

Proc. 2000 IEEE Power EngineeringSociety Summer Meeting, July<br />

2000, vol. 3, pp. 1538–1540<br />

[4] Taylor.P, Johnson L, Reichart. K, Dipietro P, Philip J, Butlar .P, ―A<br />

summary of the state of the art of superconducting magnetic energy<br />

storage systems, flywheel energy storage systems, and compressed air<br />

energy storage systems‖ .SAND99-1854, Sandia National Labs, 1999<br />

[5] Ribeiro P.F, Johnson B.K, Crow M.L, Arsoy A, Liu Y , ‖Energy storage<br />

systems for advanced power applications‖, Proc.IEEE, 2001, 19, (12),<br />

pp. 1744–1756<br />

[6] S.Chakraborty, T.Senjyu, H.Toyama, A.Y.Saber.T. unabashi,<br />

―Determination methodology for optimising the energy storage size for<br />

power system‖, IET Gener. Transm. Distrib., 2009, Vol. 3, Iss. 11, pp.<br />

1987–999<br />

[7] Sheen J.N, ―Economic profitability analysis of demandside<br />

management program‖ , Energy Conversion and Management,2005, 46,<br />

(18–19), pp. 2919–2935<br />

[8] Ibrahim H,Ilinca A, Perron J, ―Energy storage systems–characteristics<br />

and comparisons‖, Renewable and Sustainable EnergyReviews, 2008,12,<br />

(5), pp. 1221–1250<br />

[9] Peter Kadar: ―Pumped Storage Hydro Plant model for educational<br />

purposees‖ ICREPQ‘ 09 International Conference on Renewable Energy<br />

and Power Qualiry; Valencia,Spain, April 15-17, 2009.<br />

[10] P.G.Latha,S.R.Anand,Imthias Ahamed,G.Madhu,‖A Different<br />

Approach on Pumped Storage Scheduling‖,AECT 2011,4 th National<br />

Conference on Advanced Energy Conversion Technologies.<br />

MIT,Manipal,India,Feb 03-05,2011<br />

[11] Market clearance price in power exchange (www.iexindia.com)<br />

[12] G Tobias Geschler,‖ Survey of energy storage options in Europe,<br />

London‖ Research International Ltd, London, March 2010.<br />

AUTHORS<br />

First Author – N. Venkateswarlu, Department of EEE<br />

Audisankara College of Engineering & Technology, Gudur,<br />

Nellore Dist.<br />

Second Author – M. Velmurugan, Department of EEE<br />

Audisankara College of Engineering & Technology, Gudur,<br />

Nellore Dist.<br />

Third Author – S.Udaya Baskar, Department of EEE<br />

Audisankara College of Engineering & Technology, Gudur,<br />

Nellore Dist.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 65<br />

ISSN 2250-3153<br />

Tamil Speech Recognition using Semi Continuous Models<br />

Abstract- In this paper novel approach for implementing Tamil<br />

Language Semi continuous speech recognition based on Hidden<br />

Markov Models is discussed. Tamil and other Indian languages<br />

share phonological features which are rich in vowel and<br />

consonant realizations. The same phone in different words has<br />

different realizations. This can be overcome by employing<br />

phone-in-context. Therefore triphone models were chosen as<br />

suitable sub-word units for acoustic training. The system is<br />

trained with speech corpus of 37 Tamil phones. Speech corpus<br />

consisted of 0.35 hours of speech. Training was done using<br />

Carnegie Mellon University (CMU)‘s SphinxTrain acoustic<br />

model Trainer. Accuracy of the training is measured by decoding<br />

using PocketSphinx.<br />

Index Terms- Speech Recognition, Tamil Phones, Acoustic<br />

Model, Hidden Markov Model, Training<br />

S<br />

I. INTRODUCTION<br />

peech is human‘s most efficient mode of communication and<br />

is an alternative to traditional methods of interaction with a<br />

computer. Beyond efficiency, humans are comfortable and<br />

familiar with speech as it is the natural mode of communication.<br />

Tamil is a Dravidian language spoken predominantly in the state<br />

of Tamilnadu in India and Sri Lanka. It is the official language of<br />

the Indian state of Tamilnadu and also has official status in Sri<br />

Lanka and Singapore [9].<br />

II. TAMIL PHONOLOGY<br />

Tamil phonology is characterised by the presence of<br />

retroflex consonants and multiple rhotics[7]. Tamil phonemes are<br />

categorized into vowels, consonants, and a secondary character,<br />

the āytam.<br />

A. Vowels<br />

With respect to orthography, vowels occur in their isolated<br />

character only in the beginning position of words. In all the other<br />

positions, such as medial and final positions, they are realized in<br />

the form of a secondary symbol.<br />

TABLE I: Tamil Vowels [5,8]<br />

S. No Vowel VL VH VF LR<br />

1. அ s l b -<br />

2. ஆ l l b -<br />

3. இ s h f -<br />

4. ஈ l h f -<br />

Hanitha Gnanathesigar<br />

Informatics Institute of Technology, Sri Lanka,<br />

5. உ s h b +<br />

6. ஊ l h c +<br />

7. ஋ s m f -<br />

8. ஌ d c - -<br />

9. ஍ d c - -<br />

10. எ s m b +<br />

11. ஏ l m c +<br />

12. ஐ d c - +<br />

VL Vowel Length (s)hort, (l)ong, (d)ipthong, sc(h)wa,<br />

(g)eminate<br />

VH Vowel Height (h)igh, (m)id, (l)ow, (c)losing, (o)pening<br />

VF Vowel Frontness front, mid, back<br />

LR Lip Rounding (+) Yes, (-) No<br />

B. Consonants<br />

There are 18 consonants in Tamil Language.<br />

஑ ஓ ட ஡ த ந<br />

ஒ ஞ ஠ ஢ ஥ ண<br />

஦ ஧ ன ஬ ஫ ப<br />

However depending on the context certain consonants are<br />

pronounced differently increasing the number of consonant<br />

phonemes to 25. Nasal consonants ஢, ண, ஠, ஒ and ஥ are<br />

pronounced variously based on the environment in which they<br />

occur. The consonants with which these nasals occur include ஡,<br />

த ட and ஑.<br />

க is pronounced 'g' after nasal consonants.<br />

Eg: அங்க஑<br />

க is pronounced 'h' between vowels and after ர் and ய்.<br />

Eg: த஑ல், ஊர்஑ள்<br />

க is pronounced 'k' in word initial position and in clusters<br />

Eg: ஑ர஧<br />

ச is pronounced 's' between vowels and optionally in word initial<br />

position<br />

Eg: ஆரஓ, சஓவ்஬ாய்<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 66<br />

ISSN 2250-3153<br />

ஓ is pronounced 'ch' in word initial position and in clusters<br />

Eg: சஓவ்஬ாய், தச்ரஓ<br />

ஓ is pronounced 'j' after nasal consonants<br />

Eg: தஞ்சு<br />

ட is pronounced D after nasal consonants and between vowels<br />

Eg: ஑஧ண்டி, ஏடம்<br />

ட is pronounced t in word initial position and in clusters<br />

Eg: ட஥ா஧ம், தட்டு<br />

஡ is pronounced dh after nasal consonants and between vowel<br />

Eg: தந்து, அது<br />

஡ is pronounced th in word initial position and in clusters<br />

Eg: ஡஥ிழ். தத்து<br />

த is pronounced b after nasal consonants and between vowels<br />

Eg: ஡ம்தி, அதா஦ம்<br />

த is pronounced p in word initial position and in clusters<br />

Eg: தடி, அப்தா<br />

TABLE II<br />

Tamil Consonants [5,8]<br />

S. No Consonant IPA TC PA CV<br />

1. ஑ k p v -<br />

2. ஑ g p v +<br />

3. ஑ h f g -<br />

4. ஒ ŋ n v +<br />

5. ஓ tʃ f p +<br />

6. ஓ s f a -<br />

7. ஓ ʝ f p +<br />

8. ஞ ɲ n p +<br />

9. ட ʈ p r -<br />

10. ட ɖ p r +<br />

11. ஠ n n a +<br />

12. ஡ t p a -<br />

13. ஡ d p a +<br />

14. ஢ ɳ n r +<br />

15. த P p b -<br />

16. த b p b +<br />

17. ஥ m n b +<br />

18. ஦ j m p +<br />

19. ஧ R t u +<br />

20. ன l m a +<br />

21. ஬ v f l +<br />

22. ஫ L m v +<br />

23. ப ɭ m r +<br />

24. ந r t a +<br />

25. ண N n u +<br />

TC Type of Consonant (n)asal, (p)losive, (f)ricative,<br />

appro(x)imant, (t)rill, flap or (t)ap, late(r)al fricative, lateral<br />

approxi(m)ant, ( l)ateral flap<br />

PA Place of Articulation (b)ilabial, (l)abio-dental, (d)ental,<br />

(a)lveolar, p(o)st-alveolar, (r)etroflex, (p)alatal, (v)elar,<br />

(u)vular, p(h)aryngeal, (e)piglottal, (g)lottal<br />

CV Consonant Voicing (+) Yes, (-) No, NA Not Applicable<br />

S.<br />

No<br />

TABLE III<br />

Tamil Phonemes<br />

ARPABET IPA Tamil<br />

1. AH ʌ அ - அம்஥ா<br />

2. AA aː ஆ - ஆம்<br />

3.<br />

4.<br />

IH ɪ இ - இது<br />

IY i ஈ - ஈ<br />

5. UH ʊ உ - உன஑ம்<br />

6. UW uː ஊ - ஊர்<br />

7. EH ɛ ஋ - ஋ண்தது<br />

8. EY əɪ ஌ - ஌ற்நம்<br />

9. AY aɪ ஍ - ஍க஦ா<br />

10. AO ɔ எ - எரு<br />

11. OH ɔː ஏ - ஏடு<br />

12. AW aʊ ஐ<br />

13. K k ஑ - அக்஑ா<br />

14. G g ஑ - அங்க஑<br />

15. HH h ஑ - த஑ல்<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 67<br />

ISSN 2250-3153<br />

16. NG ŋ ஒ - அங்க஑<br />

17. CH tʃ ஓ - தச்ரஓ<br />

18. S s ஓ - ஆரஓ<br />

19. J ʝ ஓ - தஞ்சு<br />

20. NC ɲ ஞ - தஞ்சு<br />

21. T ʈ ட - தாட்டு<br />

22. D ɖ ட - ஢ாடு<br />

23. NX n ஠ - ஑ண்<br />

24. TH t̪ ஡ - தத்து<br />

25. DH d̪ ஡ - அது<br />

26. NH ɳ ஢ - தந்து<br />

27. P P த - தத்து<br />

28. B b த - க஑ாதம்<br />

29. M m ஥ - ஥ரன<br />

30. Y j ஦ - ச஑ாய்஦ா<br />

31. RR R ஧ - ஑ர஧<br />

32. L l ன - தல்<br />

33. V v ஬ - சஓவ்஬ாய்<br />

34. Z L ஫ - ஡஥ிழ்<br />

35. LL ɭ ப - ஑டவுள்<br />

36. R r ந - ஑ரந<br />

37. N N ண - ஢ான்<br />

III. CHOICE OF SUB-WORD UNIT FOR TRAINING<br />

The number of words in Tamil is around 3 lakhs (approx.).<br />

Hence maintaining a large vocabulary is also difficult when the<br />

system needs to use Tamil[10]. For a language with large<br />

vocabulary like Tamil, training all the words adequately is<br />

problematic. Also memory requirement grows linearly with<br />

number of words. A syllable is a larger unit than a phone since it<br />

encompasses two or more phone clusters. These phone clusters<br />

account for the severe contextual effects. Tests on measuring<br />

accuracy of syllable-based Automatic Speech Recognition (ASR)<br />

reveals that the baseline results were much higher than<br />

monophone ASR and slightly worse than fine-tuned triphone<br />

ASR[2]. For both the phone and word recognition, triphone<br />

model reduced word error rate (WER) by about 50% [11]. In this<br />

scenario, when the vocabulary is high and speakers are limited,<br />

triphone based model is suitable.<br />

IV. TRAINING<br />

Hidden Markov Model based system, like all other speech<br />

recognition systems, functions by first learning the characteristics<br />

(or parameters) of a set of sound units, and then using what it has<br />

learned about the units to find the most probable sequence of<br />

sound units for a given speech signal. The process of learning<br />

about the sound units is called training. Acoustic models for<br />

Tamil language is created using SphinxTrain. SphinxTrain is<br />

CMU‘s open source acoustic model trainer[6]. It consists of a set<br />

of programs, each responsible for a well defined task and a set of<br />

scripts that organizes the order in which the programs are called.<br />

A. Transcript File<br />

The trainer also needs to be told which sound units you want<br />

it to learn the parameters of, and at least the sequence in which<br />

they occur in every speech signal in your training database. This<br />

information is provided to the trainer through transcript file. In<br />

this the sequence of words and non-speech sounds are written<br />

exactly as they occurred in a speech signal, followed by a tag<br />

which can be used to associate this sequence with the<br />

corresponding speech signal.<br />

UTAVIYI KAADCHIPADUTTUVATIL TAVARU <br />

(utt13)<br />

KURAL KADDUPAATTU URUPADI PEECINAAL<br />

MEELMEESIYI KADDUPADUTTA UTAVUM (utt14)<br />

B. Control File<br />

This file consists of name of each audio file used for training.<br />

utt1<br />

utt2<br />

utt3<br />

utt4<br />

C. Dictionary Files<br />

This file maps every word to a sequence of sound units, to<br />

derive the sequence of sound units associated with each signal.<br />

There are two dictionaries. One in which legitimate words in the<br />

language are mapped sequences of sound units and another in<br />

which non-speech sounds are mapped to corresponding nonspeech<br />

or speech-like sound units. Former is the language<br />

dictionary and the latter filler dictionary.<br />

AAYATTAM AA Y AH TH TH AH M<br />

ADIVU AH D AY V UH<br />

ADUTTA AH D UH TH TH AH<br />

SIL<br />

SIL<br />

SIL<br />

D. Phone List<br />

This tells the trainer what phones are part of the training set. It<br />

is made by listing all the above identified ARPABET phones<br />

without duplicates and arranged alphabetically.<br />

AA<br />

AH<br />

AO<br />

AY<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 68<br />

ISSN 2250-3153<br />

E. Language Model<br />

Statistical tri-gram language models were built using the Sphinx<br />

Knowledge Base Tool for a corpus of 334 sentences and 85<br />

unique words.<br />

F. Development of speech Corpus<br />

Contemporary speech recognition systems derive their power<br />

from corpus based statistical modeling, both at the acoustic and<br />

language levels. Corpus is a large collection of written or spoken<br />

texts available in machine readable form accumulated in<br />

scientific way to represent a particular variety or use of a<br />

language [4]. It serves as an authentic data for linguistic and<br />

other related studies. Statistical modeling, of course, presupposes<br />

that sufficiently large corpora are available for training. For<br />

Tamil language such corpora, particularly acoustic ones, are not<br />

immediately available for processing[3]. Therefore necessary<br />

speech corpora are developed in-house. All the utterances of the<br />

transcript files are recorded and corpus is developed based on<br />

following parameters.<br />

TABLE IV<br />

Speech Corpus Parameters<br />

Parameter Value<br />

File Type mswav<br />

File Extension Wav<br />

Sampling Rate 16 kHz<br />

Depth 16 bits<br />

Mono/Stereo Mono<br />

Feature File Extension mfc<br />

Vector Length 13<br />

G. Training of acoustic models with sphinxTrain<br />

It consists of following steps [6].<br />

1. Flat-start monophone training: Generation of monophone seed<br />

models with nominal values, and re-estimation of these models<br />

using reference transcriptions. This is also called flat<br />

initialization of CI model parameters.<br />

2. Baum-Welch training of monophones: Adjustment of the<br />

silence model and re-estimation of single-Gaussian monophones<br />

using the standard Viterbi alignment process.<br />

3. Triphone creation: Creation of triphone transcriptions from<br />

monophone transcriptions and initial triphone training. This step<br />

creates CD untied model files and flat initialization of model<br />

files.<br />

4. Training CD untied models: Again the Baum-Welch algorithm<br />

is iteratively used. This takes 6 – 10 iterations.<br />

5. Building decision trees and parameter sharing: A group of<br />

similar states is called a senone. Senone is also called as a tied<br />

state. Then the senones are trained.<br />

6. Mixture generation: Split single Gaussian distributions into<br />

mixture distributions using an iterative divide-by-two clustering<br />

algorithm and re-estimation of triphone models with mixture<br />

distributions.<br />

H. Decoding<br />

PocketSphinx, CMU‘s fastest speech recognition system is<br />

used to for decoding. It‘s a library written in pure C which is<br />

optimal for development of C applications as well as for<br />

development of language bindings. At real time speed it‘s the<br />

most accurate engine, and therefore it is a good choice for live<br />

applications. Also it includes support for embedded devices with<br />

fixed-point arithmetic. This is built on top of Sphinx3[1]. The<br />

results are tabulated in the following table.<br />

Type of<br />

Data<br />

Trained<br />

Corpus<br />

Test<br />

corpus<br />

Trained<br />

Corpus<br />

Test<br />

Corpus<br />

TABLE V<br />

Results – Error Rate<br />

Hours of No. of Sentence Word<br />

Training Segmen Error Error<br />

ts Rate Rate<br />

0.17 (10 167 81.4% 89.9%<br />

min)<br />

(136/167) (283/316)<br />

0.17 (10 133 97.7% 100.4%<br />

min)<br />

(130/133) (252/251)<br />

0.35 (21 334 1.8% 0.9%<br />

min)<br />

(6/334) (6/632)<br />

0.35 (21 7 57.1(4/7) 46.1%(11<br />

min)<br />

/26)<br />

I. Results<br />

Word error rate (WER) is calculated as<br />

S D I<br />

WER <br />

N<br />

where<br />

S is the number of substitutions,<br />

D is the number of the deletions,<br />

I is the number of the insertions,<br />

N is the number of words in the reference.<br />

Word accuracy (WAcc) is calculated as<br />

N S D I<br />

WAcc 1<br />

WER<br />

N<br />

TABLE VII<br />

Results – Word Accuracy<br />

Type of Hours of No. of Word<br />

Data Training Segments Accuracy Rate<br />

Trained<br />

Corpus<br />

0.17 (10 min) 167 10.1%<br />

Test<br />

corpus<br />

0.17 (10 min) 133 -0.4%<br />

Trained 0.35 (21 min) 334 99.1%<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 69<br />

ISSN 2250-3153<br />

Corpus<br />

Test<br />

Corpus<br />

0.35 (21 min) 7 53.9%<br />

V. CONCLUSION<br />

37 phonemes are identified in Tamil Language. Of which 12<br />

are vowels and 25 consonants. Acoustic model training for semi<br />

continuous models was performed using SphinxTrain. Results of<br />

the Decoding carried out by PocketSphinx shows that the<br />

accuracy was higher for trained corpus in compare to test corpus.<br />

Though only little amount of Training was performed it is<br />

observed that accuracy improved tremendously with increased<br />

training.<br />

REFERENCES<br />

[1] Carnegie Mellon University, (2010). Pocketsphinx. [<strong>Online</strong>] Available<br />

from: http://cmusphinx.sourceforge.net/wiki/versions [Accessed 16 January<br />

2011].<br />

[2] Hejtmánek, J. A. P., T., (2008). Automatic speech recognition using<br />

context-dependent syllables. 9th International PhD Workshop on Systems<br />

and Control: Young Generation Viewpoint. Izola, Slovenia.<br />

[3] Ganesh, K. M., Subramanian, S.(2002). Interactive Speech Translation in<br />

Tamil. College of<br />

Technology, Peelamedu.<br />

[4] Ganesan, M. (n.d). Tamil Corpus Generation and Text Analysis. Annamalai<br />

University<br />

[5] IPA, (2005). ―The International Phonetic Association (revised to 2005) IPA<br />

Chart.‖ [<strong>Online</strong>]. Available:<br />

http://www.langsci.ucl.ac.uk/ipa/IPA_chart_(C)2005.pdf<br />

[6] Singh, R. (2000). SphinxTrain Documentation [<strong>Online</strong>]. Available at<br />

[Accessed 02<br />

January 2011].<br />

[7] Schiffman, Harold F.; Arokianathan, S. (1986). "Diglossic variation in<br />

Tamil film and fiction". In Krishnamurti, Bhadriraju; Masica, Colin P..<br />

South Asian languages: structure, convergence, and diglossia. New Delhi:<br />

Motilal Banarsidass. pp. 371–382. ISBN 8120800338. at p. 371<br />

[8] Schiffman, Harold F.; Arokianathan, S. (1999). "A reference grammar of<br />

spoken Tamil‖ [<strong>Online</strong>]. Available<br />

:http://books.google.com/books?id=Oqe-<br />

QsaZnnQC&lpg=PP1&pg=PP1#v=onepage&q&f=false<br />

[9] Thangarajan, R., Nagarajan,A.M., Selvam, M., (2008). Word and triphone<br />

based approaches in<br />

continuous speech recognition for Tamil language. WSEAS Transactions<br />

on signal processing, 4, 76-85.<br />

[10] Thilak, R. A., Madharaci, R. (2004). Speech Recognizer for Tamil<br />

Language. Tamil Internet<br />

2004,Singapore.<br />

[11] Lee, K., (1990). Context-Dependent Phonetic Hidden Markov Models for<br />

Speaker-Independent Continuous Speech Recognition., Carnegie Mellon<br />

University.<br />

AUTHORS<br />

Hanitha Gnanathesigar, BSc (Hons) Software Engineering,<br />

Informatics Institute of Technology (IIT), Sri Lanka,<br />

ghanitha@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 70<br />

ISSN 2250-3153<br />

Complex Dynamics in a Mathematical Model of Tumor<br />

Growth with Time Delays in the Cell Proliferation<br />

M. Saleem and Tanuja Agrawal<br />

Department of Applied Mathematics, Z. H. College of Engineering & Technology,<br />

A.M.U, Aligarh (UP) 202002, India<br />

Abstract- In this paper, a simple prey-predator type model for<br />

the growth of tumor with discrete time delay in the immune<br />

system is considered. It is assumed that the resting and hunting<br />

cells make the immune system. The present model allows delay<br />

effects in the growth process of the hunting cells. Qualitative and<br />

numerical analyses for the stability of equilibriums of the model<br />

are presented. Length of the time delay that preserves stability is<br />

given. It is found that small delays guarantee stability at the<br />

equilibrium level (stable focus) but the delays greater than a<br />

critical value may produce periodic solutions through Hopf<br />

bifurcation and larger delays may even lead to chaotic attractors.<br />

Implications of these results are discussed.<br />

Index Terms- tumor growth, prey-predator model, immune<br />

system, time delay.<br />

I<br />

I. INTRODUCTION<br />

t is well known that the cancer is one of the greatest killers in<br />

the world and the control of tumor growth requires great<br />

attention. The development of a cancerous tumor is complex and<br />

involves interaction of many cell types. Main components of<br />

these cells are tumor cells (or abnormal cells also known as bad<br />

cells) and immune and healthy tissue cells (or normal cells also<br />

known as good cells).<br />

A tumor is a dynamic nonlinear system in which bad cells<br />

grow, spread and eventually overwhelm good cells in the body.<br />

The form of the dynamic nonlinear system modeling the cancer<br />

and the class of the equations which describe such a system are<br />

related to the scaling problem. Indeed, there are three natural<br />

scales which are connected to different stages of the disease and<br />

have to be identified. The first is the sub-cellular (or molecular)<br />

scale, where one focuses on studying the alterations in the<br />

genetic expressions of the genes contained in the nucleus of a<br />

cell. As a result of this some special signals which are received<br />

by the receptors on the cell surface are transmitted to the cell<br />

nucleus. The second is the cellular scale, which is an<br />

intermediate level between the molecular scale and the<br />

macroscopic scale to be described in the following. The third is<br />

the macroscopic scale, where one deals with heterogeneous<br />

tissues. In the heterogeneous tissues, some of the layers (e.g. the<br />

external proliferating layer, the intermediate layer and the inner<br />

zone with necrotic cells) constituting the tumor may occur as<br />

islands. This leads to a tumor comprising of multiple regions of<br />

necrosis engulfed by tumor cells in a quiescent or proliferative<br />

state [1]. In case of macroscopic scale, the main focus is on the<br />

interaction between the tumor and normal cells (e.g., immune<br />

cells and blood vessels) in each of the three layers. For more<br />

details about description of the scaling problem and the passage<br />

from one scale to another, one may refer to Bellomo et al. [1, 2].<br />

A great research effort is being devoted to understand the<br />

interaction between the tumor cells and the immune system.<br />

Mathematical models using ordinary, partial, and delay<br />

differential equations [3] play an important role in understanding<br />

the dynamics and tracking the tumor and immune system<br />

populations over time.<br />

Many authors have used mathematical models to describe the<br />

interaction among the various components of tumor<br />

microenvironment, (see de Boer et al. [4], Goldstein et al. [5], de<br />

Pillis et al. [6] and Kronic et al. [7]). These papers mainly deal<br />

with immune response to tumor growth. In the last few years a<br />

great deal of human and economical resources is devoted to<br />

cancer research with a view to develop different control<br />

strategies and drug therapies with main emphasis on<br />

experimental aspects and immunology (see Aroesty et al. [8],<br />

Eisen [9], Knolle [10], Murray [11], Adam [12], Adam and<br />

Panetta [13], Owen and Sherrat [14], de Pillis et al. [15], Dingli<br />

et al. [16] and Menchen et al. [17]). There are many existing<br />

reviews of mathematical models of tumor growth and tumor<br />

immune system interactions such as Bellomo and Preziosi [18],<br />

Araujo and McElwain [19], Nagy [20], Byrne et al. [21],<br />

Castiglione and Piccoli [22], Martins et al. [23], Roose et al. [24],<br />

Chaplain [25] and Bellomo et al. [26]. Some of these reviews<br />

follow a historical approach (Araujo and McElwain [19]) while<br />

others focus on multi-scale modeling or on particular aspects of<br />

tumor evolution Bellomo and Preziosi [18], Martins et al. [23]<br />

and Bellomo et al. [26]). Recently, Bellomo et al. [27] study the<br />

competition between tumor and immune cells modeled by a<br />

nonlinear dynamical system which identifies the evolution of the<br />

number of cells belonging to different interacting populations<br />

such as tumor and immune cells at different scales namely<br />

molecular, cellular and macroscopic. Bellomo and Delitala) [28]<br />

have applied the methods of the classical mathematical kinetic<br />

theory for active particles to study the immune competition with<br />

special attention to cancer phenomena. They mainly focus on<br />

modeling aspects of the early stage of cancer onset and<br />

competition with the immune system.<br />

Several authors have used the concept of prey-predator type<br />

interactions in tumor studies where in general the immune cells<br />

play the role of predator and the tumor cells that of prey (see<br />

Kuznetsov et al. [29], Kirschner and Panetta [30], Sarkar and<br />

Banerjee [31], and El-Gohary [32]). These are mainly ordinary<br />

differential equation models which certainly provide a simpler<br />

framework within which to explore the interactions among tumor<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 71<br />

ISSN 2250-3153<br />

cells and the different types of immune and healthy tissue cells.<br />

Kuznetsov et al. [29] study nonlinear dynamics of immunogenic<br />

tumors with emphasis on parameter estimation and global<br />

bifurcation analysis. Immunotherapy of tumor-immune<br />

interaction has been studied by Kirschner and Panetta [30]. They<br />

indicated that the dynamics between tumor cells, immune cells,<br />

and IL-2 can explain both short-term oscillations in tumor size as<br />

well as long-term tumor relapse. Sarkar and Banerjee [31]<br />

discuss self-remission and tumor stability by taking stochastic<br />

approach.<br />

The delay differential equations have long been used in<br />

modeling cancer phenomena [33, 34, 35, 36, 37, 38, 39]. Byrne<br />

[40] considers the effect of time delay on the dynamics of<br />

avascular tumor growth by incorporating a time-delayed factor<br />

into the net proliferation rate of the cells. Buric et al. [41]<br />

consider the effects of time delay on the two-dimensional system<br />

which represents the basic model of the immune response. They<br />

study variations of the stability of the fixed points due to time<br />

delay and the possibility for the occurrence of the chaotic<br />

solutions. Recently Fory‘s and Kolev [42] propose and study the<br />

role of time delay in solid avascular tumor growth. They study a<br />

delay model in terms of a reaction-diffusion equation and mass<br />

conservation law. Two main processes are taken into account i.e.<br />

proliferation and apoptosis. Galach [43] studies a simplified<br />

version of the Kuznetsov-Taylor model where immune reactions<br />

are described by a bilinear term with time delay. Yafia [44]<br />

analyzes an interaction between the proliferating and quiescent<br />

cells tumor with a single delay. He shows the occurrence of Hopf<br />

bifurcation as the delay crosses some critical value.<br />

Recently, El-Gohary [32] studied a cancer selfremission<br />

and tumor system and provided optimal control<br />

strategies that made its unstable steady states asymptotically<br />

stable. In the present paper, we introducing a model with<br />

constant time delay T in the growth rate of the hunting cells of<br />

the immune system. This model while on one hand incorporates<br />

certain thresholds which may be helpful to control the tumor cell<br />

growth; on the other hand it hints at the complex dynamics that a<br />

tumor may have. It may be mentioned here that by representing<br />

tumor growth with ordinary differential equations we indeed<br />

operate in the present study at the super-macroscopic scale while<br />

the link with the lower cellular scale is represented by the delay.<br />

Of course, we do not consider heterogeneity, mutations and link<br />

with the lower molecular scale in the present paper (for details<br />

one may see [27, 28, 45, 46]).<br />

II. THE MODEL AND EQUILIBRIUM SOLUTIONS<br />

In this paper, we shall study the dynamical behaviors of a<br />

simple prey-predator type model for the growth of tumor with<br />

discrete time delay in the immune system. We are assuming<br />

that there is a constant time delay since the time resting cells<br />

give signal to hunting cells for activation and the mature<br />

hunting cells are ready to kill the tumor cells. More<br />

specifically, we incorporate the growth term in equation (2.1b)<br />

by . The model developed consists of<br />

the following three equations:<br />

(2.1)<br />

In (2.1), different variables and parameters have the following<br />

interpretations:<br />

, , : Densities of tumor cells, hunting predator cells and<br />

resting cells at time<br />

: Growth rate of tumor cells<br />

: Rate of killing of tumor cells by hunting cells<br />

: Specific loss rates of the tumor cells<br />

:Conversion rate of the resting cells to hunting predator cells<br />

: Specific loss rates of the hunting predator cells<br />

: Rate of killing of hunting predator cells by tumor cells<br />

: Growth rate of resting cells<br />

:Conversion rate of the resting cells to hunting predator cells<br />

: Specific loss rates of the resting cells<br />

: Rate of killing of resting cells by tumor cells<br />

Equating the right hand side of (2.1) to zero the following<br />

equilibrium points can be obtained.<br />

1. The first equilibrium state is given by<br />

2. The second equilibrium state is given by<br />

, always exist<br />

We can easily observe that this equilibrium state is positive if<br />

and therefore it will be biologically feasible if<br />

this condition is satisfied.<br />

3. The first equilibrium state is given by<br />

where<br />

,<br />

and<br />

where<br />

Let<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 72<br />

ISSN 2250-3153<br />

If<br />

Under the biologically feasible conditions as<br />

and (2.2)<br />

III. LINEAR STABILITY ANALYSIS<br />

3.1 Stability with delay (i.e. )<br />

Assuming small deviations around the equilibrium<br />

such that , the linearized system<br />

of the model (2.1) becomes<br />

(3.1)<br />

In the case of a positive delay , the characteristic<br />

equation for this system can be written as<br />

where<br />

such that<br />

and<br />

(3.2)<br />

Now substituting (where is positive) in equation (3.2)<br />

and separating the real and imaginary parts, we obtain the<br />

following system of transcendental equations<br />

(3.3)<br />

(3.4)<br />

Squaring and adding (3.3) and (3.4), we get<br />

which can be simplified to<br />

where<br />

Equation (3.5) can be written as a cubic<br />

with .<br />

(3.5)<br />

(3.6)<br />

For parameter values such that is positive, the simplest<br />

assumption that (3.6) will have a unique positive root is<br />

. Since is positive, it requires that<br />

for to be negative. Hence, it can be said that<br />

there is a unique positive root say of (3.6). Denoting<br />

, it follows that the characteristic equation (3.2) has a<br />

pair of purely imaginary roots of the form . Eliminating<br />

from (3.3) and (3.4), we get<br />

Then corresponding to is given by<br />

Since is stable for , it implies from Freedman and<br />

Rao[47] that remains stable for .<br />

3.2 Estimation of the length of delay to preserve stability<br />

(3.7)<br />

Let us consider the system (2.1). Taking the Laplace transform<br />

of this system, we get<br />

,<br />

where<br />

.<br />

Following lines of Erbe et al. [48] and using the Nyquist criterion<br />

(Freedman and Rao[47]), it can be shown that the sufficient<br />

conditions for the local asymptotic stability of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 73<br />

ISSN 2250-3153<br />

are given by<br />

(3.8)<br />

(3.9)<br />

where<br />

and is the smallest positive root of (3.8).<br />

Inequality (3.8) and the equation (3.9) can alternatively be<br />

written as<br />

(3.10)<br />

(3.11)<br />

Now if equations (3.10) and (3.11) are satisfied simultaneously,<br />

they are sufficient conditions to guarantee stability. These are<br />

now used to get an estimate to the length of the time delay. The<br />

aim is to find an upper bound to , independent of , from<br />

(3.11) and then to estimate so that (3.10) holds true for all<br />

values of such that and hence, in particular, at<br />

.<br />

Equation (3.11) is rewritten as<br />

Maximizing the right hand side of (3.12)<br />

Subject to<br />

we obtain<br />

Hence if<br />

then clearly from (3.13) we have .<br />

From (3.10) we obtain<br />

(3.12)<br />

(3.13)<br />

. (3.14)<br />

Since is locally asymptotically stable for<br />

the inequality (3.14) will continue to hold for sufficiently<br />

small . Using (3.12), (3.14) can be rearranged as<br />

(3.15)<br />

Using the bounds<br />

and<br />

we obtain from (3.14)<br />

where<br />

Hence, if<br />

then for the Nyquist criterion holds true and<br />

estimates the maximum length of the delay preserving the<br />

stability.<br />

IV. NUMERICAL SIMULATION<br />

The purpose of this section is to illustrate dynamics of the<br />

model (2.1) numerically with variation in the delayed responses<br />

of the immune system. For this purpose we consider the<br />

following set of parameters<br />

which satisfies the biologically feasible conditions. For this set,<br />

the positive equilibrium of the model (2.1) is<br />

. It can be seen that for these<br />

parameter values the coefficients of the cubic (3.6) are such that<br />

and . It guarantees that the cubic (3.6) has a<br />

unique positive root. It turns out from (3.7) that and<br />

the stability result of section 2 yields that the positive equilibrium<br />

of model (2.1) is stable for such that . For<br />

, Figure 1 illustrates the approach of the trajectory of<br />

the model (2.1) to the equilibrium .<br />

resting predator cells<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

4<br />

3<br />

2<br />

hunting predator cells<br />

1<br />

0<br />

0.4<br />

0.6<br />

0.8<br />

1<br />

tumor cells<br />

Figure 1: Three-dimensional phase portrait depicting stable<br />

dynamics of the model (2.1) for . The trajectory spirals<br />

and approaches to starting from the initial<br />

point .<br />

Indeed the existence of as unique root of (3.5) implies<br />

that there exists a pair of pure imaginary eigen values that<br />

satisfies the characteristic equation (3.2) corresponding to the<br />

delay value . It thus follows that as increases from zero and<br />

,<br />

.<br />

1.2<br />

1.4<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 74<br />

ISSN 2250-3153<br />

crosses a Hopf bifurcation occurs meaning thereby an<br />

initiation of periodic solution(s). One such periodic solution<br />

(limit cycle) of the model (2.1) is shown to exist for in<br />

Figure 2.<br />

resting predator cells<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

4<br />

3<br />

2<br />

hunting predator cells<br />

1<br />

0<br />

0.4<br />

0.6<br />

0.8<br />

1<br />

tumor cells<br />

Figure 2: Limit cycle solution of the model (2.1) for<br />

starting from the initial point .<br />

It has been well known from ecological model results<br />

(McDonald [50], Cushing [51], May [52]), especially for models<br />

with prey-predator type interactions, that while small delays help<br />

stability large delays in the growth response of the species may<br />

cause instability. In order to check if such possibility of<br />

instability of equilibrium occurs for this model also, we<br />

integrated model (2.1) numerically for large values of delay . It<br />

has been quite interesting to note that for large values of delay ,<br />

model (2.1) showed irregular pattern in time series for each cell<br />

population. The fact that these irregular patterns are indeed<br />

chaotic in nature giving rise to chaotic attractors is confirmed by<br />

the sensitivity of the solutions to initial conditions. We present<br />

here only two illustrations of chaotic attractors for and<br />

in Figures 3 and 4 respectively.<br />

populations<br />

8<br />

7<br />

6<br />

5<br />

4<br />

3<br />

2<br />

1<br />

0<br />

( a )<br />

-1<br />

0 100 200 300 400 500<br />

time<br />

600 700 800 900 1000<br />

1.2<br />

tumor cells<br />

hunting predator cells<br />

resting predator cells<br />

1.4<br />

resting predator cells<br />

hunting predator cells<br />

resting predator cells<br />

-0.5<br />

8<br />

tumor cells<br />

1<br />

0.5<br />

0<br />

6<br />

4<br />

hunting predator cells<br />

2<br />

1<br />

2<br />

0<br />

0<br />

( b )<br />

( c )<br />

0.5<br />

tumor cells<br />

0<br />

0 100 200 300 400 500 600 700 800 900 1000<br />

10<br />

5<br />

0<br />

0 100 200 300 400 500 600 700 800 900 1000<br />

1<br />

0<br />

-1<br />

0 100 200 300 400 500<br />

time<br />

600 700 800 900 1000<br />

Figure 3: (a) Time series solution of the model (2.1) for<br />

(b) Corresponding chaotic attractor in the phase space (c)<br />

Sensitivity of solution to initial conditions:<br />

for both types of curves but for solid curve (i.e. on the<br />

attractor) and for dashed curve.<br />

populations<br />

8<br />

7<br />

6<br />

5<br />

4<br />

3<br />

2<br />

1<br />

0<br />

( a )<br />

-1<br />

0 100 200 300 400 500<br />

time<br />

600 700 800 900 1000<br />

1<br />

tumor cells<br />

hunting predator cells<br />

resting predator cells<br />

1.5<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 75<br />

ISSN 2250-3153<br />

resting predator cells<br />

tumor cells<br />

resting predator cells<br />

hunting predator cells<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

-0.2<br />

10<br />

5<br />

hunting predator cells<br />

0<br />

-5<br />

0<br />

( b )<br />

0.5<br />

tumor cells<br />

( c )<br />

1.5<br />

1<br />

0.5<br />

0<br />

0 100 200 300 400 500 600 700 800 900 1000<br />

5<br />

0<br />

0 100 200 300 400 500 600 700 800 900 1000<br />

1<br />

0.5<br />

0<br />

0 100 200 300 400 500<br />

time<br />

600 700 800 900 1000<br />

Figure 4: (a) Time series solution of the model (2.1) for<br />

(b) Corresponding chaotic attractor in the phase space (c)<br />

Sensitivity of solution to initial conditions:<br />

for both types of curves but for solid curve and<br />

for dashed curve.<br />

V. CONCLUSION<br />

The response of the tumor diseases to treatment depends<br />

upon many factors including the severity of the tumor, the<br />

application of the treatment and most importantly the patient‘s<br />

immune response. Tumor cells are characterized by a vast<br />

number of genetic and epigenetic events leading to the<br />

appearance of specific antigens called neo antigens triggering<br />

antitumor activity by the immune system (Gohary [53],<br />

d‘Onofrio [54]). Though this paper does not deal directly with<br />

any external treatment of the tumor but of course it focuses on<br />

the indirect treatment aspects of the disease by looking into the<br />

role of the immune system if it does not get triggered<br />

immediately but shows delayed responses. With this in mind, we<br />

modify the model of El-Gohary [32] to incorporate time delayed<br />

responses of the immune system through the growth mechanism<br />

of the hunting cells and some other terms. It is assumed that<br />

hunting cells do not respond to killing of tumor cells as soon as<br />

they get signal from resting cells but they get activated after a<br />

constant time delay . As has been mentioned in the<br />

introduction, the model of this paper represents a link between<br />

the super-macro scale (in terms of ordinary differential<br />

equations) and the lower cellular scale (in terms of delay).<br />

The dynamics and the stability results of the model show three<br />

main patterns of solutions: (i) stable equilibrium (ii) limit cycle<br />

1<br />

1.5<br />

solution (iii) chaotic attractor. More specifically, it is found that<br />

when hunting cells are either all time-alert ( or alert<br />

enough ( all three cell populations approach to<br />

equilibrium values and the tumor can be said to be nonmalignant.<br />

For averagely-alert hunting cells (i.e. when or slightly<br />

greater than ), all the three cell populations may coexist in a<br />

limit cycle or periodic solution. In this case, the tumor can be<br />

termed as mildly malignant. The existence of periodic solutions<br />

is relevant in cancer models. It implies that the tumor levels may<br />

oscillate around a fixed point even in the absence of any<br />

treatment. Such a phenomenon, known as Jeff‘s phenomenon or<br />

self-regression of tumor [49], has been observed clinically. When<br />

the hunting cells play too lethargic in their response to killing of<br />

tumor cells (i.e. when is large enough), all the three cell<br />

populations may grow in an irregular fashion with time leading<br />

to chaotic attractors. This is indeed the case when the tumor can<br />

be said to be malignant and it is the case where a serious<br />

treatment strategy is required because of continuously changing<br />

density of tumor cells all the time.<br />

It is well known from ecological-model results that large<br />

delays cause instability of equilibriums. Thus one can say that<br />

the results of the present model are on the known lines but we<br />

feel that instability in the form of chaotic attractors in cancer<br />

modeling is quite an interesting observation of this study linking<br />

super macro scale to lower cellular scale. The allowable time<br />

delay for activation of the immune system and the estimation of<br />

the length of delay to preserve stability may be the two important<br />

parameters that may help decide the mode of action for<br />

controlling the disease.<br />

ACKNOWLEDGMENT<br />

The author MS acknowledges the financial support of<br />

the UGC, New Delhi for this work under the Project No. 37-<br />

483/2009(SR).<br />

REFERENCES<br />

[1] N. Bellomo, N. Li, P. K. Maini, On the foundations of cancer modelling:<br />

Selected topics, speculations, and perspectives, Math. Models Methods<br />

Appl. Sci. 18 (2008) 593–646.<br />

[2] N. Bellomo, A. Bellouquid, J. Nieto, J. Soler, Multiscale biological tissue<br />

models and fluxlimited chemotaxis from binary mixtures of multicellular<br />

growing systems, Math. Models Methods Appl. Sci. 20 (2010) 1179–1207.<br />

[3] F. Rihan, Delay differential models in dynamic diseases, The Proceedings<br />

of the International Conference on Bioinformatics and Computational<br />

Biology - Hawaii, USA (2) (2010) 73–79.<br />

[4] R. de Boer, P. Hoogeweg, H. Dullens, R. de Weger, and W. Den Otter,<br />

Macrophage T lymphocyte interactions in the anti-tumor immune response:<br />

a mathematical model. J. Immunol., 134, no. 4,1985, 2748–2758.<br />

[5] B. Goldstein, J. Faeder, and W. Hlavacek, Mathematical and computational<br />

models of immune receptor signaling. Nat. Rev. Immunol., 4, no. 6, 2004,<br />

445–456.<br />

[6] L. de Pillis, A. Radunskaya, and C. Wiseman, A validated mathematical<br />

model of cell-mediated immune response to tumor growth. Cancer Res.,<br />

65, no. 17, 2005, 7950–7958.<br />

[7] N. Kronik, Y. Kogan, V. Vainstein, and Z. Agur, Improving alloreactive<br />

CTL immunotherapy for malignant gliomas using a simulation model of<br />

their interactive dynamics. Cancer Immunol. Immunother., 57, 2008, 425-<br />

439.<br />

[8] J. Aroesty, T. Lincoln, N. Shapiro, and G. Boccia, Tumor growth and<br />

chemotherapy: Mathematical methods,computer simulations, and<br />

experimental foundations,‖ Mathematical Biosciences, Vol. 17, 1973, pp.<br />

243-300.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 76<br />

ISSN 2250-3153<br />

[9] M. Eisen, Mathematical models in cell biology and cancer chemotherapy,<br />

Springer-Verlag. Berlin, 1979.<br />

[10] H. Knolle, Cell kinetic modelling and the chemotherapy of cancer,<br />

Springer-Verlag, Berlin, 1988.<br />

[11] J. M. Murray, Optimal control for a cancer chemotherapy problem with<br />

general growth and loss functions, Mathematical Biosciences. An<br />

International Journal, 98, no. 2, 1990, 273-287.<br />

[12] J. A. Adam, The dynamics of growth-factor-modified immune response to<br />

cancer growth: One-dimensional models, Mathematical and Computer<br />

Modelling, 17, no. 3, 1993, 83-106.<br />

[13] J. A. Adam, and J. Panetta, A simple mathematical model and ;alternative<br />

paradigm for certain chemotherapeutic regimens, Mathematical and<br />

Computer Modelling, 22, no. 8, 1995, 4940.<br />

[14] M. Owen, and J. Sherratt, Modelling the macrophage invasion of tumours:<br />

Effects on growth and composition, IMA Journal of Mathematics Applied<br />

in Medicine and Biology, 15, 1998, 165-185.<br />

[15] L. G. De Pillis, and A.E. Radunskaya, A mathematical tumor model with<br />

immune resistance and drug therapy: an optimal control approach, Journal<br />

of Theoretical Medicine, Vol. 3, 2001, pp. 79-100.<br />

[16] D. Dingli, M. Cascino, K. Josic, S. Russell, and Z. Bajzer, Mathematical<br />

modeling of cancer radiovirotherapy. Math Biosci., 199, 2006, 55-78.<br />

[17] S. A. Menchón, R. A. Ramos, and C. A. Condat, Modeling subspecies and<br />

the tumor-immune system interaction: steps toward understanding therapy.<br />

Phys A Stat Mech Appl., 386, no.2, 2007, 713–9.<br />

[18] N. Bellomo, and L. Preziosi, Modelling and mathematical problems related<br />

to tumor evolution and its interactions with the immune system. Math.<br />

Comput. Model., 32, 2000, 413–452.<br />

[19] R. Araujo, and D. McElwain, A history of the study of solid tumor growth:<br />

the contribution of mathematical modeling. Bull. Math. Biol., 66, 2004,<br />

1039–1091.<br />

[20] J. Nagy, The ecology and evolutionary biology of cancer: a review of<br />

mathematical models of necrosis and tumor cells diversity. Math. Biosci.<br />

Eng., 2, no. 2, 2005, 381–418.<br />

[21] H. Byrne, T. Alarcon, M. Owen, S. Webb, and P. Maini, Modeling aspects<br />

of cancer dynamics: a review. Philos. Trans. R. Soc. A, 364, 2006, 1563–<br />

1578.<br />

[22] [22] F. Castiglione, and B. Piccoli, Cancer immunotherapy, mathematical<br />

modeling and optimal control. Journal of Theoretical Biology, Vol. 247,<br />

2007, pp. 723-732.<br />

[23] M. Martins, S. C. Jr. Ferreira, and M. Vilela, Multiscale models for the<br />

growth of avascular tumors. Phys. Life Rev., 4, 2007, 128–156.<br />

[24] T. Roose, S. Chapman, and P. Maini, Mathematical models of avascular<br />

tumor growth. SIAM Rev., 49, no.2,2007, 179–208.<br />

[25] M. Chaplain, Modelling aspects of cancer growth: insight from<br />

mathematical and numerical analysis and computational simulation. In<br />

Lecture notes in mathematics: Vol. 1940. Multiscale problems in the life<br />

sciences (pp. 147–200). Berlin: Springer, 2008.<br />

[26] N. Bellomo, N. Li, and P. Maini, On the foundations of cancer modeling:<br />

selected topics, speculations, and perspectives. Math. Mod. Methods Appl.<br />

Sci., 18, no. 4, 2008, 593–646.<br />

[27] N. Bellomo, , A. Bellouquid, J. Nieto, and J. Soler, Multiscale biological<br />

tissue models and unlimited chemotaxis from binary mixtures of<br />

multicellular growing systems. Math. Models Methods Appl. Sci., 20 ,<br />

2010, 1179-1207.<br />

[28] N. Bellomo and N. Delitala, From the mathematical kinetic, and stochastic<br />

game theory to modelling mutations, onset, progression and immune<br />

competition of cancer cells, Phys Life Rev. 5, 6, 2008, 183–206.<br />

[29] V. Kuznetsov, I. Makalkin, M. Taylor, and A. Perelson, Nonlinear<br />

dynamics of immunogenic tumors: parameter estimation and global<br />

bifurcation analysis, Bulletin of Mathematical Biology, Vol. 56, no. 2,<br />

1994, pp. 295- 321.<br />

[30] D. Kirschner, and J.C. Panetta, Modeling immunotherapy of the tumorimmune<br />

interaction, Journal of Mathematical Biology, 37, no. 3, 1998, 235-<br />

52.<br />

[31] R. Sarkar, and S. Banerjee, Cancer and self remission and tumor stability, a<br />

stochastic approach. Math Biosci., 169, 2005, 65-81.<br />

[32] A. El-Gohary, Chaos and optimal control of cancer self-remission and<br />

tumor system steady states. Chaos, Solitons & Fractals, 37, no. 5,2008,<br />

1305-16.<br />

[33] M. Bodnar, U. Forys, J. Poleszczuk, Analysis of biochemical reactions<br />

models with delays, J. Math. Anal. Appl. 376 (1), 2011, 74–83.<br />

[34] U. Forys, Multi-dimensional lotka-volterra systems for carcinogenesis<br />

mutations, Math. Methods Appl. Sci. 32 (17), 2009, 2287–2308.<br />

[35] U. Forys, M. Bodnar, J. Poleszczuk, Negativity of delayed induced<br />

oscillations in a simple linear dde, Appl. Math. Letters 24 (6), 2011, 982–<br />

986.<br />

[36] J. Miekisz, J. Poleszczuk, M. Bodnar, U. Forys, Stochastic models of gene<br />

expression with delayed degradation, Bull. Math. Biol. 73 (9), 2011, 2231–<br />

2247.<br />

[37] M. Piotrowska, U. Forys, Analysis of the hopf bifurcation for the family of<br />

angiogenesis models, J. Math. Anal. Appl. 382 (1), 2011, 180–203.<br />

[38] M. Piotrowska, U. Forys, The nature of hopf bifurcation for the gompertz<br />

model with delays, Math. Comput. Model. 54, 2011, 9–10.<br />

[39] J. Poleszczuk, M. Bodnar, U. Forys, New approach to modeling of<br />

antiangiogenic treatment on the basis of Hahnfeldt et al. model, Math.<br />

Biosc. Eng. 8 (2), 2011, 591–603.<br />

[40] H.M. Byrne, The effect of time delay on the dynamics of avascular tumor<br />

growth, Math. Biosci., 144(2), pp. 83–117, 1997.<br />

[41] N. Buric, M. Mudrinic, N. Vasovic, Time delay in a basic model of the<br />

immune response, Chaos, Solitons and Fractals 12 (2001) 483-489<br />

[42] U. Fory´s and M. Kolev, ―Time delays in proliferation and apoptosis for<br />

solid avascular tumor,‖Prep. institute of applied mathematics and<br />

mechanics, rw02-10 (110), Warsaw University, 2002.<br />

[43] M. Gałach, Dynamics of the tumor-immune system competition—the effect<br />

of time delay, International Journal of Applied Mathematics and Computer<br />

Science 13 (2003), no. 3, 395–406.<br />

[44] R. Yafia, Dynamics Analysis and Limit Cycle in a Delayed Model for<br />

Tumor Growth with Quiescence, Nonlinear Analysis: Modelling and<br />

Control, 2006, Vol. 11, No. 1, 95–110<br />

[45] J. Paulsonn, Models of stochastic gene expression, Physics of Life Reviews<br />

2, 2005, 157–175.<br />

[46] E. Gabetta, E. Ragazzini, About the gene families size distribution in a<br />

recent model of genome evolution, Math. Models Methods Appl. Sci. 10,<br />

2010, 1005 – 1020.<br />

[47] H. I. Freedman and V. S. H. Rao, The trade-off between mutual<br />

interference and time lags in predator-prey systems, Bulletin of<br />

Mathematical Biology 45, no. 6, 1983, 991–1004.<br />

[48] L. H. Erbe, H. I. Freedman, and V. Sree Hari Rao, ―Three-species foodchain<br />

models with mutual interference and time delays,‖ Mathematical<br />

Biosciences, vol. 80, no. 1, 1986, pp. 57–80.<br />

[49] R. Thomlinson, ―Measurement and management of carcinoma of the<br />

breast,‖ Clin. Radiol., 33, 1982, 481–492.<br />

[50] N. MacDonald, Time lags in biological models, Lecture Notes in<br />

Biomathematics 27, Springer Verlag, Berlin 1978.<br />

[51] J. M. Cushing, Integrodifferential equations and delay models in population<br />

dynamics, Lecture Notes in Biomathematics 20, Springer Verlag,<br />

Heidelberg 1979.<br />

[52] R.M. May, Stability and complexity in model ecosystems, Princeton<br />

University Press, Princeton, N.J. 1973.<br />

[53] El-Gohary A. Optimal control of the genital herpes epidemic. Chaos,<br />

Solitons & fractals 2001;12:1817–22.<br />

[54] d‘Onofrio A. Tumor evasion from immune control: strategies of a MISS to<br />

become a MASS. Chaos, Solitons & Fractals 2007;31:261–8.<br />

AUTHORS<br />

First Author – M. Saleem, PhD and Email:<br />

saleemmd60@gmail.com<br />

Second Author – Tanuja Agrawal, MPhil and email:<br />

tanu.18aug@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 77<br />

ISSN 2250-3153<br />

Fuzzy Spanning Tree Flow-Equivalent Algorithm<br />

Dr. G.Nirmala, K.Uma<br />

Associate Professor in Mathematics, K.N.G.A. College (Women), Thanjavur, India<br />

Associate Professor in Mathematics, A.V.V.M. Sri Pushpam College, Poondi, Thanjavur, India<br />

Abstract- By introducing, the new concept fuzzy edge cut-set,<br />

multiple sources and sinks of fuzzy graphs and with arc and<br />

vertex capacities of fuzzy graphs , simple variations of the<br />

maximal flow problem is introduced. A maximum flow matrix is<br />

constructed by a spanning tree using vertex condensation<br />

process. Also, in this paper a fuzzy spanning tree with<br />

maximum flow is constructed, which is equivalent to an<br />

undirected graph by algorithmic representation. In general, the<br />

flow equivalent fuzzy tree is not unique.<br />

Index Terms- Fuzzy Edge cut-sets- arc and vertex capacity-<br />

Fuzzy equivalent-flow.<br />

T<br />

I. INTRODUCTION<br />

he purpose of a network is to implement a flow of water, oil,<br />

electricity, traffic, or whatever the network is designed to<br />

carry. Mathematically, a flow in a network N is a function that<br />

assigns to each edge (i, j) of N a nonnegative number fij that does<br />

not exceed arc capacities qij. Intuitively, fij represents the amount<br />

of flow passing through the edge (i, j) when the flow is f.<br />

Informally, we refer to fij as the flow through edge (i ,j) . We also<br />

require that for each node other than the source and sink, the sum<br />

of the fkj on edges leaving node k. This means that flow cannot<br />

accumulate, be created, dissipate, or be lost any node other than<br />

the source or the sink. This is called conservation of flow. A<br />

consequence of this requirement is that the sum of the flows<br />

entering the sink. This sum is called the value of the flow.<br />

In some cases, for example in the case where the graph<br />

represents a telephone network with vertices corresponding to<br />

stations and the arcs corresponding to the telephone cables, what<br />

may be required is the maximum rate of communication between<br />

any two stations s and t, assuming that only a single pair of<br />

stations can communicate with each other at any one time. In this<br />

example the capacity of a cable is the number of independent<br />

calls that can be routed through it. A similar situation exists in<br />

the case where the graph represents a road network and where,<br />

say, a system of one-way streets is proposed. What is then<br />

required is to determine how then one-way streets affects the<br />

maximum rate of traffic flow between any two areas, when those<br />

areas are considered in isolation. This problem could be solved<br />

by simply considering the (s to t) maximum flow problem for<br />

every pair of vertices (s,t).<br />

II. DEFINITIONS<br />

Definition 2.1. A fuzzy graph with V as the underlying set is a<br />

pair G: (A, Γ) where A: V [0,1] is a fuzzy subset, Γ :<br />

VxV [0,1] is a fuzzy relation on the fuzzy subset A, such<br />

that Γ(u,v) ≤ A(u) ∩ A(v) for all u,v є V.<br />

Definition 2.2. A flow of a fuzzy graph f is an assignment of an<br />

integer value f (e) to each edge e that satisfies the following<br />

properties:<br />

Capacity Rule: For each edge e, 0 ≤ f (e) ≤ q(e)<br />

Conservation Rule: For each vertex v ≠ s,t<br />

∑ f(e) = ∑ f(e)<br />

e є Γ + (v) e є Γ - (v)<br />

Where, Γ - (v) and Γ +(v) are the incoming and outgoing arcs of<br />

v, respectively. The value of a flow f, denoted |f|, is the total flow<br />

from the source, which is the same as the total flow into the sink.<br />

Definition 2.3. A flow of a fuzzy graph N is said to be<br />

maximum if its value is the largest of all flows for N.<br />

--2--<br />

Definition 2.4. If the vertices of a undirected fuzzy graph G=(A,<br />

Γ) are partitioned into two sets A0 and Ã0 (where A0 C A and<br />

Ã0 is the complement of A0 in A), then the set of links of fuzzy<br />

graph G whose terminal vertices lie one in A0 and the other in<br />

Ã0, is called a edge cut-set of fuzzy graph G. The set of links in<br />

the cut-set can be represented by the vertex set doublet (A0 ,Ã0).<br />

Definition 2.5. Consider a fuzzy graph G = (A, Γ) , with s and t<br />

being of G chosen at random. Let us say that (A0 ,Ã0) is the<br />

minimum cut-set corresponding to this maximum flow and<br />

consider two vertices xi and xj which are both in A0(or both in<br />

Ã0).If we now wish to find fij, the maximum flow from xi to xj,<br />

then all vertices of Ã0 ( or A0 if xi and xj єÃ0) may be<br />

―condensed ― into a single vertex xc, say, as far as this flow<br />

calculation is concerned. The condensation is such that links<br />

(xa,xb), xaє A0 and xb є Ã0 are replaced by links (xa,xc), and<br />

any parallel links between the same pair of vertices (which may<br />

result) are replaced by a single link of capacity equal to the sum<br />

of the capacities of the parallel links. Figures 2.1(a), 2.1(b) and<br />

2.1(c) illustrate the Fuzzy Vertex Condensation process.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 78<br />

ISSN 2250-3153<br />

Minimum (s to t) cut-set<br />

Link capacity<br />

Fig 2.1(a)<br />

Fig.2.1(b): Fuzzy vertex condensation for xi to xj flow calculation<br />

Fig. 2.1(c): Condensed Fuzzy graph<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 79<br />

ISSN 2250-3153<br />

III. FUZZY GRAPHS WITH MULTIPLE SOURCES AND<br />

SINKS<br />

Consider a fuzzy graph with Ns sink vertices and assume that<br />

flow can go from any sources to any sink. The problem of<br />

finding the maximum<br />

total flow from all the<br />

sources to all the sinks can be converted to the simple (s to t)<br />

maximum flow problem by adding a new artificial source vertex<br />

s and a new artificial sink vertex t with added arcs leading from s<br />

to each of the real source vertices and from every real sink to t.<br />

Fig. 3.1<br />

The above figure shows how multiple sources and sinks can be reduced to a single source and a single sink.<br />

3.1 Fuzzy Graphs With Arc and Vertex Capacities<br />

For a fuzzy graph G let the arcs have capacities qij, and in<br />

addition let the vertices have capacities wj, say(j=1,2,3….n) so<br />

that the total flow entering vertes xj must have a value less than<br />

wj.<br />

(ie) ∑ ξij ≤ wj for all xj<br />

Let the maximum flow between vertices s and t for such a fuzzy<br />

graph be required. Let us define a fuzzy graph G0 so that every<br />

vertex xj of fuzzy graph G corresponds to two vertices xj + and xj<br />

– in the fuzzy graph G0 , in such a way so that for every arc<br />

(xi,xj) of G incident at xj corresponds an arc (xi - ,xj + ) of G0<br />

incident at xj +, and for every arc (xi,xj) of G emanating from xj<br />

corresponds an arc (xi - ,xj + ) of G0 emanating from xj - . moreover<br />

, we introduce an arc between xj + and xj - of capacity wj , (ie)<br />

equal to the capacity of vertex xj.<br />

EXAMPLE- 3.1<br />

Fig 3. 2: Fuzzy graph with both vertex and arc capacities<br />

Fig. 3.3: Equivalent fuzzy graph with arc capacities only.<br />

Since, the total flow entering a vertex xi + must, by necessity,<br />

travel along the arc (xi + ,xj - ) whose capacity is wj, the maximum<br />

flow in the fuzzy graph G with vertex capacities , is equal to the<br />

maximum flow in the graph G0 which has only arc capacities.<br />

Remark: 3.1<br />

If the minimum edge cut-set of G0 does not contain arcs of the<br />

form (xi + ,xj - ), then the vertex capacities in G are inactive and<br />

superfluous;<br />

If on the other hand the minimum edge cut-set of G0 contains<br />

arcs of the form (xi + ,xj - ), then the corresponding vertices of G are<br />

saturated by the maximum flow solution<br />

3.2. Fuzzy Spanning Tree Algorithm<br />

The algorithm that is given in this section generates a tree T*<br />

which is flow-equivalent to the undirected fuzzy graph G. The<br />

maximum flow fij between two vertices xi and xj of the fuzzy<br />

graph G can then be found from this tree as:<br />

fij = min [q̕ik1, q̕k1k2, q̕k2k3,……………… q̕kpj]--------------- (3.1)<br />

where (x̕i, x̕k1 , x̕k2, ……………, x̕j) is the unique path along links<br />

of T* which leads from x̕I to x̕j. Every vertex x̕k of T*<br />

corresponds to a vertex xk of G and q̕kl is the capacity of link (x̕k<br />

, x̕l) of T*. Since the algorithm generated T* gradually and since<br />

at any one of the (n-1) stages of the algorithm the ―vertices ― of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 80<br />

ISSN 2250-3153<br />

T* may in fact be sets composed of vertices of G, we will, in<br />

order to avoid confusion , refer to the vertices of G as G –vertices<br />

and to the vertices of T* as T*-vertices.<br />

Step 1: Set a set δ1 = A, N= 1. At any stage, T* is the graph<br />

defined by N T*-vertices δ1, δ2,……….., δN each one of which<br />

corresponds to a set of G- vertices. T* is initialized to be the<br />

single vertex δ1 .<br />

Step 2: Find a set δ* є { δ1, δ2,……… δN} which contains more<br />

than one G-vertex in it. If none exist go to step 6, otherwise go to<br />

step 3.<br />

Step 3: If δ* were to be removed from T*, the fuzzy tree<br />

would in general be reduced to a number of fuzzy sub-trees<br />

(connected components).Condense the T*-vertices in each subtree<br />

into single vertices to form the condensed fuzzy graph. Take<br />

any two vertices xi and xj є δ* and calculate the minimum<br />

cut-set (A0 ,Ã0) of G separating xi from xj by doing an ( xi to xj)<br />

maximum flow calculation.<br />

Step 4: Remove the T*-vertex δ* together with its incident links<br />

from T*, and replace it by two T*-vertices composed of the Gvertex<br />

sets δ*∩A0 and δ*∩ Ã0 , and a link of capacity v(A0,Ã0)<br />

between them. Also, for all T*-vertices δi which were incident on<br />

before the replacement, add the link (δi , δ*∩ A0 ) to T* if<br />

δi ⊂ A0; or add the link (δi , δ*∩ Ã0 ) to T* if δi ⊂ Ã0. The<br />

capacities of the links being taken as ci o (link of capacity)<br />

regardless of which one is added.<br />

Step 5: Set N=N+1. The vertices of T* are now the sets of Gvertices<br />

δ1, δ2,……, δ*∩ A0, δ*∩ Ã0, … δN where δ* has been<br />

replaced by the two T*-vertices δ*∩ A0 and δ*∩ Ã0 as explained<br />

earlier. Go to step 2.<br />

Step 6: Stop. T* is the required flow-equivalent tree of G and its<br />

T*-vertices are now single G-vertices. The link capacities of T*<br />

corresponds to the values of the (n-1) independent cut-sets of G.<br />

equations (3.1) can then be used to calculate the fij ( for any xi, xj<br />

є A), directly from T*.<br />

EXAMPLE: 3.2<br />

Consider an undirected fuzzy graph G shown in figure 3.2 where the link capacities are shown next to the links. It is required to find<br />

the maximum flow between every pair of vertices of G.<br />

From the above algorithm we get.<br />

Step 1: δ1= {x1, x2, x3, x4, x5, x6 } ; N=1<br />

Step 2: δ* = δ1<br />

Fig. 3.2: Fuzzy graph.<br />

Step 3: The fuzzy graph cannot be condensed. Take xi= x1 and xj = x2 arbitrarily. From an (x1 to x2) maximum flow calculation we<br />

find the minimum cut-set to be (A0 ,Ã0) where A0={ x1, x5, x6, } and Ã0 ={ x2, x3, x4}, the value of the cut-set being 0.52.<br />

Step 4: The fuzzy tree T* and its link capacities are now shown in figure 3.2(a)<br />

Step 5: N=2 (i.e. T* now has 2 vertices δ1 and δ2 as shown in figure 3.2(a)).<br />

Similarly, proceeding to step 2 and continuing the process till δ* = δ3 we get the following figure:-<br />

{X1,X5,X6} {X2,X3,X4}<br />

Fig. 3.2(a): T* after the first stage<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 81<br />

ISSN 2250-3153<br />

Fig.3.2 (b and d): The condensed fuzzy graph after the 2 nd (b) and 3 rd stages (d)<br />

Fig .3.2(c): T* after the 2 nd stage<br />

Fig .3.2(e) : T* after the 3 rd stage<br />

Fig .3.2(f and h): The condensed fuzzy graph after the 4 th (f) and 5 th (h) stages<br />

Fig. 3.2(g): T* after the 4 th stage<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 82<br />

ISSN 2250-3153<br />

Fig. 3.2(i): Final flow – equivalent fuzzy tree T*<br />

Continuing in the same way and taking δ* = δ1 next, the development of the flow-equivalent fuzzy tree is illustrated above. Also, the<br />

maximum flow matrix [fij] of the original fuzzy graph can be calculated as follows:<br />

X1 X2 X3 X4 X5 X6<br />

X1 - 0.52 0.52 0.31 0.37 0.45<br />

X2 0.52 - 0.59 0.31 0.37 0.45<br />

X3 0.52 0.59 - 0.31 0.37 0.45<br />

X4 0.31 0.31 0.31 - 0.31 0.31<br />

X5 0.37 0.37 0.37 0.31 - 0.37<br />

X6 0.45 0.45 0.45 0.31 0.37 -<br />

Maximum Flow Matrix<br />

The five fuzzy cut-sets (in general n-1) of fuzzy graph G corresponding to the links of the fuzzy tree T* are shown in dotted figure 3.3<br />

.<br />

Fig.3.3: Cut-sets forming fuzzy tree T*<br />

In general, the flow-equivalent fuzzy tree T* is not unique. One such fuzzy tree is shown in following Figure 3.4.<br />

Fig. 3.4: Another flow-equivalent fuzzy tree<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 83<br />

ISSN 2250-3153<br />

IV. CONCLUSION<br />

Using fuzzy graphs with multiple sources and sinks, and with<br />

arc and vertex capacities we can construct a fuzzy spanning tree<br />

with maximum flow using condensation process which is flow<br />

equivalent to an undirected graph by algorithmic representation.<br />

The paper concludes that the flow equivalent fuzzy tree is not<br />

unique.<br />

REFERENCES<br />

[1] L.S. Bershtein, Т.А. Dziouba (2000). Allocation of maximal bipartite part<br />

from fuzzy graph. In Proceedings of European Symposium on Intelligent<br />

Techniques ESIT‟2000, pages 45-47,full version on CD, Aachen, Germany,<br />

2000.<br />

[2] N. Christofides (1975). Graph theory. An algorithmic approach. London,<br />

Academic press.<br />

[3] G. Frank, I. Frish (1978). Networks, connection and flows. Moscow,<br />

translation from English.<br />

[4] H.J.Zimmermann (1991).Fuzzy Set Theory and Its Applications (2 nd<br />

edition). Boston/Dordrecht/London,Kluwer Academic Publishers.<br />

[5] Berge C., 1989, Hypergraphs, Amsterdam, North-Holland.<br />

[6] Bershtein L.S.,Dziouba T.A.,1998,Construction of the optimal bipartite part<br />

in the fuzzy graph,Proceedings of IT&SE.98,Yalta, Ukraine.<br />

[7] Dubois, D., Prade H., 1980, Fuzzy Sets and Systems: Theory and<br />

Applications, Academic Press, London.<br />

[8] Kaufmann, Arnold, 1977, Introduction a la theorie des sous-ensemles flous,<br />

Masson, Paris, France.<br />

[9] Volkmann L., 1991, Graphen und Digraphen: eine Einfuehrung in die<br />

Graphentheorie, Wien; New York: Springer.<br />

[10] [Zadeh, Lotfi, 1975, Fuzzy sets and their application to cognitive and<br />

decision, Academic Press, New York, USA.<br />

AUTHORS<br />

First Author – Dr. G.Nirmala, Associate Professor in<br />

Mathematics, K.N.G.A. College(Women), Thanjavur<br />

Second Author – K.Uma, Assistant Professor in<br />

Mathematics,A.V.V.M. Sri Pushpam College, Poondi,<br />

Thanjavur, India Email: umak1976@yahoo.in<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 84<br />

ISSN 2250-3153<br />

A Model Approach to Off-line English Character<br />

Recognition<br />

Binod Kumar Prasad*, Goutam Sanyal**<br />

* Department of Electronics and Communication Engineering,<br />

Bengal College of Engineering andTechnology, Durgapur, INDIA<br />

(binod.krpr@rediffmail.com)<br />

** Department of Computer Science and Engineering, National Institute of Technology, Durgapur, INDIA<br />

(nitgsanyal@gmail.com)<br />

Abstract- Recognition rate of handwritten character is still<br />

limited due to presence of large variation of shape, scale and<br />

format in hand written characters. A sophisticated hand written<br />

character recognition system demands a better feature extraction<br />

technique that would take care of such variation of hand writing.<br />

In this paper, we propose a recognition model based on Hidden<br />

Markov Models (HMMs) supported by novel feature extraction<br />

technique. Ultimately post-processing is done to enhance the<br />

recognition rate further.<br />

A data-base of 13000 samples is collected from 100 writers<br />

written five times for each character. 2600 samples have been<br />

used to train HMM and the rest are used to test recognition<br />

model. Using our proposed recognition system we have achieved<br />

a good average recognition rate of about 93.24 percent.<br />

Index Terms- Hidden Markov Model, Sobel masks, gradient<br />

features, curvature features and projected histogram.<br />

T<br />

I. INTRODUCTION<br />

he off-line handwriting recognition (OHR) continues to be<br />

an active area for research towards exploring the newer<br />

techniques that would improve recognition accuracy because<br />

several application including mail sorting, bank processing,<br />

document reading and postal address recognition require offline<br />

handwriting recognition systems. Character recognition is<br />

nothing but Machine simulation of human reading [1], [2]. It is<br />

also known as Optical Character Recognition. It contributes<br />

immensely to the advancement of an automation process and can<br />

improve the interface between man and machine in numerous<br />

applications. Several research works have been focussing on new<br />

techniques and methods that would reduce the processing time<br />

while providing higher recognition accuracy. The methods of<br />

Character recognition have grown up sequentially [3], [4]. The<br />

recognition of isolated handwritten character was first<br />

investigated [5], but later whole words [6] were addressed. Most<br />

of the systems reported in literature until today consider<br />

constrained recognition problems based on vocabularies from<br />

specific domain e.g., the recognition of handwritten check<br />

amounts [7] or postal address [8]. Free handwritten recognition,<br />

without domain specific constraints and large vocabularies was<br />

addressed only recently in a few papers [9], [10]. The recognition<br />

rate of such system is still low and there is a need of<br />

improvement [11].It is now a well established fact that the<br />

direction of character strokes contain vast important information<br />

for character recognition .If we can precisely describe that<br />

strokes in certain directions occur at certain positions in the<br />

character image, the character will be easily categorized. Many<br />

statistical features used in character recognition are designed<br />

according to this idea.[12]Previous researchers [13][14]<br />

demonstrated that among direction features the gradient features<br />

[15] outperform various other directional features.<br />

That‘s why we have given due stress on Gradient features by<br />

finding it both globally and locally for a character image.<br />

The tool to train the system with the obtained feature vectors is<br />

taken to be HMM because OHR systems based on HMM have<br />

been shown to outperform segmentation based approaches [16]-<br />

[19]. With the usage of HMM models for the pattern recognition<br />

or character recognition, a HMM model keeps information for a<br />

character when the model is trained properly and the trained<br />

model can be used to recognize an unknown character. The<br />

advantage with HMM based systems is that they are<br />

segmentation free that is no pre segmentation of word/line<br />

images into small units such as sub-words or characters is<br />

required [20]. However there are well-known limitations with<br />

HMM based approaches. These limitations are due to two<br />

reasons-(a) the assumptions of conditional independence of the<br />

observations given the state sequence and (b) the restriction on<br />

feature extraction imposed by frame based observations [21].<br />

The rest of the paper has been arranged as follows-<br />

Section 2 shows the proposed model, section 3 details out preprocessings,<br />

section 4 deals with feature extraction methods;<br />

section 5 describes the classifier whereas in section 6, postprocessings<br />

are described. Section 7 is about the experiments and<br />

results. Conclusions have been drawn in section 8 and in section<br />

9, we have discussed our future works followed by section 10<br />

which contains a single set of collected samples.<br />

II. PROPOSED MODEL<br />

Features are extracted in both global and local<br />

processing.HMM model for each character has been trained by<br />

the sequence of the symbols of the features extracted from<br />

collected samples. To test a handwritten character image, we<br />

extract the similar features using same procedure as earlier and<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 85<br />

ISSN 2250-3153<br />

the corresponding sequence (observation) is processed with each<br />

HMM model P(O/λ), probability of the observation sequence (O)<br />

by the models (λ) is compared and the highest probability<br />

concludes the highest matching of the features with the<br />

corresponding model<br />

Figure 1: System Overview<br />

III. PRE-PROCESSING<br />

Any image processing application suffers from noise like<br />

isolated pixels. This noise gives rise to ambiguous features which<br />

results in poor recognition rate or accuracy. Therefore a<br />

preprocessing mechanism has been executed before we could<br />

start with feature extraction methods. Here a sequence of<br />

operations is carried out in succession as shown in flow diagram<br />

.We have used median filter for its better performance to get rid<br />

of unwanted marks or isolated pixels. Thinning is performed to<br />

get the skeleton of character image so that strokes could be<br />

conspicuous.<br />

Figure 2: Block Diagram for Pre-processing<br />

IV. FEATURE EXTRACTION METHODS<br />

Feature extraction is an important part of any type of pattern<br />

recognition. A better feature extraction method may yield better<br />

recognition rate by a given classifier. Therefore, much attention<br />

is paid to extract the suitable features from the preprocessed<br />

images. Our feature extraction process consists of<br />

4.1 GLOBAL FEATURE EXTRACTION METHOD<br />

Global feature of an image sample describe its overall structure.<br />

We extract global features as described below:<br />

Gradient Features<br />

To compute the density of line segments in the quantized<br />

direction we use only two masks - Horizontal sobel mask and<br />

Vertical sobel mask. Magnitude and phase of the gradient<br />

obtained by Sobel masks are calculated as below<br />

Figure 3: Gradient Feature Extraction using Sobel Masks<br />

Phase is quantized in eight directions as shown in Fig. 6.For each<br />

quantized phase value, corresponding magnitudes are added to<br />

get the total strength in that direction. To get the feature within<br />

finite number of symbols (here eleven symbols are used),<br />

magnitudes are normalized and quantized. Finally, we consider<br />

four global gradient (G) features combining following pairs-(0°,<br />

±180°), (45°,−135°), (90°,−90°) and (135°,−45°).<br />

4.2 LOCAL FEATURE EXTRACTION METHODS<br />

To extract the local information contained in the preprocessed<br />

character image, we divide the image by nine equal blocks and<br />

then, from each block four gradient features (as discussed earlier)<br />

are extracted. Thus, the local feature (L) contains 36<br />

observations.<br />

Therefore, our final observation sequence contains 50<br />

observations obtained by global and local feature extraction<br />

methods, as shown below<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 86<br />

ISSN 2250-3153<br />

O = [G(4) L(36)] (3)<br />

V. HIDDEN MARKOV MODEL<br />

Hidden Markov Model (HMM) is a finite state machine<br />

in which a sequence of observations (O) is produced by this<br />

model but the corresponding sequence of states remain hidden<br />

within this model[16]. This HMM model can be defined as<br />

λ = (π, A, B) (4)<br />

where π is initial state probability vector, A is final state<br />

transition probability matrix and B is final observation<br />

probability matrix. The HMM model was initially used for<br />

speech recognition purpose, but later it has been proved that the<br />

HMM model can be efficiently utilized for other recognition<br />

process like character recognition, pattern recognition etc. In this<br />

paper we use a closed left to right chain HMM model for<br />

handwritten English characters recognition. A sketch of 5 states<br />

HMM model is shown in<br />

Figure 4: Left to Right Chain HMM Model with 5 States<br />

5.1 TRAINING OF HMM MODEL<br />

For the HMM model shown in Fig.4, π is taken as<br />

[1 0 0 0 0 ] (5)<br />

Initial value of A and B are taken as below:<br />

We have used Baum-Welch algorithm to train the HMM using<br />

observation sequence obtained from the feature vectors. At the<br />

end of training process we obtain the final value of A and B<br />

which is used for recognition purpose.<br />

5.2. RECOGNITION BY HMMM MODEL<br />

Consider an observation vector (O) of length L as below<br />

O = [O1 O2 O3 ·· · OL] (6)<br />

We use Viterbi decoding algorithm to decode the sequence of<br />

states of the HMM model λ for the sequence of observation O<br />

and it returns P (O/λ), the probability of generating the given<br />

sequence O by the HMM model λ.<br />

VI. POST-PROCESSING<br />

A post-processing block is included at the final stage of<br />

recognition process in order to provide special care to the highly<br />

confused group of characters due to their high structural<br />

correlation factor (similarity). Few examples of such groups are<br />

mentioned below-<br />

(1) O and Q,<br />

(2) M and N,<br />

(3) V and Y,<br />

(4) C and O,<br />

(5) B, K,R and P etc.<br />

For each group, one or more new features are extracted that<br />

can discriminate these characters with good accuracy. For<br />

example, O and Q can be easily differentiated using signature<br />

features, as shown in Fig.5-7.<br />

Figure 5: Samples of Character Image for Post-processing<br />

(a) Character O and (b) Character Q<br />

Figure 6: Signature and Derivative of Signature Plot for<br />

Character O Shown in Fig.5 (a).<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 87<br />

ISSN 2250-3153<br />

Figure 7: Signature and Derivative of Signature Plot for<br />

Character Q Shown in Fig.5 (b).<br />

These show that the differentiation of signature plot of Q<br />

contains very large spike that can be utilized to distinguish this<br />

(Q) from the character O using a threshold criteria. Note that, this<br />

signature feature is not used to train the HMM models of all<br />

characters. The effect of this post-processing block is presented<br />

in the next section providing some experimental studies.<br />

VII. EXPERIMENTS AND RESULTS<br />

A total of 13000 samples are collected from 100 persons. Each<br />

writer wrote 5 set of A-Z characters. Each character image is<br />

converted to a fixed size of 150×150 pixels .We have applied our<br />

feature extraction method on these samples and then these<br />

feature values are quantized and encoded to the eleven symbols<br />

in order to create sequences of observation symbols. First 100<br />

samples of each character are used to train the corresponding<br />

character HMM. Rest 400 samples are used to test our HMM<br />

classifier. For our experiment we have started with only 5 state<br />

model but we observed that as the no. of states of HMM model is<br />

increased, the corresponding recognition rate is also improved.<br />

Finally, with 36 states HMM model we have got our expected<br />

result as shown in table. Table I shows the effectiveness of our<br />

proposed model.<br />

In table 1 we have shown final recognition rate of our<br />

character recognition system using post-processing and it is<br />

compared with result obtained without post processing technique.<br />

This produces an average recognition rate of 93.24%.<br />

TABLE 1: Recognition Rate With or Without Post-<br />

Processing (PP) Using Proposed HMM Model<br />

Char Recognition<br />

-acter Rate (%)<br />

With Wi<br />

out pp th pp<br />

A 89.50 89<br />

.50<br />

B 91.00 93<br />

.25<br />

C 93.75 94<br />

.25<br />

D 93.25 93<br />

.25<br />

E 93.75 93<br />

.75<br />

F 94.00 94<br />

.00<br />

G 92.50 92<br />

.50<br />

H 93.75 93<br />

.75<br />

I 94.25 94<br />

.25<br />

J 93.50 93<br />

.50<br />

K 92.50 93<br />

.75<br />

L 93.75 93<br />

.75<br />

M 92.25 93<br />

.50<br />

VIII. CONCLUSION<br />

In this paper, an approach has been made to increase the rate<br />

of recognition of handwritten character by finding both local and<br />

global features. In the post-processing section, a trial has been<br />

done to put a line of demarcation between similar looking<br />

characters.<br />

All these specialties of this paper has made us obtain an<br />

average accuracy of 93.24%. For the letters ‗A‘ and ‗W‘,the<br />

recognition rate is found to be very low, because of a lot of<br />

variations in writing style of these letters as shown in fig.<br />

(c) (d)<br />

Char Recognition<br />

-acter Rate (%)<br />

With Wi<br />

out pp th pp<br />

N 93.75 94<br />

.25<br />

O 91.50 94<br />

.25<br />

P 91.25 92<br />

.75<br />

Q 92.25 94<br />

.00<br />

R 90.75 93<br />

.25<br />

S 90.50 91<br />

.50<br />

T 93.25 93<br />

.25<br />

U 93.50 93<br />

.50<br />

V 91.75 93<br />

.75<br />

W 89.25 89<br />

.25<br />

X 93.25 93<br />

.25<br />

Y 91.25 93<br />

.75<br />

Z 94.50 94<br />

.50<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 88<br />

ISSN 2250-3153<br />

Fig. 8 Two completely different formats for handwritten<br />

character A (a) A1 (b) A2 and for character W (c) W1 (d)<br />

W2<br />

IX. CONCLUSION<br />

HMM is a flexible tool by its inherent nature which is capable<br />

of absorbing a little bit of variations in character images. It is<br />

obvious from the samples shown above that their gradient<br />

features should differ considerably. So, our future works will be<br />

concentrated on improvement of recognition rate of such letters.<br />

X. DATA-SET<br />

ACKNOWLEDGMENT<br />

Our thanks to the authority of Bengal College of Engineering<br />

and Technology, Durgapur (W.B.) to provide us with WI-FI<br />

connection and other facilities to carry out research works.<br />

REFERENCES<br />

[1] U. Bhattacharya, and B. B. Chaudhury, ―Handwritten numeral databases of<br />

Indian scripts and multistage recognition of mixed numerals‖, IEEE Trans.<br />

Pattern analysis and machine intelligence, vol. 31, No. 3, pp. 444-457,<br />

2009.<br />

[2] U. Pal, T. Wakabayashi and F. Kimura, ―Handwritten numeral recognition<br />

of six popular scripts‖, Ninth International Conference on Document<br />

Analysis and Recognition, ICDAR07, Vol.2, pp.749-753, 2007.<br />

[3] V. K. Govindan and A. P. Shivaprasad,―Character Recognition A review‖,<br />

Pattern recognition, vol.23, no.7, pp.671-683, 1990<br />

[4] J. Pradeep, E. Srinivasan and S. Himavathi, ―Diagonal Based Feature<br />

Extraction for Handwritten Alphabets Recognition System Using Neural<br />

Network‖, International Journal of Computer Science and Information<br />

Technology (IJCSIT),, vol. 3, no. 1, pp. 27-38, Feb 2011.<br />

[5] C. Suen, C. Nadal, R. Legault, T. Mai, and L. Lam, ―Computer recognition<br />

of unconstrained handwritten numerals‖, Proc. IEEE , 80(7):1162-80.<br />

[6] J. C. Simon , ―Off-line cursive word recognition‖, Proc. IEEE , 80(7):1150-<br />

61.<br />

[7] S. Impedovo, P. Wang and H. Bunke,editors, Automatic bank check<br />

processing, Singapore: World scientific; 1997.<br />

[8] S. Srihari,―Handwritten address interpretation: a task of many pattern<br />

recognition problems‖, International Journal of Pattern Recognition and<br />

Artificial Intelligence, 2000; 14:663-74<br />

[9] G. Kim, V. Govindaraju, and S. Srihari, ―Architecture for handwritten text<br />

recognition systems‖,International Journal on document Analysis and<br />

Recognition (IJDAR), vol. 2, pp. 37-44, 1999.<br />

[10] U. V. Murti, and H. Bunke, ― Using a statistical language model to improve<br />

the performance of an HMM-basis cursive handwriting recognition<br />

system‖, International Journal of Pattern Recognition and Artificial<br />

Intelligence, 2001;15:65-90.<br />

[11] S. Gunter, and H. Bunke, ―Off-line cursive handwriting recognition using<br />

multiple classifier systemson the influence of vocabulary, ensemble, and<br />

training set size‖, Optics and Lasers in Engineering, vol. 43, pp. 437-<br />

454,2005.<br />

[12] Hailong Liu and Xiaoqing Ding ―Handwritten Character recognition Using<br />

Gradient feature and Quadratic Classifier with Multiple Discrimination<br />

Schemes,Proceedings of the 2005Eight International Conference on<br />

Document Analysis and Recognition(ICDAR‘2005)<br />

[13] H.Fujisawa,C.L.Liu ,‖Directional Pattern Matching for Character<br />

Recognition‖,Proc.7 th ICDAR,Edinburgh,Scotland,2003,pp794-798<br />

[14] K.Ding,Z.B.Liu,L.W.Jin ,X.H.Zhu,‖A comparative study of Gabor Feature<br />

And Gradient Feature For Handwritten Chinese Character<br />

Recognition‖,ICWAPR,Beijing ,China,2007,pp.1182-1186<br />

[15] C.L.Liu ,K.Nakashima,H.Sako,H.Fujisawa,‖Handwritten Digit Recognition<br />

:Investigation of Normalisation and Feature Extraction Techniques‖,Pattern<br />

Recognition ,2004,37(2),PP.265-279<br />

[16] L. R. Rabiner, ―A tutorial on Hidden Markov Models and selected<br />

applications in speech recognition‖, Proceedings of The IEEE, vol. 77, no.<br />

2, pp. 257-286, Feb. 1998.<br />

[17] C. Mokbel, H. Abi Akl, and H. Greige, ―Automatic speech recognition of<br />

Arabic digits over Telephone network―, Proc.Research Trends in Science<br />

and Technology, 2002.<br />

[18] R. El-Hajj, L. Likforman-Sulem, and C. Mokbel, ―Arabic Hand- writing<br />

Recognition Using Baseline Dependent Features and Hidden Markov<br />

Modeling, Proc. Eighth Intl Conf. Document Analysis and Recognition, pp.<br />

893-897, 2005.<br />

[19] H. El Abed and V. Margner, ―ICDAR 2009 - Arabic handwriting<br />

recognition competition‖, Inter. Journal on Document Analysis and<br />

Recognition, vol. 1433-2833, 2010.<br />

[20] P. Natarajan, S. Saleem, R. Prasad, E. MacRostie, and K.<br />

Subramanian,―Multilingual Off-line Handwriting Recognition Using<br />

Hidden Markov Models: A script independent Approach‖, Springer Book<br />

Chapter on Arabic and Chinese Handwriting Recognition, ISSN:0302-9743,<br />

VOL. 4768, pp. 235-250, March 2008.<br />

[21] Zhang Hong lin, ―Visiual C++Digital image pattern recognition technology<br />

and engineering practice,‖Beijing: Posts & Telecom Press, 2008,pp. 52-58.<br />

[22] R. C. Gonzalez and P. Wintz, ―DIGITAL IMAGE PROCESSING,‖ 2 nd<br />

Edition, ADDISON WESLEY, Reading Mass, 198.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 89<br />

ISSN 2250-3153<br />

Fuzzy Sub - Trigroup – Trilevel Properties<br />

1 G.Nirmala, 2 S.Suganthi<br />

1 Associate prof.of Mathematics, PG and Research Department of mathematics, K.N.G.A.College(Women),Autonomous,Thanjavur.<br />

2 Research Scholar, Manonmaniam sundaranar University,Thirunelveli.<br />

Abstract- In this paper, some characteristic description and a<br />

kind of representation of the fuzzy sub-trigroup with respect to<br />

operation addition are Introduced.Fuzzy sub-trigroup,union of<br />

fuzzy trigroups trilevel subset of a fuzzy sub-trigroup are<br />

defined. Properties of fuzzy sub-trigroup are proved with<br />

examples. some results of trilevel subset of fuzzy sub-trigroups<br />

are also proved.<br />

T<br />

Index Terms- Trilevel subset, Trigroup, Fuzzy sub-trigroup<br />

I. INTRODUCTION<br />

he concepts of fuzzy sets was introduced by Zadeh.Since the<br />

paper fuzzy set theory has been considerably developed by<br />

zadeh himself and some researchers.The original concept of<br />

fuzzy sets was introduced as an extension of cribs (usual) sets, by<br />

enlarging the truth value set of ―grade of members‖from the two<br />

value set {0,1} to unit interval {0,1} of real numbers. The study<br />

of fuzzy group was started by Rosenfeld.<br />

It was extended by Roventa who have introduced the fuzzy<br />

groups operating on fuzzy sets.W.B.Vasantha kandasamy<br />

introduced fuzzy sub-bigroup with respect to ‗+‘ and ‗.‘and<br />

illustrate it with example. W.B.Vasantha kandasamy was the first<br />

one to introduce the notion of bigroups in the year 1994.Several<br />

mathematicians have followed them in investigating the fuzzy<br />

group theory. We now recall the previous and preliminary<br />

definitions, and results that are required in our discussion.<br />

1. Preliminaries:<br />

Definition: 1.1<br />

Let X be a nonempty set.A fuzzy set µ of the set X is a function<br />

µ : X → [0,1].<br />

Definition: 1.2<br />

The most commonly used range of membership functions is the<br />

unit interval [0,1].In this case,each membership function maps<br />

elements of a given universal set x,which is always a crisp<br />

set,into real numbers in [0,1]<br />

Two distinct notations are most commonly employed in the<br />

literature to denote membership functions.<br />

The membership functions of a fuzzy set A is denoted by A<br />

Ã:x → [0,1].<br />

Definition: 1.3<br />

Let A and B be two fuzzy sets for all [0,1]<br />

Min of AB=Aα(۸)Bα<br />

= [a1 (α) ,a2 (α) ]۸[b1 (α) , b2 (α) ]<br />

= [a1 (α) ۸b1 (α) ,a2 (α) ۸b2 (α) ]<br />

Max of AB= Aα(۷)Bα<br />

= [a1 (α) ,a2 (α) ] ۷[b1 (α) ,b2 (α) ]<br />

= [a1 (α)<br />

۷ b1 (α) ,a2 (α) ۷b2 (α) ]<br />

Definition: 1.4<br />

Let G be a group.A fuzzy subset µ of a group G is called a fuzzy<br />

subgroup of the G if i. µ(xy) ≥ min{ µ(x) , µ(y)}<br />

for every x,y G<br />

ii. µ(x -1 ) = µ(x) for every x G<br />

Definition: 1.5<br />

Let µ be a fuzzy subset of G.For t [0,1] the set µt = { x G/<br />

µ(x) ≥ t} is called a level subset of the fuzzy subset µ.<br />

Definition: 1.6<br />

Let µ1 be a fuzzy subset of a set X1 and µ2 be a fuzzy subset of a<br />

set X2, then the fuzzy union of the fuzzy sets µ1 and µ2 is defined<br />

as a function.<br />

µ1µ2: X1X2 → [0,1] given by<br />

max(µ1(x), µ2(x)) if x X1∩ X2<br />

(µ1µ2)(x) = µ1(x) if xX1 and xX2<br />

µ2(x) if xX2 and xX1<br />

Definition: 1.7<br />

Let µ1 be a fuzzy subset of a set X1 and µ2 be a fuzzy subset of a<br />

set X2, µ3 be a fuzzy subset of a set X3then the fuzzy union of<br />

the fuzzy sets µ1 and µ2, µ3 is defined as a function.<br />

µ1µ2µ3: X1X2X3 → [0,1] given by<br />

max(µ1(x),µ2(x), µ3(x))<br />

if x X1∩ X2∩ X3<br />

(µ1µ2 µ3)(x) = µ1(x) if xX1 x X2, X3<br />

µ2(x) if xX2 x X1, X3<br />

µ3(x) if xX3 x X1, X2<br />

II. RESULTS<br />

Let G = (G1G2G3,+) be a trigroup.Then µ : G → [0,1] is<br />

said to be a fuzzy sub-trigroup of the trigroup G if there<br />

exists three fuzzy subsets µ1 of G1 and µ2 of G2, µ3 of G3<br />

such that<br />

(i) (µ1,+) is a fuzzy subgroup of (G1,+)<br />

(ii) (µ2,+) is a fuzzy subgroup of (G2,+)<br />

(iii) (µ3,+) is a fuzzy subgroup of (G3,+)<br />

µ = (µ1µ2 µ3).<br />

Let (G = G1G2G3,+) be a trigroup and<br />

µ = (µ1µ2 µ3) be a fuzzy sub-trigroup of the trigroup G.The<br />

tri level subset of the fuzzy sub-trigroup µ of the trigroup G<br />

is defined as (Gµ ) t = (G1µt) t (G2µt) t (G3µt) t<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 90<br />

ISSN 2250-3153<br />

for every t [0,min{µ1(e1), µ2(e2) , µ3(e3)}] where e1, e2 , e3 are<br />

denotes the identity element of the group (G1 , +) ,(G2 ,+) ,(G3,+)<br />

respectively.<br />

A fuzzy subset µ of a group G is said to be a union of three<br />

fuzzy sub-groups of the group G if there exists three fuzzy<br />

subgroups µ1,µ2 and µ3 of µ (µ1=µ , µ2=µ and µ3=µ) such<br />

that<br />

µ = (µ1µ2 µ3).Here by the term fuzzy subgroup λ of μ we<br />

mean that λ is a fuzzy subgroup of the group G and λ μ (where<br />

μ is also a fuzzy subgroup of G).<br />

The condition<br />

t [0,min{µ1(e1), µ2(e2) , µ3(e3)}] is essential for the trilevel<br />

subset to be a sub-trigroup for if<br />

t [0,min{µ1(e1), µ2(e2) , µ3(e3)}] then the trilevel subset<br />

need not in general be a sub-trigroup of the trigroup G.<br />

2. Properties of fuzzy sub –trigroup.<br />

Example: 2.1<br />

Let x1 = {1,2,3,4,5} and<br />

X2 ={2,4,6,8,10},X3 = {1,3,5,7,9} be three sets<br />

Define µ1: x1 → [0,1] by<br />

1 if x = 1,2<br />

µ1(x) = 0.6 if x =3<br />

0.2 if x = 4,5<br />

Define µ2: x2 → [0,1] by<br />

1 if x = 2,4<br />

µ2(x) = 0.6 if x =6<br />

0.2 if x = 8,10<br />

And Define µ3: x3 → [0,1] by<br />

Hence<br />

1 if x = 1<br />

µ3(x) = 0.6 if x =3,5<br />

0.2 if x = 7,9<br />

1 if x = 1,2,4<br />

(µ1µ2µ3)(x) = 0.6 if x =3,5,6<br />

0.2 if x = 7,8,9,10<br />

Example: 2.2<br />

Consider the trigroup<br />

G = {±i, ±0, ±1,±2,±3,±4,………..}<br />

Under the operation ‗+‘ where<br />

G1 = {0, ±1,±2,±3,………………}<br />

G2 = {±i,0},G3 = {0, ±2}.<br />

Define µ: G → [0,1] by<br />

1/3 if x = i,-i<br />

µ (x) = 1 if x {0,±2,±4,….}<br />

1/2 if x {±1,±2,±3,………}<br />

We can find<br />

Define µ1: G1 → [0,1] by<br />

µ1(x) =<br />

1 if x {0, ±2,±4,…….}<br />

1/2 if x {±1,±3,±5,………}<br />

Define µ2: G2 → [0,1] by<br />

µ2(x) =<br />

1/3 if x = ±i<br />

1 if x = 0<br />

Define µ3: G3 → [0,1] by<br />

µ3(x) =<br />

1 if x =0<br />

1/2 if x = ±2<br />

Hence there exists two fuzzy subgroups µ1of G1, µ2 of G2 and µ3<br />

of G3 such that µ = (µ1µ2µ3).<br />

Theorem: 2.1<br />

Every t-level subset of a fuzzy sub-trigroup µ of a trigroup G<br />

need not in general be a sub-trigroup of the trigroup G<br />

Proof:-<br />

We can prove this theorem by an example<br />

Take G = {-2,-1,0,1,2} to a bigroup under the operation ‗+‘<br />

Where G1 = {-2,0,2}, G2 = {-1,0,1}, G3 = {0} are groups w.r.to<br />

‗+‘ .<br />

Define µ: G→ [0,1] by<br />

1 if x = -2,2<br />

µ (x) = 1/2 if x = -1,1<br />

1/4 if x = 0<br />

Then clearly (µ,+) is a fuzzy sub-trigroup of the trigroup (G,+).<br />

Now consider the level subset Gµ 1/2 of the fuzzy sub-trigroup µ.<br />

Gµ 1/2 = {-2,-1,1,2} is not a sub – trigroup of the trigroup<br />

(G,+).<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 91<br />

ISSN 2250-3153<br />

Hence the t level subset<br />

Gµ t (of t =1/2) of the fuzzy sub – trigroup µ is not a sub –<br />

trigroup (G,+).<br />

Theorem: 2.2<br />

Every trilevel subset of a fuzzy sub – trigroup µ of a trigroup G<br />

with respect to the usual addition is a sub-trigroup of trigroup G.<br />

Proof :-<br />

Let µ = (µ1µ2µ3) be the fuzzy subgroup of a trigroup<br />

(G = G1G2G3,+).<br />

Consider the trilevel subset Gµ t of the fuzzy sub – trigroup µ for<br />

every<br />

t [0,min{µ1(e1), µ2(e2) , µ3(e3)}]<br />

Where e1, e2 and e3 denote the identity elements of the<br />

groups G1,G2 and G3 respectively.<br />

Then Gµ t = G3µ3 t G2µ2 t G1µ1 t<br />

Where G1µ1 t , G2µ2 t , and G3µ3 t are subgroups of G1,G2 and G3<br />

respectively.<br />

Since G1µ1 t is a t-level subset of the group G1, G2µ2 t is a t-level<br />

subset of the group G2 and G3µ3 t is a t-level subset of the group<br />

G3.<br />

Hence the sub-trigroup Gµ t is a sub-trigroup of the trigroup G.<br />

Example: 2;3<br />

G = {0, ±1, ±i} is a trigroup with repect to the addition.<br />

Clearly G1= {0},G2 ={0, ±1},<br />

G3 = {0, ±i} are groups with respect to addition.<br />

Define µ: G → [0,1] by<br />

1 if x = 0<br />

µ (x) = 0.5 if x =±1<br />

0.3 if x =±i<br />

Therefore µ is a fuzzy sub – trigroup of the trigroup G as there<br />

exists three fuzzy subgroups µ1: G1 → [0,1] , µ2: G2 → [0,1] and<br />

µ3:G3 → [0,1] such that µ = µ1Uµ2Uµ3<br />

Where<br />

µ1(x) = 1 if x = 0<br />

0.8 if x = 0<br />

REFERENCES<br />

[1] S. AbouZaid, On fuzzy subnearrings and ideals, Fuzzy Sets and Sys. 44<br />

(1991), 139146.<br />

[2] Yuan Bo and Wu Wangming, Fuzzy ideals on a distributive lattice, Fuzzy<br />

Sets and Sys. 35 (1990), 231240.<br />

[3] P. S. Das, Fuzzy groups and level subgroups, J. Math. Anal. and Appl. 84<br />

(1981), 264269.<br />

[4] V. N. Dixit, R. Kumar and N. Ajal, On fuzzy rings, Fuzzy Sets and Sys. 49<br />

(1992), 205213.<br />

[5] N. Kuroki, Fuzzy biideals in semigroups, Comment.Math. Univ. St. Pauli.<br />

28 (1979), 1721.<br />

[6] N. Kuroki, On fuzzy ideals and fuzzy biideals in semigroups, Fuzzy Sets<br />

and Sys. 5 (1981), 203215.<br />

µ2(x) = 0.5 if x =±1<br />

0.9 if x = 0<br />

µ3(x) = 0.3 if x =±i<br />

Now we calculate the trilevel subset Gµ t for t = 0.5<br />

Gµ t = G3µ3 t G2µ2 t G1µ1 t<br />

={xG1/µ1(x) ≥t}{xG2/µ2(x) ≥t}<br />

{ xG3/ µ3(x) ≥ t}<br />

Gµ t = {0}{0,±1}{0}<br />

= {0, ±1}<br />

G t = {0, ±1} is a sub-trigroup of the trigroup G.<br />

Theorem: 2.3<br />

Let µ = µ1Uµ2Uµ3 be a fuzzy sub – trigroup of the trigroup<br />

G.Where µ1,µ2 and µ3 are fuzzy sub groups of the group G.The<br />

trilevel subset Gµ t of µ for<br />

t[0,minµ1(e1),µ2(e2), µ3(e3)}] can be represented as the union of<br />

three subgroups of the group G.<br />

That is Gµ t = G3µ3 t G2µ2 t G1µ1 t .<br />

Proof:-<br />

Let µ be a fuzzy sub – trigroup of the group G with<br />

respect to addition and<br />

t [0,min{µ1(e1), µ2(e2) , µ3(e3)}]<br />

there exists fuzzy subgroups µ1,µ2 and µ3 of the group G such<br />

that µ = µ1µ2µ3.<br />

Let Gµ t be the level subset of µ,<br />

Then we have<br />

xGµ t µ(x) ≥ t<br />

max{ µ1(x),µ2(x), µ3(x)} ≥ t<br />

µ1 ≥ t or µ2(x) ≥ t or µ3(x) ≥ t<br />

xG1µ1 t or xG2µ2 t or xG3µ3 t<br />

xG1µ1 t G2µ2 t G3µ3 t<br />

Hence Gµ t = G1µ1 t G2µ2 t G3µ3 t<br />

III. CONCLUSION<br />

In this paper with the basic concepts of group theory,we define<br />

related concepts of fuzzy sub-trigroup and further we proved<br />

properties of fuzzy sub-trigroup.<br />

[7] G.Nirmala,S.Suganthi, fuzzy algebra –presended the paper in national<br />

conference on Recent advances in pure and applied mathematics –Govt.Arts<br />

college for women (Aut),Pudukkottai.<br />

[8] G.Nirmala,S.Suganthi published the paper-Lagrange‘s theorem in fuzzy<br />

approach-The pmu journal of Humanities and Sciences-july-december<br />

2011.<br />

[9] W. B. Vasantha Kandasamy, Smaramdache fuzzy Algebra<br />

American Research Press Rehoboth 2003.<br />

10.Zimmermann H., Fuzzy Set Theory and its Applications (2001),<br />

ISBN 978 – 0 – 7923- 7435 – 0<br />

AUTHORS<br />

First Author – G.Nirmala, Associate prof. of Mathematics, PG<br />

and Research Department of mathematics,<br />

K.N.G.A.College (Women), Autonomous,Thanjavur, India<br />

Tamilnadu,India.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 92<br />

ISSN 2250-3153<br />

Email id - nirmalamanokar11@yahoo.com<br />

Second Author – S.Suganthi, Research Scholar, Manonmaniam<br />

sundaranar University,Thirunelveli,Tamilnadu,,India.<br />

Email id : mathisuganthi@gmail.com<br />

*Correspondence Author – S.Suganthi,<br />

Email id : mathisuganthi@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 93<br />

ISSN 2250-3153<br />

Adjustment problems of Educable Mentally Retarded<br />

Abstract- The study examined the adjustment problems of<br />

educable mentally retarded students of Ranchi (India). The total<br />

sample in the study consisted of 200 subjects – out of which 100<br />

served as experimental group (mentally retarded) and 100 as<br />

normal control. The subjects in the experimental group were<br />

selected from the schools of mentally retarded and normal<br />

control subjects were selected from different high schools of<br />

Ranchi. They were matched with the experimental group with<br />

respect to various socio-demographic variables, like age,<br />

economic status, religion and domicile. The Purposive sampling<br />

technique was adopted. For assessing the intelligence and<br />

adjustment problems of the subjects, Sandford Binet intelligence<br />

scale and Bell adjustment inventory were administer. Result<br />

showed that:<br />

(i) Mentally retarded subjects had greater adjustment problems<br />

than the normal control group.<br />

(ii) Mentally retarded group showed highest score in social area<br />

and lowest score in health area in comparison to other areas of<br />

adjustment.<br />

Index Terms- Educable Mentally retarded, Adjustment,<br />

Control group, Experimental group<br />

M<br />

I. INTRODUCTION<br />

ental retardation is a complex clinical condition with a<br />

heterogeneous etiology in which people have below<br />

intelligence that limits their ability to function normally. This<br />

type of people may have problems with communication, taking<br />

care of themselves, daily living social skills, community<br />

interactions, directing themselves, health, safety and work.<br />

Mental retardation has posed a great problem throughout the<br />

world due to its highly complex social, medical, psychological<br />

and educational components, apart from various unanticipated<br />

problems.<br />

The American Psychiatric Association in DSM-IV-TR<br />

defined mental retardation as ‗significantly sub average general<br />

intellectual functioning…. that is accompanied by significant<br />

limitation in adaptive functioning.‘ The term adaptive<br />

functioning refers to the person‘s ability to cope with life‘s<br />

demand and live independently, according to the standards of his<br />

or her age groups, communities, social clam and culture.<br />

Mental retardation varies in severity. The DSM-IV-TR<br />

classified four different degrees of mental retardation: mild,<br />

moderate, severe and profound. These categories are based on<br />

the person‘s level of functioning and IQ Scores. Children with<br />

mild mental retardation are classified as the educable mentally<br />

retarded, and compose approximately 85% of the mentally<br />

retarded. Initial diagnosis of mental retardation occurs very<br />

frequently at ages 5 to 6. During early childhood, individuals<br />

Dr. Bharati ROY<br />

Email: bharatiroy.roy15@gmail.com<br />

with a mild degree of intellectual impairment, often appear to be<br />

normal. Their sub average intellectual functioning becomes<br />

apparent only when difficulties with school works lead to a<br />

diagnostic evaluation. When adequate facilities are available for<br />

their education, children in this group can usually master<br />

essential school skills and achieve a satisfactory level of socially<br />

adaptive behavior. (Carson, Butcher, Mineka and Hooley, 2008)<br />

Educable retarded children are basically very similar to other<br />

children generally they do not have physical characteristics<br />

which set them apart from other children. They are capable of<br />

engaging in the same physical activities that other children enjoy.<br />

They do not exhibit behavior patterns which deviate noticeably<br />

from their peers. Educationally they learn in much the same way<br />

that other children do. They begin school at the same age other<br />

children do and are able to profit from education as it is<br />

presented in the public schools. The social and emotional<br />

adjustment of mildly retarded children is often approximately are<br />

that of adolescents, although they tend to lack normal<br />

adolescent‘s imagination, inventiveness, curiosity and judgment.<br />

Ordinarily they do not show sign of brain pathologies or other<br />

physical anomalies, but still they require some measure of<br />

supervision because of their limited abilities to foresee the<br />

consequences of their actions. With early diagnosis, parental<br />

assistance, and special educational programs, the great majorities<br />

of mildly retarded individuals can adjust socially, master simple<br />

academic and occupational skills and become self supporting<br />

citizens.<br />

There are few differences which are common to all educable<br />

retarded children. These are:<br />

(1) Intellectually they function at a slower rate of learning<br />

than most children in school. Their score on individual<br />

intelligence tests will usually fall between 50 and 80 I.Q.<br />

(2) Academically they are marked below their chronological<br />

grade level.<br />

The inability of the educable mentally retarded to compete<br />

academically may adversely affect his personal and social<br />

adjustment in the school setting. It may lead to profound feelings<br />

of inferiority and may sharply reduce his ability to realistically<br />

assess his abilities and limitations.<br />

Mild mentally retarded have IQs over 50, are relatively normal in<br />

appearance and come mostly from lower social economic<br />

classes. According to Frank, Hewett, Steven and Forness ‗mild<br />

mental retardation most likely results from the complex interplay<br />

of familial, environmental and social factors in which heredity<br />

tends to set limits on intellectual potential or capacity, whereas<br />

experience determines to what extent such potential will be<br />

fulfilled. With regard to etiology, there are probably four<br />

overlapping types of causes associated with mild retardation.<br />

The first type is familial, which includes the small percentage<br />

of each ethnic group or minority group that falls at the lower end<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 94<br />

ISSN 2250-3153<br />

of the polygenetic distribution of intelligence for their respective<br />

groups. The second type of cause is neurological. It is possible in<br />

some cases to pinpoint that a specific pathologic condition may<br />

have caused some damage to the child‘s central nervous system,<br />

resulting in a mild level of retardation. Lead poisoning, either<br />

through prolonged exposure to industrial lead dust or ingestion of<br />

chipped lead paint, may be one such cause (Moore and Moore,<br />

1977) the third type of cause is nutritional. There is increasing<br />

documentation that chronic malnutrition, either in the mother or<br />

subsequently in the developing child, may be one of the more<br />

significant factors in eventual mental performance (Perkins 1977,<br />

Winnick 1976). The fourth cause is environmental. Socioeconomic<br />

factors or poverty is an important factor of mild<br />

retardation. In general, mild mental retardation is somewhat more<br />

prevalent in families with low incomes than in families with high<br />

incomes. This risk factor is related to parental intelligence and<br />

the amount of intellectual stimulation the child receives. A<br />

related risk factor may be maternal age. A number of studies<br />

pointed out that most of these children come from poverty<br />

stricken, unstable and often disputed family back grounds<br />

characterized by a lack of intellectual stimulation, an inferior<br />

quality of interaction with others, and general environmental<br />

deprivation (Cullinan, 1985)<br />

II. OBJECTIVE<br />

The objective of present study is to examine the adjustment<br />

problems of educable mentally retarded.<br />

III. HYPOTHESIS<br />

It is hypothesized that educable mentally retarded would show<br />

more adjustment problems in different areas that normal.<br />

IV. METHOD<br />

4.1 Participants<br />

The study comprised of 100 educable mentally retarded<br />

children (87 were male and 13 were female) and 100 normal<br />

controls, (50 male and 50 female) their chronological age ranged<br />

from 15 to 18 years. Subjects of retarded group were selected<br />

from the schools for mentally retarded and the sample of normal<br />

control subjects were selected from different high schools of<br />

Ranchi purposive sampling technique was employed for the<br />

selection of sample.<br />

4.2 Tools<br />

The following tools were used in the present study:<br />

4.2.1 Stanford – Binet Intelligence Scale – LM Form: An<br />

Indian adaptation of Stanford Binet Intelligence Scale revised<br />

LM Form by Kulshrestha (1971) was used for measuring<br />

intelligence of both mentally retarded and normal individuals.<br />

The reliability of this scale ranges from 0.95 to 0.98 for age 14 to<br />

18 years. The validity co-efficient ranges between 0.40 to 0.75.<br />

4.2.2 Mohsin – Shamshad Adaptation of Bell Adjustment<br />

Inventory (1987): The inventory consists of 135 items<br />

measuring adjustment in four different areas: home, health, social<br />

and emotional separately as well as it yields a composite score<br />

for overall adjustment.<br />

4.3 Procedure<br />

All subjects who were selected for the present study were<br />

interviewed and then assessed for IQ with the help of Stanford –<br />

Benet intelligence scale. Thereafter, Bell‘s adjustment inventory<br />

was individually administered on each mentally retarded and<br />

average intelligent student. After getting back the completed<br />

questionnaire the responses were scored as per the predetermined<br />

standard scoring procedure.<br />

4.4. Statistical Analysis<br />

Statistical analysis was done with the help of Statistical<br />

Package for Social Science (SPSS). The percentages, means,<br />

standard deviations and t tests were used to find if there were<br />

significant differences between the groups.<br />

V. RESULT AND DISCUSSION<br />

Analysis or Social-demographic data presented in table-1,<br />

indicated that, in educable mentally retarded group maximum<br />

number of sample (50%) was in the age group of 17 years.<br />

Majority (87%) of retardeds were male, from Muslim community<br />

(89.5%) rural area (75%) and 70% were from lower socioeconomic<br />

back ground.<br />

Result given in table II and figure-1 clearly showed that<br />

maladjustment scores of educable retarded groups are higher<br />

(Mean-78.82) in comparison to maladjustment scores of normal<br />

group (mean 40.46). Mean maladjustment scores of mentally<br />

retarded groups are higher in all the areas of adjustment i.e.<br />

home, health, social and emotional. The total maladjustment<br />

score of educable mentally retarded group is almost double to the<br />

score of normal control group.<br />

It was observed that the mean score of mentally retarded<br />

group was particularly higher in the social area (mean- 19.82)<br />

which was higher than the scores on other areas of adjustment.<br />

This probably indicates that the subject has difficulties in their<br />

social life. Because of their poor mental ability, the retarded find<br />

it difficult to adjust to the demands of the society and get a high<br />

maladjustment score in the social area. A considerable amount of<br />

research has been done on the social adjustment of mentally<br />

retarded (Meyers et al, 1979, Sukla, 1982, Kumar Singh and<br />

Akhtar 2009). It was found that social mal adjustment among<br />

mentally retarded have been manifested by difficulty in<br />

establishing close intimate relationship, loneliness, lack of<br />

friends, frustration and dissatisfaction with existing relationships.<br />

The feeling of loneliness decreases their active involvement in<br />

social relations.<br />

Mentally retarded children also exhibit severe adjustment<br />

problems in the emotional area, indicating presence of<br />

depression, nervousness, and anxiety. They suffer from<br />

emotional disturbance and try to cope in every aspect of life in a<br />

maladaptive and immature manner. The retarded must face the<br />

reality of his retardedness for the history of failure on intellectual<br />

tasks and they suffer from the feeling of inferiority,<br />

worthlessness, anger, helplessness, non-assertiveness and<br />

inadequate self confidence.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 95<br />

ISSN 2250-3153<br />

Mean scores of mentally retarded is quite high in the home<br />

adjustment area. The family life to which the retarded must<br />

adjust is complicated by parental guilt. Some parents of retarded<br />

children show evidence of strong guilt feeling for having brought<br />

into the world a child with limited abilities. One prevalent form<br />

of expression of his guilt is parental over protection. Such pattern<br />

of parental behavior encourages a dependent style of interaction<br />

in child. Other parents express guilt by denying the child‘s<br />

disabilities, the different reaction of the parents namely<br />

overprotection and denial, may creat adjustment problems for<br />

retarded children.<br />

Mentally retarded group gets lowest score in the health area in<br />

comparison to other areas of adjustment although this score was<br />

much higher than normal control group. Normal group shows<br />

poorer adjustment in emotional area in comparison to other<br />

dimensions of adjustment. It is quite natural because adolescent<br />

Table – I: Socio-demographic characteristics of the sample.<br />

Characteristics Number of Cases<br />

period is characterized as a period of stress and strain. During<br />

this period adolescents face with rapid physiological changes.<br />

Erickson (1950) has described adolescence as ‗period of identity<br />

crisis‘. Normal group belongs to this period & if they have<br />

shown adjustment problems in the emotional area, the findings<br />

are in the expected direction.<br />

Result given in table III reveal that the males of mentally<br />

retarded group showed significantly higher score in comparison<br />

with female group on social adjustment dimension.<br />

The male group of normal control significantly scored higher<br />

in comparison with female group on social, emotional and home<br />

dimensions. They did not differ in health dimension score. The<br />

table showed that there is no considerable difference between the<br />

male and female retarded group on home, health and emotional<br />

dimensions of adjustment.<br />

Age distribution in years Educable retarded Normal control<br />

N % N %<br />

13 years 10 10 15 15<br />

16 years 30 30 20 20<br />

17 years 50 50 25 25<br />

18 years 10 10 40 40<br />

Male 87 87 50 50<br />

Gender<br />

Religion<br />

Domicile<br />

Socio-economic Status<br />

Female 13 13 50 50<br />

Hindu 6 6 25 25<br />

Muslim 89 89 25 25<br />

Christian 5 5 25 25<br />

Sikh 0 0 25 25<br />

Urban 25 25 50 50<br />

Rural 75 75 50 50<br />

High 30 30 50 50<br />

Low 70 70 50 50<br />

Table – II: Comparison of Educably mentally retardeds and normal controls in terms of Mean adjustment scores.<br />

Dimension Groups Mean SD SEM MD t<br />

Home<br />

Health<br />

Social<br />

Emotional<br />

Total<br />

Retarded 16.30<br />

Normal 8.35<br />

Retarded 12.42<br />

Normal 8.65<br />

Retarded 19.82<br />

Normal 8.36<br />

Retarded 16.00<br />

Normal 10.25<br />

Retarded<br />

Normal<br />

78.82<br />

40.46<br />

2.6<br />

3.48<br />

3.44<br />

3.36<br />

3.24<br />

3.40<br />

4.15<br />

3.10<br />

9.25<br />

3.20<br />

.26<br />

.348<br />

.344<br />

.336<br />

.324<br />

.340<br />

.415<br />

.310<br />

.925<br />

.320<br />

7.95 18.92**<br />

3.77 8.19**<br />

11.46 24.91**<br />

5.75 11.5**<br />

38.36 39.54**<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 96<br />

ISSN 2250-3153<br />

** Significant at 0.01 level.<br />

Dimension<br />

Home<br />

Health<br />

Social<br />

Emotional<br />

Figure – I: Mean maladjustment scores of educably mentally retarded and non-retarded sample.<br />

Mean<br />

S D<br />

Mean<br />

S D<br />

Mean<br />

S D<br />

Mean<br />

S D<br />

Table – III: Gender difference in adjustment.<br />

Group<br />

Mentally Retarded Normal<br />

Male Female t Male Female t<br />

16.18<br />

7.92<br />

27.98<br />

8.88<br />

19.25<br />

16.12<br />

1.12<br />

18.05<br />

9.15<br />

18.15<br />

.05<br />

0.6<br />

0.01<br />

8.62<br />

3.37<br />

7.15<br />

4.15<br />

8.98<br />

7.25<br />

3.75<br />

8.10<br />

3.69<br />

7.02<br />

8.16 7.18 3.45 3.12<br />

19.02<br />

8.66<br />

20.15<br />

8.75<br />

.92<br />

18.64<br />

8.25<br />

16.25<br />

7.18<br />

2.74<br />

1.66<br />

4.35<br />

2.19<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 97<br />

ISSN 2250-3153<br />

VI. CONCLUSION<br />

(i) Educable mentally retarded group had greater adjustment<br />

problems than the normal control group.<br />

(ii) E.M.R. group showed highest maladaptive score in social<br />

area and lowest score in the health area in comparison to other<br />

areas of adjustment.<br />

(iii) No significant difference was found between the male and<br />

female retarded group on home, health and emotional area of<br />

adjustment.<br />

REFERENCES<br />

[1] Carson, R.C., Butcher, J.N., Mineka & Hooley, J.M. (2008): Abnormal<br />

Psychology 12th Ed. Pearson Education Inc. and Dorling kindersey<br />

Publishing.Inc.<br />

[2] Cullinan, D & Esplin, M.H. (1985).Adjustment problems of mildly<br />

handicapped and non-handicapped students.Revedial and Special<br />

education.6.No. 2-5-11.<br />

[3] Erickson, E.H. (1950). Growth and crises of the healthy personality.<br />

Symposium on the Healthy Personality. Josiah Macy, Jr.Found, New York.<br />

[4] Kulshrestha, S.K. (1971).Stanford Binet intelligence Scale. Hindi<br />

Adaptation.Manas Sewa Sausthan, 10, Louther Road, Allahabad.<br />

[5] Kumar, I., Singh.A.R. & Akthar.S. (2009).Social development of children<br />

with mental retardation. Industrial Psychiatry Journal.18 (1):56 – 59.<br />

[6] Mohsin, S.S & Shamshad, H. (1987).Manual for Mohsin-Shamshad, Hindi<br />

Adaptation of Bell Adjustment Inventory. Psycho-Scientific works.<br />

Publication Division, Mahendru, Patna, 1970.<br />

[7] Moore, B. C., & Moore, S. M. (1977).Mental retardation; Causes and<br />

Prevention. Columbus, Ohio: Charles E.merrill Publishing Co.<br />

[8] Perkins, S.N. (1977).Malnutrition and mental development. Exceptional<br />

Children.43, 214-220.<br />

[9] Sukla, T.R., Khoche, V. (1982).A study of adjustment problems of mentally<br />

retarded children. Indian Journal of mental retardation.7 (1):4 – 13.<br />

[10] Winnick, M, (1976).Malnutrition and brain development.Newyork: Oxford<br />

University, Press.<br />

AUTHORS<br />

Correspondence Author – Dr. Bharati ROY, Professor of<br />

Psychology,<br />

Ranchi University, Ranchi – 834 006, India.<br />

E-mail: bharatiroy.roy15@gmail.com<br />

Telephone #: 0651-2563686<br />

Mobile #: 09430789030<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 98<br />

ISSN 2250-3153<br />

Design of Efficient XTEA Using Verilog<br />

Shweta Gaba, Iti Aggarwal, Dr. Sujata Pandey<br />

Electronics and Communication Engineering, Amity School of Engineering and Technology,<br />

Amity University, India<br />

Abstract- In this age of viruses and hackers of electronic<br />

eavesdropping and electronic fraud, security is paramount. A<br />

cryptographic system ( or a cipher system) is a method of hiding<br />

data so that only certain people can view it. A cryptographic<br />

system typically consists of algorithms, keys, and key<br />

management facilities. There are several algorithms to choose<br />

from that vary in the security they provide, their size, the time it<br />

takes to encrypt or decrypt a block of data. In this paper, we<br />

analyze and evaluate the development of a cheap and relatively<br />

fast hardware implementation of the extended tiny encryption<br />

algorithm (XTEA). Originally the research was split into separate<br />

encipher/decipher units, but these have now been combined into<br />

a single unit. The design will start by using finite state machine<br />

(FSMs) and will use Verilog hardware description language to<br />

describe the design. Minimizing the chip area and security<br />

transmission of data will be our main goal. The targeted<br />

hardware systems are the reconfigurable Spartan III and Xilinx<br />

Virtex IV modern field programmable gate arrays (FPGAs).<br />

Index Terms- Encipher, Decipher, Finite State Machines,<br />

cryptographic system.<br />

T<br />

I. INTRODUCTION<br />

he security of symmetric cryptosystem [9] is a function of<br />

two parameters: the strength of the algorithm and the length<br />

of the key. The algorithm must be so secure that there is no better<br />

way to break it than with a brute-force attack. The security of the<br />

algorithm must be resided in the key and delta value we choose.<br />

So therefore, there is balance between choosing long key, delta<br />

and the time required to complete the enciphering operation.<br />

Many encryption algorithms [8] are available in the market and<br />

the selection of a specific one is dependent on the relatively tight<br />

constraints. The selected algorithm should be small, relatively<br />

secure, with a proven history of overcoming possible well known<br />

attacks on it. The Tiny Encryption Algorithm (TEA) (Wheeler<br />

and Needham 1994), [6] and hence its successor the Extended-<br />

TEAs (XTEAs) (Needham and Wheeler 1997; Russell 2004;<br />

Kelsey et al. 1997; Moon et al. 2002) [7] are among the best<br />

choices available for security purpose. The name of block cipher<br />

came from the fact that block cipher encrypts plaintext as blocks<br />

[8]. These blocks differ in size between block cipher algorithms,<br />

for example, in Data Encryption Standard DES the plaintext is<br />

divided into blocks of length 64, but it is 32 in International Data<br />

Encryption Algorithm (IDEA) [11], if the length of block cipher<br />

equal one them, it will become stream cipher.<br />

This paper uses the Verilog description language to implement<br />

the core function of XTEA and integrate them into a FPGA [10]<br />

chip. XTEA consist of two parts namely encipher and decipher<br />

units but we are developing in a single module. The unit accepts<br />

data in data_in1 and data_in2, a key in key, a delta in delta and<br />

the mode in block (‗00‘ for encipher, ‗11‘ for decipher). The<br />

all_done wire is raised when the results of the operation are<br />

ready to be read from out_1 and out_2. It needs to be reset before<br />

each use. The paper is arranged as follows:<br />

1) Abstract<br />

2) Introduction<br />

3) Verilog designing of XTEA<br />

4) Results of simulation and synthesis<br />

5) Conclusions<br />

II. IDENTIFY, RESEARCH AND COLLECT IDEA<br />

After attending the conference on VLSI MEMS and NEMS<br />

held in Amity University we got an idea to do some research<br />

work on XTEA. We have studied some research papers and<br />

Google it thoroughly. Till now a key of different 128 bit is<br />

required for both encipher and decipher but we have design it in<br />

such a way that we require same key for both encipher an<br />

decipher module.<br />

III. EXPERIMENTAL DETAILS<br />

XTEA [1] is a symmetric block cipher designed to correct<br />

weakness in TEA [6]. Like TEA, XTEA is a 64-bit block Feistel<br />

network with a 128-bit key and a suggested 64 rounds. Several<br />

differences from TEA are apparent, including a somewhat more<br />

complex key-schedule and a rearrangement of the shifts, XORs<br />

and additions (Hong et al. 2003; Ko et al.2004). Fig.1 shows the<br />

block diagram of an XTEA.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 99<br />

ISSN 2250-3153<br />

Fig.1 Block Diagram of XTEA<br />

In this proposed XTEA we are using different value of<br />

DELTA and KEY to increase the security. By doing this only the<br />

sender and receiver knows the value of both delta and key. And<br />

we also use 32 cycles for encrypting and decrypting the data in<br />

Feistel function to increase the security. Fig.2 shows the block<br />

diagram of a single XTEA round.<br />

Fig.2 A single XTEA round with its normal computational constructs.<br />

The crossed square for the sum, crossed circle for an XOR, >> for a<br />

right shift,


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

100<br />

ISSN 2250-3153<br />

data. So, we use Mealy Machine because mealy Machines use<br />

less number of states than Moore machine. In this state diagram,<br />

after resetting all the data at S0 state decides whether data has to<br />

be encrypted or decrypted. This is done by Block: If ―Block=00‖<br />

data goes for encryption i.e. state S1 and If ―Block=11‖ data goes<br />

for decryption i.e. State S9. After engaging the Encrypt signal,<br />

the system will enter the state s1, and will finish the encryption<br />

after busy signal goes low (x>32) and we get data at state S7.<br />

In the same manner, data which will be decrypted goes for<br />

decryption i.e. state S9.After engaging the Decrypt signal ,the<br />

system will enter the state S9,and will finish the decryption after<br />

busy signal goes low(x>32) and will get the decrypted data at S7.<br />

It must be noted that the encrypted data must be sent as input for<br />

decryption to get the same input data (as in encryption process)<br />

as output.<br />

Fig.4 Flow diagram for data decryption using Fiestel function<br />

IV. STATE DIAGRAM OF XTEA<br />

The state diagram of XTEA shows that how our XTEA works<br />

and tells about the actual flow of data during encryption and<br />

decryption and shown below in Fig.5:<br />

Fig.5 State diagram of XTEA<br />

While coding for XTEA, we want our algorithm which utilize<br />

minimum chip area and provide more security transmission of<br />

V. RESULTS AND DISCUSSIONS<br />

The proposed XTEA has been simulated on the ModelSim SE<br />

10.0a and has been synthesized on the Xilinx ISE 10.1. The<br />

figure 1 shows the generalized block diagram of XTEA with the<br />

maximum frequency of 129.099 MHz in case of Virtex4 and<br />

71.114MHz in case of Spartan3.<br />

In Fig.6, we show the waveforms of testing the encryption<br />

process. The reset signal was activated at first to insure that all<br />

the registers are cleared before starting any operation, note that<br />

the asynchronous reset is active high once. After that low the<br />

reset and select the block to set the module. Now, the module is<br />

ready to either encrypt or decrypt. One can distinguish<br />

between these two by the control signal i.e. block provided as an<br />

input to the system. After engaging the Encrypt signal, the<br />

system will enter the state s1, and will finish the encryption after<br />

busy signal goes Low (x>32). You can notice that the output is<br />

available at that time when x is equal to 32 which can easily<br />

shown in Fig.7.<br />

Fig.6 Testing the Encryption Process (shows the starting Portion of the<br />

waveform).<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

101<br />

ISSN 2250-3153<br />

FIG.7 Testing the Encryption Process (shows the Output after x is equal to 32)<br />

In Figure 8, we depict the waveforms of decryption state<br />

transition testing. The encryption and the Decryption processes<br />

are quite the same in architecture, but the decryption operates in<br />

a reverse manner on the data, and uses a subtract or rather than<br />

an adder. This test shows the transition of the state from the S0 to<br />

S9, because block is selected for decryption and here the input<br />

given is same as of output of encryption module, and will finish<br />

the decryption after busy signal goes high. You can notice that<br />

the output is available at that time when x is equal to 32 which<br />

can easily shown in figure 9.<br />

Fig. 8 Testing the Decryption Process (shows the starting Portion of the<br />

waveform).<br />

FIG.9 Testing the Decryption Process (shows the Output after x is equal to 32).<br />

VI. RTL SCHEMATIC<br />

The top module of the XTEA is shown below which we will get<br />

after synthesize our main module on Xilinx ISE 10.1.<br />

Fig.10 INTERNAL STRUCTURE OF XTEA WITH TWO<br />

BLOCKS - ENCIPHER AND DECIPHER<br />

VII. SYNTHESIS RESULT<br />

The synthesis result contains a table which shows the<br />

comparison between the old research and the proposed XTEA.<br />

While doing comparison we will find that our research shows<br />

great significance as our all the parameters are consuming less<br />

area and consumes less power to operate.<br />

TABLE.1Comparison between old research and proposed XTEA<br />

Parameters Virtex4SX25<br />

FF668<br />

Virtex4SX25<br />

FF668 [3]<br />

Spartan3s200tq<br />

144-4<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

102<br />

ISSN 2250-3153<br />

LUTs<br />

Clock<br />

1252 4,608 1182<br />

Period(ns) 7.746 6.403<br />

14.062<br />

Slice flip<br />

flops<br />

Maximum<br />

frequency<br />

244 1,081<br />

259<br />

129.099MHz 156.177MHz 71.114MHz<br />

VIII. CONCLUSIONS<br />

This uses Verilog description language to get the modules of<br />

XTEA. After studying the comparative analysis with [3] we<br />

conclude that there is a difference in between the number of<br />

slices, LUTs, GCLKs and the maximum frequency. While<br />

synthesizing our optimization goal is speed. The results are quiet<br />

stable and reliable and has great flexibility with high integration.<br />

REFERENCES<br />

[1] Extended TEA Algorithm proposed by Tom St Denis, April 20 th 1999.<br />

[2] Julio C. Hernandez, Pedro Isasi ―New results on the Genetic Cryptanalysis<br />

of TEA Reduced Round versions of XTEA‖ 2000 IEEE.<br />

[3] Steven M. Aumack, Michael D. Koontz Jr. ―Hardware Implementation of<br />

XTEA‖.<br />

[4] Derek Williams CPSC 6128- Network Security Columbus State University<br />

―The Tiny Encryption Algorithm (TEA)‖ April 26, 2008.<br />

[5] Gaidaa Saeed Mahdi, ―A Modification of TEA Block Cipher Algorithm for<br />

Data Security (MTEA)‖, Eng. & Tech., Journal, vol.29, No.5, 2011.<br />

[6] Wheeler, David J. and Needham, Roger M. TEA, ―a Tiny Encryption<br />

Algorithm‖ Computer Laboratory, Cambridge University, England.<br />

November, 1994.<br />

[7] Wheeler, David J. and Needham, Roger M. TEA Extensions. Computer<br />

Laboratory, Cambridge University, England. October, 1997.<br />

[8] Scheier, Bruce.‖ A Self-Study Course in Block-Cipher Cryptanalysis‖,<br />

Crypto logia, Vol.24 (1).January 2000.<br />

[9] Feistel, Horst.‖ Cryptography and Computer Privacy‖, Scientific American.<br />

Vol. 228(5). May 1973.<br />

[10] Ke Wang,‖ An Encrypt and Decrypt Algorithm Implementation on<br />

FPGAs‖, Semantics, Knowledge and Grid, 2009. SKG 2009. Fifth<br />

International Conference, Page(s): 298 – 301. B. Smith, ―An approach to<br />

graphs of linear forms (Unpublished work style),‖ unpublished.<br />

[11] Biham, Eli and Shamir, Adi,‖ Differential Cryptanalysis of the Data<br />

Encryption Standard‖, Springer Verlag, 1993. ISBN 0-387-97930-1, ISBN<br />

3-540-97930-1.<br />

AUTHORS<br />

First Author – Shweta Gaba, Pursuing M.Tech in VLSI, Amity<br />

School of Engineering and Technology, Amity University and email<br />

– gabashweta18@yahoo.co.in.<br />

Second Author – Iti Aggarwal, Pursuing M.Tech in VLSI,<br />

Amity School of Engineering and Technology, Amity University<br />

and e-mail – agarwal.iti7@gmail.com<br />

Third Author – Dr. Sujata Pandey, HOI of Electronics and<br />

Communication Dept. Amity School of Engineering and<br />

Technology, Amity University and e-mail – spandey@amity.edu.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 103<br />

ISSN 2250-3153<br />

Performance analysis & Optimization of WDM-EPON<br />

for Metropolitan Area Networking<br />

Tripuresh Joshi, Arvind Kumar Jaiswal, Mukesh Kumar<br />

Department of Electronics and Communication Engineering<br />

Sam Higginbottom Institute of Agriculture, Technology and Science, Allahabad, Uttar Pradesh, India -211007<br />

Abstract- In this paper, we introduce Bidirectional WDM-<br />

EPON for metropolitan area network for simultaneous transfer of<br />

Data and Video for replacing copper pair cable, with high data<br />

rate communication between CO (Central Office) and Subscriber<br />

End/ ONU (Optical Network Unit). We analyses the network<br />

with different data rate to minimize the problem of high<br />

attenuation, power loss, and improve the efficiency.<br />

Index Terms- Digital video, passiveoptical network (PON),<br />

video overlay, wavelength-division multiplexing (WDM).<br />

I<br />

I. INTRODUCTION<br />

n the era of high data rate communication there are various<br />

ways to communicate either Using the traditional<br />

communication system by coaxial cable, twisted pair cable or<br />

wirelessly. In early 70‘s a new communication technique was<br />

evolved incorporating optical fiber cable communication. Fibers<br />

are Silica glass fiber cables used to transmit data in optical<br />

domain with high speed and enormous bandwidth. There are<br />

several ways to transmit data using fiber cables which may be<br />

divided on the basis of ways of transmission of fiber<br />

communication system;direct communication optical fiber<br />

system and shared communication optical fiber system.<br />

The simplest optical distribution network is called direct fiber.<br />

In this architecture, each fiber leaving the central office goes to<br />

one customer, but technique is very expensive when we are<br />

talking in terms of several customers. So the shared fiber<br />

techniques have been evolved where in the fiber leaving the<br />

central office is shared by many customers. It is not until such a<br />

fiber gets relatively close to the customers that it is split into<br />

individual customer-specific fibers. There are two competing<br />

optical distribution network architectures which achieve this<br />

split; active optical networks (AONs) and passive optical<br />

networks (PONs).<br />

Passive optical networks (PONs) have been considered<br />

attractive due to their longevity, low operational costs, and huge<br />

bandwidth and are widely deployed in the first/last mile of<br />

today‘s operational access networks. PONs come in a number of<br />

flavours. The so-called asynchronous transfer mode (ATM) PON<br />

(APON) and broadband PON (BPON) are ATM-based systems.<br />

Gigabit PON (GPON), the successor of BPON, is able to support<br />

traffic other than ATM (e.g., telephony and Ethernet) in its native<br />

format by using time-division multiplexing (TDM) partitions and<br />

generic framing procedure (GFP) which are similar formats.<br />

Recently, Ethernet PONs (EPONs), standardized by the IEEE<br />

802.3ah Ethernet in the First Mile (EFM) Task Force, have been<br />

attracting and considerable attention from both industry and<br />

academia has been given. EPONs aim at converging the low-cost<br />

equipment and simplicity of Ether-net and the low-cost fiber<br />

infrastructure of PONs. EPONs are evolved to be a promising<br />

solution to provide sufficient bandwidth for emerging services<br />

such as video conferencing, distributed gaming, IP telephony,<br />

and video on demand.<br />

Current EPONs are single-channel systems; that is, the fiber<br />

infrastructure carries a single downstream wavelength channel<br />

and a single upstream wavelength channel, which are typically<br />

separated by means of coarse wavelength-division multiplexing<br />

(CWDM). In the upstream direction (from sub-scriber to<br />

network), the wavelength channel bandwidth is shared by the<br />

EPON nodes by means of TDM. In doing so, only one common<br />

type of single-channel transceiver is used network-wide,<br />

resulting in simplified network operation and maintenance. At<br />

present, single-channel TDM EPONs appear to be an attractive<br />

solution to provide more bandwidth in a cost-effective manner.<br />

Given the steadily increasing number of users and band-widthhungry<br />

applications, current single-channel TDM EPONs are<br />

likely to be upgraded in order to satisfy the growing traffic<br />

demands in the future. Clearly, one approach is to increase the<br />

line rate of TDM EPONs. Note, however, that such an approach<br />

implies that all EPON nodes need to be upgraded by replacing<br />

the installed transceivers with higher-speed transceivers,<br />

resulting in a rather costly upgrade. Alter-natively, singlechannel<br />

TDM EPONs may be upgraded by deploying multiple<br />

wavelength channels in the installed fiber infrastructure in the<br />

upstream and/or downstream directions, resulting in WDM<br />

EPONs. As opposed to the higher-speed TDM approach, WDM<br />

EPONs provide a cautious upgrade path in that wavelength<br />

channels can be added one at a time, each possibly operating at a<br />

different line rate. More important, only EPON nodes with<br />

higher traffic demands may be WDM upgraded by deploying<br />

multiple fixed-tuned and/or tuneable transceivers, while EPON<br />

nodes with lower traffic demands remain unaffected. Thus, using<br />

WDM enables network operators to upgrade single-channel<br />

TDM EPONs in a pay-as-you-grow manner where only a subset<br />

of EPON nodes may be upgraded gradually.<br />

In this paper ourfocus is on how to communicate up to the<br />

nearest part of subscriber‘s home or work place, in a<br />

Metropolitan Area Network (MAN). Sharing of one fiber in<br />

optical communication system can be done by using WDM-<br />

PONs (Wavelength Division Multiplexing Passive Optical<br />

Networks).<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 104<br />

ISSN 2250-3153<br />

II. WDM EPON ARCHITECTURE<br />

2.1 Proposed Bidirectional WDM PON<br />

Diverse services like Video-on-demand and multimedia<br />

broadcasting using minimum number of wavelengths have been<br />

incorporated in WDM PON increasing its utility to offer<br />

broadcasting services.The system proposed is developed and<br />

simulated for full duplex VoIP, data and digital broadcast Video<br />

signals over single mode fiber based on WDM PON as shown in<br />

figure 2.1.<br />

Figure 2.1: Proposed Bidirectional WDM PON Network. STB: Set Top Box<br />

2.2Down Streaming of Data, VoIP and Video Signals<br />

2.2.1 Operation at Central Office (CO)<br />

For the downstream data transmission, four Continuous Wave<br />

(CW) lasers operating in the range of 1550 ~ 1553 nm at the<br />

central office (CO) are being used. The output power of<br />

threelasers(1550, 1551 and 1552 nm) was set to be 0 dBm and<br />

laser at 1553 nm was set to be 1 dBm. Three laser sources<br />

operating at 1550, 1551 & 1552 nm have been modulated at<br />

10gbps, 5 gbps& 9gbps for data and laser source at 1553 nm is<br />

modulated at 10gbps for video signal. These are MZ Modulated<br />

in NRZ Format and then were multiplexed by using a 4X1 WDM<br />

Multiplexer. The modulated WDM channels passed through the<br />

1.3/1.5 µm WDM couplers, which were used for the separation<br />

of upstream and downstream channels. For the digital broadcast<br />

video signal, a CW laser operating at 1553 nm (output power:<br />

1dBm) have been used. This signal consisted of digital HD video<br />

channels from a bit sequence generator (operating in the range of<br />

10 GHz). The root-mean-square (rms) optical modulation index<br />

(OMI) per channel was set to be 2.6%. The video signal was<br />

multiplexed with the 3 downstream data channels at the WGR<br />

and amplified by using an erbium-doped fiber amplifier (EDFA)<br />

(output power: 17 dBm). These multiplexed channels were<br />

transmitted to the remote node (RN) through 30 km of singlemode<br />

fiber (SMF).<br />

2.2.2 Operation at Remote Node (RN)<br />

At the RN, the downstream channels were separated into<br />

baseband data and video signal using a 1:4 WDM DEMUX. The<br />

video signal operating at 1553 nm was then split by using a 1X3<br />

splitter and sent to three 2:1 WDM MUX input ports, so that it<br />

could be broadcasted to the 4 ONUs via 5 km of SMF. The<br />

baseband signals, delivered by three WDM channels operating in<br />

the range of 1550~1552 nm, were de-multiplexed by the WDM<br />

DEMUX and sent to each corresponding ONU. In order to<br />

minimise the work load of the central office we shifted the<br />

distribution system to the remote node for simplification of<br />

simulated optical network.<br />

2.2.3 Operation at Optical Network Unit (ONU)<br />

At the ONU, the video and baseband signals were directed to<br />

1:2 WDM DEMUX and sent to corresponding p-i-n photo-diode<br />

(PIN-PD) receiver by the 1.3/1.5- µm WDM couplers. We used<br />

dedicated receiver to detect both the video and baseband signals<br />

when the data rate of the downstream data was 10Gb/s.<br />

The output signal of the receiver was split, and sent to an error<br />

detector and a TV for the BER and video quality measurements,<br />

respectively. When the downstream data rate was 10 Gb/s, we<br />

separated the baseband and video signals using an additional<br />

1550~1552/1553- nm WDM DEMUX and sent to two<br />

independent receivers.<br />

2.3 Up Streaming of Data, Voice and Video Signals<br />

For the upstream channels, a directly modulated LED<br />

operating at 1300~1302 nm at each ONU to transmit 2.5-Gb/s<br />

data has been used. The output power and 3-dB bandwidth of the<br />

LED were about 3 dBm, respectively. In this simulation, we<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 105<br />

ISSN 2250-3153<br />

operated the upstream channels only at 2.5 Gb/s due to the<br />

limited power budget. However, if necessary, it could be possible<br />

to increase the upstream data rate up to about 7.5 Gbps by using<br />

the high-power LEDs capable of operating at high speed. The<br />

upstream data were first coupled into the same fiber used for the<br />

downstream channels by using 1.3/1.5 µm WDM couplers, and<br />

then sent to the corresponding ports of the WDM MUX at the<br />

RN. Thus, the upstream channels were automatically spectrumsliced<br />

and multiplexed by the WDM MUX at the RN. After<br />

transmission over 5 km of SMF, the multiplexed upstream<br />

channels were de-multiplexed by the WDM DEMUX at the CO.<br />

The de-multiplexed upstream channel was then detected by using<br />

the PIN photo-diode receiver via a 1.3/1.5 µm WDM coupler. In<br />

this network, identical transmitters were used at the entire ONUs<br />

since we used LEDs for the upstream transmission.<br />

III. RESULT AND DISCUSSION<br />

For this channel, the fiber length is set to be between 10 Km<br />

to 50 Km from CO to RN and 5Km will be added from RN to<br />

ONU. Value of Q-factors and signal power is taken and<br />

compared within the range of fiber length as shown in figure 3.1<br />

and figure 3.2 respectively. The value of the Q-factor are<br />

decreasing when the length of the fiber is increasing same as the<br />

transmission signal power, it be will decrease as the length is<br />

increasing. The variation of OSNR with distance coverage as<br />

shown in figure 3.3 indicates that when the fiber reach 30 Km the<br />

quality of transmission is still good and gets deteriorated as the<br />

length is increased beyond 30 Km, but when it reaches40 Km to<br />

50 Km, the performance of transmission is getting worst. It is<br />

further observed that when the length reaches 40 Km to 50 Km,<br />

its performance is worst and therefore an amplifier needs to be<br />

incorporated. The value of parameters e.g. Q-factor, signal<br />

power, noise power and OSNR for the specified length(0+5,<br />

10+5, 20+5, 30+5, 40+5 and 50+5 Km), at different data rates<br />

are shown in Table No. 3.1, Table No. 3.2, Table No. 3.3 &<br />

Table No. 3.4.<br />

Table 3.1: System Measurement at 10 Gb/s at 1550 nm for Data.<br />

Length<br />

(Km)<br />

Q-Factor Signal<br />

Power<br />

(dBm)<br />

Noise<br />

Power<br />

(dBm)<br />

OSNR<br />

(dB)<br />

0+5 4.21518 10.2810 -51.2647 51.5457<br />

10+5 4.10117 8.19247 -49.2647 51.4572<br />

20+5 4.33012 6.18614 -47.2647 51.4509<br />

30+5 4.37036 4.16775 -45.2647 51.4325<br />

40+5 4.38897 2.1423 -43.2647 51.4070<br />

50+5 4.45080 0.13474 -41.2647 51.3995<br />

Table 3.2: System Measurement at 5 Gb/s at 1551 nm for Data.<br />

Length<br />

(Km)<br />

Q-Factor Signal<br />

Power<br />

(dBm)<br />

Noise<br />

Power<br />

(dBm)<br />

OSNR<br />

(dB)<br />

0+5 5.54020 8.50604 -50.9485 49.4546<br />

10+5 4.76874 6.37868 -48.9485 49.3272<br />

20+5 5.1722 4.36422 -46.9485 49.3128<br />

30+5 5.35873 2.34143 -44.9485 49.2900<br />

40+5 5.51902 0.321221 -42.9485 49.2698<br />

50+5 5.59244 -1.71130 -40.9485 49.2372<br />

Table 3.3: System Measurement at 9 Gb/s at 1552 nm for Data.<br />

Length<br />

(Km)<br />

Q-Factor Signal<br />

Power<br />

(dBm)<br />

Noise<br />

Power<br />

(dBm)<br />

OSNR<br />

(dB)<br />

0+5 4.40331 7.76382 -50.7254 48.4892<br />

10+5 4.14752 5.57348 -48.7254 48.2989<br />

20+5 4.30115 3.54628 -46.7254 48.2717<br />

30+5 4.13236 1.51757 -44.7254 48.2429<br />

40+5 4.07893 -0.527713 -42.7254 48.1977<br />

50+5 3.99816 -2.548160 -40.7254 48.1772<br />

Table 3.4: System Measurement at 10 Gb/s at 1553 nm for Video.<br />

Length<br />

(Km)<br />

Q-Factor Signal<br />

Power<br />

(dBm)<br />

Noise<br />

Power<br />

(dBm)<br />

OSNR<br />

(dB)<br />

0+5 5.61559 6.91018 -55.2344 52.1446<br />

10+5 5.56571 4.58242 -53.2344 51.8168<br />

20+5 5.33704 1.92976 -51.2344 51.1642<br />

30+5 4.96501 -0.934781 -49.2344 50.2996<br />

40+5 5.03402 -3.74776 -47.2344 49.4866<br />

50+5 5.78113 -6.14907 -45.2324 49.0853<br />

Figure3.1: GraphQ-Factor (dB) with Distance Variation<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 106<br />

ISSN 2250-3153<br />

Figure 3.2: Graph Noise Power (dBm) with Distance Variation<br />

Figure 3.3: Graph OSNR (dB) with Distance Variation<br />

IV. CONCLUSION<br />

We have proposed and demonstrated a bidirectional PON for<br />

the simultaneous transmission of 4 WDM signals and HD digital<br />

broadcast video channels, up to35 km. This network could be<br />

implemented cost-effectively using a single strand of SM fiber<br />

for bidirectional transmission, LEDs for upstream WDM<br />

channels and one receiver for the detection of basebandsignals at<br />

2.5 Gb/s. In addition, the capacity of the proposed network could<br />

be upgraded easily by incorporating an additional WDM coupler<br />

and a receiver at the ONU.<br />

REFERENCES<br />

[1] D. K. Jung, H. Kim, K. H. Han, and Y. C. Chung, ―Spectrum-sliced<br />

bidirectional passive optical network for simultaneous transmission of<br />

WDM and digital broadcast video signals,‖ Electron. Lett., vol. 37, no. 5,<br />

pp. 308–309, 2001.<br />

[2] P. P. Iannone, K. C. Reichmann, and N. J. Frigo, ―High-speed point-topoint<br />

and multiple broadcast services delivered over a WDM passive optical<br />

network,‖ IEEE Photon. Technol. Lett., vol. 10, pp. 1328–1330, Sept. 1998.<br />

[3] M. Akbulut, C. H. Chen, M. C. Hargis, A. M. Weiner, M. R. Melloch, and<br />

J. M. Woodall, ―Digital communications above 1 Gb/s using 890-nm surface-emitting<br />

light-emitting diodes,‖ IEEE Photon. Technol. Lett., vol. 13,<br />

pp. 85–87, Jan. 2001.<br />

[4] U. Hilbk, T. Hermes, J. Saniter, and F.-J. Westphal, ―High capacity WDM<br />

overlay on a passive optical network,‖ Electron. Lett., vol. 32, no. 23, pp.<br />

2162–2163, 1996.<br />

[5] D. K. Jung, S. K. Shin, and Y. C. Chung, ―Wavelength-tracking technique<br />

for spectrum-sliced WDM passive optical network,‖ IEEE Photon. Technol.<br />

Lett., vol. 12, pp. 338–340, Mar. 2000.<br />

AUTHORS<br />

First Author – Tripuresh Joshi;PG-Student;SHIATS-DU,<br />

Allahabad, Uttar Pradesh, India-211007 email address –<br />

coolcog@gmail.com.<br />

Second Author – Arvind Kumar Jaiswal;Professor;SHIATS-<br />

DU, Allahabad, Uttar Pradesh, India-211007 email address –<br />

arvindkjaiswal@yahoo.co.in.<br />

Third Author – Mukesh Kumar;Assistant Professor;SHIATS-<br />

DU, Allahabad, Uttar Pradesh, India-211007 email address –<br />

mukesh044@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 107<br />

ISSN 2250-3153<br />

Next Generation of Internet Protocol for TCP/IP<br />

Protocol Suite<br />

Abstract- The Internet has instantly evolved into a vast global<br />

network in the growing techonology.TCP/IP protocol is the basic<br />

requirement for the recent time Internet .In TCP/IP proposed a<br />

security enhancement. This enhancement adds three modules.<br />

These are Security Policy, security control and data link layer.<br />

Security policy belongs to application layer, Security control is<br />

management located in the transport layer and Data security<br />

layer located between transport layer and IP layer. Security<br />

policy interacts with the system administrator for defining<br />

policies and roles of security to be applied in the data<br />

communications. Security control module provides the means to<br />

apply security policy module and established security channels.<br />

It usage four way handshaking and public key cryptography<br />

(PKC) to create virtual secure connection and secret key<br />

cryptography (SKC). Data security layer proposed Thin security<br />

over IP protocol. Thin security protocol encrypt and encapsulated<br />

the coming transport layer packet into TSP packets. Internet<br />

usage continues to increase exponentially. So network security<br />

becomes a growing problem. Even though IPv6 comes with build<br />

mechanism IPSec for security, it lacks security in application<br />

layer of TCP/IP protocol suite.IPv6 solves most of the security<br />

breaches for IPv4 with the use of IPSec but IPSec does not have<br />

any security provision in application layer and for security<br />

purpose there is a need for security mechanism. Here in TCP/IP<br />

architecture includes a layer called Security Layer, which<br />

guarantees security to provide Application layer using a protocol<br />

Application Layer Security Protocol.<br />

Index Terms- Internet, TCP/IP, Security policy, Security<br />

control, Data Security Layer<br />

T<br />

I. INTRODUCTION<br />

he emergence of IPv6 enables new generation of application<br />

and services. Security is traditionally connected to<br />

exigencies of defining sensitive data from illegal access. But in<br />

the moment network security is approached from a different<br />

perception. With the growing use of the internet infrastructure for<br />

commercial applications, the demand for quality of service is one<br />

of the Emerging paradigms in internet and seems to be corner<br />

stone for more and more network services. An increasing number<br />

of applications need multifaceted, consistent controls for<br />

guaranteeing Quality of service. Internet is based on TCP/IP<br />

protocol suite. IP was not planned with security in mind. TCP/IP<br />

suite is used for communication. It enabled million of computers<br />

to communicate globally.IPv6 is not designed to provide<br />

Miss. Soni Samprati<br />

Department of Computer Science of Engineering<br />

MIT Pune‘s, Maharashtra Academy of Engineering, Alandi(D).<br />

Pune University, India<br />

sonisamprati16@yahoo.com<br />

backward compatibility with IPv4, most IPv6 mission critical<br />

applications must be able to continuously interoperate with<br />

legacy IPv4 nodes. The most common transition mechanism now<br />

a days in Dual stack. A node with a dual stack allows coexistence<br />

and interoperability of IPv4 and IPv6 nodes using IPv4<br />

and IPv6 packets. The gateway which is located at the boundary<br />

of IPv4 and IPv6 address real translates IPv4 header into IPv6<br />

header or vice versa. To ensure end to end security between the<br />

end nodes, the deployment of IPSec since IPSec has been widely<br />

used in IP networks. AH header is inserted into the IP packet<br />

immediately after the outer IP header. Then, AH authentication<br />

the entire packet including the preceding IP header. The<br />

underlying of IPSec mechanism which preserve of translation<br />

gateway for most applications in the practices. When the<br />

translation gateway modifies the IP header from one address<br />

realm to another, IPSec evaluating this as violation of integrity<br />

and discards the packet. Therefore header from one address<br />

realm to another, IPSec evaluating this as violation of integrity<br />

and discard the packet. Here for TCP/IP suite security<br />

enhancement will be used. This enhancement adds three modules<br />

i.e. Security policy, security control and data security layer. The<br />

security policy belongs to application layer, and the security<br />

control and management located in the transport layer, the data<br />

security layer is located between the transport layer and IP layer.<br />

Security policy interacts with system administrator to define the<br />

policies and roles of security to be applied in data<br />

communication. Security control module provides the means to<br />

apply the security policy defined in security policy module and<br />

established a secure channel. It uses four way handshaking and<br />

public key cryptography (PKC) to create virtual secure<br />

connection and security entity (SE). SE holds the secret key<br />

cryptography (SKC) addresses of two host that share this SKC<br />

and other vital information necessary to carry out a secure data<br />

communication. For data security, proposed a thin security<br />

protocol (TSP) over IP protocol. TSP protocol encrypts and<br />

encapsulated the coming transport layer packet into TSP packets.<br />

The Tsp packet header consists only of two fields each of them is<br />

one byte. The first field identifies the TSP packets such as public<br />

key request, public key acknowledgement, secret key and secret<br />

key, and secret key acknowledgment. The second field carries<br />

information about the transport layer protocol.TSP designed and<br />

implementation, to concern minimize the overhead added to IP<br />

including traffic volume and transmission delay.<br />

IPv6 is current version, and most widely used internet<br />

protocol. IP enables data to be sent from one workstation to<br />

another in a network and is known as a connectionless protocol<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 108<br />

ISSN 2250-3153<br />

since there is no continuous connection between the two<br />

communicating devices. Therefore when a message is sent by<br />

means of IP it is broken up into packets, which may travel<br />

through a number of different routes to their final destination,<br />

and on arrival at their destination they are reassembled in their<br />

original form. Each device in a network has an IP address, which<br />

is used by the IP protocol to ensure that the packets of<br />

information to reach their correct destination. It holds great<br />

guarantee to become the backbone of the prospect of the internet<br />

and an important improvement over IPv4 in terms of scalability,<br />

security, mobility and convergence.<br />

Existing or Related Work<br />

The existing network layer protocol in the TCP/IP protocol<br />

suite is as present IPv4. IPv4/IPv6 translation gateway breaks<br />

IPSec. IPSec supports transport mode in providing end to end<br />

security between nodes. However, applying IPSec across<br />

translation gateway for this purpose violates TCP/UDP intrinsic<br />

functionalities. The co-existence of translation gateway and<br />

IPSec ESP is not feasible due to the IP header translation which<br />

cause the TCP/UDP checksum invalid.TCP/UDP checksum has a<br />

dependency on IP source and destination addresses through the<br />

inclusion of TCP/UDP pseudo-header in the calculation. Like<br />

normal Network Address Translation (NAT), while the<br />

translation gateway translates the IP address, it should also recompute<br />

the checksum. Since IPSec ESP encrypt and<br />

authenticates ESP header and TCP/UDP header, any attempt to<br />

modify to checksum causes the integrity check to fail.<br />

Alternately, if translation gateway dose not update the checksum,<br />

TCP/UDP verification will fail. NAT-Traversal (NAT-T) is<br />

designed to solve the problems inherent in using IPSec and<br />

translation gateway. The following section extensively describes<br />

the operation of NAT. With NAT-T, the UDP-ESP encapsulation<br />

is deployed to support the IPSec packets from both end nodes to<br />

traverse the translation gateway and to avoid any problems with<br />

the IPSec aware gateway. Let‘s imagine multiple connections are<br />

mapped to one allocated address. Since IPSec ESP does not use<br />

port information, the translation gateway can only utilize the<br />

protocol field in IP header to distinguish the packets. When the<br />

first IPSec connection in the table so that all IPSec ESP packets<br />

will be routed to the first connection. However, when there is the<br />

new IPSec connection, the translation gateway replaces the entry<br />

in the table and thus breaking the first IPSec connection. UDP-<br />

ESP encapsulation gives the translation gateway an UDP header<br />

containing UDP port that can be used for multiplexing IPSec data<br />

streams.<br />

Even though IPv4 is well designed, its security breaches make<br />

it inappropriate for the fast emerging Internet. To overcome these<br />

drawbacks, IPv6 also known as IPing was planned which became<br />

a standard in the recent past.<br />

IPv6 Security Issues<br />

From a security point of view, the new IPv6 protocol stack<br />

represents a considerable advance in reliable to the old IPv4<br />

stack. However, despite its innumerable virtues, IPv6 still<br />

continues to be by far vulnerable. IPv6 where security continues<br />

to be an important issues:<br />

Dual stack related issues: Presently, the internet<br />

continues to be mostly IPv4 based. However, it is<br />

reasonable to expect that this scenario will change soon<br />

as more and more networks are migrated to be new<br />

protocol stack. Unfortunately, migrating millions of<br />

networks is going to take quite some time. In the mean<br />

time, some form of 6 to 4 dual-stack will supply the<br />

desired functionality without any doubt; IPv4-IPv6 dual<br />

stacks increase the potential for security vulnerabilities-<br />

as a consequence of having two infrastructures with<br />

specific security problems. However, most of the issues<br />

are not direct result of specific IPv6 design flaws but<br />

mostly a result of inappropriate configuration.<br />

Header manipulation issues: The use of extension and<br />

IPSec can deter some common sources of attack based<br />

on header manipulation. However the fact that EH must<br />

be proposed by all stacks can be source of trouble- a<br />

long chain of EH or some considerably large size could<br />

be used to overwhelm certain node an attack. Its uses<br />

source of security problems such as address spoofing- in<br />

this case if the spoofed address is used to masquerade an<br />

external packet as one that was originated from the<br />

inside network.<br />

Flooding issues: Scanning for valid host address and<br />

services is considerably more difficult in IPv6networks<br />

that it is in IPv4 networks. However, the larger<br />

addressing space does not mean that IPv6 is totally<br />

invulnerable to this type of attack. Nor the lack of<br />

broadcast address makes IPv6 more secure. New<br />

features such as multicast address continue to be source<br />

of problem.<br />

Mobility: Mobility is a totally new feature of IPv6 that<br />

was not available in this predecessor. Mobility is a very<br />

complex function that raises a considerable amount of<br />

concern when considering security. Mobility uses two<br />

types of addresses, the real address and the mobility<br />

address. The first is a typical IPv6 address contained in<br />

an extension header. The second is a temporary address<br />

contained in the IP header. Because of the<br />

characteristics of this networks, the temporary<br />

component of a mobile node address could be exposed<br />

to spoofing attacks on the home agent. Mobility requires<br />

special security measures and networks administrators<br />

must be fully aware.[1]<br />

II. TCP/IP ARCHITECTURE<br />

The TCP/IP protocol suite referred to as the Internet protocol<br />

suite, is the set of communication protocol that implements the<br />

protocol stack on which the internet and most commercial<br />

networks run. It is made up of two most important protocols in<br />

suite: the Transmission Control Protocol (TCP) and the Internet<br />

protocol (IP). Internet protocol is the foundation of the TCP/IP<br />

protocol suite, science it is the mechanism responsible for<br />

delivering datagram‘s. The TCP/IP protocol suite is like OSI<br />

Reference model which is defined as a set of layers. Upper layers<br />

are logically to the users and deal with more abstract data,<br />

relying on lower protocols to translate data into forms that are<br />

transmitted physically over the network.TCP/IP suite which is<br />

the De facto standard for internet manages security with many<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 109<br />

ISSN 2250-3153<br />

other issues in the application layer making its a very thick one.<br />

Hence more, this means that the security problem needs to be<br />

solved by application developer whose consternation mainly on<br />

the main task of their application.<br />

Figure 1: TCP/IP architecture<br />

2.3.1. Security policy module:<br />

Security policy module lies on the application layer with<br />

respect to TCP/IP protocol suite and interacts with user to define<br />

the proper security requirements. This security policy are stored<br />

and used by security control and management module to define<br />

the actions that should be accomplished for each communication<br />

session.<br />

2.3.2. Security control and management module:<br />

Security control and management module gets security<br />

requirements from its upper layer, which is security policy<br />

module. Based on the requirements, this module acts on each<br />

communication session .Security control and management<br />

module is responsible on providing the means required by data<br />

security layer. It creates a security entity(SE) for each<br />

communication session. SE contains an address of the sender, an<br />

address of the receiver, symmetric encrypt key, encryption<br />

algorithm, compressing algorithm, compressing enable and SE<br />

lifetime for which this SE will stay alive in security cache. Fig.2<br />

[2] shows a four- way handshaking approach to establish a secure<br />

connection and exchange symmetric encryption keys between the<br />

sender and receiver.<br />

Figure 2: Exchanging symmetric encryption key using four-way<br />

handshaking<br />

2.3.3. Data security layer:<br />

Data security layer uses symmetric data encryption algorithm.<br />

The symmetric key used in this layer is provided by security<br />

control module. For each communication session there is security<br />

entity (SA). Hence more data security layer may uses data<br />

compressing algorithm to reduce the size of the encrypted data.<br />

We used data compressing because some encrypted algorithm<br />

output size is larger than input data the overhead added by<br />

compressing is accepted by security policy define by the system<br />

administrator. In fact the size is larger the input size in this case<br />

of the input size is small.<br />

2.3.4. Thin security protocol:<br />

Thin security protocols (TSP) intend to provide data security<br />

for all packets coming from transport layer. It encrypts transport<br />

layer packets using symmetric encrypt algorithm as shown in<br />

figure 1. The TSP header is only two bytes. The first one holds<br />

protocol vital information and the other preserve transport layer<br />

protocol type such as TCP or UDP.TSP two bytes header are<br />

specified in detail in figure 3.<br />

Figure 3: TSP Protocol Header<br />

The first byte contain TSP type field, which is 5-bits long; it<br />

holds the type of TSP packet that is transmitted. TSP types are<br />

public key request, public key acknowledgment (ACK), secret<br />

key, secret key ACK, end connection, and end connection ACK<br />

packet. The rest of the first byte is used as indication flags, the<br />

first one which is denoted as ―Include Trans. Layer‖ specifies<br />

wither this TSP packet has encrypted transport layer header or it<br />

is outside the encryption boundaries. The second bit denoted<br />

―Compress Packet‖ indicates if this packet is compressed.<br />

Compressing packet data is done after encrypting it. So it works<br />

as an indicator to allow the post-decryption handler to<br />

decompress the received data. The last bit is reserved for future<br />

utilization. The second byte, which indicates the upper layer<br />

protocol, is an identical field to the one in the original IP header.<br />

The upper layer protocol field is filled with 255 to indicate that<br />

TSP protocol is used [3].<br />

III. CRYPTOGRAPHIC ALGORITHM<br />

Cryptography algorithms provide high security to information<br />

on controlled networks. These algorithms are required to provide<br />

data security and users authenticity. Numerous encryption<br />

algorithms are extensively available and can be categorized into<br />

symmetric and asymmetric key. Some of the common algorithms<br />

are RE 2, DES, 3DES, RC6, Blow fish, Elgamal and AES.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 110<br />

ISSN 2250-3153<br />

Among these algorithms Blowfish and Elgamal are taken for the<br />

analysis that can be used for the proposed architecture.<br />

TABLE 1: Differentiate between these algorithms<br />

Attribu<br />

tes<br />

Blowfish Elgamal RC6 DES<br />

Block<br />

size<br />

64 bit NA NA 64 bit<br />

Keys Variable( One Symmet Constant<br />

32-448 Secret ric (56 bits)<br />

bits) key<br />

Speed Fast Slower Slower Slower<br />

than Blow than than<br />

fish Elgamal Blow<br />

fish<br />

Memor Large Comparati Less Less<br />

y space memory vely less<br />

than<br />

space<br />

Blow<br />

fish<br />

Perfor Very Good Good Good<br />

mance Good<br />

A. Blowfish:<br />

Blowfish is a variable length key, 64-bit block cipher. The<br />

algorithm consists of two parts: A key– expansion part and a data<br />

encryption part. Key expansion part converts a key of at most<br />

448 bits into several sub key arrays totally 4168 bytes. Blowfish<br />

uses a large number of sub keys. These keys must be<br />

precomputed before any data encryption or decryption. The key<br />

array also called p-array consists of 18 32 bit sub keys:<br />

p1,p2,….,p18. There are four 32 bit s-boxes with 256 entries<br />

each. S1, 0, S1, 1… S1, 255; S2, 0, S2, 1... S2, 255; S3, 0, S3,<br />

1....., S3, 255; S4, 0, S4, 1… S4, 255;<br />

Data encryption occurs via a 16 round Feistel network<br />

[reference]. Each round consists of a key dependent permutation,<br />

a key and a data dependent substitution. All operations are EX-<br />

Ors and additions on 32 bit words.<br />

Algorithm .1 (Encryption)<br />

1. The input is a 64 bit data element, i.e. X.<br />

2. Divide X into two 32 bit halves: XL,XR.<br />

3. then 16 rounds Feistel network: for i=1 to 16:<br />

4. XL=XL XOR Pi: for prevent the potential attack<br />

5. XR=F(XL) XOR XR<br />

6. After that swap XL and XR<br />

7. swap XL and XR again to under the last swap<br />

After 1s6 round.<br />

8. then XR=XR XOR P17 and XL=XL XOR P18<br />

9. Recombine XL and XR to get cipher text.<br />

TABLE 2: Dataset From Simulation<br />

Round No. of Files Original ALSP<br />

Architecture Architecture<br />

1 1 300ms 420ms<br />

2 3 800ms 925ms<br />

3 5 1750ms 2500ms<br />

4 8 820ms 900ms<br />

5 10 2200ms 2300ms<br />

Decryption for Blowfish is relatively straightforward. Ironically,<br />

decryption works in the same algorithmic direction as encryption<br />

beginning with the cipher text as input. However as expected, the<br />

sub keys are used in reverse order[ 3].<br />

IV. PERFORMANCE EVALUATION<br />

Performance is the vital part of the TCP/IP Protocol suite.<br />

Several performance metrics are used to evaluate the<br />

performance of the encryption algorithms such as Encryption<br />

time, Decryption time, CPU process time, and CPU clock cycles<br />

and Battery. To demonstrate the performance for the proposed<br />

architecture, a series of simulation runs are performed on a<br />

variety of set of data.<br />

Fig 4: Performance Evaluation<br />

From the previous one, it shows that the proposed architecture<br />

has poor performance when compared to the existing TCP/IP<br />

architecture. It also shows that the execution time of encryption<br />

algorithm is very high which a major reason for the lack of<br />

performance is[3].<br />

Blow Fish Algorithm is fast, free alternative to existing<br />

encryption algorithm. It is slowly gaining acceptance as a strong<br />

encryption algorithm and also Unpatented, license free and<br />

available for all users. It uses sub keys that are a One-way hash<br />

function. In Blow fish, no linear structure therefore, it reduces<br />

the complexity of exhaustive search. And also it is easy to<br />

understand therefore here Blow fish algorithm would be used.<br />

Here, We can modified to reduce the execution time Only that<br />

case performance of proposed system can be increased.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 111<br />

ISSN 2250-3153<br />

V. CONCLUSION<br />

In this paper outlined several security problems of IPv6.It also<br />

outlined new ideas to design efficient security mechanism for the<br />

TCP/IP protocol suite. With some changes in the existing model,<br />

high level of security can be obtained. In this new structure of<br />

TCP/IP we added three modules. These modules are: Security<br />

policy, Security Control and Data security layer. It uses four way<br />

handshaking and Public key cryptography (PKC) to create virtual<br />

secure connection and security entity (SE). SE holds the secret<br />

key cryptography (SKC), and address of two hosts that share this<br />

SKC.TSP protocol minimizes the overhead added to IP including<br />

traffic volume and transmission delay. In term of data size, TSP<br />

adds only two bytes as TSP header. Hence more, TSP compress<br />

the encrypted data before sending it. It provides tight security<br />

with the minor overhead of the exiting model based on this<br />

Application Layer Security Protocol (ALSP) architecture.<br />

ACKNOWLEDGMENT<br />

My heartfelt thanks to my guide, Prof. R. M. Goudar, Asst<br />

Professor, College of Maharashtra Academy of Engineering,<br />

Pune, who offered her whole hearted guidance and invaluable<br />

suggestions throughout the preparation of this paper. Above all I<br />

must and do thank God Almighty from the depth of my heart for<br />

the being with me at each and every stage assuring hope,<br />

confidence and courage to get the task accomplished in time.<br />

REFERENCES<br />

[1] Samuel Sotillo, IPv6 Security Issues, East Carolina University.<br />

[2] Mohammad Al-jarrah, Abdel-Karim R.Tamimi, Computer Engineering<br />

Department, Hijjah, Faculty for Eng. Techonology, Yarmouk University,<br />

Irbid 21163-Jordan.<br />

[3] M.Anand Kumar, Security Model for TCP/IP Protocol Security, Karpagam<br />

University.<br />

[4] Yongguang Zhang, A Multilayer IP Security Protocol for TCP Performance<br />

Enhancement in Wireless Networks, Member, IEEE.<br />

AUTHORS<br />

Soni Samprati, M.E (1 st year), Maharshtra Academy of<br />

Engineering, Pune<br />

sonisamprati16@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 112<br />

ISSN 2250-3153<br />

Evaluation of Anticarcinogenic and Antimutagenic<br />

Effects of Triphala Extract<br />

R.C.Agrawal, Rajani<br />

Research Department, Priyamvada Birla Cancer Research Institute, Satna, Madhya Pradesh, India<br />

Abstract- The results of the present investigation showed that<br />

topical single application of DMBA. followed by 1 % croton oil<br />

produced skin papillomas. The incidence of tumours reached<br />

100% and the value of cumulative number of papillomas in these<br />

animals were recorded 40 and the average number of papillomas<br />

per mouse (tumour yield) was found 6.6. The mice which<br />

received Triphala extract additionally showed a significant<br />

decrease in the number and incidence of tumour as compared<br />

with DMBA + croton oil group. When triphala extract was<br />

topically applied at the dose of 40 mg /kg body weight for 16<br />

weeks to the skin of animals the tumor incidence was found 60%<br />

and the value of cumulative number of papillomas in these<br />

animals were recorded 6 and the average number of papillomas<br />

per mouse in this group was found 1.5. The differences in the<br />

values of results of the experiment was statistically analyzed and<br />

found significant in comparison to the control group at (p< 0.05).<br />

In another study the effect of triphala extract on B16F10<br />

melanoma tumour bearing mice was also evaluated. The<br />

inhibition rate was 69 % in triphala extract groups group as<br />

compared to control group. The life span was also increased by<br />

52 % as compared to control group. The tumour volume of<br />

triphala treated mice was significantly reduced as compared to<br />

control. The result was found significant in comparison to the<br />

control group (p< 0.05).<br />

In antimutagenicity studies, single application of triphala<br />

extract at the dose of 40, 80 and 120 mg/kg body weight, 24<br />

hours prior the intraperitonial administration of<br />

Cyclophosphamide (at the dose of 50 mg/kg) have significantly<br />

prevented the micronucleus formations and chromosomal<br />

aberrations in dose dependent manner in bone marrow cells of<br />

mice as compared to Cyclophosphamide group. It may be<br />

concluded that triphala extract exert anticarcinogenic and<br />

antimutagenic effect in the present set of experiments.<br />

T<br />

I. INTRODUCTION<br />

riphala is a combination of the dried fruits of Terminalia<br />

chebula, Terminalia belerica, and Emblica officinalis in<br />

equal proportions. It is therefore making it useful as an internal<br />

cleansing, detoxifying formula ( Jagetia et al,2002 ). This<br />

compound and its individual ingredients are highly valued in<br />

Ayurveda, and being compared to a "good manager of the<br />

house," aiding digestion, nutrient absorption and body<br />

metabolism. In a study it has been reported that Triphala<br />

possessed the ability to induce cytotoxicity in tumor cells but<br />

spared the normal cells (Sandhya et al, 2005 and 2006). Another<br />

report found that "Triphala" showed a significant cytotoxic effect<br />

on cancer cell-lines. It has been concluded that the action was<br />

due to gallic acid-a major polyphenol found in "Triphala". (Kaur<br />

et al ,2005) It was also effective in reducing tumor incidences<br />

and increasing the antioxidant status of animals. It was observed<br />

that Triphala was more effective in reducing tumor incidences as<br />

compared to its individual constituents (Deep et al,2005 ).<br />

Antioxidant studies conducted revealed that all three constituents<br />

of triphala are active and they exhibit slightly different activities<br />

under different conditions and the mixture, triphala, is expected<br />

to be more efficient due to the combined activity of the<br />

individual components (Naik et al, 2005). Similar results were<br />

also reported that ―Triphala, an ayurvedic rasayana drug, protects<br />

mice against radiation-induced lethality by free-radical<br />

scavenging.‖(Jagetia et al, 2002) Triphala, may be potent and<br />

novel therapeutic agents for scavenging of Nitrous Oxide ( NO)<br />

and thereby inhibited the pathological conditions caused by<br />

excessive generation of NO and its oxidation product, per<br />

oxynitrite. Since there is a paucity of information regarding<br />

anticarcinogenicity and antimutagenicity of triphala extract, we<br />

have therefore undertaken to study these parameter in the<br />

experimental animals.<br />

II. MATERIALS AND METHODS<br />

Animals: Random bred male Swiss Albino and C57 Bl hybrid<br />

mice of (6-8 weeks old) of 15-20 gms body weight were obtained<br />

from the animal colony of our research centre. They were kept<br />

on controlled temperature (22 0 C) and 12 : 12 hours light and<br />

dark cycle and were given synthetic pellet diet and water ad<br />

libitum. The experiment was approved by the institutional animal<br />

ethic committee before conduction of the experiments.<br />

Chemicals: Cyclophosphamide was purchased from Sigma<br />

chemical Co., U.S.A. and other chemical were reagents grade<br />

and were procured locally for the study.<br />

III. PREPARATION OF TRIPHALA EXTRACT.<br />

Triphala was purchased from Dabur chemical co. The 50 gm<br />

powder was mixed in 50 % methanol and kept in separating<br />

funnel for 6 hours. The supernatant was collected and this<br />

process was repeated until clear solution of supernatant was<br />

obtained. All supernatant was pooled together and dried to the<br />

powder at 40 0 C water bath. The final powder was soluble in<br />

water therefore it was dissolved in double distilled water before<br />

the each treatment at required concentrations.<br />

(A) Experimental design<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 113<br />

ISSN 2250-3153<br />

Skin Bioassay Protocol<br />

Procedure<br />

Experiments were performed as per the method reported by<br />

Berenblum (1975) and Sukumaran and Kuttan R. (1991). A<br />

group of 6 mice (Shaved on dorsal skin two days earlier) single<br />

application of 104 μg of DMBA in acetone (100 μl), was began 1<br />

week after initiation Triphala extract (100 μl) were applied 1 hr.<br />

before each croton oil treatment. The extract was applied to the<br />

shaved area using the micropiptette. The experiment was<br />

continued for 16 weeks. Skin tumour formation was recorded<br />

weekly and the tumours greater than 1 mm in diameter were<br />

included in counting of total number of papillomas / mouse,<br />

tumour incidence and tumour yield was recorded if they<br />

persisted for two weeks or more.<br />

Group 1 (Untreated control) No treatment was given. .<br />

Group 2 (Vehicle control) 100 μl acetone 2 times /week up to<br />

16 weeks<br />

Group 3(DMBA alone) 104 μg DMBA was dissolved in 100 μl<br />

acetone and single application was given.<br />

Group 4 (Croton oil alone) 1 % Croton oil was applied on skin<br />

2 times a week up to 16 weeks.<br />

Group 5 (DMBA + Croton Oil) The animals were treated with<br />

a single dose of DMBA (104 μg/100 μl of acetone) over the<br />

shaven area of the skin of the mice. One week later, croton oil<br />

(1% in 100 μl of acetone) was applied as a promoter 3 times per<br />

week until the end of the experiment (i.e. 16 weeks).<br />

Group 6 (DMBA + Triphala extract. + Croton Oil) The<br />

animals were treated with Triphala extract (40 mg /kg) topically<br />

one week after DMBA (104 μg/100 μl of acetone) application,<br />

followed by the application of croton oil (1% in 100 μl of<br />

acetone thrice a week) until the end of the experiment (i.e. 16<br />

weeks).<br />

Group 7 (Triphala extract alone): - The animals were treated<br />

Triphala extract (40 mg /kg) without DMBA and Croton oil was<br />

given 3 times a week up to 16 weeks.<br />

Each group‘s consists of 6 animals for skin model assay and<br />

the animals of all groups were kept under observation for gross<br />

and microscopic changes in skin.<br />

(B) Melanoma model<br />

Melanoma cell line was obtained from National Cell Science<br />

Research Centre, Pune and 5 lacks cells / animal were injected.<br />

After implantation of the melanoma cell line, animal were kept<br />

under observation and experiment was started after 10 days when<br />

the tumours were seen. The treatment was given orally for 30<br />

days and tumour volume and survival time of each animal was<br />

recorded. The following groups were maintained.<br />

Control Group: This group consisted of four mice. The<br />

melanoma cell line (B6F10) were injected subcutaneously (S.C.)<br />

in all four mice.<br />

Test Group: This group was divided into two sub groups.<br />

Each group consisted of four animals. The melanoma cell line<br />

was injected by S.C. route. The tumour bearing mice were orally<br />

given dose of 40 mg/ Kg body weight in 50 % methonolic extract<br />

of Triphala. as standardized by us in earlier experiments<br />

(Agrawal et al, 2009).<br />

Antimutagenic study: The cytogenetic damage in the bone<br />

marrow cells were studied by chromosomal aberrations and<br />

micronuclei induction.<br />

(i) Chromosomal aberrations analysis: For the<br />

chromosomal aberrations assay, the Triphala<br />

extract at different dose levels i.e. 40 ,80 and 120<br />

mg/kg body weight in the volume of 0.2 ml was<br />

injected 24 hours before the treatment of<br />

cyclophosphamide. The positive control group<br />

received single i.p. injection of 50 mg/kg<br />

cyclophosphamide in 0.9% saline. Colchicine (4<br />

mg/kg b.wt ) was administered intraperitoneally 2<br />

hours before the harvest of the cells. Animals were<br />

sacrificed by cervical dislocation and bone marrow<br />

cells were harvested. The slides were prepared<br />

essentially as per modified method of Preston et al<br />

(1987) for chromosomal aberrations and method of<br />

Schmid (1975) and standardized by us (Agrawal et<br />

al ,1998, 1999) for micronucleus evaluations. The<br />

femur was excised and the bone marrow was<br />

extracted in 0.56 % KCl. The harvested cells were<br />

incubated at 37 0 C for 20 minutes and then<br />

centrifuged for 10 minutes at 1000 rpm. Cells were<br />

fixed in Carney‘s fixative (Methanol: Acetic acid,<br />

3:1) and burst opened on a clean slide to release the<br />

chromosomes. The slides were stained with 5 %<br />

Giemsa solution for 15 minutes and then put in<br />

xylene and mounted with DPX. A total of 100 well<br />

spread metaphase plates were scored for<br />

chromosomal aberrations at a magnification of<br />

1000 X (100 x 10 X) for each group. Different<br />

types of chromosomal aberrations such as<br />

chromatid breaks, gaps, pulverization, polyploidy,<br />

centromeric association etc. were scored and<br />

expressed as % chromosomal aberrations.<br />

(ii) Micronuceus assay: The femur of mice was<br />

dissected out and the bone marrow was flushed out<br />

in HBBS solution as described by us earlier (<br />

Agrawal et al,1998) . The smear was made in<br />

precleaned slides, air dried and fixed in absolute<br />

methanol. The slides were stained with<br />

Maygrunwald and Giemsa stain. About 2000 cells<br />

were counted and number of micronucleated<br />

polychromatid and Normochromatid erythrocytes<br />

cells were scored. PCE/NCE ratio was also<br />

calculated. The data are presented in MNPCE+SE.<br />

The statistical significance was evaluated using<br />

Student's `t' test.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 114<br />

ISSN 2250-3153<br />

IV. RESULTS<br />

The results of the present investigation have been summarized<br />

in Tables 1 and 2. Topical single application of DMBA at the<br />

dose of 104 mg/kg b. wt. followed by 1 % croton oil produced<br />

skin papillomas. The incidence of tumours reached 100% and<br />

the value of cumulative number of papillomas in these animals<br />

were recorded 40 and the average number of papillomas per<br />

mouse (tumour yield) was found 6.6.<br />

The mice which received Triphala extract showed a<br />

significant decrease in the number and incidence of tumour as<br />

compared with that of the DMBA + croton oil group. When<br />

triphala extract was topically applied at the dose of 40 mg /kg b.<br />

wt. for 16 weeks to the skin of animals the tumor incidence was<br />

found 60% and the value of cumulative number of papillomas in<br />

these animals were recorded 6 and the average number of<br />

papillomas per mouse in this group was found 1.5 . The<br />

differences in the values of the results of experimental groups<br />

were statistically analyzed and found to be significant in<br />

comparison to the control group at (p< 0.05).<br />

Histopathology of skin tumour<br />

The animals which received the treatment of DMBA + Croton<br />

oil for 16 weeks showed the infiltration nests of neoplastic<br />

squamous epithelium . The tumour cells exhibited a high nuclear<br />

cytoplasmic ratio. Moderate cytoplasm and dense clumped<br />

chromatin were also seen. Adjacent epithelium showed marked<br />

hyperkeratosis. This is suggestive of kerating squamous cell<br />

carcinoma grade II. When the triphala extract was applied along<br />

with the DMBA and Croton oil malignant tumours were not seen<br />

as compared to DMBA + Croton oil group. In the case of this<br />

group only four mice had tumours and the histopathology report<br />

suggest in these animals were having papillomatous hyperplasia,<br />

papilloma, extracellular keratin and epithelial hyperplasia with<br />

mild displasia was reported and the remaining animals showed<br />

the normal skin.<br />

The study showed the effect of triphala extract on B16F10<br />

melanoma tumour bearing mice. The preventive effect of triphala<br />

extract was calculated using the parameter of inhibition rate (IR),<br />

Increase in the life span (ILS), and Volume of tumour . The<br />

inhibition rate was 69 % in triphala extract treated group as<br />

compared to control group. The life span was also increased in<br />

52 % as compared to control group. The volume of triphala<br />

treated mice was significantly reduced as compared to control.<br />

The differences in the values of the results of experimental<br />

groups were statistically analyzed and found significant in<br />

comparison to the control groups (p< 0.05).<br />

In cytogenetic studies, single application of triphala extract<br />

at the dose of 40, 80 and 120 mg/kg dry weight, 24 hours prior<br />

the i.p. administration of Cyclophosphamide (at the dose of 50<br />

mg/kg) have significantly prevented the micronucleus formations<br />

in dose dependent manner in bone marrow cells of mice as<br />

compared to Cyclophosphamide group (Table 4). The dose<br />

dependent protection was also observed in chromosomal<br />

aberrations assay in bone marrow cells of mice in triphala<br />

extract treated mice as compared to known mutagen,<br />

Cyclophosphamide treated groups (Table 5)<br />

V. DISCUSSION<br />

The present study demonstrated that when triphala extract was<br />

given one hour before the each application of croton oil, the<br />

incidence and the number of skin papillomas was significantly<br />

decreased. The reduction in tumour count may be due to effect in<br />

the promotional phase of tumourgenesis which prevent the<br />

reduction of free radicals (Huachen and Krystyn, 1991). Triphala<br />

becomes one of the highly potential herbal medicines in cancer<br />

treatment and prevention because all three compositions of<br />

Triphala have been found to possess notable anticancer<br />

properties (Sandhya et al., 2006a).Although very little is known<br />

about the mechanism by which these plants act against cancer<br />

cells. The mechanism of in vitro cytotoxicity and tumor growth<br />

reduction in vivo induced by Triphala seems to involve apoptosis<br />

induction. In addition, the components of Triphala may exert<br />

synergistic cytotoxic action on tumor reduction. Gallic acid is<br />

one of the major components of Triphala and capable of<br />

inhibiting cancer cell proliferation suggesting the key factor<br />

responsible for antimutagenic and cytotoxic effects of Triphala<br />

(Kaur et al., 2005). Polyphenols such as tannins and gallic acid, a<br />

component unit of hydrolysable tannins, are well known inducers<br />

of apoptosis in tumor cells (Inoue et al., 2000). Topical<br />

application of TPA (active constituent of croton oil) has been<br />

reported to increase production of free radicals (Huachen, and<br />

Krystyna, 1991). This is perhaps due to the free radical oxidative<br />

stress that has been implicated in the pathogenesis of a wide<br />

variety of clinical disorders (Das, 2002). Many antioxidants and<br />

anticarcinogenic compounds appear to have major effect on the<br />

detoxification of the carcinogens by the induction of Phase II<br />

detoxification enzymes since these enzymes divert carcinogens<br />

to react with critical cellular macromolecules (Prochaska et al.,<br />

1992). The anticarcinogenic effect of triphala extract suggests its<br />

role in chemoprevention of skin cancer. These results are<br />

important because this drug is used globally as a bowl cleaning<br />

agent. It may also be an important drug for chemotherapeutic<br />

treatment of cancer.<br />

REFERENCES<br />

[1] Agrawal, R.C. and Kumar, S. Prevention of cyclophosphamide induced<br />

Micronucleus formation in mouse bone marrow by Indole-3-carbinol, Food<br />

and Chemical Toxicol, 36, 1998, 975-977.<br />

[2] Agrawal, R.C. and Kumar, S. ―Prevention of chromosomal aberrations in<br />

mouse bone marrow by Indole-3-carbinol‖, Toxicology Letters, 106,<br />

1999, 137-141.<br />

[3] Agrawal, R.C.; Jain,R.; Raja,W and Oves,M. (2009) Anticarcinogenic<br />

effects of Solanum lycopersicum fruit extract on Swiss albino and C57 BL<br />

mice. Asian Pacific journal of Cancer prevention,Vol 10, 379-382<br />

[4] Berenbrum,I. (1975) Sequential aspects of chemical carcinogenesis in skin<br />

Cancer: A comprehensive treatise, Plenum press,New York,1,323-324<br />

[5] Das UN. (2002) A radical approach to cancer. Med. Sci. Monit. 8: 79-92.<br />

[6] Deep G, Dhiman M, Rao A R, Kale R K, Chemopreventive Potential of<br />

Triphala ( a composite Indian drug) in benzo (a) pyrene induced<br />

forestomach tumorgenesis in murine tumor model system J. exp. Clin.<br />

cancer Res 2005 Dec, 24 (4): 555-63<br />

[7] Huachen W and Krystyna F. (1991) In vivo formation of oxidized DNA<br />

base in tumor promoter-treated mouse skin. Cancer Res.,51: 4443.<br />

[8] Inoue, M., Sakaguchi, N., Isuzugawa, K., Tani, H. And Ogihara, Y. 2000.<br />

Role of reactive oxygen species in gallic acid-induced apoptosis. Biological<br />

& Pharmaceutical Bulletin, 23, 1153-1157<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 115<br />

ISSN 2250-3153<br />

[9] Jagetia GC, Baliga MS, Malagi KJ, Klamath M. The evaluation of the<br />

radioprotective effect of Triphala (an ayurvedic rejuvenating drug) in the<br />

mice exposed to gamma-radiation. Phytomedicine. 2002; 9:99-106.<br />

[10] Kaur S, Michael H, Arora S, Harkonen PL, Kumar S. 2005 The in vitro<br />

cytotoxic and apoptotic activity ofTriphala-an Indian herbal drug. Journal of<br />

Ethnopharmacology, 97, 15-20.<br />

[11] Naik GH, Priyadarsini KI, Bhagirathi RG, et al. In vitro antioxidant studies<br />

and free radical reactions of triphala, an ayurvedic formulation and its<br />

constituents. Phytother Res. 2005; 19:582-586.<br />

[12] Naik, H. Priyadarsini K. I., and Hari Mohan. Free radical scavenging<br />

reactions and phytochemical analysis of triphala, an ayurvedic formulation<br />

RESEARC COMMUNICATIONS CURRENT SCIENCE, VOL. 90, NO.<br />

8, 25 APRIL 2006<br />

[13] Prochaska HJ, Santamaria AB and Talalay P. (1992) Rapid detection of<br />

inducers of enzymes that protect against carcinogens. Proc. Natl. Acad. Sci.<br />

USA 89: 2394-2398.<br />

[14] Preston ,J, R., Brian J. Dean, Sheila Galloway, Henry Holden, Alfred F.<br />

MeFee, and Michael Shelby, ―Mammalian in vivo cytogenetic assays,<br />

Analysis of chromosomal aberrations in mouse bone marrow cells‖,<br />

Mutation Research, 189, 1987, 157-165.<br />

[15] Sandhya T.; Lathika K.M.; Pandey B.N; Mishra K.P; potential of ayurvedic<br />

formulation, Triphala, as novel anticancer drug cancer letters 2006<br />

vol.231,n02 , p.p. 206-214<br />

[16] Schmid,W., ―The micronucleus test‖, Mutation Research,1975,31, 9-15.<br />

First Author –R.C.Agrawal, Research Department, Priyamvada<br />

Birla Cancer Research Institute, Email:<br />

rcagrawal60@yahoo.com, Phone: 91-9826949427<br />

Table 1: Cumulative no, of Papilloma on Triphala extract treated Swiss mice.<br />

GROUPS DOSE TIME OF 1 st<br />

CUMULATIVE MEAN NO.<br />

APPEARANCE OF NO. OF<br />

OF<br />

PAPILLOMA PAPILLOMA PAPILLOMA<br />

DMBA* + 104 µg/ animal On 29<br />

Croton Oil** + 1 %<br />

th day 40 6.6<br />

DMBA* alone 104 µg/ animal - 0 -<br />

Croton oil** 1 % - 0 -<br />

DMBA* + 104 µg/ animal On 69th day 6 1.5<br />

Croton Oil** + + 1 % + 40<br />

Triphala<br />

***extract<br />

mg/kg b wt<br />

Triphala<br />

***alone<br />

40 mg/kg b wt - 0 -<br />

* Single application of DMBA was given at the dose of 104 µg/animal<br />

(4 mg/kg b.wt.)<br />

**1 % croton oil was given one hour before each application of Triphala extract.<br />

*** Triphala extract at the dose of 40 mg/kg body weight was given one hour before the each application of croton oil.<br />

Table2: Tumour incidence in mice treated with Triphala extract<br />

GROUPS NO.OF WEEKS<br />

4 th WEEK 8 TH WEEK 12 TH WEEK 16 TH WEEK<br />

DMBA* + Croton 1/6<br />

3/6<br />

5/6<br />

6/6<br />

Oil**<br />

(16 %) (50%)<br />

(83%)<br />

(100%)<br />

DMBA alone* 0/6 0/6 0/6 0/6<br />

Croton oil** 0/6 0/6 0/6 0/6<br />

DMBA* + Croton 0/6<br />

1/6<br />

3/6<br />

4/6<br />

Oil** +Triphala<br />

extract ***<br />

(0 %) (16 %)<br />

(50%)<br />

(60%)<br />

Triphala extract *** 0/6 0/6 0/6 0/6<br />

* Single application of DMBA was given at the dose of 104 µg/animal<br />

(4 mg/kg b.wt.)<br />

**1 % croton oil was given one hour before each application of Triphala extract.<br />

*** Triphala extract at the dose of 40 mg/kg body weight was given one hour before the each application of croton oil.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 116<br />

ISSN 2250-3153<br />

Table 3: Malenoma Skin bio Assay (Triphala extract treatment)<br />

GROUP DOSE<br />

( mg/kg b wt)<br />

TUMOUR<br />

VOLUME<br />

(in mm)<br />

MEAN<br />

SURVIVAL<br />

(in days)<br />

ILS( %) IR (%)<br />

Untreated<br />

Group<br />

- 1638 ± 345.5 17.5 - -<br />

Triphala ext 40 505± 17* 26.6 52 69.2<br />

* denotes stastical significance at p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 117<br />

ISSN 2250-3153<br />

2.<br />

Triphala Ext. + CP (<br />

40 mg/kg + 50 )<br />

3. Triphala Ext. +<br />

CP(80 mg/kg +<br />

50)<br />

4. Triphala Ext. +<br />

CP(120 mg/kg +<br />

50)<br />

5. Triphala Alone (40<br />

mg/kg)<br />

22.40 ± 6.70* 4 5 3 3 8<br />

17.74 ± 3.80* 3 4 2 2 7<br />

13.07 ± 3.80* 2 3 1 1 6<br />

9.08 ± 0.80 *<br />

2 2 Nil Nil 5<br />

* denotes statistical significance in `t' test as compared to<br />

cyclophosphamide treated group at P < 0.05<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 118<br />

ISSN 2250-3153<br />

Object Detection in Remote Sensing Images: A Review<br />

Abstract- In this paper, we address the problem of presegmentation<br />

for object detection and statistics in remote sensing<br />

image processing. It plays an important role in reducing<br />

computational burden and increasing efficiency for further image<br />

processing and analysis. We follow the paradigm of object<br />

detection by Active Contour Method, then imposes structural<br />

constraints for the detection of the entire object. We have<br />

analyzed the performance of the proposed scheme<br />

comprehensively and specifically using some measured data, and<br />

carried out comparisons of the existing algorithms. The results<br />

show that the proposed scheme could improve the application<br />

ability in target detection.<br />

Keywords- Remote Sensing Images, Active Contour Method,<br />

Hough Transform<br />

A<br />

I. INTRODUCTION<br />

s the advance of remote sensing technology, the very high<br />

quantity remote sensing images become widely available.<br />

With the increasing volume of image data, it is desirable to<br />

develop the technique for remote sensing image analysis and<br />

understanding. However, the overwhelming amount of image<br />

data impose heavy computation constrain. Also, many<br />

applications, such as target or object detection, are only focusing<br />

on some salient regions in the image [1]. It is desired to extract<br />

regions of interest before further processing and analyzing.<br />

Salient region extraction is an important method to detect the<br />

region of interest. It is operated to select a subset of the available<br />

sensory information before further processing and sample the<br />

most relevant features, most likely to reduce the complexity of<br />

scene analysis [2].. Due to such superiority, salient region<br />

extraction has been adopted in widely applications, such as<br />

image compression [3], distinctive objects detection [4], image<br />

segmentation [5] etc.<br />

Most information of an image is concentrated in edges.<br />

Variations of light can influence the appearance of a region<br />

markedly, but not its edges. Remote sensing images are<br />

frequently influenced by several changes, such as camera<br />

viewpoints, distance and illuminance, so different targets<br />

automatic recognition methods in remote sensing images by<br />

using edges or gradient have attracted many researchers in recent<br />

years. Edges are detected to enhance the linear features.<br />

However, in these algorithms, edge detectors are often used to<br />

find region boundaries or edge details in an image and they only<br />

utilize the gradient magnitude but neglect the area, threshold,<br />

radius etc. In this paper, an object recognition method with the<br />

object statics is proposed. This method realizes the object<br />

detection combining the texture and geometry characteristics.<br />

Er. Tanvi Madaan, Er. Himanshu Sharma<br />

M.M. University, Mullana, Ambala, India<br />

II. PROPOSED METHOD<br />

Here the aim is to analyze the image in order to find out the<br />

objects. Due to noise or shadow, objects cannot be recognize<br />

properly. So some steps can be followed to remove these factors<br />

and after that find the objects and calculate their statistics.<br />

Following are the steps to be followed:<br />

a) Process the image to remove noise and shadow present<br />

in the image. A segmentation algorithm often needs a<br />

preprocessing step like noise smoothing to reduce the<br />

effect of undesired perturbations (artifacts) which might<br />

cause over- and under-segmentation.<br />

b) The purpose of image segmentation is to decompose an<br />

image domain into a number of disjoint regions so that<br />

the features within each region have visual similarity,<br />

strong statistical correlation and reasonably good<br />

homogeneity. The preprocessed image works as the<br />

input to segmentation algorithm.<br />

c) After segmentation either follow binary conversion of<br />

image using thresholding or grey scale conversion:-The<br />

goal of thresholding is to create a binary representation<br />

of the image & to discard irrelevant data and keep only<br />

the important segments of data which lie above<br />

threshold curve. It segments the digital image based on<br />

certain characteristics of pixels (for example intensity<br />

value).Grey scale dumps all the color information and<br />

leaves with very little information to work with. NTSC<br />

standard is used for the conversion to grey scale There<br />

exist several methods for segmenting gray-level images.<br />

Gray-level thresholding is one of the oldest techniques<br />

for image segmentation.<br />

d) Contour extraction, depending on the image quality &<br />

structure has two possibilities. The first one is<br />

performing image segmentation based on color &<br />

texture. If color based segmentation is not possible due<br />

to unknown information about objects, then the second<br />

way to compute the contour is direct edge detection<br />

since one need contours with a thickness of one pixel.<br />

Finally, calculate the threshold, region, boundary and<br />

the area of extracted objects using Hough<br />

transformation.<br />

III. ACTIVE CONTOUR METHOD<br />

Besides challenges due to imaging noise and partial volume<br />

effects, the similarity in intensity and texture between<br />

neighboring structures complicates the task of identifying distinct<br />

boundaries between the structures. So the active contour method<br />

was introduced which developed the concept of shape contours<br />

.When evolving shape contours, the interaction consists of<br />

modeling the ―forces‖ of attraction, repulsion, and competition<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 119<br />

ISSN 2250-3153<br />

by taking into account the relationship between object contours<br />

and their shape estimates.<br />

An active contour is an ordered collection of ‗n‘ points in the<br />

image plane:<br />

v {<br />

v ,......... ... v<br />

v<br />

i<br />

}<br />

( x , y ) , i ( 1 ,...., n)<br />

i i i i i --- (1)<br />

The points in the contour iteratively approach the boundary of an<br />

object through the solution of an energy minimization problem.<br />

For each point in the neighborhood of ‗Vi‘, an energy term is<br />

computed:<br />

E E<br />

( v ) E<br />

i<br />

Where<br />

( v )<br />

int i ext i<br />

E<br />

( ) v<br />

int i<br />

n<br />

is an energy function dependent on the shape<br />

Eext<br />

( vi<br />

)<br />

of the contour and is an energy function dependent on<br />

the image properties, such as the gradient, near point<br />

v . , <br />

i<br />

and are constants providing the relative weighting of the<br />

E , EintandE<br />

energy terms. i<br />

ext are matrices. The value at the<br />

center of each matrix corresponds to the contour energy at<br />

point i v . Other values in the matrices correspond (spatially) to<br />

the energy at each point in the neighborhood of i v .<br />

Each point, i v '<br />

v<br />

is moved to the point i , corresponding to the<br />

location of the minimum value in i E<br />

. Corresponding to the<br />

location of the minimum value in i E<br />

. This process is illustrated<br />

in Figure 1. If the energy functions are chosen correctly, the<br />

contour, v , should approach, and stop at, the object boundary.<br />

Figure 1: Procedure for feature extraction<br />

3.1 Internal Energy<br />

The internal energy function is intended to enforce a shape on<br />

the deformable contour and to maintain a constant distance<br />

between the points in the contour. Additional terms can be added<br />

to influence the motion of the contour.<br />

The internal energy function used herein is defined as follows:<br />

E<br />

( v ) cE ( v ) bE<br />

Where<br />

( v )<br />

int i con i bal i<br />

Econ(<br />

vi<br />

)<br />

of the contour and<br />

---(2)<br />

is the continuity energy that enforces the shape<br />

Ebal(<br />

vi<br />

)<br />

is a balloon force that causes the<br />

contour to grow (balloon) or shrink. ‗c‘ and ‗b‘ provide the<br />

relative weighting of the energy terms.<br />

Figure 2: Extraction of object using Active Contour Method<br />

3.2 External Energy<br />

The external energy function attracts the deformable contour<br />

to interesting features, such as object boundaries, in an image.<br />

Any energy expression that accomplishes this attraction can be<br />

considered for use.<br />

Image gradient and intensity are obvious (and easy)<br />

characteristics to look at (another could be object size or shape).<br />

Therefore, the following external energy function is investigated:<br />

Eext<br />

( vi<br />

) mEmag<br />

( vi<br />

) gEgrd<br />

( vi<br />

)<br />

Where<br />

Emag<br />

( vi<br />

)<br />

high or low intensity regions and<br />

--(3)<br />

is an expression that attracts the contour to<br />

Egrd<br />

( vi<br />

)<br />

is an energy term that<br />

moves the contour towards edges. Again, the constants, m,g are<br />

provided to adjust the relative weights of the terms.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 120<br />

ISSN 2250-3153<br />

IV. HOUGH TRANSFORMATION<br />

The Hough transform is a technique which can be used to<br />

isolate features of a particular shape within an image. Because it<br />

requires that the desired features be specified in some parametric<br />

form, the classical Hough transform is most commonly used for<br />

the detection of regular curves such as lines, circles, ellipses, etc.<br />

A generalized Hough transform can be employed in applications<br />

where a simple analytic description of a feature is not possible.<br />

Due to the computational complexity of the generalized Hough<br />

algorithm, we restrict the main focus of this discussion to the<br />

classical Hough transform. Despite its domain restrictions, the<br />

classical Hough transform (hereafter referred to without the<br />

classical prefix) retains many applications, as most manufactured<br />

parts (and many anatomical parts investigated in medical<br />

imagery) contain feature boundaries which can be described by<br />

regular curves. The main advantage of the Hough transform<br />

technique is that it is tolerant of gaps in feature boundary<br />

descriptions and is relatively unaffected by image noise.<br />

The Hough transform algorithm uses an array, called an<br />

accumulator, to detect the existence of a line y = mx + b. The<br />

dimension of the accumulator is equal to the number of unknown<br />

parameters of the Hough transform problem. For example, the<br />

linear Hough transform problem has two unknown parameters: m<br />

and b. The two dimensions of the accumulator array would<br />

correspond to quantized values for m and b. For each pixel and<br />

its neighborhood, the Hough transform algorithm determines if<br />

there is enough evidence of an edge at that pixel. If so, it will<br />

calculate the parameters of that line, and then look for the<br />

accumulator's bin that the parameters fall into, and increase the<br />

value of that bin. By finding the bins with the highest values,<br />

typically by looking for local maxima in the accumulator space,<br />

the most likely lines can be extracted, and their (approximate)<br />

geometric definitions read off. The simplest way of finding these<br />

peaks is by applying some form of threshold, but different<br />

techniques may yield better results in different circumstances -<br />

determining which lines are found as well as how many. Since<br />

the lines returned do not contain any length information, it is<br />

often next necessary to find which parts of the image match up<br />

with which lines. Moreover, due to imperfection errors in the<br />

edge detection step, there will usually be errors in the<br />

accumulator space, which may make it non-trivial to find the<br />

appropriate peaks, and thus the appropriate lines.<br />

V. CONCLUSION<br />

With the aim of designing a highly practical process of target<br />

detection in remote sensing images, this research has proposed an<br />

improved scheme consisting of algorithms for object detection.<br />

At the systematic level, an integrative frame sequentially<br />

combining the algorithm based on feature extraction and the<br />

knowledge of object has been presented. At the algorithmic level,<br />

first, the discriminative features have been extracted. Second, a<br />

HOUGH TRANSFORM algorithm has been presented.<br />

According to the comparisons of the existing algorithms and<br />

abundant experimental results, the proposed scheme is found to<br />

improve the application ability in object detection.<br />

REFERENCES<br />

[1] X. Gang, ―Extracting salient object from remote sensing image based on<br />

guidance of visual attention pb -,‖ Proceedings of SPIE – The International<br />

Society for Optical Engineering, vol. 6790, 2007.<br />

[2] M. Jager, ―Saliency and salient region detection in sar polarimetry,‖<br />

IGARSS 2005: IEEE International Geoscience and Remote Sensing<br />

Symposium, Vols 1-8, Proceedings, pp. 2791–2794, 2005.<br />

[3] C. Christopoulos, ―Efficient region of interest coding techniques in the<br />

upcoming jpeg2000 still image coding standard,‖ 2000 INTERNATIONAL<br />

CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, pp.<br />

41–44, 2000.<br />

[4] B. C. Ko, ―Object-of-interest image segmentation based on human attention<br />

and semantic region clustering,‖ JOURNAL OF THE OPTICAL SOCIETY<br />

OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, vol. 23, no. 10,<br />

pp. 2462–2470, 2006.<br />

[5] U. Rutishauser, ―Is bottom-up attention useful for object recognition? Pb -,‖<br />

Proceedings of the IEEE Computer Society Conference on Computer Vision<br />

and Pattern Recognition, vol. 2, pp. II37–II44, 2004.<br />

[6] R. Achantay, ―Frequency-tuned salient region detection pb -,‖ 2009 IEEE<br />

Computer Society Conference on Computer Vision and Pattern Recognition<br />

Workshops, CVPR Workshops 2009, pp. 1597–1604, 2009.<br />

[7] Qihao Weng, Ph.D.,‖ Remote Sensing and GIS Integration, Theories,<br />

Methods, and Applications‖ McGraw-Hil-2010<br />

[8] Xu Yuanjing,Wang Qiaojue,Shen Huanfeng,Li Pingxiang,Zhang<br />

Hongyan,A Remote Sensing Image Restoration Method Estimation and<br />

Regularization Model,[J]. Journal of Geomatics,2010(6).<br />

[9] Y. N. Xu, Y. Zhao, L. P. Liu, and X. D. Sun, ―Parameter identification of<br />

point spread function in noisy and blur images,‖ vol. 17, No. 11, pp. 2849-<br />

2856, Nov 2009.<br />

[10] P. L. Rosin, ―A simple method for detecting salient regions,‖ PATTERN<br />

RECOGNITION, vol. 42, no. 11, pp. 2363–2371, 2009.<br />

AUTHORS<br />

First Autho – Er. Tanvi Madaan, M.Tech Scholar, M.M.<br />

University, Mullana,Ambala, Email: ertanvimadaan@gmail.com<br />

Second Author– Er. Himanshu Sharma, Department of<br />

Electronics and Communication Engineering, M.M. University,<br />

Mullana, Ambala, Email: himanshu.zte@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 121<br />

ISSN 2250-3153<br />

Genetic Variability Studies for Qualitative and<br />

Quantitative traits in Popular Rice (Oryza sativa L.)<br />

Hybrids of India<br />

V. Ravindra Babu 1 *, K. Shreya 2 , Kuldeep Singh Dangi 2 , G. Usharani 2 , P. Nagesh 3<br />

1 Crop Improvement Division, Directorate of Rice Research, Rajendranagar, Hyderabad, India.<br />

2 Department of Genetics and Plant Breeding, College of Agriculture, ANGRAU, Rajendranagar, Hyderabad, India.<br />

3 Research Associate, Grain Legume, Groundnut Breeding, ICRISAT, Patancheru, Hyderabad, India.<br />

Abstract- The present investigation is carried out to study the<br />

genetic parameters for yield, yield attributing, quality and<br />

nutritional characters in twenty one rice hybrids. Analysis of<br />

variance revealed significant differences for all the traits under<br />

study. The characters viz., number of filled grains per panicle,<br />

number of chaffy grains per panicle and iron content exhibited<br />

high Genotypic Coefficient of Variation (GCV) and Phenotypic<br />

Coefficient of Variation (PCV). Small differences between GCV<br />

and PCV were recorded for all the characters studied which<br />

indicated less influence of environment on these characters. The<br />

characters viz., number of filled grains per panicle and water<br />

uptake exhibited high heritability coupled with high genetic<br />

advance indicating that simple selection could be effective for<br />

improving these characters.<br />

Index Terms- Genetic advance, Genetic variability,<br />

Heritability and Rice<br />

R<br />

I. INTRODUCTION<br />

ice is one of the most important cereal crops of the world<br />

meeting the dietary requirements of the people living in the<br />

tropics and sub-tropics. Quantum jump in yield improvement has<br />

been achieved in rice with the development of high yielding<br />

heterotic hybrids under commercial cultivation. However, being<br />

the staple food of the population in India, improving its<br />

productivity has become a crucial importance (Subbaiah et al.,<br />

2011). Knowledge on the nature and magnitude of genetic<br />

variation governing the inheritance of quantitative characters like<br />

yield and its components is essential for effecting genetic<br />

improvement. A critical analysis of genetic variability is a prerequisite<br />

for initiating any crop improvement programme and for<br />

adopting of appropriate selection techniques.<br />

A paradigm shift in the rice (Oryza sativa L.) breeding<br />

strategies from quantity centered approach to quality oriented<br />

effort was inevitable, since India has not only become self<br />

sufficient in food grain production but also is the second largest<br />

exporter of quality rice in the world (Sreedhar et al.,2005).<br />

Improvement in grain quality that does not lower yield is the<br />

need of hour at present context in order to benefit all rice growers<br />

and consumers. Like grain yield, quality is not easily amenable to<br />

selection due to its complex nature. Lack of clear cut perception<br />

regarding the component traits of good quality rice is one of the<br />

important reasons for the tardy progress in breeding for quality<br />

rice varieties. With the increase in yield, there is also a need to<br />

look into the quality aspects to have a better consumer<br />

acceptance, which determines the profit margin of rice growers<br />

which in turn dictates the export quality and foreign exchange in<br />

India. Genetic enhancement is one of the important tools to<br />

improve the productivity. Hybrid technology has been widely<br />

acclaimed and accepted. High magnitude of variability in a<br />

population provides the opportunity for selection to evolve a<br />

variety having desirable characters.<br />

Grain quality characteristics are very important in rice<br />

breeding as it is predominantly consumed as a whole grain. The<br />

milling percentage, grain appearance, cooking quality and<br />

nutritional components constitute the quality traits. Nutritional<br />

components include proteins and micronutrients like Iron and<br />

Zinc. The average percentage of protein in rice grains is 8 per<br />

cent (The amino acid profile shows that it is rich in Glutamic<br />

acid and Aspartic acid, highest quality cereal protein being rich<br />

in lysine (3.8 %), the first limiting amino acid); Fe is 1.2 mg/100<br />

g and Zn is 0.5 mg/100 g. Malnutrition is a large and growing<br />

problem in the developing world mostly in South and S.E. Asia<br />

and Sub Sahara Africa (Reddy et al., 2005). Over 3 billion<br />

people suffer micro nutrient malnutrition (Welch and Graham,<br />

2002). Iron deficiency may affect 3 billion people worldwide<br />

(Long et al., 2004). It is estimated that 49 per cent of the world‘s<br />

population is at risk for low zinc intake (Cichy et al., 2005). In<br />

order to enhance the micronutrient concentration in the grain<br />

suitable breeding programmes should be followed. Keeping in<br />

view the above perspectives, the present investigation is carried<br />

out with the following objective of estimating the genetic<br />

variability in rice hybrids for yield, yield attributing characters,<br />

quality and nutritional traits.<br />

II. MATERIALS AND METHODS<br />

The present experiment is carried out at Directorate of Rice<br />

Research Farm, ICRISAT, Patancheru, Hyderabad, Andhra<br />

Pradesh, India, situated at 17.5°N latitude, 78.27°E longitude and<br />

altitude of 545 m above mean sea level. The materials comprised<br />

of twenty one rice hybrids (Table 1) obtained from Department<br />

of Plant Breeding, Crop Improvement Section, Directorate of<br />

Rice Research, Rajendranagar, Hyderabad. The experimental<br />

material was planted in a Randomized Block Design with three<br />

replications in three blocks. Each block consisted of twenty one<br />

genotypes randomized and replicated within each block. Twenty<br />

seven days old seedlings were transplanted 20cm apart between<br />

rows and 15cm within the row. All necessary precautions were<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 122<br />

ISSN 2250-3153<br />

taken to maintain uniform plant population in each treatment per<br />

replication. All the recommended package of practices was<br />

followed along with necessary prophylactic plant protection<br />

measures to raise a good crop. Five representative plants for each<br />

hybrid in each replication were randomly selected to record<br />

observations on the quantitative characters under study. Days to<br />

50% flowering were computed on plot basis. Data was recorded<br />

on physico-chemical quality characters from the bulk samples.<br />

The milling characteristics were computed following the method<br />

given by Ghosh et al., (1971). Iron and zinc content of seed<br />

samples was estimated by Atomic Absorption Spectrophotometer<br />

as suggested by Lindsay and Novell (1978). The treatment means<br />

for all the characters viz., days to 50 percent flowering, plant<br />

height (cm), number of productive tillers per plant, panicle length<br />

(cm), number of filled grains per panicle, number of chaffy grain<br />

per panicle, 1000 grain weight (g), single plant yield (g), grain<br />

moisture percentage, head rice recovery (%), kernel length (mm),<br />

kernel breadth (mm), L/B ratio, volume expansion ratio, water<br />

uptake (ml), alkali spreading value, gel consistency (mm),<br />

protein content (%), Iron content (mg/100g) and Zinc content<br />

(mg/100g), except for the milling percentage were subjected to<br />

analysis of variance technique on the basis of model proposed by<br />

Panse and Sukhatme (1961). The genotypic and phenotypic<br />

variances were calculated as per the formulae proposed by<br />

Burton (1952). The genotypic (GCV) and phenotypic (PCV)<br />

coefficient of variation was calculated by the formulae given by<br />

Burton (1952). Heritability in broad sense [h 2 (bs)] was calculated<br />

by the formula given by Lush (1940) as suggested by Johnson et<br />

al. (1955). From the heritability estimates, the genetic advance<br />

(GA) was estimated by the following formula given by Johnson<br />

et al. (1955).<br />

III. RESULTS AND DISCUSSION<br />

a) Variability parameters<br />

Greater variability in the initial breeding material ensures better<br />

chances of producing desired forms of a crop plant. Thus, the<br />

primary objective of germplasm conservation is to collect and<br />

preserve the genetic variability in indigenous collection of crop<br />

species to make it available to present and future generations.<br />

The analysis of variance indicated the existence of significant<br />

differences among all the hybrids for all the traits studied. The<br />

results of analysis of variance are presented in Table 2. The<br />

characters studied in the present investigation exhibited low,<br />

moderate and high PCV and GCV values. Among the yield<br />

characters, highest PCV and GCV values were recorded for<br />

number of chaffy grains per panicle, followed by number of<br />

filled grains per panicle and the lowest PCV and GCV values<br />

were recorded for grain yield per plant. Among the grain quality<br />

characters highest PCV and GCV values were recorded for iron<br />

content and lowest PCV and GCV was recorded for kernel<br />

breadth. High phenotypic variations were composed of high<br />

genotypic variations and less of environmental variations, which<br />

indicated the presence of high genetic variability for different<br />

traits and less influence of environment. Therefore, selection on<br />

the basis of phenotype alone can be effective for the<br />

improvement of these traits. Similar results were observed by<br />

Kumar et al. (1994), Chaudhary and Singh (1994), Pathak and<br />

Sharma (1996), Sarvanan and Senthil (1997), Rather et al.<br />

(1998), Satya et al (1999), Shivani and Reddy (2000),<br />

Iftekharudduala et al. (2001) and Sao (2002). Coefficients of<br />

variation studies indicated that the estimates of PCV were<br />

slightly higher than the corresponding GCV estimates for all the<br />

traits studied indicating that the characters were less influenced<br />

by the environment. Therefore, selection on the basis of<br />

phenotype alone can be effective for the improvement of these<br />

traits.<br />

b) Heritability<br />

The estimates of heritability act as predictive instrument in<br />

expressing the reliability of phenotypic value. Therefore, high<br />

heritability helps in effective selection for a particular character.<br />

Heritability is classified as low (below30%), medium (30-60%)<br />

and high (above 60%). The characters studied in the present<br />

investigation expressed low to high heritability estimates ranging<br />

from 25.5 to 98.4 percent. Among the yield characters, highest<br />

heritability was recorded by days to 50 percent flowering<br />

followed by number of chaffy grains per panicle, number of<br />

filled grains per panicle, whereas, in grain quality characters<br />

alkali spreading value recorded highest heritability and head rice<br />

recovery percentage recorded lowest heritability value. High<br />

heritability values indicate that the characters under study are<br />

less influenced by environment in their expression. The plant<br />

breeder, therefore, may make his selection safely on the basis of<br />

phenotypic expression of these characters in the individual plant<br />

by adopting simple selection methods. High heritability indicates<br />

the scope of genetic improvement of these characters through<br />

selection. Similar results have been reported by Panwar et al.<br />

(1997), Sarawgi et al., (2000), Gannamani (2001) and Sao<br />

(2002).<br />

c) Genetic advance<br />

The genetic advance is a useful indicator of the progress that can<br />

be expected as result of exercising selection on the pertinent<br />

population. Heritability in conjunction with genetic advance<br />

would give a more reliable index of selection value (Johnson et<br />

al. 1955). Genetic advance was highest for number of filled<br />

grains per panicle followed by days to 50 percent flowering and<br />

lowest for grain yield per plant among yield characters. In case of<br />

grain quality characters, water uptake recorded highest genetic<br />

advance followed by gel consistency and the lowest for kernel<br />

breadth. The genetic advance as per cent of mean was highest in<br />

case of number of chaffy grains per panicle, while lowest<br />

recorded by grain yield per plant among yield characters,<br />

whereas, in grain quality characters, iron content recorded the<br />

highest genetic advance as per cent mean, while the lowest was<br />

recorded by head rice recovery percentage. The information on<br />

genetic variation, heritability and genetic advance helps to<br />

predict the genetic gain that could be obtained in later<br />

generations, if selection is made for improving the particular trait<br />

under study. Similar findings were also reported by Regina et al.<br />

(1994), Vanniarajan et al. (1996), Shivani and Reddy (2000),<br />

Iftekharuddaula et al. (2001), Gannamani (2001) and Sao (2002).<br />

In general, the characters that show high heritability with high<br />

genetic advance are controlled by additive gene action (Panse<br />

and Sukhatme, 1957) and can be improved through simple or<br />

progeny selection methods. Selection for the traits having high<br />

heritability coupled with high genetic advance is likely to<br />

accumulate more additive genes leading to further improvement<br />

of their performance. In the present study, high heritability along<br />

with high genetic advance was noticed for the traits, number of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 123<br />

ISSN 2250-3153<br />

filled grains per panicle and water uptake. Other characters<br />

showed high heritability along with moderate or low genetic<br />

advance which can be improved by intermating superior<br />

Table 1. Details of twenty one popular rice hybrids of India<br />

genotypes of segregating population developed from<br />

combination breeding (Samadia, 2005).<br />

S.No. Name of the hybrid Nominating Agency<br />

1 DRRH – 2 Directorate of Rice Research, Hyderabad<br />

2 PA 6129 Bayer Bio-Science<br />

3 Sahyadri – 2 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />

4 Sahyadri –4 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />

5 Pusa RH -10 Indian Agricultural Research Institute, New Delhi<br />

6 Indirasona Indira Gandhi Krishi Vishwa Vidyalaya, Raipur<br />

7 GK 5003 Ganga Kaveri Seeds<br />

8 PSD-3 G. B. Pant University of Agriculture and Technology, Pantnagar<br />

9 Sahyadri – 3 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />

10 PA 6201 Bayer Bio-Science<br />

11 HSD-1(HKRH-1) Chaudhary Charan Singh Haryana Agricultural University, Karnal<br />

12 PA 6444 Bayer Bio-science<br />

13 Suruchi (MPH 5401) Mahyco seeds, Hyderabad<br />

14 JKRH- 2000 JK Agri. Genetics<br />

15 US - 312 US Agri Seeds<br />

16 CORH- 3 Tamil Nadu Agricultural University, Coimbatore<br />

17 KRH-2 University of Agricultural Sciences, Mandya<br />

18 Sahyadri -1 Dr. Balasaheb Sawant Konkan Krishi Vidyapeeth, Dapoli<br />

19 PHB – 71 Pioneer Overseas Corporation<br />

20 CRHR - 5 Central Rice Research Institute, Cuttack<br />

21 CRHR - 7 Central Rice Research Institute, Cuttack<br />

Table 2: ANOVA for yield and quality characters in rice hybrids<br />

S. No. Character<br />

Mean sum of squares<br />

Replications Treatments Error<br />

(d.f. = 2) (d.f. = 20) (d.f. = 40)<br />

1 Days to 50 per cent flowering 3.09 253.45** 3.16<br />

2 Plant height (cm) 2.11 224.14** 30.56<br />

3 Panicle length (cm) 1.89 4.66** 0.61<br />

4 No. of productive tillers/plant 0.56 4.46** 1.46<br />

5 No. of filled grains/panicle 1.11 2146.95** 37.46<br />

6 No. chaffy grain/panicle 0.02 235.49** 3.85<br />

7 Grain yield/plant (g) 0.43 2.07* 1.02<br />

8 1000-grain weight (g) 0.13 15.24** 0.31<br />

9 Grain moisture (%) 0.01 1.25** 0.01<br />

10 Milling percentage (%) 0.01 3.01 26.25<br />

11 Head rice recovery (%) 13.21 43.62* 20.38<br />

12 Kernel Length (mm) 0.002 1.17** 0.014<br />

13 Kernel breath (mm) 0.002 0.016** 0.001<br />

14 L/B ratio 0.01 0.42** 0.006<br />

15 Volume expansion ratio 0.01 0.81** 0.01<br />

16 Water uptake (ml) 0.02 1506.78** 26.25<br />

17 Alkali spreading value 0.02 2.98** 0.016<br />

18 Amylose content (%) 0.1 8.20** 0.20<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 124<br />

ISSN 2250-3153<br />

19 Gel consistency (mm) 0.57 271.64** 4.17<br />

20 Protein content (%) 0.01 2.52** 1.05<br />

21 Iron (mg/100g) 0.42 16.02** 3.83<br />

22 Zinc (mg/100g) 0.017 0.57** 0.027<br />

* Significant at 5 per cent level<br />

** Significant at 1 per cent level<br />

Table 3: Estimates of variability, heritability, genetic advance and genetic advance as per cent of mean in rice hybrids<br />

S. No. Character<br />

Phenotypic<br />

variance<br />

Genotypic<br />

variance<br />

PCV<br />

(%)<br />

GCV<br />

(%)<br />

Heritability<br />

(h 2 ) (%)<br />

GA<br />

(5%)<br />

GA as per cent<br />

mean (5%)<br />

1. Days to 50 per cent flowering 86.59 83.43 9.62 9.44 96.3 18.47 19.10<br />

2. Plant height (cm) 95.09 64.53 10.02 8.26 67.9 13.63 14.01<br />

3. Panicle length (cm) 1.96 1.35 5.37 4.45 68.9 1.99 7.61<br />

4. No. of productive tillers/plant 2.46 1.00 16.91 10.77 40.6 1.31 14.14<br />

5. No. of filled grains/panicle 740.63 703.16 23.87 23.26 94.9 53.23 46.68<br />

6. No. chaffy grain/panicle 81.07 77.21 44.67 43.60 95.2 17.67 87.66<br />

7. Grain yield/plant (g) 1.37 0.35 5.10 2.58 25.5 0.62 2.68<br />

8. 1000-grain weight (g) 5.29 4.98 9.54 9.25 94.1 4.46 18.49<br />

9. Grain moisture (%) 0.42 0.41 5.59 5.52 97.5 1.31 11.23<br />

10. Milling percentage (%) 18.51 -7.74 5.98 3.87 -41.9 -3.71 -5.16<br />

11. Head rice recovery (%) 28.13 7.75 8.02 4.21 27.5 3.01 4.55<br />

12. Kernel Length (mm) 0.40 0.39 9.80 9.63 96.5 1.26 19.48<br />

13. Kernel breath (mm) 0.01 0.01 3.72 3.34 80.6 0.13 6.18<br />

14. L/B ratio 0.14 0.14 12.16 11.92 96.0 0.75 24.05<br />

15. Volume expansion ratio 0.28 0.27 11.41 11.19 96.2 1.04 22.61<br />

16. Water uptake (ml) 519.76 493.51 7.37 7.18 94.9 44.59 14.41<br />

17. Alkali spreading value 1.01 0.99 17.65 17.51 98.4 2.03 35.77<br />

18. Amylose content (%) 2.87 2.67 7.65 7.38 93.0 3.24 14.65<br />

19. Gel consistency (mm) 93.33 89.16 17.44 17.05 95.5 19.01 34.33<br />

20. Protein content (%) 1.55 0.49 15.63 8.80 31.7 0.81 10.21<br />

21. Iron (mg/100g) 7.89 4.06 41.10 29.49 51.5 2.98 43.59<br />

22. Zinc (mg/100g) 0.19 0.16 11.74 10.88 85.8 0.77 20.75<br />

REFERENCES<br />

[1] Burton, G.W. and Devane, E.H., ―Estimating heritability in tall fescue<br />

(Festuca arundinaceae) from replicated clonal material,‖ Agronomy<br />

Journal, 1952, 45: 478-481.<br />

[2] Chaudhary, P. K. and R. P. Singh., ―Genetic variability, correlation and path<br />

analysis of yield components of rice,‖ Madras Agricultural Journal, 1994,<br />

81(9):468-470.<br />

[3] Cichy, K.A., Forster, S., Kenneth, L., Grafton and Hosfield, G.L.,<br />

―Inheritance of seed zinc accumulation in Navy bean,‖ Crop Science, 2005,<br />

45: 864-870.<br />

[4] Gannamani, N., Study of heterosis and combining ability by utilizing<br />

cytoplasmic genetic male sterility and fertility restoration system in rice<br />

(Oryza sativa L.), 2001, M. Sc. (Ag.) Thesis, GAU, Raipur.<br />

[5] Ghosh, A. K., Nanda, B. B., Swami, S. G and Nayak, B. B., ―Influence of<br />

nitrogen on the physico-chemical characteristics of rice grain,‖ Oryza,<br />

1971, 891: 87-97.<br />

[6] Iftekharuddaula, K. M. M. S. Hassan, M. J. Islam, M. A. Badshah, M R<br />

Islam, and K. Akhter., ―Genetic evaluation and selection criteria of hybrids<br />

rice in irrigated ecosystem of Bangladesh,‖ Pakistan Journal of Biological<br />

Sciences, 2001, 4(7): 790-792.<br />

[7] Johnson, H.W., Robinson H.F and Comstock, R.E. Estimation of genetic<br />

and environmental variability in soybean. Agronomy Journal, 1955, 47:<br />

314-318.<br />

[8] Kumar., Krishnapal, R., Mandal, S. K., Ramashankar Prasad S. C., and Rai<br />

R., ―Genetic study of major characters in upland rice,‖ Environment and<br />

Ecology, 1994, 12(2): 363-365.<br />

[9] Lindsay, W.L and Norvell, W.A., ―Development of a DTPA soil test for<br />

zinc, manganese and copper,‖ Soil Science Society of American Journal.,<br />

1978, 42: 421-428.<br />

[10] Long, Jennifer, K., Marianne, Baniger and Osmith, M., ―Diallel analysis of<br />

iron and zinc density in Southern African adapted maize inbreds,‖ Crop<br />

Science, 2004, 44: 201-2026.<br />

[11] Lush, J.L., ―Intra-sire correlation and regression of offspring in rams as a<br />

method of estimating heritability of characters,‖ Proceedings of American<br />

Society of Animal Product, 1940, 33: 292-301.<br />

[12] Panse, V.G and Sukhatme, P.V., ―Genetics and quantitative characters in<br />

relation to plant breeding,‖ Indian Journal of Genetics, 1957, 17: 312-328.<br />

[13] Panse, V.G and Sukhatme, P.V., ―Statistical methods for agricultural<br />

workers,‖ 2nd Edition ICAR, New Delhi, 1961, pp: 361.<br />

[14] Panwar, Ashvani, R. P. S. R. K. Sharma, K. P. S. Arya, and A. Panwar.,<br />

―Genetic variability and inter-relationship in rice (Oryza sativa L.),‖<br />

Advances in Plant Sciences, 1997, 10(1): 29-32.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 125<br />

ISSN 2250-3153<br />

[15] Pathak, P. K. and K. K. Sharma., ―Variability and correlation among<br />

physical quality characters of Joha rice of Assam,‖ Journal of Agricultural<br />

Science Society North-East India, 1996, 9(1):18- 22.<br />

[16] Rather, A. G., G. N. Mir and F. A. Sheikh., ―Genetic parameters for some<br />

quantitative traits in rice,‖ Advances in Plant Sciences, 1998, 19(2):163-<br />

166.<br />

[17] Reddy, Belum, V. S., Ramesh, S and Longvah, T., ―Prospects of breeding<br />

for micronutrients and carotene dense sorghums,‖ ISMN, 2005, 46: 10-10.<br />

[18] Regina, A, N. R. Bai, R. Devika, and C. A. Joseph., ―Genetic variability and<br />

correlation in short duration rice cultivars,‖ Journal of Tropical Agriculture,<br />

1994, 32(2): 118-120.<br />

[19] Samadia, D. K., ―Genetic variability studies in Lasora (Cordia myxa<br />

Roxb.),‖ Indian Journal of Plant Genetic Resources, 2005, 18(3): 236-240.<br />

[20] Sao, A., ―Studies on combining ability and heterosis in F1 rice hybrids using<br />

cytoplasmic male sterile lines,‖ 2002, M. Sc. (Ag.) Thesis, IGAU, Raipur.<br />

[21] Sarawgi, A. K., N. K. Rastogi, and D. K. Soni., ―Studies on some quality<br />

parameters of indigenous rice in Madhya Pradesh,‖ Annuals of Agricultural<br />

Research, 2000, 21(2): 258-261.<br />

[22] Sarvanan, R. and N. Senthil., ―Genotypic and phenotypic variability,<br />

heritability and genetic advance in some important traits in rice, Madras<br />

Agricultural Journal, 1997, 84(5):276- 277.<br />

[23] Satya, A., G. Kandasamy, and J. Ramalingam., ―Heterosis in hybrid rice,‖<br />

Crop Research, 1999, 18(2) 243-246.<br />

[24] Shivani, D. and N. Sree Rama Reddy., ―Variability, heritability and genetic<br />

advance for morphological and physiological traits in certain rice hybrids,‖<br />

Oryza, 2000, 37(3):231-233.<br />

[25] Sreedhar, S., Vanisree, S., Kulakarni, N and Ganesh, M., ―Gene effects for<br />

certain physical quality traits and grain yield in rice,‖ Madras Agricultural<br />

Journal, 2005, 92(4-6):183-187.<br />

[26] Subbaiah, P. V., Sekhar, M. R., Reddy, K. H. P and Reddy, N.P.E.,<br />

―Variability and genetic parameters for grain yield and its components and<br />

kernel quality attributes in CMS based rice hybrids (Oryza sativa L.),‖<br />

International Journal of Applied Biology and Pharmaceutical Technology,<br />

2011, 2(3): 603-609.<br />

[27] Vanniarajan, C., P. Rangasamy, J. Ramalingam, N. Nadarajan, and<br />

Arumugampillai., ―Studies on genetic variability in hybrid rice derivatives‖<br />

Crop Research, 1996, 12(1):24-27.<br />

[28] Welch, Ross, M and Robin, D. Graham., ―Breeding crops for enhanced<br />

micronutrient content,‖ Plant and Soil, 2002, 245:205-21.<br />

AUTHORS<br />

First Author – V. Ravindra Babu, Principal Scientist, Plant<br />

Breeding, Crop Improvement Section, Directorate of Rice<br />

Research, Rajendranagar, Hyderabad, -500 030, Andhra Pradesh,<br />

India.<br />

Email id : rbvemuri1955@gmail.com<br />

Second Author – K. Shreya, M. Sc.(Ag.), Department of<br />

Genetics and Plant Breeding, College of Agriculture,<br />

Rajendranagar, Hyderabad -500 030, Andhra Pradesh, India.<br />

Email id : shreya834@gmail.com<br />

Third Author – Dr. Kuldeep Singh, Associate Professor,<br />

Department of Genetics and Plant Breeding, College of<br />

Agriculture,Rajendranagar,Hyderabad-500030, Andhra Pradesh,<br />

India.<br />

Email id : dangiks404@rediffmail.com<br />

Fourth Author – G.Usharani, Ph.D Scholar, Department of<br />

Genetics and Plant Breeding, College of Agriculture,<br />

Rajendranagar, Hyderabad -500 030, Andhra Pradesh, India.<br />

Email id : ushagenetics@gmail.com<br />

Fifth Author – Dr. P. Nagesh, Ph.D Research Associate, Grain<br />

Legume, Groundnut Breeding,ICRISAT, Patancheru, Hyderabad,<br />

AndhraPradesh,India.<br />

Email id : nageshpatne@gmail.com<br />

*Correspondence Author – Dr. V. Ravindra Babu Email:<br />

rbvemuri1955@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 126<br />

ISSN 2250-3153<br />

Thyristor Based Speed Control Techniques of DC Motor:<br />

A Comparative Analysis<br />

Rohit Gupta, Ruchika Lamba, Subhransu Padhee<br />

Department of Electrical and Instrumentation Engineering,<br />

Thapar University, Patiala, India<br />

rohit.udai@yahoo.in, ruchika.mehta@thapar.edu, subhransu_padhee@yahoo.com<br />

Abstract- The versatile control characteristics of DC motor<br />

have contributed in the extensive use of DC motor in the<br />

industry. With the increasing use of power semi conductor units,<br />

the speed control of DC motor is increasingly getting<br />

sophisticated and precise. Speed of the DC motor is controlled by<br />

controlling the armature voltage. Armature voltage is controlled<br />

using different single phase AC/DC converter. Half converter,<br />

semi converter, full converter and dual converter are some of the<br />

thyristor based circuits which are used for speed control of DC<br />

motor. This paper studies different speed control techniques of<br />

DC motor and makes a comparative study of different converter<br />

based speed controller techniques.<br />

Index Terms- AC/DC converter, DC motor, speed control.<br />

DC<br />

I. INTRODUCTION<br />

motors are widely used in industry because<br />

of its low cost, less complex control structure<br />

and wide range of speed and torque. There are many<br />

methods of speed control of DC drives namely field<br />

control, armature voltage control and armature<br />

resistance control methods [2]. DC motors provide<br />

high starting torque which is required for traction<br />

applications. In DC motor control over a large speed<br />

range, both below and above the rated speed can be<br />

achieved quite easily. DC motors have inherent<br />

disadvantages that it needs regular maintenance and it<br />

is bulky in size. DC motors are tailor made, so it is<br />

very difficult to replace them. In general, armature<br />

voltage control method is widely used to control the<br />

DC drives. In this method, a controlled rectifier, or<br />

chopper is used but due involvement of power<br />

electronics elements, nonlinear torque speed<br />

characteristics are observed which are undesirable for<br />

control performance [1].<br />

Nowadays state of art speed control techniques of<br />

DC motor are available. Thyristor based DC drives<br />

with analog and digital feedback control schemes are<br />

used. Phase locked loop control technique is also used<br />

for precise speed control and zero speed regulation. In<br />

past, many researchers presented various new<br />

converter topologies of DC motor control for different<br />

applications of industry [5,6,8,9], but at the basic level<br />

in all of them thyristor based AC-DC converter are<br />

used. MATLAB with its toolboxes like Simulink and<br />

SimPowerSystem are used for simulation [3,7].<br />

This paper provides a comparative study of<br />

different thyristor based speed control techniques.<br />

II. MATHEMATICAL MODELLING OF DC MOTOR<br />

The dynamic and steady-state model of separately<br />

excited DC motor is needed to analyse the torque<br />

speed characteristics. The schematic representation of<br />

the model of a separately excited DC motor is shown<br />

below in figure 1 in which ea is the terminal voltage<br />

applied to the motor, Ra and La are the resistance, and<br />

inductance of the armature circuit respectively, Rf and<br />

Lf are the resistance, and inductance of the field<br />

circuit respectively, eb is generated back emf and Tm is<br />

the electromagnetic torque developed by the motor.<br />

The related DC Motor parameters are mentioned in<br />

appendix A.<br />

Figure 1: Equivalent circuit of separately excited DC motor<br />

The torque is produced as a result of interaction of field flux with<br />

current in armature conductors and is given by Eq. (1)<br />

T K i<br />

(1)<br />

m t a<br />

Here is a constant depending on motor windings and<br />

geometry and is the flux per pole due to the field winding.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 127<br />

ISSN 2250-3153<br />

The direction of the torque produced depends on the direction of<br />

armature current. When armature rotates, the flux linking the<br />

armature winding will vary with time and therefore according to<br />

Faraday‘s law, an emf will be induced across the winding. This<br />

generated emf, known as the back emf, depends on speed of<br />

rotation as well as on the flux produced by the field and given by<br />

Eq. (2)<br />

e K<br />

(2)<br />

b t<br />

By applying KVL at input side of in figure 1,<br />

dia<br />

ea iaRa La eb<br />

(3)<br />

dt<br />

In steady state condition, Ea IaRa Eb<br />

(4)<br />

In terms of torque and speed, the steady state equation will be<br />

given by Eq. (5)<br />

Tm<br />

Ea Ra Kt<br />

Kt<br />

(5)<br />

Ea So, <br />

K <br />

Tm<br />

K <br />

Ra<br />

(6)<br />

t t<br />

2<br />

Thus from the above equation it is clear that speed can be<br />

controlled by varying there parameters, namely , , and .<br />

The three methods of speed control are as following:<br />

i. Armature voltage controlled ( ).<br />

ii. Armature resistance controlled ( ).<br />

iii. Flux controlled ( ).<br />

Speed control using armature resistance by adding external<br />

resistor is not used very widely because of the large energy<br />

losses due to the Rext. Armature voltage control is normally used<br />

for speed up to rated speed (base speed). Flux control is used for<br />

speed beyond rated speed but at the same time the maximum<br />

torque capability of the motor is reduced since for a given<br />

maximum armature current, the flux is less than the rated value<br />

and so as the maximum torque produced is less than the<br />

maximum rated torque [4]. Here the main attention is given to<br />

the armature voltage control method. In the armature voltage<br />

control method, the voltage applied across the armature ea is<br />

varied keeping field voltage constant. As equation (6) indicates,<br />

the torque-speed characteristic is represented by a straight line<br />

with a negative slope when the applied armature voltage is ideal,<br />

that ideal torque speed characteristic is illustrated in figure 2<br />

[10].<br />

Figure 2: Torque speed characteristics of the separately excited<br />

DC motor at different armature voltages<br />

III. THYRISTOR BASED TECHNIQUES OF DC MOTOR SPEED<br />

CONTROL<br />

A separately excited DC motor fed through single phase half<br />

wave converter is shown in figure 3. Single phase half wave<br />

converter feeding a DC motor offers only one quadrant drive.<br />

Such type of drives are used up to about 0.5 kW DC motor.<br />

Figure 3: Single phase half wave converter drive<br />

For single phase half wave converter, average output voltage<br />

of converter can be calculated as, given as Eq. (7)<br />

Vm<br />

V0 1 cos<br />

, for 0 <br />

(7)<br />

2<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 128<br />

ISSN 2250-3153<br />

A half wave converter in the field circuit will increase the<br />

magnetic losses of the motor due to high ripple content on the<br />

field excitation current, so an ideal DC source is preferred over<br />

half wave converter for field circuit. A separately excited DC<br />

motor fed through single phase semiconverter is shown in figure<br />

4. This converter also offer only one quadrant drive and is used<br />

up to 15 kW DC drives.<br />

Figure 4: Single phase semi converter drive<br />

With a single phase semiconverter in the armature circuit,<br />

equation (8) gives the average armature voltage as,<br />

Vm<br />

V0Vt1 cos<br />

, for 0 (8)<br />

<br />

The armature voltage is varied by single phase full wave<br />

converter as shown in figure 5. It is a two quadrant drive, and is<br />

limited to applications upto 15kW. The armature converter gives<br />

+Vo or –Vo and allows operation in the first and fourth quadrant.<br />

The converter in the field circuit could be semi, full or even dual<br />

converter. The reversal of the armature or field voltage allows<br />

operation in the second and third quadrant.<br />

Figure 5: Single phase full converter drive<br />

The average armature voltage in armature circuit for single phase<br />

full converter drive is given by Eq. (9)<br />

2Vm<br />

V0Vt 1 cos<br />

, for 0 (9)<br />

<br />

To realize single phase dual converter, two single phase full<br />

converters are connected as shown in figure 6.<br />

Figure 6: Single phase dual converter drive<br />

In fig. 6, there are two single phase full wave converters either<br />

converter 1 operates to supply a positive armature voltage Vo, or<br />

converter 2 operates to supply negative armature voltage –Vo.<br />

Converter 1 provides operation in first and fourth quardants, and<br />

converter 2 provides operation in second and third quardants.It is<br />

four quardant drive and provides four modes of operation:<br />

forward powering, forward braking (regenration), reverse<br />

powering, and reverse breaking (regeneration). The field<br />

converter could be a full wave converter, a semiconverter, or a<br />

dual converter.<br />

If converter 1 operates at a firing angle of α1 then equation (10)<br />

gives the armature voltage as,<br />

Vm<br />

V V 1 cos<br />

, for 0 (10)<br />

<br />

0 t<br />

1<br />

<br />

And similarly, if converter 2 operates at a firing angle of α2 then<br />

equation (11) gives the armature voltage as, [11].<br />

Vm<br />

V V 1 cos<br />

(11)<br />

<br />

0 t<br />

2<br />

<br />

IV. SIMULATION<br />

To investigate the effect of armature voltage on the<br />

torque speed curve six different firing angles are used<br />

with the voltage applied to the field circuit kept<br />

constant 300V. A constant 240 V, 50 Hz AC supply is<br />

applied to the input of single phase half wave<br />

converter. The average value of converter output is<br />

controlled by changing the firing angle .<br />

A cosine firing angle scheme is used to change the<br />

firing angle. The firing angles used to get different<br />

output voltages for armature are 0°, 18°, 36°, 54°, 72°<br />

and 89°.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 129<br />

ISSN 2250-3153<br />

The simulink model used to get torque speed<br />

characteristic for a single phase half wave converter is<br />

shown in figure7.<br />

Figure 7: Simulink realization of armature voltage speed control<br />

method using a single phase half wave converter drive<br />

The torque speed curves for a single phase half<br />

wave converter drive are shown in figure 8.<br />

Figure 8: Torque-speed characteristics for a single phase half<br />

wave converter drive<br />

It is clear that torque speed contains both linear and non linear<br />

regions. The linear region of operation for 0° firing angle<br />

approximately starts at 100 N.m load torque, but for 18° firing<br />

angle linear region starts at 105N.m load torque, while for 36°<br />

firing angle linear region starts at approximately at 110 N.m and<br />

so on. The discontinuous armature current results in a highly<br />

non-linear torque speed characteristic. Figure 9 and 10 shows the<br />

armature voltage and current obtained at 50 N.m (in the nonlinear<br />

region) and 135 N.m (in linear region) with firing angle<br />

89°. These figures clearly show the discontinuous and continuous<br />

operation of single phase half wave converter drive in non linear<br />

and linear regions, respectively.<br />

Figure 9: Armature current and voltage at 50N.m with firing<br />

angle 89° for single phase half wave converter drive<br />

Figure 10: Armature current and voltage at 135N.m with firing<br />

angle 89° for single phase half wave converter drive<br />

To investigate the effect of armature voltage on the torque speed<br />

characteristic, six different firing angles are applied to the firing<br />

angle generator while the voltage applied to the field circuit is<br />

kept constant 300V. A constant 240V, 50Hz AC is applied to the<br />

input of single phase semi converter. The average value of the<br />

converter output is controlled by the firing angle (α). The firing<br />

angles used to get different output voltages for armature are 0°,<br />

18°, 36°, 54°, 72° and 89°. The simulink model used to get<br />

torque speed characteristic for a single phase half wave converter<br />

is shown in figure11.<br />

Fig<br />

ure 11: Simulink realization of armature voltage speed<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 130<br />

ISSN 2250-3153<br />

control method using a single phase semiconverter<br />

drive<br />

Figure 12: Torque-speed characteristics for a single phase<br />

semiconverter drive<br />

The fig 12, showing the torque speed<br />

cherecteristics, the non linear and linear operating<br />

regions are clearly visible for different firing angles.<br />

The linear operating range for single phase semi<br />

converter drive decrease as firing angle increases. For<br />

firing angle 0°, it is 60 to 180 N.m, for 18° it is 65 to<br />

180 N.m, for 36° it is 80 to 180 N.m and for 89° it is<br />

100 to 180 N.m. The non linearity in the speed torque<br />

characteristic is due to the discontinuity in armature<br />

current. Figure 13 and 14 shows the armature voltage<br />

and current obtained at 50 N.m (in the non-linear<br />

region) and 135 N.m (in linear region) with firing<br />

angle 0°. These figures show the discontinuous and<br />

continuous operation of single phase semiconverter<br />

drive in non linear and linear regions, respectively.<br />

Figure 13: Armature current and voltage at 50N.m with firing<br />

angle 0° for single phase semiconverter drive<br />

Figure 14: Armature current and voltage at 135N.m with firing<br />

angle 0° for single phase semiconverter drive<br />

The simulink model used to get torque speed characteristic for a<br />

single phase full converter drive is shown in figure15. The effect<br />

of armature voltages on the torque speed characteristic is<br />

observed for six different firing angles, as the voltage applied to<br />

the field circuit is kept constant at 300V, and a constant 240V, 50<br />

Hz AC is applied to input of single phase full converter. The<br />

average value of applied armature voltage is varied by varying<br />

the firing angle of full converter.<br />

Figure 15: Simulink realization of armature voltage speed control<br />

method using a single phase full converter drive<br />

Figure 16 shows the torque speed characteristics of single phase<br />

full converter drive with firing angles 0°, 18°, 36°, 54°, 72°, and<br />

89°.<br />

Figure 16: Torque-speed characteristics for a single phase full<br />

converter drive<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 131<br />

ISSN 2250-3153<br />

Linear and non linear regions for single phase full<br />

converter drive are clearly visible in the above shown<br />

torque speed curve. Non linearity is because of the<br />

discontinuity in the armature current, and also it is<br />

observed that the range of non linearity increases as<br />

firing angle is increased. For firing angle 0°, non<br />

linearity range of load torque 0 to 85 N.m, for 18° it is<br />

0 to 100 N.m, for 36°, it is 0 to 110 N.m,, for 54° it is<br />

0 to 54 N.m and for 89° it is 0 to 120 N.m. The<br />

armature voltage and current waveforms for single<br />

phase full converter drives are shown in figure 17 and<br />

18. These were obtained at 50 N.m (in the non-linear<br />

region) and 135 N.m (in linear region) with firing<br />

angle 89°. These figures show the discontinuous and<br />

continuous operation of single phase full converter<br />

drive in non linear and linear regions, respectively.<br />

Figure 17: Armature current and voltage at 50N.m with firing<br />

angle 89° for single phase full converter drive<br />

Figure 18: Armature current and voltage at 135N.m with firing<br />

angle 89° for single phase full converter drive<br />

It is clearly seen that for all firing angle, the linear region of<br />

operation extends when single phase semi converter is used. The<br />

linear operating ranges of load torque for different converter<br />

drives with respect to firing angles are tabulated in table 1.<br />

Table I: Linear operating range of Load torque for different<br />

converter drives and firing angles<br />

Drive type<br />

Firing angle<br />

Half wave<br />

Drive<br />

Load Torque(N.m)<br />

Semiconverter<br />

Drive<br />

Full wave<br />

converter<br />

Drive<br />

0 100 to 180 60 to 180 85 to 180<br />

18 105 to 180 65 to 180 100 to 180<br />

36 110 to 180 80 to 180 110 to 180<br />

54 115 to 180 100 to 180 115 to 180<br />

72 120 to 180 80 to 180 120 to 180<br />

89 130 to 180 100 to 180 120 to 180<br />

V. CONCLUSION<br />

This paper presents speed control of separately<br />

excited DC motor using different single phase AC/DC<br />

converter. Speed torque curves for three types of<br />

single phase AC/DC converter (Half wave converter,<br />

Semiconverter ans full converetr) are obtained for a<br />

wide-range of loading conditions. From the above<br />

results, it can be concluded that the reason of non<br />

linearity in speed torque curve is discontinuity in<br />

armature current which is highly non-desirable for<br />

industrial applications. To remove the discontinuity in<br />

armature current an inductor should be used in series<br />

to make the armature current continuous. It is also<br />

observed that the range of non linearity is small in<br />

semiconverter as compared to half wave and full<br />

converter drives, so semi converter drives can be<br />

preferred for the wide range of load torque.<br />

APPENDIX A<br />

The parameters of separately excited DC motor<br />

Rated Power (P) 5 Hp<br />

Rated Armature Voltage 240 V<br />

Armature Resistance R a 2.518 Ω<br />

Armature Inductance L a 0.028 H<br />

Field Resistance f R 281.3 Ω<br />

Field Inductance f<br />

L 156 H<br />

Rated Speed 1750 RPM<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 132<br />

ISSN 2250-3153<br />

Rated Field Voltage 300 V<br />

REFERENCES<br />

[1] D. A. staton, M. I. McGilp and T. J. E. Miller, ―DC machine teaching<br />

experiment,‖ in proceedings of the European Power Electronics Association<br />

EPE, Brighton, pp. 35 – 40, 1993<br />

[2] S. J. Chapman, Electric Machinery Fundamentals, New York:<br />

WCB/McGraw-Hill,1998.<br />

[3] W. M. Daniels and A. R. Shaffer, ―Re-inventing the electrical machines<br />

curriculum,‖ IEEE Transactions on Education, vol. 41, pp. 92-100, May<br />

1998.<br />

[4] N. Mohan, Electric Drives: An integrative approach, University of<br />

Minnesota <strong>Print</strong>ing services, 2000.<br />

[5] M. Nedeljkovic and Z. Stojiljkovic, ―Fast current control for thyristor<br />

rectifiers,‖ IEE Proceedings- Electr. Power Appl., Vol. 150, No. 6, pp. 636-<br />

638, Nov. 2003.<br />

[6] Alfio Consoli, Mario Cacciato, Antonio Testa and Francesco Gennaro,<br />

―Single Chip Integration for Motor Drive Converters With Power Factor<br />

Capability,‖ IEEE Transactions on Power Electronics, Vol. 19, No. 6, pp.<br />

1372-1379, Nov. 2004.<br />

[7] S. Li and R. Challo, ―Restructuring an electric machinery course with an<br />

integrative approach and computer-assisted teaching methodology,‖ IEEE<br />

Transactions on Education., vol. 49,pp. 16-28, Feb.2006.<br />

[8] Manoj Daigavane, Hiralal Suryawanshi and Jawed Khan, ―A Novel Three<br />

Phase Series-Parallel Resonant Converter Fed DC-Drive System,‖ Journal<br />

of Power Electronics, Vol. 7, No. 3, pp. 222-232, July 2007.<br />

[9] Wai Phyo Anug, ―Analysis on Modeling and Simulink of DC Motor and its<br />

Driving System Used for Wheeled Mobile Robot,‖ World Academy of<br />

Science, Engineering and Technology 32, pp. 299-306, 2007.<br />

[10] A. Gelen and S. Ayasun, ―Effects of PWM chopper drive on the torquespeed<br />

characteristic of DC motor‖ 43rd International Universities Power<br />

Engineering Conference, 2008.<br />

[11] P. S. Bhimbhra, Power Electronic, Khanna publishers, 2010.<br />

AUTHORS<br />

First Author – Rohit Gupta, M.E.(Instrumentation & control),<br />

Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID: rohit.udai@yahoo.co.in<br />

Second Author – Ruchika Lamba, M.E.(Instrumentation<br />

Engineering), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID: ruchika.mehta@thapar.edu<br />

Third Author – Subhransu Padhee, M.E.(Instrumentation &<br />

control), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID:- subhransu_padhee@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 133<br />

ISSN 2250-3153<br />

Automatic Face Detection Using Color Based<br />

Segmentation<br />

Yogesh Tayal, Ruchika Lamba, Subhransu Padhee<br />

Department of Electrical and Instrumentation Engineering<br />

Thapar University, Patiala-147004, Punjab, India<br />

yogesh.tayal87@gmail.com, ruchika.mehta@thapar.edu, subhransu_padhee@yahoo.com<br />

Abstract- Because of the increasing instances of identity theft<br />

and terrorism incidences in past few years, biometrics based<br />

security system has been an area of quality research. Modern day<br />

biometrics is a cutting edge technology which enables the<br />

automated system to distinguish between a genuine person and<br />

an imposter. Automated face recognition is one of the areas of<br />

biometrics which is widely used because of the uniqueness of<br />

one human face to other human face. Automated face recognition<br />

has basically two parts one is face detection and other one is<br />

recognition of detected faces. To detect a face from an online<br />

surveillance system or an offline image, the main component that<br />

should be detected is the skin areas. This paper proposes a skin<br />

based segmentation algorithm for face detection in color images<br />

with detection of multiple faces and skin regions. Skin color has<br />

proven to be a useful and robust cue for face detection,<br />

localization and tracking.<br />

Index Terms- Color space model, Face Detection, HSV<br />

Component, Morphology operation, Skin detection<br />

D<br />

I. INTRODUCTION<br />

ifferent aspects of human physiology are used to<br />

authenticate a person‘s identity. The science of ascertaining<br />

the identity with respect to different characteristics trait of human<br />

being is called biometrics. The characteristics trait can be broadly<br />

classified in to two categories i.e. physiological and behavioral.<br />

Measurement of physical features for personal identification is an<br />

age old practice which dates back to the Egyptians era. But it was<br />

not until 19 th century that the study of biometrics was extensively<br />

used for personal identification and security related issues. With<br />

the advancement in technology, biometric authentication has<br />

been widely used for access management, law enforcement,<br />

security system. A person can be identified on the basis of<br />

different physiological and behavioral traits like fingerprints,<br />

faces, iris, hand geometry, gait, ear pattern, voice recognition,<br />

keystroke pattern and thermal signature.<br />

This paper presents an improved color based segmentation<br />

technique to segment the skin regions in a group picture and use<br />

of skin based segmentation in face detection. Skin based<br />

segmentation has several advantages over other face detection<br />

techniques like this method is almost invariant against the<br />

changes of size of face, orientation of face. The primary aim of<br />

skin based segmentation is to detect the pixels representing the<br />

skin regions and non skin regions. After detection of pixels<br />

which represents the skin region, the next task is to classify the<br />

pixels which represent the faces and non faces.<br />

II. FACE DETECTION SYSTEM<br />

Face detection is an interdisciplinary field which integrates<br />

different techniques such as (i) image processing, (ii) pattern<br />

recognition, (iii) computer vision, (iv) computer graphics, (v)<br />

physiology, and (vi) evaluation approaches. In general, the<br />

computerized face recognition/face detection includes four steps.<br />

(i) Face image is acquired, enhanced and segmented. (ii) face<br />

boundary and facial features are detected. (iii) the extracted facial<br />

features are matched against the features stored in the database.<br />

(iv) the classification of the face image into one or more persons<br />

is achieved.<br />

Figure 1 shows the basic block diagram of face recognition<br />

system. The first step of face recognition is to acquire an image<br />

either online or offline. After acquisition of image, preprocessing<br />

operation is carried out. The unique features of the image are<br />

extracted with the help of different image processing algorithm.<br />

After the features are extracted, it is matched with the feature<br />

database and the final result is obtained.<br />

Stored template<br />

Input Image<br />

Pre-processing<br />

Feature<br />

Extraction<br />

Template<br />

Generator<br />

Post-processing<br />

Match<br />

?<br />

Output Image<br />

Figure 1: Block diagram of face detection/face recognition<br />

system<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 134<br />

ISSN 2250-3153<br />

There are different approaches for face detection system.<br />

Mainly these are divided in to four parts i.e. (i) knowledge based<br />

(ii) feature based (iii) image or appearance based (iv) template<br />

based which is shown in figure 2.<br />

Knowledge Based<br />

Multi-resolution<br />

rule based<br />

method<br />

Feature Based<br />

Mixture of<br />

Gaussian<br />

Face Detection<br />

SGLD<br />

Shape<br />

Template<br />

Template<br />

Matching<br />

ASM<br />

Eigen-face<br />

Based<br />

Figure 2: Types of face detection system<br />

III. RELATED WORK<br />

Appearance<br />

Based method<br />

SVM<br />

Based<br />

HMM<br />

Based<br />

Sung and Poggio [1] proposed and successfully implemented<br />

Gaussian clusters to model the distribution of facial and non face<br />

patterns. Rowley et.al [2] used artificial neural network for face<br />

detection. Yang et.al [3] classified face detection methods in four<br />

categories. (i) Knowledge based (ii) feature invariant (iii)<br />

template matching (iv) appearance based. Lu et.al [5] used<br />

parallel neural network for face recognition. Zhao et.al [6]<br />

proposed Linear Discriminant Analysis (LDA) for face<br />

recognition.<br />

Face Databases<br />

There are different standard face databases available in internet.<br />

This section shows some of the standard face databases.<br />

Yale Database [7]: It consists of a set of standard 165 black and<br />

white images of 15 different people (11 Images per Person) taken<br />

from Yale university standard database for use in facial<br />

algorithm. All the images are properly aligned and taken in same<br />

and good lighting and background conditions. Resolution of each<br />

image is taken as 320x243 pixels. Figure 3 shows some of the<br />

faces of Yale database.<br />

Figure 3: Faces of Yale Database<br />

Extended Yale Database [8]: It contains 16128 images of 28<br />

human subjects under 9 poses and 64 illumination conditions.<br />

FERET Database, USA [9]: The database contains 1564 sets of<br />

images for a total of 14,126 images that includes 1199<br />

individuals. All the images are of size 290x240. This database<br />

was cropped automatically and segregated into sets of 250<br />

female and 250 male faces. Figure 4 shows some of the images<br />

of the FERET database.<br />

Figure 4: Faces of FERET database<br />

IV. SKIN BASED SEGMENTATION AND FACE<br />

DETECTION<br />

Color model is to specify the colors in some standard. Some of<br />

the color models used is RGB color model for color monitors,<br />

CMY and CMYK model for color printing.<br />

HSV color model is the cylindrical representation of RGB color<br />

model. HSV stands for hue, saturation and value. In each<br />

cylinder, the angle around the central vertical axis corresponds to<br />

"hue" or it form the basic pure color of the image, the distance<br />

from the axis corresponds to "saturation" or when white color<br />

and black color is mixed with pure color it forms the two<br />

different form "tint" and "shade" respectively, and the distance<br />

along the axis corresponds to "lightness", "value" or "brightness"<br />

or it provides an achromatic notion of the intensity of the color or<br />

brightness of the color.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 135<br />

ISSN 2250-3153<br />

Figure 5: HSV color space<br />

In situations where color description plays an integral role, the<br />

HSV color model is often preferred over the RGB model. The<br />

HSV model describes colors similarly to how the human eye<br />

tends to perceive color. RGB defines color in terms of a<br />

combination of primary colors, where as, HSV describes color<br />

using more familiar comparisons such as color, vibrancy and<br />

brightness. The color camera, on the robot, uses the RGB model<br />

to determine color. Once the camera has read these values, they<br />

are converted to HSV values. The HSV values are then used in<br />

the code to determine the location of a specific object/color for<br />

which the robot is searching. The pixels are individually<br />

checked to determine if they match a predetermined color<br />

threshold.<br />

(a)<br />

(b)<br />

Hue Component<br />

(c)<br />

Figure 6 (a) (b) (c): RGB image, HSV image and H component<br />

of image<br />

HSV color space can be defined as<br />

1<br />

2 R G R B<br />

1<br />

<br />

<br />

<br />

H cos <br />

2<br />

R G R B G B<br />

<br />

<br />

(1)<br />

R G B<br />

min , ,<br />

S 13 R G B<br />

1<br />

V R G B<br />

3<br />

(2)<br />

(3)<br />

V. THE PROPOSED ALGORITHM<br />

Color is a prominent feature of human faces. Using skin color<br />

as a primitive feature for detecting face regions has several<br />

advantages. In particular, processing color is much faster than<br />

processing other facial features.<br />

Furthermore, color information is invariant to face orientations.<br />

However, even under a fixed ambient lighting, people have<br />

different skin color appearance. In order to effectively exploit<br />

skin color for face detection, a feature space has to be found, in<br />

which human skin colors cluster tightly together and reside<br />

remotely to background colors.<br />

Skin and Non- skin regions for different color spaces<br />

The first step of face detection is to segment the color image<br />

into skin and non skin region. Different color space has different<br />

ranges of pixels which represents skin region and non skin<br />

region.<br />

Skin region in B color space lies in the following range<br />

0.79G 67 B 0.78G 42<br />

Non skin region in B color space lies in the following range<br />

0.836G 14 B 0.836G 44<br />

Non skin region in H color space lies in the following range<br />

19 H 240<br />

Skin region in Cb color space lies in the following range<br />

102 Cb 128<br />

From the above ranges the skin and non skin segmentation is<br />

performed. So now the output image only shows the skin regions<br />

and non skin regions are blackened. After segmentation,<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 136<br />

ISSN 2250-3153<br />

morphological operators are implemented with a structuring<br />

element. After application of morphological operators, the<br />

standard deviation of the area is calculated and rectangles are<br />

drawn in the skin regions. If any unwanted rectangles are created,<br />

it is then removed. The complete flow chart of face detection is<br />

shown in figure 7.<br />

Start<br />

Read RGB image<br />

Convert RGB Image<br />

into HSV component<br />

Find the "Hue"<br />

component<br />

Calculate histogram<br />

of "Hue" component<br />

Set the threshold<br />

values from the<br />

histogram<br />

Threshold<br />

Check<br />

Yes<br />

Skin region<br />

Convert resultant<br />

image into binary<br />

image<br />

Apply morphological<br />

processing with<br />

structuring element<br />

Calculate centroid of<br />

binary image<br />

Calculate standard<br />

deviation<br />

Check<br />

Standard<br />

Deviation<br />

Yes<br />

Retain that faces<br />

Draw the rectangle<br />

on retain faces<br />

End<br />

No<br />

No Non-skin region<br />

Reject that portion<br />

Figure 7: Flow chart of Face Detection<br />

VI. CONCLUSION<br />

The automatic face detection algorithm is applied on a<br />

wide variety of images taken under different lighting conditions<br />

and with different backgrounds. The images also have areas<br />

containing skin from other parts of the body such as hands, necks<br />

and areas with color very similar to that of skin. These areas get<br />

classified as skin.<br />

For a 380×270 size of image, the total time taken by the<br />

algorithm was 2.30 seconds. The histogram is formed using a<br />

training set of over 4,90,000 pixels drawn from various sources<br />

on the internet. The training set contained skin pixels of people<br />

belonging to different races.<br />

The various stages in the algorithm are<br />

explained using the boy image (Fig. 10). First of all<br />

the algorithm classifies skin pixels and non-skin<br />

pixels using H components of the HSV color space.<br />

Figure 10(c) classifies between the skin pixels and<br />

non skin pixels. Fig. 10(d) shows the image after<br />

applying morphological operators. The remaining part<br />

of the algorithm uses the skin detected image and the<br />

hue image, finds the skin regions and checks the<br />

percentage of skin in that region. For regions<br />

classified as faces, it uses the height and width of the<br />

region to draw a rectangular box with the region‘s<br />

centroid as its centre. The final result of the algorithm<br />

is shown in Fig. 10(e). It is to be noted that the face<br />

has been correctly located and almost at the right<br />

scale.<br />

(8.1)<br />

(8.2)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 137<br />

ISSN 2250-3153<br />

(8.3)<br />

(8.4)<br />

(8.5)<br />

(8.6)<br />

(8.7)<br />

(8.8)<br />

Figure 8: Result of face detection algorithm in different image<br />

(a)<br />

(b)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 138<br />

ISSN 2250-3153<br />

(c)<br />

(d)<br />

Figure 9 (a) (b) (c) (d): RGB image, Skin detected image<br />

Figure 9(a) shows the RGB image and figure 9(b) shows the<br />

skin region using color based segmentation. Figure 9(c) shows<br />

the RGB image and figure 9 (d) shows the skin region using<br />

color based segmentation.<br />

(a) (b)<br />

(c) (d)<br />

(e)<br />

Figure 10 (a) (b) (c) (d) (e): A test image with boy sitting, H<br />

Component image, Skin detected image, image after<br />

morphology, result of the proposed algorithm<br />

(a) (b) (c)<br />

(d) (e) (f)<br />

Figure 11 (a) (b) (c) (d) (e) (f): Different training faces for skin<br />

color of same size<br />

To evaluate the performance of the proposed algorithm,<br />

following parameters are taken in to consideration. The<br />

parameters under consideration are number of faces, detected<br />

faces, number of repeat faces, false positive, and time to execute<br />

the algorithm and accuracy of face detection.<br />

Table 1: Performance evaluation of proposed algorithm<br />

Figure 8.1<br />

Figure 8.2<br />

Number of faces 14<br />

Detected faces 14<br />

Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

0<br />

Time to execute 1.684<br />

sec.<br />

Accuracy 100%<br />

Number of faces 8<br />

Detected faces 8<br />

Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

2<br />

Time to execute 1.760<br />

sec.<br />

Accuracy 75%<br />

Number of faces 7<br />

Detected faces 7<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 139<br />

ISSN 2250-3153<br />

Example 8.3 Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

2<br />

Time to execute 1.559<br />

sec.<br />

Accuracy 71.5%<br />

Number of faces 3<br />

Detected faces 3<br />

Example 8.4 Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

0<br />

Time to execute 1.560<br />

sec.<br />

Accuracy 100%<br />

Number of faces 10<br />

Detected faces 9<br />

Example 8.5 Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

3<br />

Time to execute 1.671<br />

sec.<br />

Accuracy 70%<br />

Number of faces 6<br />

Detected faces 6<br />

Example 8.6 Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

5<br />

Time to execute 2.526<br />

sec.<br />

Accuracy 60%<br />

Number of faces 4<br />

Detected faces 4<br />

Example 8.7 Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

7<br />

Time to execute 1.868<br />

sec.<br />

Accuracy 42%<br />

Number of faces 34<br />

Detected faces 32<br />

Example 8.8 Number of repeat<br />

faces<br />

0<br />

False positive<br />

(Wrong detections)<br />

10<br />

Time to execute 2.518<br />

sec.<br />

Accuracy 70.5%<br />

Table 1 shows the performance evaluation of the proposed<br />

algorithm and the overall accuracy of the algorithm is found out<br />

to be 73.68%<br />

VII. CONCLUSION<br />

In this research paper, the authors propose color<br />

segmentation based automatic face detection algorithm. Though<br />

there are some cases of false positives, the overall performance<br />

of the proposed algorithm is quite satisfactory. The training<br />

images on which the algorithm is tested are natural images taken<br />

under uncontrolled conditions. The efficiency of the face<br />

detection was found to be 73.68%.<br />

REFERENCES<br />

[1] K K Sung, and T Poggio, ―Example-based learning for view-based human<br />

face detection,‖ IEEE Transactions on Pattern Analysis and Machine<br />

Intelligence, vol. 20, no. 1, pp. 39–51, Jan. 1998<br />

[2] H Rowley, S Baluja, and T Kanade, ―Neural network-based face detection,‖<br />

IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20,<br />

no. 1, pp. 23–38, Jan. 1998.<br />

[3] M H Yang, D J Kriegman, , and N Ahuja, ―Detecting faces in images: a<br />

survey,‖ IEEE Transactions on Pattern Analysis and Machine Intelligence,<br />

vol. 24, no. 1, pp. 34–58, Jan. 2002<br />

[4] W Zhao, R Chellappa, P J Phillips, A Rosenfeld, ―Face recognition: A<br />

literature survey,‖ ACM computing surveys, vol. 35, no. 4, pp. 399 – 458,<br />

Dec 2003<br />

[5] J Lu, X. Yuan, and T. Yahagi, ―A method of face recognition based on<br />

fuzzy c-means clustering and associated sub-NNs,‖ IEEE Transactions on<br />

Neural Networks, vol. 18, no. 1, pp. 150–160, Jan. 2007.<br />

[6] H Zhao and P C Yuen, ―Incremental linear discriminant analysis for face<br />

recognition,‖ IEEE Transactions on System Man and Cybernetics B, vol.<br />

38, no. 1, pp. 210–221, Feb. 2008.<br />

[7] http://face-rec.org/databases<br />

[8] http://vision.ucsd.edu/~leekc/ExtYaleDatabase/<br />

[9] http://face.nist.gov/colorferet<br />

AUTHORS<br />

First Author – Yogesh Tayal, M.E. (Instrumentation &<br />

Control), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID- yogesh.tayal87@gmail.com<br />

Second Author – Ruchika Lamba, M.E. (Instrumentation &<br />

Control), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID- Ruchika.mehta@thapar.edu<br />

Third Author – Subhransu Padhee, M.E. (Instrumentation &<br />

Control), Thapar University, Patiala Punjab, India-147004<br />

E-mail ID- subhransu_padhee@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 140<br />

ISSN 2250-3153<br />

DESIGN AND EVALUATION OF CHITOSAN<br />

CONTAINING MUCOADHESIVE BUCCAL PATCH<br />

OF FLUXOTINE HCL<br />

NARESH KSHIRASAGAR*, NARESH THAMADA, V.N.BALAJI KUMAR NAIK, M.SUSHMA GOPAL<br />

SREE DATTHA INSTITUTE OF PHARMACY, SHERIGUDA, IBRAHMIPATNUM, HYDERABAD<br />

Abstract- The main objective of present study was to design<br />

and evaluate the Muco adhesive buccal patch. The buccal region<br />

is an attractive route of administration for systemic drug delivery.<br />

To provide prolonged desire state concentration of Fluxotine<br />

Hydrochloride with minimal fluctuation and improved<br />

bioavailability, a mucoadhesive buccal patch is designed in the<br />

present study that Fluxotine hydrochloride is an antidepressant<br />

with selective serotonin reuptake inhibitor, its oral bioavailability<br />

is 80% because of first pass metabolism.<br />

In this study Mucoadhesive buccal patches were prepared<br />

with chitosan dissolved in glacial acetic acid and glycerol as<br />

plasticizer. Mucoadhessive patch containing 20mg of Fluxotine<br />

Hcl were evaluated with respect to their invitro drug permeation<br />

through goat buccal mucosa in 3 hr by using Franz diffusion cell,<br />

weight variation, uniformity of film, Area of the film,<br />

determination of % yield of buccal patch, percentage moisture<br />

loss, Mucoadhesive strength, folding endurance, drug content<br />

uniformity, swelling behaviour and surface pH were obtained.<br />

The physicochemical interaction between drug and polymer were<br />

investigated by FTIR spectroscopy revealed that there is no<br />

interaction.<br />

Then the formula could be promising for the fabrication of<br />

buccal patches.<br />

Index Terms- Fluxotine Hcl, buccal patches, invitro release,<br />

evaluation<br />

R<br />

I. INTRODUCTION<br />

ecent years have seen an increasing interest in the<br />

development of novel mucoadhesive buccal dosage forms.<br />

These are useful for the systemic delivery of drug as well as for<br />

local targeting of drug to a particular region of the body. Buccal<br />

delivery for the transmucosal absorption of the drug into the<br />

systemic circulation offers number of advantages for those drugs<br />

that suffer from first pass metabolism in the liver, poor oral<br />

bioavailability. Conceivably buccal delivery systems provide<br />

easy administration, thereby increasing patient<br />

compliance.[1],[2]. FLUXOTINE HCL is an SSRI (selective<br />

serotonin reuptake inhibitor) used mainly as an antidepressant to<br />

treat major depression, bipolar disorder, obsessive compulsive<br />

disorder, bulimia nervosa, panic disorder and premenstrual<br />

dysphoric disorder. Fluxotine hydrochloride was selected as the<br />

model drug for the investigation because it has got certain<br />

characteristics that a drug should possess to get absorbed through<br />

buccal route viz., biphasic solubility and low molecular weight<br />

(309.33 g/mol). Moreover it undergoes first-pass metabolism, so<br />

its bioavailability may be improved when delivered through<br />

buccal route.[3]<br />

The main aim was to prepare mucoadhesive buccal patches by<br />

using different concentration of mucoadhesive polymer to drug<br />

ratio in order to obtain desired concentration of the drug when<br />

compared to conventional dosage forms. As the bioavailability of<br />

conventional dosage form is less than 80%<br />

II. MATERIALS AND METHODS<br />

Materials<br />

FLUXOTINE HCL was obtained as a gift sample from<br />

NATCO PHARMA LTD. Hyderabad. Chitosan was provided<br />

from Hi Media Laboratories Pvt. Ltd Mumbai.PVP K-30,<br />

glycerol, glacial acetic acid were obtained from S.D. Fine<br />

Chemicals, India. All other reagent and chemicals were of<br />

analytical grade.<br />

Methods<br />

SOLVENT CASTING METHOD: Preparation of<br />

mucoadhesive buccal patches:<br />

1%,2%(m/V) of chitosan was dissolved in 10 mL 1.5% (V/V)<br />

acetic acid under occasional stirring for 12 hr. The resulting<br />

viscous chitosan solution was filtered through nylon gauze to<br />

remove debris and suspended particles. To improve patch<br />

performance and release characteristics, a water-soluble<br />

hydrophilic additive, PVP K-30, was added in different<br />

concentrations. The drug and PVP K-30 were added into the<br />

chitosan solution under constant stirring. PEG 6000 was added<br />

into the solution as plasticizer under constant stirring. This<br />

viscous solution was left overnight at room temperature to ensure<br />

a clear, bubble-free solution. The solution was poured into a<br />

glass Petri dish (16 cm diameter) and allowed to dry at ambient<br />

temperature till a flexible film was formed. Dried films were<br />

carefully removed, checked for any imperfections or air bubbles<br />

and cut into patches of 16 mm in diameter, containing 20 mg of<br />

drug per patch.[4],[5]. The patches were packed in aluminum foil<br />

and stored in an airtight glass container to maintain the integrity<br />

and elasticity of the patches. TABLE 1 contains the<br />

compositions of different formulations.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 141<br />

ISSN 2250-3153<br />

TISSUE ISOLATION:<br />

Buccal tissue was taken from goat at a slaughter-house. It was<br />

collected within 10 minutes after slaughter of the goat and tissue<br />

was kept in Krebs buffer solution. It was transported<br />

immediately to the laboratory and was mounted within 2 hours of<br />

isolation of buccal tissue. The tissue was rinsed thoroughly using<br />

phosphate buffer saline to remove any adherent material. The<br />

buccal membrane from the tissue was isolated using surgical<br />

procedure. Buccal membrane was isolated and buccal epithelium<br />

was carefully separated from the underlying connective tissue.<br />

Sufficient care was taken to prevent any damage to the buccal<br />

epithelium.[6]<br />

TABLE 1: Composition of chitosan buccal patches of fluxotine<br />

hydrochloride<br />

COMPONENTS F1 F2 F3<br />

Drug content uniformity:<br />

The F4 amount of drug contained in the patch was determined by<br />

dissolving the patch by homogenization in 100 ml of an isotonic<br />

FLUXOTINE(mg) 20 20 20<br />

phosphate buffer (pH 6.8) for 8 h under occasional shaking. The<br />

5 20 ml solution was taken and diluted with isotonic phosphate<br />

buffer pH 6.8 up to 20 ml, and the resulting solution was filtered<br />

CHITOSAN 0.1 0.1 0.2 through 0.2 a 0.45 μm Whatman filter paper. The drug content was<br />

then determined after proper dilution by UV spectrophotometer<br />

PEG200(ml) 1 1 (Shimadzu-1700 -<br />

Japan) at λmax of 226 nm. The experiments<br />

were carried out in triplicate<br />

Content uniformity:<br />

The drug loaded patch was allowed to dissolved in<br />

100mLmphosphate buffer, pH 6.8 The amount of fluxotine in<br />

the patch was measured spectrophotometrically at λmax of 226<br />

nm (n = 3).<br />

Surface pH. – Buccal patches were left to swell for 2 h on the<br />

surface of an agar plate,prepared by dissolving 2% (m/V) agar in<br />

warmed isotonic phosphate buffer of pH 6.75under stirring and<br />

then pouring the solution into a Petridish till gelling at room<br />

temperature. The surface pH was measured by means of a pH<br />

paper placed on the surface of the swollen patch. The mean of<br />

three readings was recorded.<br />

Folding endurance test. –The folding endurance of the patches<br />

was determined by repeatedly folding one patch at the same<br />

place till it broke or folded up to 300 times, which is considered<br />

satisfactory to reveal good film properties.<br />

The number of times the film could be folded at the same place<br />

without breaking gave the value of the folding endurance.<br />

Radial swelling:<br />

Radial swelling was determined by diameter method. After<br />

determination of the original patch diameter, the patch was<br />

allowed to swell on the surface of an agar plate kept in an<br />

incubator maintained at 37 o C. Measurement of the diameter of<br />

the swollen patch was done at one hour intervals for 6 h. Radial<br />

swelling was calculated from the following equation:<br />

SD (%) = [(Dt – Do) / Do] x 100<br />

Where SD (%) is the percent swelling, Dt is the diameter of the<br />

swollen patch after time t, and Do is the original diameter of the<br />

patch at time zero.<br />

PEG6000(ml) - 1 - 1<br />

In vitro Swelling Studies of Buccoadhesive patch: The degree<br />

PVP (gm) 0.01 0.01 0.01<br />

of swelling of bioadhesive polymer is important factor affecting<br />

0.01<br />

adhesion. Upon application of the bioadhesive material to a<br />

VANILLIN(gm) 0.02 0.02 0.02<br />

tissue a process of swelling may occur. The swelling rate of<br />

buccoadhesive 0.02 patch was evaluated by placing the film in<br />

phosphate buffer solution pH 6.8 at 37±0.5 oC. Buccal patch<br />

DISTILLED<br />

5 5 5 was 5 weighed (W1), placed in a 2% (w/v) agar gel plate and<br />

WATER(ml)<br />

incubated at 37 ±10C. At regular one-hour time intervals (upto 3<br />

h), the patch was removed from the petridish and excess surface<br />

EVALUATION OF PATCHES:<br />

Mass uniformity and patch thickness. – Assessment of mass and<br />

thickness was done on ten patches. The mean and standard<br />

deviation were calculated.<br />

water was removed carefully using the filter paper. The swollen<br />

patch was then reweighed (W2) again and the swelling index was<br />

calculated.[11]<br />

Swelling index = W2- W1 / W1.<br />

Bioadhesion force:<br />

The tensile strength required to detach the bioadhesion patch<br />

from the mucosal surface was applied as a measure of the<br />

bioadhesion performance. The apparatus was locally assembled<br />

and mainly composed of two‐arm balance. The left arm of the<br />

balance was replaced by a small platinum lamina vertically<br />

suspended through a wire. At the same side, a movable platform<br />

was maintained in the bottom in order to fix the mucosal<br />

membrane. For determination of bioadhesion force, the<br />

mucoadhesive patch was fixed to the platinum lamina using<br />

cyanoacylate adhesive. A piece of rabbit intestinal mucosa was<br />

also glued to the platform. The patch surface was moistened with<br />

10 μL of phosphate buffer and left for 20 s for initial hydration.<br />

On the right pan, a constant weight of 5 g was added at 2 min<br />

interval, until the hydrated patch was brought into contact with<br />

the mucosal surface. The total weight required for complete<br />

detachment of the patch was recorded and the bioadhesion force<br />

was calculated per unit area of the patch as follows:<br />

F = (Ww x g) / A<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 142<br />

ISSN 2250-3153<br />

where F is the bioadhesion force (kg m‐1 S‐2), Ww is the mass<br />

applied (g), g is the acceleration due to gravity (cm s‐2), A is the<br />

surface of the patch (cm2). The bioadhesion force data reported<br />

represent the mean of three determinations.[7],[8]<br />

In vitro drug release study:<br />

For in vitro release study, goat buccal mucosa membrane was<br />

used as a barrier membrane with Phosphate buffer (pH 7.4) as a<br />

medium. The patches were evaluated for drug release using franz<br />

diffusion cells. Buccal mucosa membrane was mounted between<br />

the donor and receptors compartments. The patch was placed on<br />

the mucosal membrane. The diffusion cell was placed in a<br />

simulated saliva maintained at 37±2°C.The receptor<br />

compartment was filled with 50 mL phosphate buffer (pH 7.4)<br />

and hydrodynamics was maintained by stirring with a magnetic<br />

bead at 300 rpm. Five mL sample was withdrawn and replaced<br />

with 5 mL fresh medium to maintain the sink condition. The<br />

samples were analyzed in U.V. spectrophotometer at 226<br />

nm.[9].[10]<br />

Fig.1: in vitro Buccal Permeations studies:<br />

COMPOSITION OF SIMULATED SALIVA: 2.38 g<br />

Na2HPO4, 0.19 g KH2PO4 and 8.00 g NaCl per liter of distilled<br />

water adjusted with phosphoric acid to pH 6.75[12]<br />

DRUG RELEASE PROFILE:<br />

FIG: 1 In vitro drug release profiles of different formulations<br />

through buccal membrane<br />

TABLE NO: 2 Characterstics of mucoadhesive buccal patch<br />

of fluxotine hcl:<br />

FTIR STUDIES:<br />

Spectrum of chitosan<br />

Spectrum of F3<br />

FIG: 2 FTIR spectra of chitosan<br />

FIG: 3 FTIR spectra of optimizes formulation<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 143<br />

ISSN 2250-3153<br />

Spectrum of fluxotine hydrochloride<br />

FIG: 4 FTIR spectra of drug( fluxotine HCL)<br />

Spectrum of PEG 6000<br />

FIG: 5 FTIR spectra of PEG 6000<br />

III. RESULTS AND DISCUSSION<br />

The results of Physical Characteristics of patches containing<br />

individual concentration of polymer are shown in Table 2. The<br />

patches were 10 mm in diameter, and 1.01±0.01 to 1.07±0.02<br />

mm in thickness. The weight ranged from 117±0.15 to 123±0.22<br />

mg.<br />

Considering the fact that acidic or alkaline pH may cause<br />

irritation to the buccal mucosa. The surface pH of the buccal<br />

films was determined to optimize both drug permeation and<br />

muco adhesion. Attempts were made to keep the surface pH as<br />

close as to salivary pH. The pH values of all the formulations<br />

were within the range of salivary pH. No significant difference<br />

was observed in surface pH for different formulations. The<br />

surface pH of all formulations was nearer to neutral (≈7) and<br />

hence no mucosal irritation was expected. The folding endurance<br />

was measured manually, by folding the film repeatedly at a point<br />

till they were broken. The breaking time was considered as the<br />

end point. The recorded folding endurance of the patch was ><br />

300 times. The patch exhibited good physical and mechanical<br />

properties. Assessment of the swelling behavior was done by<br />

measuring radial swelling. F3 patches showed high radial<br />

swelling, followed by f4 and then f2 ; All the formulations<br />

showed good mucoadhesive strength. Among the formulations<br />

F3 showed maximum mucoadhesive strength while formulation<br />

F1 showed less mucoadhesive strength. Maximum bioadhesion<br />

was recorded for f3 (65.60 x 102 kg m‐1s‐2), followed by the f4<br />

(58.46 x 102 kg m‐1s‐2), then f‐2 (50.7 x 102 kgm‐1s‐2).<br />

Drug content in all formulations was found to be uniform<br />

ranging from 95.2% to 97.9%. This indicates that the drug was<br />

dispersed uniformly throughout the patches. The in vitro drug<br />

release a study was performed using cellophane membrane.<br />

The release profile of mucoadhesive buccal patches is shown in<br />

Fig.1. The extent of fluxotine release within 1h from f‐1, f‐2 and<br />

f‐3 and f-4 patches was 85.65%, 88.45% , 98.45% and 92.33%<br />

respectively. FTIR studies were performed and has been showed<br />

and clearly shows that there is no interactions between drug and<br />

selected polymers. Chitosan patches containing 10 mg fluxotine<br />

were subjected to 2‐ months storage at 37± 0.5o C and 75± 0.5<br />

RH and found that they exhibit excellent drug content over the<br />

storage period. The folding endurance test revealed good<br />

flexibility and elastic properties. The formulation F4 did not<br />

control the release and it releases the fluxotine as immediate<br />

release formulation, but F3 offers promising drug release pattern<br />

and good swelling index.<br />

IV. CONCLUSION<br />

It may be concluded that adhesion of buccal drug delivery<br />

device to mucosal membrane leads to an increased drug<br />

concentration gradient at the absorption site and therefore<br />

improved bioavailability of systemically delivered drug.<br />

Mucoadhesive patches<br />

are a promising drug delivery system for fluxotine in<br />

maintaining drug level in blood. The mucoadhesive polymer<br />

chitosan showed good mucoadhesive and swelling<br />

characteristics.<br />

From the present investigation, one can conclude that the<br />

optimized Buccoadhesive patches of Fluxotine hydrochloride<br />

with the combination of chitosan PEG 200, PEG 6000 and PVP<br />

K-30 can meet the ideal requirements for buccal devices, which<br />

can be a good way to bypass the extensive hepatic first pass<br />

metabolism<br />

REFERENCES<br />

[1] Giuseppina C., Libero G. and Ada Maria, Bioavailability in vivo of<br />

naltrexone following transbuccal administration by an<br />

electronically‐controlled intraoral device: A trial on pigs, J.controlled<br />

Release, 2010, 145: 214‐220.<br />

[2] Swami P.V., Amit Kumar and Shirsand S.B., Design and Evaluation of<br />

Buccal patches of Granisetron Hydrochloride, Indian J.Pharm Educ. Res,<br />

2010, 44(1) :95‐101.<br />

[3] Suraj k.Benerjee, Ankith Pavan.J.S, fluoxetine medline plus drug<br />

information<br />

http://www.nlm.nih.gov/medlineplus/druginfo/meds/a689006.html.<br />

[4] Ana Figueiras, Juliane H., and Andreas B.S., In‐vitro evaluation of natural<br />

and methylated cyclodextrin as Buccal permeation enhancing system for<br />

omeprazole delivery, Eur. J. Pharmaceutics and Biopharm, 2009, 71 :<br />

339‐345.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 144<br />

ISSN 2250-3153<br />

[5] Khairnar A., Parridhi J. and Dheeraj B., Development of Mucoadhesive<br />

Buccal patch containing Aceclofenac : In vitro evaluations, International J.<br />

Pharm. Tech Research, 2009, 1(4): 978‐981<br />

[6] Navneeth varma, a.k.ghosh, P. chhottapadey.., PREPARATION AND<br />

INVITRO ASSESSMENT OF MUCOADHESIVE BUCCAL PATCHES<br />

CONTAINING CARVEDILOL. International Journal of Pharmacy and<br />

Pharmaceutical Sciences, Vol 3, Issue 3, 2011.<br />

[7] Satishbabu BK, Srinivasan BP. Preparation and evaluation of bucoadhesive<br />

films of atenolol. Indian J Pharm Sci 2008, 70, 175.<br />

[8] Semalty M, Semalty A, Kumar G. Formulation and characterization of<br />

mucoadhesive buccal films of glipizide. Indian J Pharm Sci 2008 70, 43.<br />

[9] Henrihsen I., Green L.K. Bioadhesion of hydrated chitosan : an in vitro and<br />

in vivo study. Int. J. of Pharmaceutics 1996, 145:231‐240.<br />

[10] Chandra Shekhar, Kishan V. and Yamsani M.R., Development of<br />

Mucoadhesive patches for Buccal administration of Prochlorperazine:<br />

Evaluation of In‐vitro release and Mechanical Properties, International J. of<br />

Pharm. Sci. and Nanotech, 2008, 1 (1) : 64‐70.<br />

[11] Bhanja Satyabrata, P Ellaiah, Rohit Choudhury, KVR Murthy, Panigrahi<br />

Bibhutibhusan, Martha Sujit Kumar, Design and evaluation of methotrexate<br />

buccal mucoadhesive patches Int J Pharm Biomed Sci 2010, 1(2), 31-36<br />

ISSN No: 0976-5263.<br />

[12] Kok Khiang Peh, Choy Fun Wong, Polymeric Films As Vehicle For<br />

Buccal Delivery: Swelling, Mechanical, and Bioadhesive Properties. J<br />

Pharm Pharmaceut Sci (www.ualberta.ca/~csps) 2 (2):53-61, 1999.<br />

AUTHORS<br />

First Author – Naresh kshirasagar, M.PHARMACY.M.B.A,<br />

Sree Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />

Email: arenmpharm2009@gmail.com.<br />

Second Author – NARESH THAMMADA.M. PHARMACY<br />

Sree Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />

E-MAIL: nareshthammada@gmail.com<br />

Third Author – Balaji naik Kumar.V.N., M.Pharmacy , Sree<br />

Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />

Fourth author: Sushma Gopal. M.Pharmacy.<br />

Sree Dattha Institute of Pharmacy, Ibrahmipatnum, Hyderabad<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 145<br />

ISSN 2250-3153<br />

CHILD WELFARE PROGRAMME IN COLONIAL<br />

MYSORE<br />

Abstract- Princely state has adapted some scientific measures<br />

to provide female medical aid and for improving the health of<br />

babies most effectively serving individual children in order to<br />

raise the level of community health. The high rate of infant<br />

mortality exists in the state due to the shortage of child welfare<br />

activities and other medical facilities.<br />

T<br />

I. INTRODUCTION<br />

he princely state of Mysore was one among six hundred and<br />

forty eight native states which were indirectly controlled by<br />

the British Paramount power in India.<br />

The research article focuses on the welfare measures in Infant<br />

Health in Princely State of Mysore from 1881 to 1947. This is<br />

the period of conservation, preservation and creativeness with<br />

thrust on Public welfare. The Mysore rulers were farsighted,<br />

responsible and intellectual; their liberal and able administration<br />

brought tremendous welfare which consequently made Mysore a<br />

successful State in imperial India.<br />

“Bestow blessings on those little, innocent lives bloomed<br />

on earth, who have brought the message of joy from heavenly<br />

garden”. Rabindranath Tagore.<br />

National policy for the welfare of children, the nation’s<br />

children are a supremely important asset, their nurture and<br />

solicitude are our responsibility. Every nation, developed or<br />

developing links its future with the status of the child.<br />

Childhood holds the potential and also sets the limit to the<br />

future development of the society and the children are the<br />

greatest gift to the humanity.<br />

The high rate of infant mortality due to the shortage of<br />

maternity and child welfare centre and other medical facilities<br />

besides deeply sunk in poverty it was impossible to take adequate<br />

care and protection of the children by means of feeding, nursing<br />

and medical assistance, the bad housing conditions in sanitary<br />

environments also contribute to increase in the death rate. There<br />

was high mortality among infants under one year of age in<br />

improving the health of Babies, to provide female medical aid in<br />

the state has received the attention of the government at the<br />

commencement of the 20 th century.<br />

Philanthropy, Former Dewan, M. Kantharaj urs, donated Rs.<br />

1, 20,000\ to establish a Trust in the name of his mother<br />

Gunamba. The Gunamba Maternity and child welfare trust,<br />

which was established on 21st may 1924, The Trust started<br />

working in the building of Ayurvedic hospital under the officers<br />

of Dr. A. Hardi Bank and Mathura boi. A committee was also<br />

formed by His. Highness, and according to their<br />

Dr. THRIVENI<br />

MAHARAJAS COLLEGE<br />

UNIVERSITY OF MYSORE, MYSORE<br />

Email: thriveniurs@gmail.com<br />

recommendations Medical investigation of natal treatment was<br />

started by Doctors. House to house survey was conducted and<br />

two centers were opened at Mysore. Nutritious food and milk<br />

were provided freely, made arrangements to give medical<br />

education through magic lantern slides and lectures. The trust<br />

was consisting the staff of 3 trained midwives, 2 nurses and 2<br />

assistant dais with medical kit and other equipment of weighing<br />

mission bathing tub, milk bowls, and medicine kit. Expenditure<br />

of the trust was 1,500/ month. 2<br />

Gunamba Maternity and child welfare center operating<br />

through trained intelligence and scientific methods, most<br />

effectively serving individual children in raising the level of<br />

community health appreciated by Dr. Fredrick Robinson, the<br />

well-known American Educationist, President of the collage of<br />

the city of New York in visitors Book. Mr. Allen Lane, the<br />

famous London Publisher wrote, I can only say that I honestly<br />

congratulate all concerned in this magnificent work. 3 A voluntary<br />

organization Red Cross Society joined their support in 1925,<br />

under the guidance of Sir Charles Todhunter, private secretary to<br />

the Maharaja was specially note worthy in combating the<br />

ignorance which is responsible for so much suffering and in<br />

establishing the maternity homes and child welfare centers and it<br />

organized Baby week in Jan 1925 for 5 days and then extended<br />

its activities to all over the state. 4<br />

The civic and social progress association was established in<br />

the year 1930, it started maintains a Milk center at Ganigarpet in<br />

Bangalore city to which the municipality contributed a sum of<br />

Rs. 30 per mensem. A crèche opened by the maternity and child<br />

welfare association near the Binny Mills, and 4 child welfare<br />

centers were started working in Kolar Gold Field area. 5<br />

Milk Centers: These centers were established under supervision<br />

of medical officer of Health department in 1930. The essential<br />

provision for center was a well-equipped lady health visitor, who<br />

was assisted by a trained Dai. The center consisted of a small<br />

dispensary, lady health visitor, mid wife, and a trained Dai in<br />

close proximity to the welfare center with a large compound as<br />

play ground for the children. A lady health visitor and midwife<br />

2 Maramath Dpt file no B-13 of 1915, p. 162. Divisional Archives<br />

Mysore.<br />

3 Mysore Information Bulletin, Mythic Society, vol-IV, Bangalore.<br />

4 Shamrao M. Modern Mysore. P-421 & 422.<br />

5 Mysore Administration Report 1930, P. 6.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 146<br />

ISSN 2250-3153<br />

annually attended to about 200 to 240 births, 200 infants and<br />

about 600 to 700 pre school children. A midwife should have to<br />

attend to 100 births. A lady superintendent was supposed to spare<br />

some time to assist the lady health visitor in her work. 6<br />

A visiting lady medical officer attends the centers once or twice<br />

in a week. She was a specialist in diseases of women and<br />

children besides taking care of antenatal and baby clinics. One<br />

or two trained dais and mid wives were attached to the center to<br />

render assistance. Specialist Doctors also attend the center once<br />

or twice a fortnight to provide medical and hygienic advice to the<br />

mothers and were persuaded to bring their children to the centers<br />

for periodical check up. Leaflets in different languages<br />

distributed to give instructions regarding maternity and child<br />

welfare work, milk was supplied free of cost to children. 7<br />

Maternity and child welfare work advanced in the year 1930,<br />

Annual baby shows were held and about 7-8000 babies came<br />

under expert scrutiny of doctors. A baby and Health week<br />

celebrations were held in 49 places. 8 A Successful Health and<br />

Baby week was organized in the year 1932 Mysore, which<br />

secured a certificate of Merit from the ―All Empire Baby week<br />

committee London‖. Mysore state got 2 nd best in the world. Two<br />

more maternity and child welfare centers, a toddler‘s center in<br />

Gajasala and a Crèche in the Krishna Rajendra Mills were<br />

opened. The civic and social progress Association at Mysore and<br />

Bangalore was established to maintain child-welfare and milk<br />

centers. 9<br />

The Gunamba maternity and child welfare trust maintaining 5<br />

milk centers and one crèche. 32.332 babies availed the<br />

humanitarian service of the trust. Baby clinics were running by<br />

the Wesleyan mission in Shimoga, in Bangalore by the Mahila<br />

Seva Samaja and a child welfare center by social welfare<br />

committee in the Military area at Hebbal. 10<br />

At Dasara session of the representative assembly held in 1934,<br />

the Dewan specially called attention to the great need for<br />

extending medical aid to women and children. He pointed out<br />

that the deaths from plague; Cholera and smallpox put together<br />

were less than 1/3 of the deaths of women in child – birth and of<br />

children in the first two years of their life. The Government<br />

extended the employment of midwives and also made special<br />

arrangements for appointment of lady doctors to extend their<br />

activities by visiting places within reach from their head quarters.<br />

All empire competition and Baby week shows begun and held,<br />

Mysore was ranked in the 2 nd , 1 st and 3 rd places respectively in<br />

the year 1932, 1933 and 1934.<br />

The Vani Vilas shield for the Best Baby week campaign in<br />

1935 was awarded to Mandya branch of the Red Cross society,<br />

35 maternities and child welfare organizations existed in the year<br />

1935. 11 Baby and health week celebration were held throughout<br />

the state the Mysore state secured the 3 rd place in imperial Baby<br />

week challenge shield competition and the 2 nd place in the Vani<br />

Vilas shield for the best Baby week campaign in 1934 was<br />

6 Mysore Administration Report MAR 1930 p. 60<br />

7 Ibid<br />

8 Ibid<br />

9 Mysore Administration Report, 1932<br />

10 Mysore Administration Report, 1933, P- 138<br />

11 Mysore Administration Report, 1935<br />

awarded to French Rocks. There were 17 maternity & child<br />

welfare organizations working in the state. 10 in Bangalore<br />

district, 5 in the Mysore district and one among these in the<br />

Shimoga district and one in the Tumkur district The Gunamba<br />

Maternity and Child Welfare Trust maintained 6 centers, two<br />

nursery schools & a crèche at the Sri Krishnarajendra Mills.<br />

In order to organize maternity and child welfare work under the<br />

department of Health, Dr. Mrs. Erika Deussen Rosenthal, M.D.<br />

was appointed towards the close of the year as organizer of<br />

Maternity & child welfare work in the state. 12<br />

The Indian Red Cross Society of Mysore Branch Started 26<br />

new branches in the state making a total of 43 branches of<br />

maternity and child welfare centers. A Doctor from Mysore state<br />

represented the 16 th International Red Cross conference held in<br />

London. A medical officer from the Gunamba maternity and<br />

child welfare trust Mysore was the recipient of the Carlo<br />

Forlanini Institute scholarship of Rome for a course of study in<br />

the treatment and care of Tuberculosis. 13<br />

Anti natal Clinics: In 1938 there were 43 anti-natal clinics were<br />

working, of which 20 were in rural areas. The Government<br />

appointed a whole time officer to organize & co-ordinate the<br />

maternally & child welfare Movement. 14<br />

School Clinics: Medical Department made certain important<br />

suggestions such as the establishments of school clinic for the<br />

follow-up causes, provisions of midday meals or other nutritious<br />

feeds to the children. Provisions of better hygienic requirements<br />

& better seating arrangements in schools, introduction of<br />

systematic physical education, introduction of shorter periods,<br />

arrangements of periodical talks with the parents for<br />

improvements in the nutrition of care of the children, and supply<br />

of free cod-liver oil to deserving cases on the recommendation of<br />

the medical inspector of schools. 15<br />

Nursery Schools: Sir, Charles Todhunter who had established a<br />

child welfare centre, a nursery school and a solarium in each of<br />

the Mohallas of the city of Mysore. 16 Nursery schools were<br />

established in Mysore, Bangalore and Chikballapure in the year<br />

1938, and continued excellent work. The state had given high<br />

priority to improving child nutrition the children attending the<br />

solarium during the early morning hours were given graded sun<br />

bathes, milk, eggs, fruit Juice and cod-liver oil for their<br />

nourishment. They are weighed and examined every week for<br />

testing their progresses in health.50 maternity homes were in<br />

existence in various parts of the state. The organizing secretary<br />

did five propaganda tours and delivered 25 lectures in different<br />

parts of the state. 17<br />

Bureau of maternity and child welfare: With a view to<br />

organize a regular and efficient service of child welfare<br />

12 Mysore Administration Report , 1934, P-135<br />

13 Mysore Administration Report,1945, p. 69<br />

14 Mysore Information Bulletin. Vol-III, Mythic Society, Bangalore.<br />

15 Mysore Information Bulletin., 1939, vol-II, Bangalore.<br />

16 Ibid<br />

17 Mysore Administration Report, 1938, P- 151.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 147<br />

ISSN 2250-3153<br />

throughout the state, a bureau of maternity and child welfare was<br />

opened in the year 1945. With the object of inspecting the<br />

working of Crèches, Nursery schools and Milk centers. 18 In the<br />

year, 1946 (77) seventy-seven maternity homes were visited and<br />

their work were examined and the establishment of crèches was<br />

suggested. The established nursery schools were inspected and<br />

useful instructions were issued for the proper feeding of children<br />

and their periodical medical examination. Milk centers were<br />

started with free supply of milk to poor children in the sub-health<br />

units of ( plases called) Mandya, the Mahila Samajas of<br />

Chickballapur, Hassan and Shimoga. The scheme of 20<br />

stipendiary pupil midwives, on a scholarship of Rs.15 each per<br />

month, for undergoing training in midwifery was sanctioned. 19<br />

II. CONCLUSION<br />

The infant mortality rate was considerably reduced with the<br />

introduction of modern system of midwifery and rapid<br />

implementation of maternity and child welfare services. The<br />

child welfare centers had increased from 4 to 32 during 1881-<br />

1947 in Co-operation between Government, Local bodies &<br />

organization of Red Cross society. 20 54 hospitals among 419<br />

Medical institutions were considered as Women‘s and children‘s,<br />

and 25, 94,251 children were treated in the hospitals of the<br />

state. 21<br />

18 Mysore Administration Report 1944, p.147<br />

19 Mysore Administration Report, 1947 p. 143<br />

20 Mysore information Bulletin, May, 1940<br />

21 Mysore Administration Report, 1946, p. 147<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 148<br />

ISSN 2250-3153<br />

Live Migration of Virtual Machines in Cloud<br />

Abstract- Migration of a virtual machine is simply moving the<br />

VM running on a physical machine (source node) to another<br />

physical machine (target node). It is done as, while the VM is<br />

running on the source node, and without disrupting any active<br />

network connections, even after the VM is moved to the target<br />

node. It is considered ―live‖, since the original VM is running,<br />

while the migration is in progress. Huge benefit of doing the live<br />

migration is the very small (almost zero) downtime in the order<br />

of milliseconds.<br />

There exists a model in which the load is balanced among the<br />

servers according to their processor usage or their IO usage and<br />

keeping virtual machines zero downtime. To increase the<br />

throughput of the system, it is necessary that the virtual machines<br />

are load balanced statically, i.e. the load is distributed to each<br />

part of the system in proportion to their computing IO capacity.<br />

To migrate a virtual machine from one physical host to<br />

another, the control of virtual machines is converted to the<br />

management of services in Red Hat Cluster Suite. This creates a<br />

high availability and load balancing cluster services, to migrate a<br />

virtual machine from one physical host to another.<br />

Software services, file systems and network status can be<br />

monitored and controlled by the cluster suite, services and<br />

resources can be failed over to other network nodes in case of<br />

failure. The cluster suite forcibly terminates a cluster node's<br />

access to services or resources to ensure the node and data is in a<br />

known state. The node is terminated by removing power or<br />

access to the shared storage.<br />

W<br />

I. INTRODUCTION<br />

hat is virtual machine?<br />

One computer containing multiple operating systems<br />

loaded on a single PC, each of which functions as a separate OS<br />

on a separate physical machine. Virtualization [1] software does<br />

just that by creating and managing one or more virtual machines<br />

on a single, physical host PC. It can run its own operating<br />

systems and applications as if it were a physical computer. A<br />

virtual machine [2] behaves exactly like a physical computer and<br />

contains it own virtual (i.e. software-based) CPU, RAM hard<br />

disk and network interface card (NIC).<br />

Benefits of virtual machines<br />

1. Isolation: While virtual machines can share the physical<br />

resources of a single computer, they remain completely<br />

isolated from each other as if they were separate<br />

physical machines. If, for example, there are four virtual<br />

machines on a single physical server and one of the<br />

virtual machines crashes, the other three virtual<br />

machines remain available. Isolation is an important<br />

Ashima Agarwal, Shangruff Raina<br />

Department of Computer, MIT College of Engineering Pune, India<br />

reason why the availability and security of applications<br />

running in a virtual environment is far<br />

2. Encapsulation: A virtual machine is essentially a<br />

software container that bundles or ―encapsulates‖ a<br />

complete set of virtual hardware resources, as well as an<br />

operating system and all its applications, inside a<br />

software package. Encapsulation makes virtual<br />

machines incredibly portable and easy to manage.<br />

3. Hardware Independence: Virtual machines are<br />

completely independent from their underlying physical<br />

hardware. For example, you can configure a virtual<br />

machine with virtual components (eg, CPU, network<br />

card, SCSI controller) that are completely different from<br />

the physical components that are present on the<br />

underlying hardware. Virtual machines on the same<br />

physical server can even run different kinds of operating<br />

systems (Windows, Linux, etc).<br />

II. WHAT IS LIVE MIGRATION?<br />

Live migration [3] is the movement of a virtual machine from<br />

one physical host to another while continuously powered-up.<br />

When properly carried out, this process takes place without any<br />

noticeable effect from the point of view of the end user. Live<br />

migration allows an administrator to take a virtual machine<br />

offline for maintenance or upgrading without subjecting the<br />

system's users to downtime.<br />

When a VM is running a live service it is important that this<br />

transfer occurs in a manner that balances the requirements of<br />

minimizing both downtime and total migration time. The former<br />

is the period during which the service is unavailable due to there<br />

being no currently executing instance of the VM; this period will<br />

be directly visible to clients of the VM as service interruption.<br />

The latter is the duration between when migration is initiated and<br />

when the original VM may be finally discarded and hence, the<br />

source host may potentially be taken down for maintenance,<br />

upgrade or repair. It is easiest to consider the trade-offs between<br />

these requirements by generalizing memory transfer into three<br />

phases:<br />

Push phase: The source VM continues running while certain<br />

pages are pushed across the network to the new destination. To<br />

ensure consistency, pages modified during this process must be<br />

re-sent.<br />

Stop-and-copy phase: The source VM is stopped, pages are<br />

copied across to the destination VM, then the new VM is started.<br />

The time between stopping VM on source and resuming it on<br />

destination is called "down-time". Down-time of a VM during a<br />

live migration could be a few milliseconds to seconds according<br />

to the size of memory and applications running on the VM. There<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 149<br />

ISSN 2250-3153<br />

are some techniques to reduce live migration down-time such as<br />

using probability density function of memory change. [3]<br />

Pull phase: The new VM executes and, if it accesses a page<br />

that has not yet been copied, this page is faulted in (.pulled.)<br />

across the network from the source VM. VM migration is<br />

initiated by suspending the VM at the source. With the VM<br />

suspended, a minimal execution state of the VM (CPU, registers,<br />

and non-pageable memory) is transferred to the target. The VM<br />

is then resumed at the target, even though the entire memory<br />

state of the VM has not yet been transferred, and still resides at<br />

the source. At the target, when the VM tries to access pages that<br />

have not yet been transferred, it generates page-faults, which are<br />

trapped at the target and redirected towards the source over the<br />

network. Such faults are referred to as network faults. Source<br />

host responds to the network-fault by sending the faulted page.<br />

Since each page fault of the running VM is redirected towards<br />

the source, it can degrade the applications running inside the<br />

VM. However, when pure demand-paging accompanied with the<br />

techniques such as pre-paging can reduce this impact by a great<br />

extent. Live migration is widely used in virtualization ready data<br />

centers and enterprise IT departments. It separates software‘s<br />

from physical servers, and provides desirable abilities such as<br />

online server maintenance, dynamic load balancing, and etc.<br />

Live migration can be applied in both local area network<br />

(LAN) environment and wide area network (WAN) environment.<br />

Live migration in LAN environment is simpler, because live<br />

migration process avoids virtual storage migration by sharing a<br />

network storage. Furthermore, live migration in LAN skips the<br />

migration of network topology, and the migration process only<br />

needs to broadcast an unsolicited ARP reply from the migrated<br />

VM, in order to advertise the MAC relocation.<br />

III. SEAMLESS LIVE MIGRATION<br />

When down-time of a VM during a live migration is zero or a<br />

few millisecond which is not noticeable by end user, it is called a<br />

seamless live migration. Otherwise, the end user will feel a small<br />

or relatively long glitch in the service.<br />

What is the purpose of live migration?<br />

Migrating an entire OS and all of its applications as one unit<br />

allows us to avoid many of the difficulties faced by process-level<br />

migration approaches. With virtual machine migration, on the<br />

other hand, the original host may be decommissioned once<br />

migration has completed. This is particularly valuable when<br />

migration is occurring in order to allow maintenance of the<br />

original host.<br />

Secondly, migrating at the level of an entire virtual machine<br />

means that in-memory state can be transferred in a consistent and<br />

(as will be shown) efficient fashion. This applies to kernelinternal<br />

state (e.g. the TCP control block for a currently active<br />

connection) as well as application-level state, even when this is<br />

shared between multiple cooperating processes.<br />

Thirdly, live migration of virtual machines allows a separation<br />

of concerns between the users and operator of a data center or<br />

cluster. Users have `carte blanche' regarding the software and<br />

services they run within their virtual machine, and need not<br />

provide the operator with any OS-level access at all. Live OS<br />

migration is a extremely powerful tool for cluster administrators,<br />

allowing separation of hardware and software considerations, and<br />

consolidating clustered hardware into a single coherent<br />

management domain. If a physical machine needs to be removed<br />

from service an administrator may migrate OS instances<br />

including the applications that they are running to alternative<br />

machine(s), freeing the original machine for maintenance.<br />

How is live migration achieved?<br />

By using a pre-copy approach in which pages of memory are<br />

iteratively copied from the source machine to the destination<br />

host, all without ever stopping the execution of the virtual<br />

machine being migrated. Page level protection hardware is used<br />

to ensure a consistent snapshot is transferred, and a rate-adaptive<br />

algorithm is used to control the impact of migration traffic on<br />

running services. The final phase pauses the virtual machine,<br />

copies any remaining pages to the destination, and resumes<br />

execution there. We eschew a `pull' approach which faults in<br />

missing pages across the network since this adds a residual<br />

dependency of arbitrarily long duration, as well as providing in<br />

general rather poor performance.<br />

The logical steps that we execute when migrating an OS are<br />

summarized in Figure 3. We take a conservative approach to the<br />

management of migration with regard to safety and failure<br />

handling. Although the consequences of hardware failures can be<br />

severe, our basic principle is that safe migration should at no<br />

time leave a virtual OS more exposed to system failure than<br />

when it is running on the original single host. To achieve this, we<br />

view the migration process as a transactional interaction between<br />

the two hosts involved:<br />

Stage 0 Pre-Migration: We begin with an active VM on<br />

physical host A. To speed any future migration, a target host may<br />

be preselected where the resources required to receive migration<br />

will be guaranteed.<br />

Stage 1 Reservation: A request is issued to migrate an OS from<br />

host A to host B. We initially confirm that the necessary<br />

resources are available on B and reserve a VM container of that<br />

size. Failure to secure resources here means that the VM simply<br />

continues to run on A unaffected.<br />

Stage 2 Iterative Pre-Copy: During the first iteration, all pages<br />

are transferred from A to B. Subsequent iterations copy only<br />

those pages dirtied during the previous transfer phase.<br />

Stage 3 Stop-and-Copy: We suspend the running OS instance at<br />

A and redirect its network traffic A to B. As described earlier,<br />

CPU state and any remaining inconsistent memory pages are<br />

then transferred. At the end of this stage there is a consistent<br />

suspended copy of the VM at both A and B. The copy at A is still<br />

considered to be primary and is resumed in case of failure.<br />

Stage 4 Commitment Host B indicates to A that it has<br />

successfully received a consistent OS image. Host A<br />

acknowledges this message as commitment of the migration<br />

transaction: host A may now discard the original VM, and host B<br />

becomes the primary host.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 150<br />

ISSN 2250-3153<br />

Stage 5 Activation: The migrated VM on B is now activated.<br />

Post-migration code runs to reattach device drivers to the new<br />

machine and advertise moved IP addresses.<br />

Figure 3: Migration Timeline<br />

This approach to failure management ensures that at least one<br />

host has a consistent VM image at all times during migration. It<br />

depends on the assumption that the original host remains stable<br />

until the migration commits, and that the VM may be suspended<br />

and resumed on that host with no risk of failure. Based on these<br />

assumptions, a migration request essentially attempts to move the<br />

VM to a new host, and on any sort of failure execution is<br />

resumed locally, aborting the migration.<br />

To solve the problem of load balancing amongst the physical<br />

hosts in cloud by adaptive live migration of virtual machine,<br />

there exists a model in which the load is balanced among the<br />

servers according to their processor usage or their IO usage and<br />

keeping virtual machines zero downtime. To increase the<br />

throughput of the system, it is necessary that the virtual machines<br />

are load balanced statically, i.e. the load is distributed to each<br />

part of the system in proportion to their computing IO capacity.<br />

The System Architecture of such a model is given in next<br />

chapter.<br />

IV. SYSTEM ARCHITECTURE<br />

By the use of EUCALYPTUS [4] one or more VLAN can be<br />

created, each VLAN may be across many physical hosts and may<br />

include many virtual machines, so when a virtual machine is<br />

migrated from one physical host to another, an inclusion<br />

relationship can be kept between VLAN and virtual machine.<br />

Following diagram represents the system architecture of an<br />

adaptive intra-cloud load balancing model.<br />

Lblog: The program lblog is a small cronjob which runs<br />

regularly on each host to monitor predefined resources, such as<br />

CPU and IO load, and log their usage to the log directory on the<br />

shared storage.<br />

DLBA (Distributed load balancing algorithm): It runs on each<br />

physical host separately and dynamically migrates virtual<br />

machines of local host to other physical hosts according to<br />

resource uses.<br />

Dump: When virtual machines are migrated, their memory<br />

contents are dumped to the dump directory of shared storage.<br />

Conf: This directory contains the configuration files.<br />

Private: This directory contains the file system.<br />

Figure 4: System Architecture<br />

To migrate a virtual machine from one physical host to<br />

another, the control of virtual machines is converted to the<br />

management of services in Red Hat Cluster Suite[5]. This<br />

creates a high availability and load balancing cluster services, to<br />

migrate a virtual machine from one physical host to another. The<br />

cluster suite forcibly terminates a cluster node's access to<br />

services or resources to ensure the node and data is in a known<br />

state. The node is terminated by removing power or access to the<br />

shared storage. The detailed explanation of the working of Red<br />

Hat Cluster Suite is given in next chapter.<br />

V. RED HAT CLUSTER SUITE<br />

Introduction<br />

High-availability Service Management<br />

High-availability[7] service management provides the ability<br />

to create and manage high-availability cluster services in a Red<br />

Hat cluster. The key component for high-availability service<br />

management in a Red Hat cluster, rgmanager, implements cold<br />

failover for off-the-shelf applications. In a Red Hat cluster, an<br />

application is configured with other cluster resources to form a<br />

high-availability cluster service. A high-availability cluster<br />

service can fail over from one cluster node to another with no<br />

apparent interruption to cluster clients. Cluster-service failover<br />

can occur if a cluster node fails or if a cluster system<br />

administrator moves the service from one cluster node to another<br />

(for example, for a planned outage of a cluster node). A cluster<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 151<br />

ISSN 2250-3153<br />

service can run on only one cluster node at a time to maintain<br />

data integrity. Failover priority can be specified in a failover<br />

domain. Specifying failover priority consists of assigning a<br />

priority level to each node in failover domain. The priority level<br />

determines the failover order — determining which node that a<br />

cluster service should fail over to. If you do not specify failover<br />

priority, a cluster service can fail over to any node in its failover<br />

domain. Also, if a cluster service is restricted to run only on<br />

nodes of its associated failover domain. (When associated with<br />

an unrestricted failover domain, a cluster service can start on any<br />

cluster node in the event no member of the failover domain is<br />

available.)<br />

VDE (Virtual Distributed Ethernet)<br />

Introduction<br />

The acronym VDE [6] is self explaining: it is a Virtual<br />

network because it is built completely in software, it is<br />

Distributed as parts of the same network can run on different<br />

physical (real) computers and it is an Ethernet as the entire<br />

virtual software structure is able to forward, dispatch and route<br />

plain Ethernet packets. The main features of VDE are the<br />

following:<br />

VDE is Ethernet compliant.<br />

VDE is general; it is a virtual infrastructure that gives<br />

connectivity to several kinds of software components:<br />

emulators/virtual machines, real operating systems and<br />

other connectivity tools.<br />

VDE is distributed.<br />

VDE does not need specifically administration<br />

privileges to run.<br />

With VDE it is also possible to integrate real computers in the<br />

emulated network. When a real computer is connected to a VDE<br />

a virtual interface (based on tuntap) is visible from the operating<br />

system. This virtual interface appears exactly as it were a<br />

hardware interface and behaves as a physical ethernet interface.<br />

This operation however changes the network behavior of the host<br />

computer and thus need administrative privileges to be<br />

completed.<br />

Currently VDE supports User-Mode Linux virtual machines,<br />

qemu, Bochs and MPS.<br />

Network Connection for Zero-Downtime Migrated Virtual<br />

Machine<br />

EUCALYPTUS provides support for VLAN across multi<br />

physical hosts via VDE virtual switches. There is a VDE switch<br />

on each physical host. Ports of VDE switch are classified into<br />

two categories: tagged port and untagged port. Tagged ports<br />

transmit packages belonging to multi VLAN, for example the<br />

port 3 on Host0 and untagged ports transmit packages belonging<br />

to a VLAN, for example the port 1 and 2 on Host0. On single<br />

physical host there may be multi VLAN, and each VLAN binds<br />

to an untagged port of VDE switch on the host dynamically, or<br />

example VLAN0 and VLAN1 on Host0 respectively bind to<br />

untagged port 1 and 2,. Bridge device connects to untagged port<br />

of VDE switch via virtual network card tap. VDE switches on<br />

different physical hosts connect to each other via vde plug which<br />

is part of VDE switch software suite and implements package<br />

transmission, encryption and authentication functions.<br />

In figure 10 below, when vm2 belonging to VLAN1 migrates<br />

from Host0 to Host1, we need to delete virtual network device<br />

veth2.0 from bridge br1 on Host0. If there were no other network<br />

devices in bridge br1 except tap1 and veth2.0, we also would<br />

needed to unbind VLAN1 to untagged port 2, thus port 2 could<br />

be used by other VLAN in the future. On the target Host1,<br />

because VLAN1 has existed, before Red Hat Cluster Suite starts<br />

vm2, we only need create a pair of virtual network devices on<br />

Host1 for vm2: eth0 and veth2.0 (eth0 in virtual machine vm2<br />

and veth2.0 on the Host1), then add veth2.0 into the bridge br0.<br />

If there were not VLAN1 on<br />

Host1, we would need to find an untagged port in VDE switch<br />

and bind it to VLAN1, also create the corresponding bridge br0.<br />

Figure 8: Virtual Machine Migration<br />

Advantages of Live Migration<br />

1. Reduce IT costs and improve flexibility with server<br />

consolidation.<br />

2. Decrease downtime and improve reliability with<br />

business continuity and disaster recovery.<br />

3. Increase energy efficiency by running fewer servers and<br />

dynamically powering down unused servers with our<br />

green IT solutions<br />

4. Accessing more processing power (in the sense of load<br />

balancing),<br />

5. Exploitation of resource locality (for performance),<br />

resource sharing (meaning sharing of expensive or rare.<br />

6. Resources - such as telescopes or medical equipment –<br />

or large amounts o free memory by processes over a<br />

network), fault resilience.<br />

7. Simplified system administration and mobile computing<br />

(for instance as used by commuters from office to<br />

home).<br />

VI. CONCLUSION<br />

Thus, Live Migration is the movement of a virtual<br />

machine from one physical host to another while continuously<br />

powered-up. This helps in decreasing downtime and improves<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 152<br />

ISSN 2250-3153<br />

reliability with business continuity and disaster recovery. To<br />

migrate a virtual machine from one physical host to another, the<br />

control of virtual machines is configured to the management of<br />

services in Red Hat Cluster Suite. VDE (virtual distributed<br />

Ethernet) virtual switches are used which are connected between<br />

the physical machines. Using VDE, users can create VLAN for<br />

each virtual machine instance. Hence, the motive of zero<br />

downtime of virtual machines is achieved by live migration.<br />

REFERENCES<br />

[1] http://www.vmware.com/virtualization/virtual-machine.html<br />

[2] http://searchservervirtualization.techtarget.com/definition/virtual-machine<br />

[3] C Clark, KFraser, S Hand, J Hansen, and E Jul., ―Live migration of virtual<br />

machines‖, Proceedings of the 2nd ACM/USENIX Symposium on<br />

Networked Systems Design and Implementation (NSDI), pages: 273-286,<br />

2005<br />

[4] Daniel Nurmi, Rich Wolski, Chris Grzegorczyk., ―The EUCALYPTUS<br />

Open-source Cloud computing System‖, in Proceedings of Cloud<br />

Computing and Its Applications [online], Chicago, Illinois, October 2008<br />

[5] Yi Zhao, Wenlong Huang ― Adaptive Distributed Load Balancing<br />

Algorithm based on Live Migration of Virtual Machines in Cloud‖<br />

[6] Davoli,R., ―VDE: virtual distributed Ethernet‖, Test beds and Research<br />

Infrastructures for the Development of Networks and Communities, pages<br />

213-220, February 2005<br />

[7] http://www.centos.org/docs/5/html/5.1/Cluster_Suite_Overview/s1-servicemanagement-overview-CSO.html<br />

AUTHORS<br />

First Author – Ashima Agarwal, Third year, computer<br />

engineering, MIT College of Engineering, Pune, Email:<br />

ashimaagarwal30@gmail.com<br />

Second Author – Shangruff Raina, Third year,computer<br />

engineering, MIT College of Engineering, Pune, Email:<br />

shangruff@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 153<br />

ISSN 2250-3153<br />

Regulation and Accounting Treatment of Future and<br />

Option in Indian Derivative Market<br />

Matloob Ullah Khan, Dr. Ambrish Gupta and Dr. Sadaf Siraj<br />

Abstract- The main objectives of this paper are to study the<br />

Regulation of India Derivative market along with the accounting<br />

for Future and Option. In first objective we discuss about the<br />

Regulation of Indian Derivative Market as per Dr. L.C. Gupta<br />

committee report and in second objective we describe accounting<br />

adjustment procedure of Future and Option at the time of<br />

payment or receipt of mark-to-market margin, initial margin,<br />

open interest as on balance sheet date, final settlement or squareup,<br />

daily settlement, at the time of default, discloser requirement<br />

and method for determination of profit or loss in multiple option<br />

situations.<br />

Index Terms- Accounting for Future & Option and Regulation<br />

of Derivative Market<br />

T<br />

I. INTRODUCTION<br />

he trading in derivative market comes under provision<br />

contained in the SC(R)A (Security Contract Regulation Act).<br />

The Security Exchange Board of India (SEBI) created rules and<br />

regulation related to the trading in derivative market segment.<br />

According to the need of time, SEBI changed or revised the rules<br />

and regulation of financial market to keep the investor secure or<br />

try to put the investor on safer side of the investment by reducing<br />

the level of risk with the help of different polices of regulatory<br />

frame work of derivative market.<br />

Derivative market is basically a subset of capital market due<br />

to that reason controlling body of both the markets is same. To<br />

run this segment various expert group of people developed<br />

various derivative market products which run or executed under<br />

SEBI guideline, which are followed by every members who<br />

come under the agreement of derivative trade weather it is a<br />

client, banker, dealer, stock exchange, mutual funds companies<br />

and Foreign Institutional Investor (FII) etc.<br />

II. LITERATURE REVIEW<br />

The regulatory frame work of Indian derivative market is a<br />

critical or complicated part of overall capital market of India.<br />

Derivative market products itself contain the property of<br />

complicated structure in tem of working mechanism and<br />

valuation of price. This true fact will be clear when it discussed<br />

later on how the regulation, control, development and settlement<br />

of derivative market trading are take place by the suitable<br />

amendment to the bye-lows of stock exchange where derivative<br />

trading was permitted.<br />

[1] Sahoo (1997), analysis the securities market reform in a<br />

development countries and he found that the role of state<br />

involvement in the functioning of markets is a matter of<br />

significant debate, it is generally agreed that regulation has a<br />

very important and key role to ensure the efficient functioning of<br />

markets and avoidance of systematic failure. [2] Hathaway<br />

(1998), notice that the major contributory factors for<br />

accomplishment or breakdown of derivative market are market<br />

culture, the underlying market including its depth and liquidity<br />

and financial infrastructure including the regulatory framework.<br />

[3] International Organisation of securities commissions<br />

(IOSCO) 1996a, also observed that the successful regulatory<br />

system can balance the incentives of self-regulation while<br />

reducing the incentives and opportunity for behaviour, which<br />

threatens the success and integrity of market.<br />

[4] Dr. L.C Gupta committee (March 1998) developed<br />

appropriate regulatory framework for derivatives trading in India.<br />

[5] Prof. J.R Verma Committee ( June 1998) study the risk<br />

containment measure for derivatives trading in Indian derivative<br />

market which is not covered by Dr. L.C. Gupta committee before<br />

implementation of derivative trading in India. [6] SEBI Advisory<br />

committee ( September 2002) work on the development and<br />

regulation of derivative market in India after seeing powerful<br />

growth in this sector from 11 crores to 410 crores during the<br />

financial year 2000-01 to 2001-02, this committee cover some<br />

important issues such as: Physical settlement of stock option and<br />

stock future contract; Review of the eligibility criteria of stocks<br />

on which derivative products are permitted; Use of sub-brokers<br />

in the derivative market; and Norms for use of derivatives by<br />

mutual funds.[7]Shri K.R Ramamoorthy committee (February<br />

2003) was appointed by SEBI to look on the participation of<br />

security brokers in commodity future market and his committee<br />

was examine the various aspects related to participation of<br />

securities market brokers in commodity market and it give<br />

specific focus on following issues: Weather securities brokers<br />

could participated in commodities market; What would be the<br />

risk containment measure if the risk of one market does not spill<br />

over to other; and whether the existing infrastructure of stock<br />

exchange could be used for the commodities futures market.<br />

[8] The SEBI Group on Secondary Market Risk Management<br />

(March 2003) discussed the introduction of interest rate<br />

derivatives in India, this group basically covered the following<br />

important issues such as: The time table for introduction of<br />

exchange traded interest rate derivatives in India; The<br />

specification of the initial set of interest rate derivative contracts<br />

to be introduced; The road map for introduction of additional<br />

products; The risk containment systems for the initial set of<br />

derivatives; and The road map for research in fixed income<br />

analytics and the resulting refinement of product design and fine<br />

tuning of the margining system. The conclusion of these issues is<br />

put for public comments by this group and developed<br />

consultative document. [9] In 2006 RBI draft comprehensive<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 154<br />

ISSN 2250-3153<br />

guidelines on derivatives instrument under which it cover most<br />

of terms and policy of derivative markets.<br />

[10][11]The RBI-SEBI Standing Technical committee (2008 and<br />

2009) draft policy and trading guideline for exchange traded<br />

currency future and interest rate future under which it covers<br />

various aspects under headings Product Design, Risk<br />

Management Measures, Surveillance & Disclosures, Eligibility<br />

criteria for setting up a currency and interest rate futures<br />

segment, Eligibility criteria for members of the currency and<br />

interest rate future segments and finally Design Regulatory &<br />

Legal Aspects.<br />

III. RESEARCH METHODOLOGY<br />

Research methodology used in this paper is based on<br />

‗Qualitative Research‟. In which, we study various government<br />

policies and regulation of Indian derivative market related to<br />

accounting treatments of Future and Option. On the basis of our<br />

understanding we define different type of accounting treatments,<br />

which take place during the life of Future and Option contract.<br />

Explanation of accounting treatments are done in such a manner<br />

while keeping in mind that it will be useful to all main kind who<br />

are interested to know about accounting for F&O.<br />

IV. OBJECTIVES<br />

Regulation for derivative trading according to Dr. L.C<br />

Gupta committee;<br />

Accounting for Future; and<br />

Accounting for Option;<br />

V. REGULATION FOR DERIVATIVES TRADING IN<br />

INDIA<br />

SEBI create a 24 member committee under the supervision of<br />

Dr. L.C. Gupta. To developed a well organized regulatory<br />

framework for derivatives trading in India. SEBI accept the<br />

recommendation of this committee on 11 May 1998 and<br />

approved the phase introduction of derivatives trading in India<br />

beginning with stock index future. The requirements in the<br />

SC(R)A and the regulatory frame work developed there under<br />

preside over trading in securities. The modification of the<br />

SC(R)A to include derivatives within the frame work of that Act.<br />

Summary of derivative regulation are given blow on the basis of<br />

Dr. L.C Gupta committee recommendation.<br />

1. Any exchange in India, who are interested to start<br />

derivative trading so they have to fulfil the eligible<br />

criteria as per Dr. L.C. Gupta committee report and<br />

apply SEBI for the purpose of approval for derivative<br />

trading under section 4 of SC(R)A 1956.<br />

2. Derivative trading or clearing member should have a<br />

limit to maximum of 40% of total member council and<br />

the particular exchange should have separate governing<br />

council.<br />

3. The exchange should have to obtain prior approval of<br />

SEBI before starting of trading in any derivative<br />

contract or product and would have to regulate the sales<br />

practices of its members.<br />

4. The exchange has a limit up to 50 members.<br />

5. The member of an alive segment would not become the<br />

member of derivative segment automatically. Every<br />

existing segment member should take permeation of<br />

SEBI and also fulfil L.C Gupta committee criteria to<br />

start derivative trading.<br />

6. Clearing and any settlement of derivative contract or<br />

trade should be done through a SEBI approved clearing<br />

corporation or houses and every clearing corporation or<br />

houses should be came under the criteria of L. C. Gupta<br />

committee and also take approval for SEBI to start<br />

clearing and settlement process.<br />

7. Every brokers, dealers and clearing members of<br />

derivative market should take approval along with<br />

registration in SEBI to start new derivative product.<br />

8. least amount of net-worth of clearing member of<br />

derivative clearing corporation or houses shall be Rs. 3<br />

Cr. and net-worth should be computed on the basis of<br />

given function:<br />

Where<br />

Networth;<br />

Capital;<br />

Free Reserve; and<br />

Non-Allowable assets;<br />

Non-Allowable assets included the following items:<br />

I. Fixed assets;<br />

II. Intangible assets;<br />

III. Prepaid expenses;<br />

IV. Bad deliveries;<br />

V. Unlisted security;<br />

VI. Member‘s card;<br />

VII. Pledged security;<br />

VIII. Doubtful debts and advances; and<br />

IX. 30% marketable securities;<br />

…(1)<br />

9. The maximum contract value shall not be less than Rs 2<br />

lakh;<br />

10. Exchange should have submitted details of the futures<br />

contract they intend to introduce.<br />

11. The initial margins obligation and introduction limit<br />

should be correlated to capital adequacy and marginal<br />

demands related to the risk of loss on the position will<br />

be approved by SEBI time to time.<br />

12. L.C Gupta committee give more emphasis on ‗know<br />

your customer‘ rule and prerequisite that every client<br />

shall be registered with the derivatives broker.<br />

13. The member of derivative segment are also required to<br />

aware their client about the risk participation of<br />

derivative contract and risk awareness document are<br />

also attached with customer document, which generate<br />

alertness to customer or client about derivatives losses.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 155<br />

ISSN 2250-3153<br />

14. Every person of trading member should be qualified as<br />

per SEBI requirement and he or she also passed<br />

certification program approved by SEBI.<br />

VI. ACCOUNTING FOR FUTURES<br />

The Institute of chartered Accountant of India (ICAI) has issued<br />

guideline on accounting of Equity Index Future and Equity Stock<br />

Future. Accounting of future is based on regulation of exchange<br />

and typical trading mechanism of derivative contract. Before<br />

that, there were many issues relating to accrual of income,<br />

booking of losses, calculation of profit and disclosures. Now a<br />

day‘s most of the issues are solved or dealt with in guidance note<br />

issued by the institute. Equity derivative instrument are the type<br />

of instrument in which other parties are also involved in the<br />

trading process same as cash market or simple share market.<br />

These parties are brokers, trading members, clearing members,<br />

clearing corporations and client, so for that reasons proper<br />

accounting are also required to minimize the losses and to<br />

maintain proper working mechanism. Some of the technical<br />

terms are used in this section list are given blow:<br />

Clearing member;<br />

Clearing corporation and houses;<br />

Client;<br />

Contract month;<br />

Daily settlement price;<br />

Derivative exchange or segment;<br />

Final settlement;<br />

Long position;<br />

Open position;<br />

Settlement date;<br />

Short position; and<br />

Trading member;<br />

Most of the above term itself define its meaning but few terms<br />

are not understandable such as Long position, Open position and<br />

Short position, which may be define as follow:<br />

Long Position: Long position in an equity index future contract<br />

means outstanding purchase obligations in respect of the equity<br />

index futures contract at any point of time;<br />

Open position: Open position means the total number of equity<br />

index future contracts that have not yet been offset and closed by<br />

an opposite position; and<br />

Short Position: Short position in an equity index future contract<br />

means outstanding sell obligations in respect of the equity index<br />

futures contract at any point of time;<br />

Accounting for Equity Index Future and Equity Stock Future<br />

include the following treatments<br />

Figure 1.1<br />

Accounting for the Payment or Receipt of Mark-to-Market<br />

Margin: Payment mode or received on account Mark-to-Market<br />

margin by the client would be credited or debited to the bank<br />

account and the subsequent debit or credit for the same should be<br />

made to an appropriate account, state, ‗Mark-to-Market Margin<br />

in Equity Index Future account and Mark-to-Mark Margin in<br />

Equity Stock Future account as the case might be. The amount of<br />

Mark-to-Market Margin received into or paid from<br />

approximately deposit with the clearing or trading member<br />

should be debited or credited to the deposit for margin money<br />

account with the consequent credit or debit to the Mark-to-<br />

Market margin in Equity Future account or the Mark-to-Market<br />

margin in Equity Stock Future account as the case might be.<br />

Accounting for Initial margin: When Futures Contract is<br />

entered into for purchase or sale of Equity Index or Equity Stock<br />

Future, then no payment is required to be prepared except for the<br />

initial margin. Clearing Corporation or Houses determines this<br />

margin from time to time and it serve as security deposit for the<br />

exchange. The margin can be paid either in cash or in the form of<br />

collaterals like bank guarantees, securities and fixed deposits.<br />

Basically Initial margin paid in cash shall be debited to ‗Initial<br />

Margin Index or Stock Future account‘ and supplementary<br />

margin paid if any shall be accounted in the same manner. As the<br />

Balance Sheet date the balance in initial margin account shall be<br />

shown individually in respect of each progression under the head<br />

‗Current Assets‘. The acknowledgment or receipt of initial<br />

margin in the form of collaterals shall be recorded in<br />

memorandum records and no entry is required to be made in the<br />

financial book. If any collateral is returned back the<br />

memorandum records shall be updated in view of that.<br />

Accounting for Open Interests in Futures Contract as on the<br />

Balance Sheet Date: ‗Mark-to-Market margin in Equity Index<br />

Future account or the Mark-to-Market margin in Equity stock<br />

Future account‘ are the debit or credit balance, which represent<br />

the net amount paid to or received from the clearing or trading<br />

member on the basis of the movement of in the prices of Equity<br />

Index Futures or Equity Stock Futures till the balance sheet date<br />

in esteem of open future contract. In another case the given<br />

accounts have a debit balance as the balance sheet date and the<br />

same should be shown as current assets or on the other case if<br />

given accounts have a credit balance on the balance sheet date,<br />

the same should be shown as a current liability. You should keep<br />

in mind that ‗Prudence‘ as a consideration for the preparation of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 156<br />

ISSN 2250-3153<br />

financial statements, the provision for the anticipated loss in<br />

respect of open futures contract should be made. For this purpose<br />

the net amount paid or received on account of Mark-to-Market<br />

margin on open future contracts on the balance sheet date should<br />

be shown index wise or script wise. In this process the index<br />

wise or script wise balance is a debit balance representing the net<br />

amount paid and this condition should be made for the given<br />

amount. In another case where the index wise or script wise<br />

balance is a credit balance represent the net amount received and<br />

the same should be ignored keeping in view the consideration of<br />

‗Prudence‘. To smooth the progress of these computations, the<br />

Mark-to-Market margin accounts may be maintained index wise<br />

or script wise. The provision which should be discussed on above<br />

lines should be credited to an appropriate amount under the<br />

heading ‗Provision of loss on Equity Index Future Account‘ or<br />

‗Provision on loss on Equity Stock Future account‘ as the case<br />

might be. If in case of any opening balance in the ‗Provision for<br />

loss on Equity Stock or Equity Index Future Account‘, the same<br />

balance should be adjusted against the provision required in the<br />

current year and the profit and loss account should be debited or<br />

credited with the balance provision required to be made or excess<br />

provision written back. The ‗Provision for loss on Equity Index<br />

or Equity Stock Future Account‘ should be shown as a deduction<br />

from the balance of Mark-to-Market Margin of Equity Index or<br />

Equity Stock Future Account, if it disclosed as a current asset.<br />

On the other hand, if the above given treatment of margin<br />

accounts are disclosed as a current liability then the<br />

abovementioned provision accounts should be shown as a<br />

provision on the liabilities side of the balance sheet.<br />

Accounting at the time of Final Settlement or Squaring up of<br />

the contract: At the time of expiry of the contract or squaring up<br />

the contract, the profit or loss is computed and acknowledged in<br />

the profit or loss account. The profit or losses in such cases is the<br />

difference between final account price and contract price. The<br />

entries describing to profit and loss shall be approved by<br />

consequent debit to credit to the Mark-to-Market margin account<br />

and the balance in Market-to-Market account for a particular<br />

progression of contract this will be documented as income or<br />

expenses on final settlement. Basically if balance exists in the<br />

provision accounts, which may have been created at the yearend<br />

for predictable loss and if any losses arising on such settlement<br />

shell be first charged to such provision account and the balance if<br />

any should be charged to profit and loss account.<br />

Account at the time of daily settlement of the contract: This<br />

involves the accounting of payment or receipt of Mark-to-Mark<br />

margin money. Payment finished or received on account of daily<br />

arrangement by the client would be credited or debited to the<br />

bank and the subsequent debit or credit for the equivalent should<br />

be made to an account titled as ‗Mark-to-Market margin Equity<br />

Index or Stock Futures contract account‘. For a moment or<br />

sometime the client may deposit a approximate amount to the<br />

brokers or trading member in esteem of Mark-to-Market margin<br />

money as an alternative of receiving or paying mark-to-market<br />

margin money on every day basis. The amount should be paid is<br />

in the form of a deposit and it also debited to a suitable account,<br />

called: ‗Deposit for Mark-to-Market margin account‘. On that<br />

basis the amount of Mark-to-Market margin should be received<br />

or paid from such account and this account was credited or<br />

debited to Mark-to-Market margin of Equity Index or Stock<br />

Future account contract with a corresponding debit or credit to<br />

Deposit for Mark-to-Market margin account. At the financial<br />

year ending, any balance in the Deposit for Mark-to-Market<br />

margin account must be shown as deposit under the head<br />

‗Current Assets‘.<br />

Accounting at the time of default: When a client makes default<br />

in making payment in esteem of Mark-to-Market margin, then<br />

account should be closed out and the amount not paid by the<br />

client is adjusted against the initial margin already paid by the<br />

client. In the accounting book or ledger of the client, the amount<br />

of Mark-to-Market margin so adjusted should be debited to the<br />

Mark-to-Market margin of Equity Index or Stock Future account<br />

as the case may be , with a related credited to the initial margin<br />

of equity derivative instrument account. In case if amount paid<br />

on Mark-to-Market margin account will exceed to initial margin<br />

then this exceed amount is a liability and should be shown as<br />

such under the head ‗Current Liability and Provisions and it also<br />

coded same on the balance sheet date. The amount of profit or<br />

loss in the given contract should be calculated and predictable<br />

under profit and loss account by corresponding debit or credit to<br />

the Mark-to-Market margin of Equity Index or Stock Future<br />

account as the case may be.<br />

Disclosure requirement for Future Account: The amount of<br />

bank assurance and book value as also the market value of<br />

securities wedged should be disclosed in respect of contract<br />

having open positions at the year end. In this case initial margin<br />

money has been paid by way of bank assurance or wedged of<br />

securitises. The total number of valuable or non-valuable<br />

contracts entered and gross number of units of Equity Index or<br />

Stock future traded individually for purchase or sell of contract<br />

should be disclosed in esteem of each progression of Equity<br />

Index or Stock future contract. The numbers of Equity Index or<br />

Stock future contract have to maintain open position and number<br />

of unit of Equity Index or Stock future have to connect with<br />

those contracts which are traded. The daily arrangement or<br />

settlement price as of balance sheet date should be represented<br />

independently for long and short situation, in respect of each<br />

progression of Equity Derivative future market.<br />

VII. ACCOUNTING FOR OPTIONS<br />

The Institute of Chartered Accountants of India (ICAI) issued<br />

guidance note on accounting for Index Option or Stock Option<br />

for the view point of the parties who enter into such contract as<br />

buyers or holder and sellers or writer. Most of the technical terms<br />

used in this section are same as future accounting which are<br />

discussed above but the accounting process of option contract is<br />

little bit different from future contract due to its nature.<br />

Following are the guideline for accounting treatment in case of<br />

cash settled Index Option and Stock Option.<br />

Accounting for Equity Index Option and Equity Stock Option<br />

include the following treatments<br />

Figure 1.2<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 157<br />

ISSN 2250-3153<br />

Accounting for payment or receipt of the premium: If client or<br />

any investor entering into an option contract, the buyer of the<br />

option is essential to pay the premium amount to the option<br />

exchange for placing the option contract. In this process the<br />

premium should be debited to an suitable account of buyer or<br />

holder, say, Equity Stock or Index Option Premium Account, as<br />

the case may be. In the ledger of seller or writer, such premium<br />

amount should be credited to an appropriate account, say, Equity<br />

Index or Stock Option Premium Account as the case may be.<br />

Accounting for open interests in option contract as on the<br />

balance sheet date: In accounting process the ‗Equity Index<br />

Option Premium Account‘ and ‗Equity Stock Option premium<br />

Account‘ should be placed under the head ‗Current Assets‘ or<br />

‗Current Liability‘ as the case may be. In the book of the buyer<br />

or holder, the provision should be made for the amount by which<br />

the premium paid for the option exceed the premium customary<br />

on the balance sheet date since the buyer or holder can reduce his<br />

loss to the extent of the premium traditional in the market, by<br />

squaring up the transaction. The provision so created should be<br />

so credited to an appropriate account, we say, ‗Provision for loss<br />

on Equity Stock or Index Option Account‘ as the case may be.<br />

The provision made as above should be shown as deduction from<br />

the balance of the ‗Equity Index or Stock Option Account‘ which<br />

is shown in the book of buyer or holder under the head ‗Current<br />

Assets‘. The excess of premium customary in the market on the<br />

balance sheet date over the premium paid is not predictable and<br />

keeping in view that the deliberation of carefulness. In the<br />

accounting book of the seller or writer, the provision should be<br />

made for the amount by which premium customary or prevailing<br />

on the balance sheet date exceed the premium amount get from<br />

the option. According to that this provision should be credited to<br />

‗Provision for loss on Equity Index or Stock Option Account‘ as<br />

the case may be, with a consequent or equivalent debit to profit<br />

and loss account. Equity Index or Stock Premium Account‘ and<br />

‗Provision for loss on Equity Index or Stock Option Account‘<br />

should be or will be shown under ‗Current Liability and<br />

Provisions‘. If in case of multiple open options at the yearend, a<br />

index wise or script wise provision should be making an<br />

allowance for all the open options of any Strike Price and any<br />

expiry date under the script taking together. The amount of<br />

provision required in esteem of each script or index should be<br />

aggregated and a amalgamated ‗Provision for loss on Equity<br />

Stock or Index Option Account‘ should be credited by debiting<br />

the profit or loss account. In case of any opening balance in the<br />

‗Provision for loss on Equity Stock or Index Option Account‘,<br />

the same should be suitable against the provision required in the<br />

current year and the profit and loss account be debited or credited<br />

with the balance provision obligatory to be made or excess<br />

provision written back. If we consider the case of multiple open<br />

options at the year ended, the ‗Provision for loss on Equity Stock<br />

or Index Option Account as the case may be, should be shown as<br />

subtraction from the ‗Equity Stock or Index Option Premium<br />

Account‘ respectively, if these have a debit balance and are<br />

disclosed under the head ‗Current Assets‘ On the other hand if<br />

‗Equity Index or Stock Option Premium Account‘ have a credit<br />

balance and are disclosed under the book of account under the<br />

head ‗Current Liabilities‘, due to that reason particular provision<br />

account should be shown ‗Provision‘ under the head ‗Current<br />

Liabilities and Provisions‘<br />

Accounting at the time of final settlement: In this section we<br />

have study the accounting process of Equity Index Option or<br />

Equity Stock Option in the final settlement of cash-settled stock<br />

options contracts and delivery-settled stock options contracts for<br />

buyer or holder and seller or writer.<br />

In the process of cash settled stock option contract, two<br />

accounting books are deals:<br />

1. In the books of buyer and holder; and<br />

2. In the books of the seller and writer;<br />

In the books of buyer and holder on the implement of the Option,<br />

the buyer and holder will identify premium as an outflow and<br />

debit the profit and loss account by crediting the ‗Equity Index or<br />

Stock Option Premium Account‘. Apart from the higher<br />

arrangement in the above discussed segment, the buyer or holder<br />

will receive favourable difference, if any, between the final<br />

settlement price as on the exercise or expiry date and the strike<br />

price, which will be acknowledged as income.<br />

In the books of the seller or writer on the exercise of the option,<br />

the seller or writer will be acquainted with premium as an<br />

income and credit the profit and loss account by the debiting the<br />

‗Equity Index or Stock Option Premium Account‘ Apart from the<br />

higher arrangement in the above discussed segment, the seller or<br />

writer will pay the adverse difference, if any, between the final<br />

settlement price as on the exercise or expiry date and the strike<br />

price. Such kind of payment will be acknowledged as a loss.<br />

In the process of Delivery settled stock option contract, two<br />

accounting books are deals:<br />

If an option is not exercise and also expires, then accounting<br />

entries will be the same as those in case of cash settled options. If<br />

the option is exercised, securities will be transferred in<br />

deliberation for cash at the strike price. In such a case, the<br />

accounting treatment should be as suggested in the subsequent<br />

ways which are given blow:<br />

1. In case of buyer or holder; and<br />

2. In case of seller or holder;<br />

In case of buyer or holder for a call option, the buyer or holder<br />

will receive the security for which the call option was entered<br />

into. The buyer or holder should debit the appropriate security<br />

account and credit cash or bank. For a put option, the buyer or<br />

holder will deliver the security for which the put option was<br />

entered into. The buyer or holder should credit the appropriate<br />

security account and debit into cash or bank. In additional to this<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 158<br />

ISSN 2250-3153<br />

entry, the premium paid should be transferred to the profit and<br />

loss account, the accounting entries for which should be the<br />

equivalent as those in case of cash settled option.<br />

In case of seller or writer for a call option, the seller or writer<br />

will deliver the security for which the call option was entered<br />

into. The seller or writer should credit the relevant security<br />

account and debit cash or bank. For a put option, the seller or<br />

writer will obtain the security for which the put option was<br />

entered into. The seller or writer should debit the relative security<br />

account and credit cash or bank. In addition to this entry, the<br />

premium received should be transferred to the profit and loss<br />

account, the accounting entries for which should be the same as<br />

those in case of cash settled option.<br />

Accounting at the time of square up of an option contact: At<br />

the time when an option contract is square up by entering into a<br />

reverse contract, the difference between the premium paid and<br />

received, after adjusting the commission or brokerage charged,<br />

on the squared up contact should be transferred on the profit and<br />

loss account.<br />

Accounting method for determination of profit or loss in the<br />

multiple option situations: In the case of outstanding multiple<br />

options to work out profit or loss we used the same script or<br />

index with the same strike price and the same expiry date,<br />

weighted average method should be followed on squaring-up of<br />

transactions. Similarly for working out profit or loss in case of<br />

remaining left multiple equity stock option of the same script<br />

with the same strike price and the same expiry date, weighted<br />

average method should be used where such options are executed<br />

prior to the running out date.<br />

VIII. CONCLUSION<br />

This paper discusses the Regulation of Indian Derivative<br />

market as per Dr. L.C. Gupta committee and also cover<br />

accounting for Future and Option. On the basis of our analysis<br />

we found that accounting for future and option are complicated<br />

in nature due to its adjustment process for ‗Equity Index Future<br />

& Option‘ and ‗Equity Stock Future & Option‘ in various books<br />

of account during the life of derivative contract from one point to<br />

another point and it also requires more transparency and financial<br />

stability in derivative transaction.<br />

REFERENCES<br />

[1] Sahoo M.S. (November 1997), ―Securities market reform in a developing<br />

country‖, Chartered Secretary, Volume XXVII, Number: 11, Pp. 1261-<br />

1269.<br />

[2] Hathaway, Kate (October 1988), ―Regulatory parameters associated with<br />

successful derivatives‖, Chartered Secretary, Volume XXVII, Number: 10,<br />

Pp. 981-988.<br />

[3] IOSCO Report (June 1996(a)), ―Legal and regulatory framework for<br />

exchange traded derivatives‖, International Organisation of Securities<br />

Commission.<br />

[4] Gupta L.C. (March 19980, ―Suggestive bye-lows for regulation and control<br />

of trading and settlement of derivative contract‖, The SEBI Committee on<br />

derivatives trading in India.<br />

[5] Varma J.R (June 1998), ―Risk containment in the derivative market‖,<br />

Varma Committee Report form by SEBI.<br />

[6] SEBI Advisory Committee on Derivative (September 2002), ―Report on<br />

Development and Regulation of Derivative Market in India‖.<br />

[7] Ramamoorthy K.R. (February 2003), ―Report of the Participation of<br />

Security Brokers in Commodity Future market‖ Committee formed by SEBI.<br />

[8] SEBI Group on secondary market risk management (March 2003),<br />

―Exchange traded interest rate derivatives in India‖, Consultative<br />

Document.<br />

[9] Draft Comprehensive guideline on Derivative by RBI (2006).<br />

[10] Report of the RBI-SEBI Standing Technical Committee on Exchange traded<br />

currency future (2008).<br />

[11] Report of the RBI-SEBI Standing Technical Committee on Interest rate<br />

futures (June 2009).<br />

[12] National Stock Exchange of India limited (2001), ―Indian security market:<br />

A review‖, Volume IV, Pp. 270-221.<br />

[13] Report of derivative market review committee form by SEBI (December<br />

2008).<br />

[14] Sahoo M.S. (June 1999), ―Forward trading in securities in India.‖ Chartered<br />

Secretary. Volume XXIX, Number: 06, Pp. 624-629.<br />

[15] Sahoo M.S. (December 20000), ―Taxability of Income arising from<br />

derivative contracts‖, NSE News, Pp. 9-10.<br />

[16] Securities and Exchange Board of India Depositories Act, 1996. Guide line.<br />

[17] The security and exchange board of India Act, 1992. Guide line.<br />

[18] http://www.sebi.gov.in<br />

[19] http://www.nseindia.com<br />

[20] http://www.rediff/money/derivatives<br />

[21] http://www.derivativeindia.com<br />

[22] http://www.icai.org/publications.html<br />

AUTHORS<br />

First Author – Matloob Ullah Khan, Ph.D, Research Scholar,<br />

Department of Management, Jamia Hamdard, New Delhi, India.<br />

Email: matloobullah.khan@gmail.com;<br />

Second Author – Dr. Ambrish Gupta, Senior Professor, FORE<br />

School Of Management, New Delhi, India. Email:<br />

ambrish@fsm.com;<br />

Third Author – Dr. Sadaf Siraj, Assistant Professor, Department<br />

of Management, Jamia Hamdard, New Delhi, India. Email:<br />

sirajsadaf@gmail.com;<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 159<br />

ISSN 2250-3153<br />

P-FUZZY SUBALGEBRA AND ITS PROPERTIES<br />

Dr. G. NIRMALA 1 , S.PRIYADARSHINI 2<br />

1 Research Advisor, Manonmaniam Sundaranar University, Tirunelveli, India<br />

E mail:nirmalamanokar11@yahoo.com<br />

2 Research Scholar, Manonmaniam Sundaranar University, Tirunelveli, India<br />

E mail:priya002darshini@gmail.com<br />

Abstract- We give definition for fuzzy subalgebras for<br />

partially ordered algebra, Fuzzy subgroup and fuzzy coset. Then<br />

we study their connection of P – fuzzy subalgebras with fuzzy<br />

subgroup and fuzzy coset.<br />

Index Terms- P – fuzzy subalgebras, fuzzy subgroup and<br />

fuzzy coset.<br />

I<br />

I. INTRODUCTION<br />

n 1965, Lotfi. Zadeh introduced the notion of a fuzzy subset of<br />

a set as a method for representing uncertainty. A fuzzy set A is<br />

defined as a map from A to the real unit interval<br />

I = [0, 1]. The set of all fuzzy sets on A is usually denoted by I A .<br />

It is also known that under the natural ordering I A is a complete<br />

lattice. Early Greeks, such as Pythagoras and Euclid, relied on<br />

geometry to express all of their logical proofs. It was about<br />

250CE when the Greek Diophantus began using Greek letters as<br />

numbers and other mathematical symbols. Finally, algebra began<br />

to take on its modern symbolic look when viete used letter for<br />

variables around 1600. Then in 1637, Descartes wrote la<br />

geometrie. Before these mathematicians had thought of<br />

polynomials specially, so X3 actually represented a cube. His<br />

written algebra is the first to look almost exactly like ours.<br />

The definitions given to the concept of P – fuzzy subalgebra,<br />

fuzzy subgroup and fuzzy coset also involve different operations.<br />

Now we unify and generalize these definitions. The theorems<br />

proved also highly generalize the existing ones.<br />

II. PRELIMINARIES<br />

Definition 2.1 If (P,≤ ) is a partially ordered set and X is a<br />

nonempty set, then any mapping<br />

A : X→P is a partially ordered fuzzy set on X.<br />

Definition 2.2 A P – fuzzy set μ Є P A is called a P – fuzzy<br />

algebra or fuzzy subalgebra on the algebra A, if<br />

For any n – ary ( n≥1 ) operation f Є F<br />

μ(f(x1………..xn)) ≥ μ(x1)……………..μ(xn) for all<br />

x1………..xn Є A<br />

For any constant ( nullary operation) C<br />

μ(c) ≥ μ(x) for all x Є A.<br />

Definition 2.3 Let G be a group. A fuzzy subset μ of a group G is<br />

called a fuzzy subgroup of the group if<br />

μ (xy) ≥ min {μ(x) , μ(y)} for every x,y Є G and<br />

μ (x -1 ) = μ (x) for every x Є G.<br />

Definition 2.4 Let μ be a fuzzy subgroup of a group g. For any a<br />

Є G, a μ defined by<br />

(aμ)x = μ(a -1 x) for every x Є G is called the fuzzy coset of the<br />

group G determined by a and μ.<br />

Result: 2.5<br />

A fuzzy subset μ of a group g is a fuzzy subgroup G iff<br />

μ(xy -1 ) ≥ min { μ(x) , μ(y) } for every x,y Є G.<br />

III. RESULTS<br />

Theorem:3.1 P – fuzzy subalgebra is a fuzzy subgroup.<br />

Proof:<br />

Consider a P – fuzzy subalgebra on the algebra A then<br />

there eists a P –fuzzy set<br />

μ Є P A then for<br />

(i) n – ary operation<br />

μ(f(x1………..xn)) ≥ μ(x1)……………..μ(xn) for all<br />

x1………..xn Є A-(1)<br />

from (1) let x2 = y<br />

μ(f(xy)) ≥ μ(x)μ(y)-(2)<br />

since μ(xy) ≥ min {μ(x) , μ(y)}-(3)<br />

from (2) and (3)<br />

μ(x)μ(y) = μ(xy) ≥ min {μ(x) , μ(y)}-(4)<br />

Let μ: X→[0,1]<br />

Here μ is a function defined that X is a set which map it<br />

each and every element between 0 and 1.<br />

Also the set of all elements of X -1 maps the values<br />

between 0 and 1.<br />

Therefore μ: X -1 →[0,1].<br />

This implies μ(x -1 ) = μ(x)-(5)<br />

(ii) nullary operation ( for any constant)<br />

If there exist any constant μ(c) then<br />

μ(c) μ(x) = μ(c x) ≥ min {μ(c) , μ(x)}= μ(x)-(6)<br />

μ(c) ≥ μ(x), for all x Є A.<br />

Since all the element of μ(x) lies between 0 and 1. Also<br />

μ(c) is any constant and it is greater than or equal to 1. Using the<br />

results (4), (5) and (6), it is clear that P – fuzzy subalgebra is a<br />

subgroup.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 160<br />

ISSN 2250-3153<br />

Example:<br />

Let P = {1,-1, i,-i} be the P- fuzzy set in P- fuzzy<br />

algebra.<br />

Define<br />

μ: P→[0,1] by<br />

1 if x = 1<br />

μ(x) = 0.5 if x = -1<br />

0 if x = i, -i, 1/i, -1/i<br />

Clearly μ is a fuzzy subgroup of the P. Also P is a group under<br />

operation .<br />

Theorem:3.2 A P – fuzzy subalgebra of a group G is a fuzzy<br />

subgroup of the group G iff<br />

μ(xy -1 ) ≥ min { μ(x) , μ(y) } for every x,y Є G.<br />

Proof:<br />

Real part:<br />

Consider a P – fuzzy subalgebra of a group G is a fuzzy<br />

subgroup on the algebra A then we have to prove that<br />

μ(xy -1 ) ≥ min { μ(x) , μ(y) }<br />

proof:<br />

For P – Fuzzy subalgebra, there exist a P –fuzzy set μ Є P A , then<br />

(i) For n – ary operation<br />

μ(f(x1………..xn)) ≥ μ(x1)……………..μ(xn) for all<br />

x1………..xn Є A<br />

Let x1, x2 Є P where P Є G<br />

Consider x1 = x and x2 = y -1<br />

Since it is a fuzzy subgroup using theorem (1)<br />

Therefore μ(f(x1 x2)) = μ(f(x y -1 ))<br />

≥ μ(x) μ(y -1 )<br />

μ(x) μ(y -1 ) = μ(x y -1 )<br />

since fuzzy algebra satisfies fuzzy relation<br />

so μ(x y -1 ) ≥ μ(x) Λ μ(y -1 ) using equation (5)<br />

≥ μ(x) Λ μ(y)<br />

≥ min{μ(x), μ(y)}<br />

(ii) for nullary operation<br />

μ(c) ≥ μ(x) for all x Є A.<br />

using theorem (1), it is a subgroup<br />

therefore there exist an identity element,let it be μ(e)<br />

we know that μ(c) ≥ μ(x)<br />

μ(c) = μ(c) μ(e -1 ) ≥ μ(c) μ(e) using equation (5)<br />

≥ μ(c) Λ μ(e)<br />

≥ min{μ(c), μ(e)}= μ(e)-(7)<br />

C is any constant it may be greater than or equal to identity<br />

element.<br />

Also<br />

μ(x) = μ(x) μ(e -1 ) ≥ μ(x) μ(e) using equation (5)<br />

≥ μ(x) Λ μ(e)<br />

≥ min {μ(x), μ(e)}= μ(x)-(8)<br />

All the elements of x are less than or equal to identity element.<br />

Converse part:<br />

If μ (xy -1 ) ≥ min {μ(x) , μ(y) } for every x, y Є P and P Є G then<br />

a fuzzy partially ordered subset μ of a group is a fuzzy subgroup<br />

of the group G.<br />

Proof:<br />

μ (xy -1 ) ≥ min { μ(x) , μ(y -1 ) }<br />

≥ min { μ(x) , μ(y) } using (5)<br />

≥ μ(x) Λ μ(y)<br />

μ (xy -1 ) = μ(x y -1 ) using fuzzy algebra relation.<br />

μ(x y -1 ) = μ(x) μ(y -1 ) = μ(x) μ(y)<br />

≤ μ(f(x y)) ( n- ary operation)<br />

This implies μ(f(x y)) ≥ μ(x) μ(y)-(9)<br />

Let μ(c) be any constant and μ(e) be an identity element, then<br />

Assume that<br />

μ(c) = μ(x)<br />

μ(c) μ(e -1 ) = μ(x) μ(e -1 )<br />

using (5)<br />

μ(c) μ(e) = μ(x) μ(e)<br />

μ(c) μ(e) ≥ min { μ(c) , μ(e) } = μ(e)<br />

μ(x) μ(e) ≥ min { μ(x) , μ(e) } = μ(x)<br />

C is any constant it may be greater than or equal to identity<br />

element and x.<br />

Therefore, μ(c) ≥ μ(x)-(10)<br />

Using (9) and (10)<br />

If μ (xy -1 ) ≥ min { μ(x) , μ(y) }then P- fuzzy subalgebra is a<br />

fuzzy subgroup.<br />

Theorem:3.3 P – fuzzy subalgebra is a fuzzy coset of the group.<br />

Proof:<br />

Let μ be a fuzzy subgroup of a group G from fuzzy<br />

algebra A.<br />

To prove that: For any a Є G, a μ is defined by (aμ)x =<br />

μ(a -1 x) for every x Є G, also x Є P.<br />

Consider P – fuzzy subalgebra to prove fuzzy coset,<br />

assume that n = 1<br />

Then we use n – ary operation<br />

μ(f(x)) ≥ μ(x)<br />

Let a Є P and P Є G<br />

a μ(f(x)) ≥ aμ(x)<br />

(aμ)x = (μa)x<br />

Since P – fuzzy algebra satisfy commutative law<br />

(μa)x = μ(ax) using (5)<br />

= μ(a -1 x)<br />

Since P fuzzy subalgebra is afuzzy subgroup<br />

Therefore,<br />

(aμ)x = μ(a -1 x) for every x Є G<br />

IV. CONCLUSION<br />

This paper concludes the connection of P – fuzzy subalgebra<br />

with fuzzy subalgebra and fuzzy coset of a group.<br />

REFERENCES<br />

[1] Laszlo filep.Study of fuzzy algebras and relations from a general viewpoint,<br />

acta Mathematica Academiae Paedagogicae Nyrlregyhaziensis,Tonus<br />

14(1998), 49-55.<br />

[2] W.B.Vasantha kandasamy. Smarandache fuzzy algebra.american research<br />

press, Rehoboth 2003.11-12.<br />

[3] I. M. Anthony and H. Sherwood. Fuzzy groups redefined, Journal Math.<br />

Anal. Appl., 69:124-130,1979<br />

[4] L. Filep. Fundamentals of a general theory of fuzzy relations and algebras.<br />

In Proc. 4 th IFSA World congress, Pages 70-74, Brussels 1991.<br />

[5] J. A. Gougen. L-fuzzy sets. Journal Math. Anal. Appl., 18:145-1741,1967.<br />

[6] A. Rosenfeld. Fuzzy graphs. In Fuzzy sets and their applications to<br />

cognitive and decision process, pages 77-95, Academic Press, 1975.<br />

[7] L. A. Zadeh. Fuzzy sets. Information Control, 8:338-353, 1965.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 161<br />

ISSN 2250-3153<br />

[8] Ovchinnikov, S., Similarity Relation, Fuzzy Partitions and Fuzzy Orderings,<br />

Fuzzy Sets and Systems, 40(1991) 107-126.<br />

[9] Seselja, B., Tepavcevic, A., On a construction of codes by P-fuzzy sets,<br />

Univ. u Novom Sadu Zb. Rad. Prirod. – Mat. Fak. Ser. Mat., 20,2(1990),71-<br />

80.<br />

[10] Seselja, B., Tepavcevic, A., Partially Ordered and Relational Valued Fuzzy<br />

Relations I, Fuzzy Sets and Systems.<br />

[11] Fuzzy Set Theory and its Applications, Second edition by H. J.<br />

Zimmermann.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 162<br />

ISSN 2250-3153<br />

Energy Conservation through Roof Surface Evaporative<br />

Cooling for Air Conditioning System<br />

R.B. Lokapure, J.D.Joshi<br />

Dept of Mechanical Engg., Bharti Vidyapeeth College of Engg., Shivaji University Kolhapur, India<br />

Abstract- Day by day the demand of energy is rising<br />

tremendously, but there is lack in supply. So there is no option<br />

for proper and efficient utilization and conservation of energy. In<br />

this paper the main stress is given on energy conservation by<br />

using technique of Roof surface evaporative cooling for Airconditioning<br />

system. The target of saving and conserving energy<br />

up to 15 to 22% but in this case we achieved our goal of energy<br />

saving up to 13% by adopting RSEC technique.<br />

Keywords- Appliance load, Cooling load, DCS Room,<br />

Evaporative cooling, Energy conservation, Thermal<br />

transmittance (U), Vfds<br />

E<br />

I. INTRODUCTION<br />

nergy is a basic requirement for the existence and<br />

development of human life, primarily; the commercial<br />

sources such as fossil fuels (coal, oil and natural gas),<br />

hydroelectric power and nuclear power provide the energy needs<br />

of a country. The fear of release of radioactivity into the<br />

atmosphere in the event of an accident or from nuclear waste has<br />

forced people to reconsider the use of nuclear power. In view of<br />

these problems associated with conventional energy sources, the<br />

focus is now shifting to conservation of energy.<br />

In a commercial building, the cooling load can be saved by<br />

about 26% in a hot and dry climate (like Jodhpur) by adopting<br />

appropriate design considerations and operation strategies.<br />

Simple design procedures such as orientation, shading,<br />

insulation, etc. can be easily incorporated in any building,<br />

leading to substantial benefits from the point of view of comfort<br />

and energy saving.<br />

In some climates, simple techniques alone may not be<br />

adequate for achieving ideal comfort conditions. In such cases,<br />

advanced features such as wind tower, roof pond, Trombe wall,<br />

etc. may be used. Even in conditioned buildings, where<br />

mechanical devices are used to create a comfortable<br />

environment, the use of passive methods would help reduce the<br />

energy consumption (i.e. [1])<br />

Technique of Roof surface evaporative cooling is used for<br />

reducing cooling load on air-conditioning system ultimately this<br />

technique serves purpose of energy conservation.<br />

I. What is Roof Surface Evaporative Cooling (RSEC)<br />

In a tropical country like India, the solar radiation incident on<br />

roofs is very high in summer, leading to overheating of rooms<br />

below them. Roof surfaces can be effectively and inexpensively<br />

cooled by spraying water over suitable water-retentive materials<br />

(e.g. gunny bags) spread over the roof surface(i.e.[1]).As the<br />

water evaporates, it draws most of the required latent heat from<br />

the surface, thus lowering its temperature and reducing heat gain.<br />

Besides, evaporation also cools the air above the roof. The cool<br />

air slides down and enters the living space through infiltration<br />

and ventilation, providing additional cooling. This is an example<br />

of the passive indirect evaporative cooling technique. (i.e. [1])<br />

II. Procedure for Installing a Roof Surface Evaporative<br />

Cooling System:<br />

Suitable waterproofing treatment of the roof should be done.<br />

The roof must be covered with water absorptive and retentive<br />

materials such as gunny bags, brick ballast, sintered fly-ash,<br />

coconut husk or coir matting. On account of their porosity, these<br />

materials when wet, behave like a free water surface for<br />

evaporation. The durability of such materials is rather good, but<br />

they have to be treated for fire safety.<br />

During peak summer, the quantity of water needed is<br />

approximately 10 kg / day / m 2 of roof area. (i.e. [1])<br />

The roof must be kept wet throughout the day using a water<br />

sprayer. The sprayer can be manually operated or controlled by<br />

an automatic moisture-sensing device. The sprayer usually works<br />

at low water pressure which can be achieved either by a water<br />

head of the storage tank on the roof, or by a small water pump.<br />

III. Effectiveness of RSEC Depends on Ambient air<br />

temperature and humidity. Intensity of solar radiation.<br />

Wetness of the roof surface Roof type.<br />

The effect of evaporation increases when the air humidity is<br />

low and the air temperature as well as the intensity of solar<br />

radiation falling on the roof surface is high. A uniform and<br />

constant wetting of the roof surface is essential for continuous<br />

evaporation. It should be noted that the roof needs to be<br />

adequately treated with water proofing material.<br />

The evaporation of water causes cooling of the roof surface.<br />

This sets up a temperature gradient between the inside air and<br />

outside roof surface, resulting in loss of heat from the inside to<br />

outside. Thus, heat transfer through the roof is the dominant<br />

aspect in the overall performance of RSEC, Higher the rate of<br />

heat transfer, more effective is the RSEC. Consequently the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 163<br />

ISSN 2250-3153<br />

RSEC system is most effective when the roof has a high thermal<br />

transmittance (U). (i.e. [1]).<br />

A Case Study of-Shree Renuka Energy Ltd<br />

(30MW Co –Generation Project at Ichalkaranji.)<br />

Here, RSCE technique is used to reduce cooling load of DCS<br />

room (Distributed control system). In this Co-gen.Plant we have<br />

DCS room of 19.8 Mtr.Long x 7.8Mtr.Width and 3.06Mtr Ht.<br />

having Terrace area-151Sq.Mtr. (e.g.Fig.1)<br />

For this size room heat load calculations done as follows:<br />

Under the steady state approach the heat balance for room air can<br />

be written as (i.e. [2]).<br />

Q total = Qc + Qs+Qi+Qv – (1)<br />

Now, Total heat conduction through each side wall +door<br />

+Glazing +Roof + Hard Board.<br />

Qc Total =17.475 W<br />

Total solar heat gain through wall<br />

Qs = 10.422 W<br />

Internal heat gain due to -Artificial light + Occupants +<br />

Appliance load.<br />

In this case considering appliance load the major heat emitting<br />

source is VFD‘s (Variable Frequency Drive) used for various<br />

drives such as ID,FD,SA fan and Boiler feed pump.<br />

Qi Total = 82,219 W<br />

Now Heat flow rate due to Ventilation<br />

Qv = 12,096 W<br />

Now putting all calculated values in above eq‘. - (1)<br />

We get Q Total =1, 22,212 W = 122 kW.<br />

For this DC‘s Room we have terrace area Total = 151 Sq.Mtr<br />

For using RSEC technique for this area.<br />

Total Gunny Bag Req. = 196 Nos<br />

Also during peak summer the quantity of water required for<br />

sprinkling on terrace is Q water =1510 Ltr/ Day (Theoretical)<br />

Q water = 800 Ltr/ Day (Actual).<br />

Table I: List of Equipment’s and Material Required for<br />

RSEC.<br />

Item Name Qty. Cost in Rs.<br />

Monoblock pump 01 Nos 1575.00<br />

Drip Irrigation pipe<br />

with clips<br />

Four – Arm Sprinkler<br />

with stand<br />

1 ph Energy meter<br />

Range - 10-40 amp<br />

3 ph CT Meter<br />

Range – 200/5<br />

Gunny Bags (1100 x<br />

700 mm)<br />

Ø 1‖ M.S. Pipe<br />

+Fabrication<br />

Soft Pipes for water<br />

connections<br />

Plastic Barrel<br />

65 mtr 730.00<br />

01 Nos 230.00<br />

01 Nos 1400.00<br />

01 Nos 3378.00<br />

196 Nos 3920.00<br />

06 Mtr. 590.00<br />

13 mtr.<br />

223.00<br />

01 Nos. 500.00<br />

Miscellaneous Item 150.00<br />

Total = Rs. - 12,696.00<br />

II. EXPERIMENTAL SET UP<br />

Selection Criterion for Water Spray System<br />

During our project work on Roof Surface evaporative cooling,<br />

the system adopted for this project such as sprinkler & drip pipe<br />

system. While selecting this it become a problem some, since<br />

total Area where we going to carry out experiments divided into<br />

two parts.<br />

Part One – Plain Area of 51M 2 (out of 151 M 2 )<br />

Such area is open; there is no any restriction for using a water<br />

sprinkler system. There is no any steam line. So use of water<br />

sprinkler proved efficient way of spraying water on Gunny Bags.<br />

(e.g.Fig.3)<br />

Part Two – Area of 100M 2 (Under steam pressure reducing<br />

station.)<br />

This area is creating a headache to choose a water sprinkling<br />

system. Since near to this area main live steam line of 510 0 c<br />

leading to main T.G. set so use of water sprinkler create a<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 164<br />

ISSN 2250-3153<br />

horrible problem of steam joint leakage, so use of water sprinkler<br />

is out of use.<br />

To overcome this problem we use here irrigation drip pipe<br />

systems for providing better wetness to Gunny bags.<br />

The use of drip system proved a highly efficient & better way to<br />

overcome this problem. (e.g.Fig.2)<br />

Necessary Measurements Recorded<br />

During project – important parameters measured and recorded on<br />

hourly basis.<br />

I) During - with R.S.E.C. effect.<br />

Measurement of Ambient temperature both dry and wet.<br />

Measurement of relative humidity.<br />

Measurement of DCS room temperature.<br />

Measurement of terrace slab temperature.<br />

Measurement of DCS room ceiling temperature.<br />

Water evaporation rate during day hours.<br />

Electrical Measurements<br />

Energy consumption by air conditioning<br />

Energy machine – for 24 hrs and day hrs. (8 hrs)<br />

Consumption by monobloc pump set during day hrs.<br />

II) During - without R.S.E.C. effect<br />

.<br />

Measurement of Ambient temperature both dry and wet.<br />

Measurement of relative humidity.<br />

Measurement of DCS room temperature.<br />

Measurement of terrace slab temperature.<br />

Measurement of DCS room ceiling temperature.<br />

Electrical Measurements -Energy consumption by air<br />

conditioning machine – for 24 hrs and day hrs. (8 hrs)<br />

For this Measurement, we used 3 Phase Energy Meter<br />

(CT Meter, Range-200/5)<br />

Energy Consumption by monoblock pump- For this<br />

Measurement, we used 1 Phase Energy Meter<br />

(1Ph.Meter, Range-10-40Amp)<br />

Fig 1: Entire view of DCS Room.<br />

Fig 2: Drip irrigation pipes placed on roof top<br />

Fig 3: Water Sprinkler used for plain area.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 165<br />

ISSN 2250-3153<br />

Following graph shows temperature behaviour with and without<br />

RSEC effct.(Temp.recorded during Day time from 8.0 AM to 05<br />

PM)<br />

(Temp 0 C Vs Time Hr.)<br />

Fig 4: Shows temperature behavior with RSEC effect<br />

Fig. 5: Shows temperature behavior without RSEC effect.<br />

III. RECORDS OF TEMPERATURES<br />

Temperature parameters were recorded carefully as per time<br />

schedule. The following observations were recorded.<br />

Table II<br />

Details With RSEC Without RSEC<br />

Ambient temp. effect 44˚C effect 44˚C<br />

Terrace slab temp 35˚C 42˚C<br />

DCS Room<br />

23˚C 31˚C<br />

ceiling temp.<br />

DCS Room temp. 24˚C 25˚C<br />

Energy consumed 2,303 kWh 2.649 kWh<br />

by A/C Machine (08 hrs.)<br />

(08 hrs.)<br />

IV. ENERGY SAVING CALCULATION<br />

From observation sheets, we have following readings of energy<br />

consumption by A/C Machine &small pump.<br />

Table III<br />

Power Consumption (in kWh)<br />

With RSEC Effect Without RSEC<br />

Day Power<br />

Consump<br />

tion by<br />

A/C<br />

8Hrs.<br />

Power<br />

Consumption<br />

by<br />

Monoblock<br />

Pump<br />

Effect<br />

Day Power<br />

Consum<br />

ption by<br />

A/C 8Hr<br />

7/5/10 2,360 0.7 19/5/10 2,740<br />

8/5/10 2,250 0.7 20/5/10 2,680<br />

9/5/10 2,200 0.7 21/5/10 2,770<br />

13/5/10 2,280 0.7 22/5/10 2,650<br />

14/5/10 2,300 0.9 23/5/10 2,590<br />

15/5/10 2,360 0.7 28/5/10 2,580<br />

17/5/10 2,370 0.7 29/5/10 2,530<br />

Avg. 2,303 0.72 Avg. 2,649<br />

(Above Data collected from observation sheets.)<br />

Energy consumed by A/C machine with RSEC effect =2,303<br />

kWh /Day (08 Hrs.)<br />

Also, Energy consumed by A/C machine without RSEC effect<br />

=2,649 kWh /Day (08 Hrs.)<br />

Difference =2,649-2303<br />

=346 kWh /08 Hrs.<br />

Therefore, Net saving of Energy =346 kWh /08 Hrs. i.e. per day<br />

% of saving of energy = 13.06 % per day<br />

Assuming 150 Days of working Season (The RSEC system is<br />

more effective in the month of March, April, May& June.)<br />

Then, Total Saving =346x150<br />

Total Saving = 51,900 kWh /Season<br />

Now such an energy consumed may be purchased from State<br />

Electricity Board at a Rate of Rs.8.10 per kWh<br />

Total Saving =51,900 x 8.10<br />

Total Saving =Rs. 4, 20,390 per Season<br />

Now, investment done for achieving RSEC effect are shown in<br />

table no. I<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 166<br />

ISSN 2250-3153<br />

1. It is presumed that gunny bags will be required fresh<br />

every year. Rests of the items are assumed to have a life<br />

of 3 years.<br />

Hence cost of items from table I per year = Rs. 6845/-<br />

2. Cost of Electricity consumed by small pump<br />

(i.e. [4]) =1kWh/Day x8.10x150 =Rs.1215<br />

3. Sprinkling water required-800 lit. /Day<br />

(Water charges as per Jeevan Pradhikaran Agency-<br />

Rs.10.20/1000 Ltr.)<br />

Hence, Cost of Sprinkling Water (i.e. [3]) =8.16x150=<br />

Rs.1224<br />

Hence, after deducting the expenses incurred for implementing<br />

RSEC effect, the above costs from 1), 2), and 3) are deducted<br />

from total saving.<br />

Net saving = Total saving – (expenses 1+2+3)<br />

= Rs. 4, 20,390 – (Rs. 6845 +1215 +1224)<br />

= Rs. 4, 11, 106/- per season<br />

Net saving = Rs. 4, 11, 106/- per season<br />

V. CONCLUSION<br />

Historically sugar industry has been slow in its development<br />

and in adopting technology. However, in the recent past power<br />

shortage & other economical issues have forced technocrats and<br />

industry to use more efficient energy conservation system and<br />

cost reduction systems. The above paper highlights some efforts<br />

towards this direction.<br />

REFERENCES<br />

[1] J.K.Nayak,J.A.Prajapati,HANDBOOK ON - ‗ENERGY CONSCIOUS<br />

BUILDINGS‘ By IIT Bombay and solar energy center, Ministry of Non<br />

Conventional Energy Sources. Page no.2, 89, 90,164 .2006.<br />

[2] S.C. Arora & S. Domkundwar, Text Book on A COURCE IN –<br />

‗REFRIGERATION AND AIR-CONDITIONING‘. Page no.19.2, 19.6,<br />

19.7.2000.<br />

[3] http://www.maha mjp.com/news site/water_Tariff.aspx<br />

[4] www.forumofregulatory.gov.in/TOD_tariff_in_india.pdf<br />

[5] www.bee.india.nic.in.<br />

AUTHORS<br />

First Author – R.B. Lokapure, M.Tech (Energy Tech.), Bharti<br />

Vidyapeeth College of Engineering. Kolhapur. (India).<br />

E. Mail- lokapureraju@gmail.com, Cell No: 09860259513<br />

Second Author – J. D. Joshi, M.E., (Mechanical - Design),<br />

M.I.E., C. Engg. From Bharti Vidyapeeth College of<br />

Engineering. Kolhapur. (India)<br />

E. Mail- jawaharlalj@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 167<br />

ISSN 2250-3153<br />

A Carrier Based Compact Model for Long Channel<br />

Undoped and Doped Body Symmetric Double Gate<br />

MOSFETS<br />

Abstract- Double gate MOSFET is widely used for sub-50nm<br />

technology of transistor design .They have immunity to short<br />

channel effects, reduced leakage current and high scaling<br />

potential. The single gate Silicon–on-insulator (SOI) devices give<br />

improved circuit speed and power consumption .But as the<br />

transistor size is reduced the close proximity between source and<br />

drain reduces the ability of the gate electrode to control the flow<br />

of current and potential distribution in the channel. To reduce<br />

SCE we need increase gate to channel coupling with respect to<br />

source/drain to channel coupling. This paper deals with the<br />

compact modeling of long channel undoped and doped<br />

symmetric double-gate MOSFET. The formulation starts with the<br />

solution of Poisson‘s equation which is then coupled to the Pao-<br />

Sah current equation to obtain the analytical drain-current model<br />

in terms of carrier concentration. The performance analysis will<br />

be done by using the model.<br />

Index Terms- Symmetric DGMOS, Doped body, undoped<br />

body, Compact model, Volume inversion.<br />

D<br />

I. INTRODUCTION<br />

ouble gate MOSFET is widely used for sub-45nm<br />

technology of transistor design .They have immunity to<br />

short channel effects, reduced leakage current, nearly ideal subthreshold<br />

swing and high scaling potential. The single gate<br />

Silicon–on-insulator (SOI) devices give improved circuit speed<br />

and power consumption .But as the transistor size is reduced the<br />

close proximity between source and drain reduces the ability of<br />

the gate electrode to control the flow of current and potential<br />

distribution in the channel. To reduce SCE we need to increase<br />

the gate to channel coupling with respect to source/drain to<br />

channel coupling. Several technological approaches can be<br />

followed to design multiple gate MOSFETs. The various<br />

proposed architectures differ mainly by the number of gates and<br />

by the orientation of the conduction channel. We can define three<br />

main types of multiple gate devices: planar transistors, in which<br />

the gates and the channel are horizontal, FinFETs, in which the<br />

channel is vertical and the conduction is parallel to the wafer<br />

surface and the vertical transistors, in which the conduction<br />

direction is vertical.<br />

This paper deals with the compact modeling of long channel<br />

undoped and doped symmetric double-gate MOSFET. While<br />

modeling DG MOSFETs, we have to take a different approach<br />

Neha Goel, Dr.Vandana Nath<br />

Electronics and Communication Engineering, USIT,<br />

Guru Gobind Singh Indraprastha University, India<br />

from that of CMOS Technology as it has unique physical effects<br />

such as the two conducting interface coupling, volume inversion<br />

and carrier energy level quantization. Highly accurate physics<br />

based compact models are required which are computationally<br />

efficient. These requirements are easier to meet in the case of<br />

undoped body MOSFETs because of the absence of fixed charge<br />

in the channel.<br />

Recently, extensive study has been performed on the DG<br />

MOSFETs device physics.<br />

Some researchers have solved 1-D Poisson‘s equation for<br />

DGMOS to derive the analytical solution for surface potential<br />

and inversion layer charge density. But due to the complexity<br />

and need to solve a number of transcendental equations and<br />

auxiliary functions, these models needs more efforts to be<br />

implemented in the circuit simulator. Other groups used the<br />

charge based approach and focused on analytical charge and<br />

current expressions. These models provide simplified derivation<br />

of I-V characteristic but require special assumptions and<br />

approximations that compromise the physical detail in describing<br />

the device behavior.<br />

A fundamental complication of DG MOS‘s is the existence of<br />

multiple interfaces that coupled to each other. As a result, the<br />

drain current can‘t be fully described by an equation with respect<br />

to only source and drain surface potential but it requires the<br />

potential at the center of the Si film at the source and drain each.<br />

This carrier based method avoids the difficulties in calculating<br />

the surface and Si-film centric potential as long as the carrier<br />

concentrations at the boundaries are known. The calculations of<br />

the carrier concentrations are obtained directly by using<br />

Poisson‘s equation and thus we use minimum approximations.<br />

The model is formulated from the solution of the Poisson‘s<br />

equation and Pao-Sah drift-diffusion current expression and<br />

covers all three operating regions of a DG MOSFET: linear,<br />

active and saturation. Also in this model, we are ignoring some<br />

second order physical effects such as Short Channel Effects,<br />

Drain induced barrier lowering and quantum effects for the sake<br />

of simplicity.<br />

The paper is arranged as follows:<br />

6) Abstract<br />

7) Introduction<br />

8) Model Discussion for undoped body DGMOS<br />

9) Model Formulation for undoped body DGMOS<br />

10) Results and Discussions<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 168<br />

ISSN 2250-3153<br />

11) Conclusion<br />

II. MODEL DISCUSSION FOR UNDOPED BODY<br />

DGMOS<br />

Fig. 1 shows the energy level distribution diagrams of a<br />

symmetric double-gate MOSFET. The same voltage is applied to<br />

the two gates with the same work function to make them work as<br />

symmetric DGMOS. The voltage levels are referred to the<br />

electron quasi - fermi level of the source as there is no contact to<br />

the silicon body. Assuming that the quasi-fermi level is constant<br />

across the silicon film direction so that the device current flows<br />

only along the channel (y direction). The formulation starts with<br />

1-D Poisson‘s equation along the vertical direction considering<br />

the gradual channel approximation.<br />

Where, n and are the mobile electron concentration and<br />

spatial electrostatics respectively, is the permittivity of the<br />

silicon material. The transport due to holes is minimum in the nchannel<br />

and hence can be ignored.<br />

According to Boltzmann statistics, the mobile electron<br />

concentration is expressed by the potential<br />

And<br />

(1)<br />

(2a)<br />

(2b)<br />

Where and are the intrinsic carrier concentration and the<br />

induced carrier concentration respectively at the reference point<br />

in x-direction.<br />

The spatial derivative of the electron concentration from (2a) is<br />

written as<br />

Again differentiating the above equation we get<br />

Substituting (4) into (1)gives the equation for the electron<br />

concentration as<br />

There is a geometry symmetric point in the silicon film center<br />

due to the symmetric characteristic of double-gate MOSFETs.<br />

The symmetry boundary condition of a symmetric double gate<br />

MOSFET sets the electric field in the center of the silicon film to<br />

be zero. Thus, the reference coordinate takes the center of the<br />

silicon film as the coordinate point of x = 0. For consistency the<br />

value of the n(x) at x=0 is taken as .<br />

Substituting (6) into (2a) we get<br />

(3)<br />

(4)<br />

(5)<br />

(6)<br />

(7)<br />

The electric field distribution is obtained by differentiating<br />

equation (7)<br />

E(x)= (8)<br />

Fig.1 Structure and Energy Level Diagram of undoped DGMOS<br />

The symmetry of the boundary condition of the DGMOS<br />

allows the surface potential and the surface electric field to be<br />

calculated from equation (7) and (8) respectively.<br />

] (9)<br />

E(x)= (10)<br />

Defining we can calculate half of the total<br />

inversion charge.<br />

(11)<br />

The surface potential, concentration and field need to obey the<br />

Gauss‘s law for the applied gate to source voltage. So, we have<br />

= + (12)<br />

Substituting the expressions for surface potential and inversion<br />

charge in (12) we get<br />

= ] +<br />

(13)<br />

Using (13) is first solved for a given value of Vgs.along the<br />

channel direction the quasi –Fermi potential varies from<br />

This expression is useful because of its exactness, solid physics<br />

background, and the analytical characteristics in compact model<br />

construction.<br />

The current continuity principle requires the current to be<br />

constant and independent of the quasi –Fermi potential,<br />

following which we can determine the functional dependence<br />

between (y) and .<br />

Following the Pao- Sah current formulation which assumes that<br />

the drift-diffusion transport is valid for the long channel DGMOS<br />

, the drain current is obtained by integrating from the<br />

source to the drain ,expressed as (<br />

(14)<br />

Where are the solutions of (13) corresponding to<br />

=0 to respectively, is the effective mobility and W and L<br />

are the channel width and length of the DGMOS respectively.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 169<br />

ISSN 2250-3153<br />

Calculating from equation (13) and substituting it in (14)<br />

We get<br />

2* +<br />

(15)<br />

As the charge formulation accounts for only half of the channel,<br />

so the final current for symmetric DGMOS is doubled in (15).<br />

III. MODEL FORMULATION FOR DOPED BODY<br />

DGMOS<br />

In the doped body DGMOS there are significant mobile<br />

charges and fixed charges so the Gauss‘s law changes to<br />

= + (16)<br />

Where is fixed charge and its value is:<br />

(17)<br />

So the value of Vgs is increased which leads to an increase in the<br />

threshold voltage.<br />

= ]+<br />

+ (18)<br />

We‘ll calculate the value of using the previous<br />

considerations and using the Pao-Sah drift- diffusion current<br />

equation the value of the drain current is:<br />

2* +<br />

IV. RESULTS AND DISCUSSIONS.<br />

(19)<br />

We use this model to simulate an undoped double-gate<br />

MOSFET with the channel length of 2µm and gate oxide<br />

thickness of 2nm. Fig.2 show the DG MOSFET current voltage<br />

characteristics predicted by the derived analytical model with the<br />

constant mobility of 300 cm2 /V.s.<br />

Fig.2 I-V Characteristics of undoped body Symmetric DGMOSFET<br />

Fig.3: I-V Characteristics of doped body Symmetric DGMOSFET<br />

A.Transconductance curve:<br />

The transconductance curves of the two types of symmetric<br />

DGMOS clearly shows that as the concentration of the channel<br />

increases the threshold voltage also increases. So the threshold<br />

voltage for undoped body DGMOS is lower than the doped body<br />

DGMOS.<br />

Also as we can see from fig.4 as the silicon film thickness tsi<br />

increases the subthreshold current also increases so the value of<br />

tsi should be kept low but more than 2nm.<br />

Fig.4: Transconductance characteristics of undoped body Symmetric<br />

DGMOSFET<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 170<br />

ISSN 2250-3153<br />

Fig.5: Transconductance characteristics of doped body Symmetric DGMOSFET<br />

B. Volume inversion<br />

Fig.5 demonstrates the inversion charge versus gate voltage<br />

characteristics. The silicon film thickness affects the amount of<br />

sub-threshold inversion charge but has no effect on the strong<br />

inversion charge density. This verified the existence of the<br />

volume inversion and implies that decrease of the silicon<br />

thickness can effectively control the sub-threshold region leakage<br />

current. It illustrates a potential weakness in the used of undoped<br />

symmetric double MOSFETs for nano-CMOS application. To<br />

optimize the device performance, the silicon film thickness<br />

should be reduced to suppress the off-current.<br />

Fig.6: Inversion charge density per unit area is plotted at different values of Vgs<br />

and studied at tsi=10nm and tsi=50nm<br />

V. CONCLUSIONS<br />

In this paper a carrier based analytical<br />

model for long channel undoped body<br />

symmetric DGMOS is studied using carrier<br />

based approach. The drain is described by a<br />

single explicit equation with respect to<br />

the carrier concentration at the boundaries<br />

that is valid for all region of operation.<br />

This model is further extended to develop<br />

the model for doped symmetric DGMOS. Also<br />

we can check the performance of this model<br />

and compare it with the 2-D numerical<br />

simulation so as to check for the validity<br />

of the model. We can also derive the<br />

capacitance model for both the devices and<br />

study the radio-frequency characteristics<br />

of the two devices.<br />

REFERENCES<br />

[1] Zhang L.;J.He;Liu F.;Zhang J.;Song Y., ―A unified charge based model for<br />

symmetric DGMOSFETs valid for both heavily doped body and undoped<br />

body‖,in MIXDES 2008 Poland 19-21 June 2008 ,pp-367-372,2008.<br />

[2] Yadav K.Vinay;Rana K.Ashwani, ―Impact of Channel Doping on DG-<br />

MOSFET Parameters in Nano Regime-TCAD Simulation‖, in International<br />

Journal of Computer Applications (0975 – 8887) Vol. 37– No.11, January<br />

<strong>2012</strong>,pp-36-40,<strong>2012</strong>.<br />

[3] Gupta, R.S.; Sharma, N.; Bansal, J.; Chaujar, R.; Gupta, M.;, ―Two<br />

dimensional analytical modeling of multi-layered dielectric G4 MOSFET-A<br />

novel design‖, in Recent Advances in Microwave Theory and Applications,<br />

2008. MICROWAVE 2008., pp47 – 49,2008.<br />

[4] Yuan Taur; Jooyoung Song; Bo Yu, ―Compact modeling of multiple-gate<br />

MOSFETs‖, in Custom Integrated Circuits Conference, 2008. CICC 2008.<br />

IEEE, pp. 257 – 264,2008.<br />

[5] Kasturi, P.; Saxena, M.; Gupta, M.; Gupta, R.S., ―Dual Material Double-<br />

Layer Gate Stack SON MOSFET: A Novel Architecture for Enhanced<br />

Analog Performance—Part I: Impact of Gate Metal Work function<br />

Engineering ‖ in Electron Devices, IEEE , vol.55 Issue 1, pp372 – 381.<br />

[6] Jin He,Feng Liu, Jian Zhang, Jinhua Hu, Shengqi Yang and Mansun Chan,<br />

― A Carrier based Approach for compact modeling of the long channel<br />

undoped symmetric Double-gate MOSFETs‖,IEEE transactions on<br />

Electronic Devices,vol.54,pp-1203- 1209,2007.<br />

AUTHORS<br />

First Author – Neha Goel, Pursuing M.Tech in ECE, Indira<br />

Gandhi Institute of Technology, GGSIP University and e-mail –<br />

neha.agarwal12@gmail.com.<br />

Second Author – Dr. Vandana Nath, Electronics and<br />

Communication Dept. U.S.I.T., GGSIP University and e-mail –<br />

vandana.usit@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 171<br />

ISSN 2250-3153<br />

Removal of Multiple Access Interference in DS-CDMA<br />

System<br />

And<br />

1 (Lecturer, Department of E & TC, G.H.Raisoni College of Engineering & Management, Amravati)<br />

2 (Principal, G.H.Raisoni College of Engineering & Management, Amravati)<br />

Abstract- Multiple access interference (MAI) is a factor which<br />

limits the capacity and performance of DS-CDMA systems. MAI<br />

refers to the interference between direct-sequence users. This<br />

interference is the result of the random time offsets between<br />

signals, which make it impossible to design the code waveforms<br />

to be completely orthogonal. While the MAI caused by any one<br />

user is generally small, as the number of interferers or their<br />

power increases, MAI becomes substantial. The conventional<br />

detector does not take into account the existence of MAI. It<br />

follows a single-user detection strategy in which each user is<br />

detected separately without regard for other users. Because of the<br />

interference among users, however, a better detection strategy is<br />

one of multi-user detection (also referred to as joint detection or<br />

Interference cancelation). Here, information about multiple users<br />

is used jointly to better detect each individual user.<br />

Index Terms- Multiple Access Interference, Parallel<br />

Interference Canceller, Successive Interference Canceller, Code<br />

Division Multiple Access, Time Division Multiple Access,<br />

Frequency Division Multiple Access, Direct Sequence Code<br />

Division Multiple Access, Multiuser Detection, Base Station,<br />

Decision Feedback Equalizer, Maximum Likelihood detection,<br />

Maximum A posteriori Probability, Linear Minimum Mean<br />

Square Error, Turbo Multiuser Detection.<br />

I. INTRODUCTION<br />

1.1. Commercial CDMA System<br />

The Code Division Multiple Access (CDMA) offers many<br />

advantages over TDMA and FDMA. IS-95 CDMA allows each<br />

user within a cell to use the same radio channel, and users in<br />

adjacent cells also use the same radio channel, since this is a<br />

direct sequence spread spectrum CDMA system.<br />

CDMA completely eliminates the need for frequency within a<br />

market.<br />

Unlike other cellular standards, the user data rate (but not the<br />

channel chip rate) changes in real-time, depending on the voice<br />

activity and requirements in the network. Also,IS-95 uses a<br />

different modulation and spreading technique for the forward and<br />

reverse links. On the forward link, the base station<br />

simultaneously transmits the user data all mobiles in the cell by<br />

using a different spreading sequence for each mobile. A pilot<br />

code is also transmitted simultaneously and at a higher power<br />

level, thereby allowing all mobiles to use coherent carrier<br />

detection while estimating the channel conditions. On the reverse<br />

link, all mobiles respond in an asynchronous fashion and have<br />

ideally a constant level due to power control applied by the base<br />

station.<br />

The speech coder used in the IS-95 system is the Qualcomm<br />

9600 bps Code Excited Predictive (QCELP) coder. The original<br />

implementation of this vocoder detects activity, and reduces the<br />

data rate to 1200 bps during silent periods.<br />

IS-95 is specified for reverse link operation in the 824-849 MHz<br />

band and 869-894 for the forward link. A PCS version of IS-95<br />

has also been designed for international use in the 1800-2000<br />

MHz bands. A forward and reverse channel pair is separated by<br />

45 MHz for cellular band operation. Many users share a common<br />

channel transmission. The maximum user data rate is 9.6 kb/s.<br />

User data in IS-95 is spread to channel chip rate of 1.2288<br />

Mchip/s (a total spreading factor of 128) using a combination of<br />

techniques. The spreading process is different for the forward<br />

and reverse in the original CDMA specification. On the forward<br />

link, the user data stream is led using a rate 1/2 convolution code,<br />

interleaved, and spread by four orthogonal ling sequences (Walsh<br />

functions). Each mobile in a given cell is assigned different link<br />

sequence, providing perfect separation among the signals from<br />

different users, at least for the case where multipath does not<br />

exist. To reduce interference between mobiles that use the same<br />

spreading sequence in different cells, and to provide the desired<br />

wideband spectral characteristics (not all of the Walsh functions<br />

yield a wideband power spectrum), all signals in a particular cell<br />

are scrambled using a pseudorandom sequence of length 2 15<br />

chips.<br />

On the reverse link, a different spreading strategy is used<br />

since each received signal arrives at the base station via a<br />

different propagation path. The reverse channel user data stream<br />

is first convolutionally encoded with a rate 1/3 code. After<br />

interleaving, each block of six encoded symbols is mapped to<br />

one of the 64 orthogonal Walsh functions, providing sixty-fourary<br />

orthogonal signaling. A final fourfold spreading, giving a rate<br />

of 1.2288 Mchip/s, is achieved by spreading the resulting 307.2<br />

kchip/s stream by user-specific and base-station specific codes<br />

having periods of 2 42 - 1 chips and 2 15 chips, respectively. The<br />

rate 1/3 coding and the mapping onto Walsh functions result in a<br />

greater tolerance for interference than would be realized from<br />

traditional repetition spreading codes. This added robustness is<br />

important on the reverse link, due to the non-coherent detection<br />

and the in-cell interference received at the base station.<br />

Another essential element of the reverse link is tight control of<br />

each subscriber's transmitter power, to avoid the "near-far"<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 172<br />

ISSN 2250-3153<br />

problem that arises from varying received powers of the users. A<br />

combination of open-loop and fast, closed-loop power control is<br />

used to adjust the transmit power of each in-cell subscriber so<br />

that the base station receives each user with the same received<br />

power. The commands for the closed-loop power control are sent<br />

at a rate of 800 bits/s, and these bits are stolen from the speech<br />

frames. Without fast power control, the rapid power changes due<br />

to fading would degrade the performance of all users in the<br />

system.<br />

At both the base station and the subscriber, RAKE receivers<br />

are used to resolve and combine multipath components, thereby<br />

1.2 PROBLEMS IN CDMA SYSTEMS<br />

• A conventional DS/CDMA system treats each user separately<br />

as a signal, with other users considered as noise or MAI -<br />

multiple access interference<br />

• Capacity is interference-limited.<br />

• Near/far effect: users near the BS are received at higher<br />

powers than those far away.<br />

• suffer degradation in performance.<br />

• Need tight power control?<br />

1.3 MULTIUSER DETECTION<br />

• Multiuser detection considers all users as signals for each<br />

other for joint detection.<br />

• Reduced interference leads to capacity increase.<br />

• Alleviates the near/far problem.<br />

• MUD can be implemented in the BS or mobile, or both<br />

• In a cellular system, base station (BS) has knowledge of all the<br />

chip sequences<br />

FIGURE 1.1: IS-95 FORWARD CHANNEL BLOCK DIAGRAM<br />

reducing the degree of fading. RAKE receiver exploits the<br />

multipath time delays in a channel and combines the delayed<br />

replicas of the transmitted signal in order to improve link quality.<br />

In IS-95, a three finger RAKE is used at the base station. The IS-<br />

95 architecture also provides base station diversity during "soft"<br />

handoffs, whereby a mobile making the transition between cells<br />

maintains links with both base stations during the transition. The<br />

mobile receiver combines the signals from the two base stations<br />

in the same manner as it would combine signals associated with<br />

different multipath components.<br />

• Size and weight requirement for BS is not stringent<br />

Therefore MUD is currently being envisioned for the uplink<br />

(mobile to BS)<br />

1.4 SUCCESSIVE INTERFERENCE CANCELLERS<br />

• Successively subtracting off the strongest remaining signal<br />

• Cancelling the strongest signal has the most benefit<br />

• Cancelling the strongest signal is the most reliable<br />

cancellation<br />

• An alternative called the Parallel Interference Cancellers<br />

simultaneously subtract off all of the users' signals from all of the<br />

others<br />

• Works better than SIC when all of the users are received with<br />

equal strength (e.g. under power control).<br />

2.1 CDMA<br />

II. LITERATURE REVIEW<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 173<br />

ISSN 2250-3153<br />

One important property of the air interface of a cellular telephone<br />

system is the multiple access method. Each user of the cellular<br />

system is given a channel, and all users get different channels.<br />

The way in which these channels are different is determined by<br />

the multiple access method. .<br />

FIGURE 2.1: CDMA<br />

In a cellular system employing Direct Sequence Code<br />

Division Multiple Access, all users use the same frequency at the<br />

same time. Before transmission, the signal from each user is<br />

multiplied by a distinct signature waveform. The signature<br />

waveform is a signal which has a much larger bandwidth than the<br />

information bearing signal from the user. The CDMA system is<br />

thus a spread spectrum Technique. All users use different<br />

signatures waveforms to expand their signal bandwidth. The<br />

procedure is depicted in fig. 2.1 for a two-user case. Notice the<br />

phase shifts in the transmitted signal is due to the negative pulses<br />

in the data stream.<br />

2.2 The conventional receiver<br />

At the base station, the sum of all the broadband signals is<br />

received. To demodulate signals from a specific user, the<br />

received signal is correlated with the signature waveform of that<br />

user. The procedure is illustrated in fig. 2.2 by correlating the<br />

sum of all the above signals with the respective signature<br />

waveforms. Under ideal conditions, the correlation between<br />

different signature waveforms is zero; in that case, the output of<br />

the correlator will be the transmitted signal of the desired user as<br />

depicted in fig. 2.2. This correlation receiver is known as the<br />

conventional receiver.<br />

FIGURE 2.2: CONVENTIONAL RECEIVER<br />

2.3 Disadvantages with the conventional receiver<br />

The conventional receiver has some serious drawbacks. The<br />

underlying assumption is that the signals from different users are<br />

uncorrelated. In this case the conventional receiver is optimum.<br />

In practice the signals from different users will be correlated,<br />

which means the conventional receiver will be suboptimum. Still<br />

the conventional receiver will still work rather well under these<br />

two conditions:<br />

• The correlation between the signature sequences is small.<br />

• The signals from different users are received with<br />

approximately the same power.<br />

The first condition can be fulfilled by careful design of the<br />

code sequences that determine the signature waveforms. The<br />

second condition can be fulfilled by accurate power control. The<br />

base station measures the received power of all the transmitting<br />

signals. By sending power control commands to all the mobiles<br />

telling them to increase their transmit power, the received power<br />

levels of all the users can be kept at approximately the same<br />

level. Without power control, the received power levels may by<br />

60 dB or more. If the power of the received signals differs<br />

significantly, it suffers from the near-far problem.<br />

Code sequence design also has problems. It turns out that the<br />

correlation between signals from different users is critically<br />

dependent on the relative delays of the signals from different<br />

users. It is possible to design codes that are orthogonal, i.e. have<br />

zero cross correlation if the signals arrive at the base station<br />

synchronously. It is however impossible to design code<br />

sequences (with finite length) that have very low cross<br />

correlation for all relative delays.<br />

2.4 A Multiuser Detection Problem<br />

Due to the problems with the conventional receiver mentioned<br />

above, a different type of detector has been derived. These<br />

detectors, which do not treat other users as noise, but as digital<br />

signals are called multiuser detectors.<br />

Different Types of Multiuser Detectors: Most multiuser<br />

detectors are used in conjunction with the conventional receiver.<br />

This means that the received signal is first correlated with each<br />

of the signature waveforms. The output from this bank of<br />

correlators is treated as a vector. The multiuser receiver then<br />

performs some linear or non-linear transformation on this vector.<br />

Several multiuser detectors of this kind have been proposed.<br />

Usually, some letters need not be known, whereas others must be<br />

estimated. Unfortunately, some of: necessary parameter<br />

estimation may be difficult in a situation where there is a nearproblem.<br />

This is true in particular for estimation of the<br />

propagation delay, which is necessary for most of the multiuser<br />

detectors in this category.<br />

Other multiuser detectors do not operate on the output from<br />

the bank of correlators. Instead the demodulated wideband signal<br />

is sampled at a high rate and fed an adaptive discrete time filter.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 174<br />

ISSN 2250-3153<br />

The coefficients of the filter are adjusted so that the put of the<br />

filter resembles some known training sequence, which is<br />

transmitted before transmission of the actual message. These<br />

coefficients are then used during the remainder of the<br />

transmission.<br />

Amazingly enough, these detectors need no side information<br />

except the training sequence. Still, they have some problems. The<br />

use of these detectors place severe restrictions on the choice of<br />

spreading codes. Also the detectors may not be able to adapt to<br />

changing transmission conditions due to fading.<br />

2.4.1 A Multi-variable Decision Feedback Equalizer operating<br />

on the correlator outputs:<br />

As an example of a multiuser detector that operates on the<br />

output from the bank of correlators, a multivariable decision<br />

feedback equalizer (DFE) is studied. Decision feedback<br />

equalizers were first derived in the 1960's. They were then used<br />

to mitigate inter-symbol interference, which was a major<br />

problem for construction of high speed telephone line modems.<br />

For application as a multiuser detector in an asynchronous<br />

DS-CDMA system, the DFE has to be extended to have multiple<br />

inputs as well as multiple outputs. For this purpose the vector of<br />

sampled correlator outputs as the output of a discrete time<br />

variable channel model was used. Also the transmitted symbols<br />

of all users at a certain time instant in a vector were collected.<br />

The situation is depicted in the figure2.3.<br />

FIGURE 2.3: DS-CDMA TRANSMITTER<br />

Note that both input and output of the filter are vectors.<br />

By using the information about the transmission and reception in<br />

a DS-CDMA it is possible to relate the output to the input. This<br />

relation will be a discrete time multivariable FIR-filter with the<br />

number of inputs and the number of outputs equal to<br />

the number of users.<br />

FIGURE 2.4: MULTIVARIABLE DFE<br />

The vector of correlator outputs are used as input to the feed<br />

forward filter, which suppresses most of the inter-symbol<br />

interference and cross-couplings in the channel. From outputs of<br />

the feed forward filter, the outputs from the feedback filter<br />

remove the act of symbols that have been previously detected.<br />

Author observed that if graphically multivariable DFE in a<br />

CDMA scenario with two users is tried, the received powers of<br />

the two users will differ by 20 dB. and the codes used were Gold<br />

codes, which is a common choice in CDMA systems. The signal<br />

to noise ratio is varied between 5 and 20 dB, and counted the<br />

number of errors in the symbol decisions. The performance of<br />

the multivariable DFE was compared to the performance of the<br />

conventional receiver, and also to the performance of the<br />

decorrelating detector, a linear multiuser detector.<br />

The performance of the DFE is superior to the performance of<br />

the conventional detector. This is natural, since the performance<br />

of the conventional detector is limited by interference from the<br />

other user. This is in contrast to both the DFE and the relating<br />

detector, which strangely enough have the same performance. It<br />

should be however that the decorrelating detector cannot be<br />

implemented without modification in a real system, since it is a<br />

block detector. In a block detector, an entire sequence is received<br />

and demodulated simultaneously. It is then implicitly assumed<br />

that the transmission begins and ends at specified instances,<br />

which are not separated too far apart, will not be the situation in a<br />

real system: in a CDMA system, transmission takes place<br />

continuously.<br />

The performance of a practical implementation of the<br />

decorrelating detector is then over bounded by the performance<br />

indicated in the graph. Also, the correlating detector has been<br />

shown to perform very badly in a situation where the propagation<br />

delay has been estimated inaccurately. Thirdly, the complexity of<br />

the DFE is lower than the complexity of the decorrelating<br />

detector.<br />

2.4.2 A Multiuser Detector operating directly on the wideband<br />

signal:<br />

As previously stated, multiuser detector operating on the<br />

output of the correlator rely on accurate estimation of among<br />

other things the propagation delay. To circumvent the problem of<br />

propagation delay estimation, also multiuser detector operating<br />

directly on the wideband signal is devised. But the disadvantages<br />

associated such a detector: lack of flexibility in the code selection<br />

part and inability to cope fast fading were avoided. A multiuser<br />

detector for application in mobile radio must be able to adapt to<br />

rapid changes in transmission conditions. A multiuser detector<br />

fulfilling these conditions would be an ideal candidate for<br />

practical implementation. Such a detector can in fact be devised.<br />

By rewriting the system for transmission reception in a CDMA<br />

system, it becomes clear that the author is dealing with a pie<br />

equalization problem rather than a complex detection problem.<br />

There are only two differences from the equalization problems<br />

considered since the 1960's:<br />

The channel has several inputs, one for each user and<br />

The output of the channel must be sampled much more<br />

rapidly than once per symbol.<br />

The situation considered is as depicted in figure 2.5.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 175<br />

ISSN 2250-3153<br />

These equivalent channels are discrete time FIR filters. The<br />

coefficients of these filters will depend on two things<br />

• The codes that are used and<br />

• The physical channel.<br />

The former is known at the receiver, while the latter must be<br />

estimated using a training sequence. This estimation problem is<br />

relatively simple and does not suffer from the near-far problem.<br />

Based on knowledge of the channels, a number of different<br />

detectors can be designed. All of them have counterparts among<br />

equalizers used to combat inter-symbol interference. Examples of<br />

such detectors are<br />

• Fractionally spaced linear equalizers,<br />

• Fractionally spaced decision feedback equalizers (DFE‘s) and<br />

• Detector based on the Viterbi algorithm.<br />

The performance of the DFE to the performance of a single-user<br />

under the same conditions is compared. Graphically it can be<br />

proved that the performance of the system will be satisfactory,<br />

despite the heavy load and the severe near-far situation. The<br />

difference between the DFE and the single user case is rather<br />

large, but the system in which the DFE operates is very heavily<br />

loaded.<br />

Direct sequence code division multiple-access (DS-CDMA) has<br />

been selected as the fundamental signalling technique for third<br />

generation (3G) wireless communication system, due to its<br />

advantages of soft user capacity limit and inherent frequency<br />

diversity. However, it suffers from multiple-access interference<br />

(MAI) caused by the non-orthogonality of spreading codes,<br />

particularly for heavily loaded systems. Therefore, techniques for<br />

mitigating the MAI, namely multiuser detection, have been the<br />

subject of intensive research effort over the past two decades. It<br />

is well known that multiuser detection can substantially<br />

suppress MAI, thus improving system performance.<br />

Maximum likelihood (ML) multiuser detection was proposed in<br />

the early 1980s, and achieves the optimal performance at the cost<br />

of prohibitive computational cost when the number of users is<br />

large.<br />

In recent years, the turbo principle, namely the<br />

iterative exchange of soft lion among different blocks in a<br />

FIGURE 2.5: CDMA TRANSMITTER-RECEIVER<br />

communication system to improve the system performance, has<br />

been applied to combine multiuser detection with channel<br />

decoding. In such turbo multiuser detectors, the outputs of<br />

channel decoders are fed back to the multiuser detector, thus<br />

enhancing the performance iteratively. Turbo multiuser detection<br />

based on the maximum Aposterior probability (MAP) detection<br />

and decoding criterion has been proposed in together with a<br />

lower complexity technique based on interference cancellation<br />

and LMMSE filtering. Further simplification is obtained by<br />

applying parallel interference cancellation (PIC) for multiuser<br />

detection, where the decisions of the decoders are directly<br />

subtracted from the original signal to cancel the MAI.<br />

Practical wireless communication systems usually experience<br />

fading channels, whose state information is unknown to the<br />

receiver. Thus practical systems need to detection and decoding<br />

with uncertain channel state information. In the context short<br />

code CDMA systems, blind multiuser detection can be<br />

accomplished without explicit channel estimation by using<br />

subspace and other techniques.<br />

III. DESIGN METHODOLOGY<br />

Let us consider channel-coded CDMA systems operating over<br />

multipath fading channels whose channel state information is<br />

unknown to the receiver. To demodulate and decode such<br />

systems, we will apply the turbo principle to both channel<br />

estimation and multiuser detection. Consider a receiver that feeds<br />

back decisions from channel decoders to both an ML channel<br />

estimator and a PIC multiuser detector. The iteration will be<br />

initialized with training symbol based channel estimation and a<br />

non-iterative multiuser detection. The dissertation will be<br />

focused mainly on the performance analysis of such structures<br />

using semi-analytic methods. Here the contributions to the<br />

variance of the channel estimation error due to noise and<br />

decision feedback error, and the variance of the residual MAI<br />

after PIC will be analysed. Then this analysis will be used to<br />

describe the decoding process as an iterative mapping. Here<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 176<br />

ISSN 2250-3153<br />

conditions assuring convergence of this iterative mapping to a<br />

unique fixed point is proposed. Computation of the asymptotic<br />

multiuser efficiency (AME) of this overall system, under some<br />

mild assumptions on the channel decoders will be done. The<br />

analysis in this dissertation will be carried on large samples and<br />

large system analysis.<br />

IV. EXPECTED RESULTS<br />

Fig4.2: BER performance comparison between the turbo<br />

multiuser receiver with five inner iterations and one inner<br />

iteration, K = 6, processing gain N = 16, vehicle speed = 120<br />

km/h, data rate = 9.6 kb/s, carrier frequency = 2.0 GHz.<br />

V. CONCLUSION<br />

Multiuser detection holds much promise for improving Direct<br />

Sequence CDMA performance and capacity. Although multiuser<br />

detection is currently in the research stage, efforts to<br />

commercialize multi-user detectors are expected in the coming<br />

years as DS-CDMA systems are more widely deployed. The<br />

success of these efforts will depend on the outcome of careful<br />

performance and cost analysis for the realistic environment.<br />

ACKNOWLEDGMENT<br />

The author sincerely thanks to Prof. R.D.Ghongade, Prof. Dr.<br />

G.G.Sarate, Prof. S.R. Hirekhan, Prof. N.N.Mandaogade for their<br />

valuable suggestion, criticism and time to time encouragement.<br />

The author also expresses his warm appreciation to his<br />

Brother, Amol, for his help in editing this article.<br />

REFERENCES<br />

[1] P. Alexander, A. Grant and M. C. Reed, ―Iterative detection of codedivision<br />

multiple-access with error control coding,‖ European Trans.<br />

Telecomm., Vol. 9, pp. 419–426, Aug. 1998.<br />

[2] P. Alexander and A. Grant, ―Iterative channel and information sequence<br />

estimation in CDMA,‖ Proceedings of IEEE Sixth International Symposium<br />

on Spread Spectrum Techniques and Applications, pp. 593–597,<br />

Parsippany, NJ, Sept. 2000.<br />

[3] X. Wang and H. V. Poor, Wireless Communication Systems: Advanced<br />

Techniques for Signal Reception. Prentice-Hall, Upper Saddle River, NJ,<br />

2004.<br />

[4] X. Wang and H. V. Poor, ―Iterative (turbo) soft interference cancellation<br />

and decoding for coded CDMA,‖ IEEE Trans. Commun., Vol. 47, no.7, pp.<br />

1046–1061, July 1999.<br />

[5] T. C. Yang and W.-B Yang. "Interference Suppression for code division<br />

multiple-access Communications in an underwater acoustic channel,".J.<br />

Acoustic. Soc. Am 126(1), 220-228, July 2009.<br />

[6] S. Moshavi, ―Multi-User detection for DS-CDMA Communications,‖ IEEE<br />

Commun. Mag., Oct. 1996.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 177<br />

ISSN 2250-3153<br />

Modeling of Liquid-Liquid Extraction in Spray Column<br />

Using Artificial Neural Network<br />

S.L. Pandharipande, Aashish Nagdive, Yogesh Moharkar<br />

Department of Chemical Engineering, Laxminarayan Institute of Technology,<br />

Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India<br />

Abstract- Liquid-liquid extraction is a process for separating<br />

the components of a liquid feed mixture by contacting with a<br />

liquid solvent phase. The operation is carried out in spray<br />

columns, packed beds, rotating disc contactors & plate columns.<br />

The effective rate of mass transfer is dependent upon several<br />

factors such as mass transfer coefficient, transfer area and<br />

magnitude of driving force applied. Multi Layer Perceptron<br />

(MLP) is a type of feed forward neural network applied to<br />

chemical engineering operations. Present work is aimed at<br />

developing ANN models with different topologies for liquidliquid<br />

extraction carried in spray column for a system of acetic<br />

acid-water-benzene. The accuracy of the ANN model is<br />

dependent upon the number of hidden layers & number of<br />

neurons in each hidden layer. Artificial neural network models 1<br />

& 2 are developed for modeling liquid-liquid extraction spray<br />

column, correlating mass transfer coefficient & mass transfer rate<br />

with flow-rate of extract phase , equilibrium concentration of<br />

acetic acid in aqueous phase & height of organic phase in<br />

column. The topology of the architecture was different for both<br />

the models. Based on results & discussions it can be concluded<br />

that both the models are successful in estimating the parameters<br />

but because of higher accuracy of estimation for both the training<br />

& test data sets ANN model 2 is more suitable. The work is<br />

demonstrative and the accuracy of estimation can be improved<br />

by altering the topology.<br />

Index Terms- liquid-liquid extraction, spray column,<br />

modeling, artificial neural network, mass transfer coefficient<br />

L<br />

I. INTRODUCTION<br />

iquid-liquid extraction is a process for separating the<br />

components of a liquid feed mixture by contacting with a<br />

liquid solvent phase. The process takes advantage of differences<br />

in the chemical properties of the feed components, such as<br />

differences in polarity and hydrophobic or hydrophilic character,<br />

to separate them. The transfer of components from one phase to<br />

the other is driven by a deviation from thermodynamic<br />

equilibrium and the equilibrium state depends on the nature of<br />

the interactions between the feed components and the solvent<br />

phase. The potential for separating the feed components is<br />

determined by the differences in this interaction. The operation is<br />

carried out in spray columns, packed beds, rotating disc<br />

contactors & plate columns. The effective rate of mass transfer is<br />

dependent upon several factors such as mass transfer coefficient,<br />

transfer area and magnitude of driving force applied. The mass<br />

transfer coefficient for a spray column is a function of a number<br />

of parameters that include velocity of raffinate & extract phases,<br />

sparger specifications, drop size, contact height of column &<br />

column dimensions.<br />

II. LITERATURE SURVEY<br />

Artificial Neural Network<br />

An Artificial Neural Network (ANN) is an information<br />

processing paradigm that is inspired by the way the biological<br />

nervous system, such as brain processes information. It is<br />

composed of large number of highly interconnected processing<br />

elements (neurons) working in unison to solve specific problem<br />

(1) .<br />

Multi Layer Perceptron (MLP) is a type of feed forward<br />

neural network applied to chemical engineering operations. It<br />

consists of multilayer hierarchical structure with input & output<br />

layers & has at least one hidden layer of processing units in<br />

between them. The layers between the input and output layers are<br />

termed ―hidden‖ since they do not converse with the outside<br />

world directly. The nodes between the two successive layers are<br />

fully connected by means of constants called as weights. The<br />

outputs from nodes of input layer are fed to hidden layer nodes,<br />

which in turn, feed their outputs to the next hidden nodes. The<br />

hidden nodes pass the net activation through a nonlinear<br />

transformation of a linear function, such as the logistic sigmoidal<br />

or hyperbolic tangent to compute the outputs. For the training of<br />

MLP, error back propagation algorithm suggested by<br />

Rumelhart (2) is popular. This is based on a nonlinear version of<br />

the Windro-Hoff rule known as Generalized Delta Rule (GDR).<br />

The schematic of the typical MLP network used in developing<br />

ANN model in the present work is shown in fig 1.<br />

Figure no 1: Simple feed forward neural network with two<br />

hidden layer<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 178<br />

ISSN 2250-3153<br />

Various applications of ANN are, an approach to fault<br />

diagnosis in chemical processes (3) , fault diagnosis in complex<br />

chemical plants (4) , incipient fault diagnosis of chemical<br />

process (5) , leak detection in liquefied gas pipeline (6),(7) , for<br />

estimation of mass transfer coefficient for fast fluidized bed<br />

solids (8) , modeling of distillation column (9) , detergent<br />

formulation (10) , modeling of unsteady heat conduction in semi<br />

infinite solid (11) , prediction of mass transfer coefficient in<br />

downflow jet loop reactor (12) and modeling of packed column (13)<br />

and similar other (14,15,16) were also reported.<br />

Modeling of liquid-liquid extraction is a topic of interest<br />

among researchers & several papers have been reported in<br />

literature related to various aspects like modeling , simulation &<br />

control of liquid-liquid extraction columns (19) , modeling mass<br />

transfer coefficient for liquid-liquid extraction with the interface<br />

adsorption of hydroxyl ions (17) , a bivariate population balance<br />

simulation tool for liquid-liquid extraction columns (20) , use of<br />

neural network for modeling of liquid-liquid extraction process<br />

in the rotating disc columns (21) , multivariable control of a pulsed<br />

liquid-liquid extraction column by neural network (18) . The<br />

present work is aimed at modeling liquid-liquid extraction spray<br />

column using artificial neural network. The experimental data<br />

generated for acetic acid-water-benzene system has been used.<br />

Mass transfer coefficient is estimated for variation in volumetric<br />

flow rate of extract phase, height of organic phase in the column<br />

and equilibrium concentration of acetic acid. It is also aimed to<br />

develop Artificial Neural Network model for correlating these<br />

sets of parameters for liquid-liquid spray extraction column.<br />

III. MATERIALS AND METHODS<br />

A. Generation of equilibrium data experimentally for the<br />

liquid-liquid extraction in spray column for a system of<br />

acetic acid-water-benzene.<br />

B. Experimental set up for spray column<br />

The schematic for the experimental set-up liquid-liquid<br />

extraction is as shown in figure no 2 .It consists of a glass tube<br />

of diameter & height 70 & 88 cm respectively. The sparger<br />

having diameter of50 mm is placed inside the column.<br />

Centrifugal pump is provided to supply the extract phase to the<br />

column. Three ball valves are provided for monitoring flow<br />

rates. Rota meter is provided for measuring the inlet flow rate of<br />

extract phase to spray column. A tank is mounted at the top of<br />

the assembly for steady supply of mixture of acetic acid and<br />

benzene to the spray column. A tank is provided for storage of<br />

extract phase at the bottom section of column.<br />

Figure no. 2: schematic for the experimental set-up of liquid-liquid extraction of spray column<br />

Observations: The experimental data generated for various runs<br />

along with the calculated values of mass transfer coefficient and<br />

rate are given in table 1.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 179<br />

ISSN 2250-3153<br />

Sr no.<br />

Equilibrium<br />

concentration of acetic<br />

acid (gmol/lit)<br />

Height of feed<br />

in column (cm)<br />

Table no 1: Experimental data<br />

Flow rate<br />

(m 3 / sec)<br />

1×10 -5<br />

Mass transfer<br />

coefficient 1×10 -4<br />

(sec -1 )<br />

Mass transfer rate<br />

1×10 -4 (gmole/sec)<br />

1 0.4901 50 3.33 1.78 1.66<br />

2 0.4901 50 5 3.2 3<br />

3 0.4901 50 6.66 5.13 4.8<br />

4 0.4901 50 7.5 6.43 6<br />

5 0.4901 55 3.33 1.68 1.73<br />

6 0.4901 55 5 3.11 3.2<br />

7 0.4901 55 6.66 4.8 4.93<br />

8<br />

0.4901 55 7.5 6.14 6.3<br />

9 0.4901 60 3.33 1.6 1.8<br />

10 0.4901 60 5 299 3.3<br />

11 0.4901 60 6.66 4.51 5.06<br />

12 0.4901 60 7.5 5.76 6.45<br />

13<br />

0.4901 65 3.33 1.58 1.93<br />

14 0.4901 65 5 2.79 3.4<br />

15 0.4901 65 6.66 4.28 5.2<br />

16 0.4901 65 7.5 5.57 6.75<br />

17 0.5769 50 3.33 1.56 1.73<br />

18 0.5769 50 5 2.54 2.8<br />

19 0.5769 50 6.66 3.74 4.13<br />

20 0.5769 50 7.5 4.49 4.95<br />

21 0.5769 55 3.33 1.48 1.8<br />

22 0.5769 55 5 2.39 2.9<br />

23 0.5769 55 6.66 3.63 4.4<br />

24 0.5769 55 7.5 4.46 5.4<br />

25 0.5769 60 3.33 1.46 1.93<br />

26 0.5769 60 5 2.26 3<br />

27 0.5769 60 6.66 3.52 4.66<br />

28 0.5769 60 7.5 4.31 5.7<br />

29 0.5769 65 3.33 1.39 2<br />

30 0.5769 65 5 2.22 3.2<br />

31 0.5769 65 6.66 3.44 4.93<br />

32 0.5769 65 7.5 4.29 6.15<br />

33 0.6035 50 3.33 1.61 1.86<br />

34 0.6035 50 5 2.6 3<br />

35 0.6035 50 6.66 3.93 4.53<br />

36 0.6035 50 7.5 5.21 6<br />

37 0.6035 55 3.33 1.52 1.93<br />

38 0.6035 55 5 2.44 3.1<br />

39 0.6035 55 6.66 3.78 4.8<br />

40 0.6035 55 7.5 4.97 6.3<br />

41 0.6035 60 3.33 1.48 2.06<br />

42 0.6035 60 5 2.38 3.3<br />

43 0.6035 60 6.66 3.66 5.06<br />

44 0.6035 60 7.5 4.78 6.6<br />

45<br />

0.6035 65 3.33 1.46 2.2<br />

46 0.6035 65 5 2.33 3.5<br />

47 0.6035 65 6.66 3.56 5.33<br />

48 0.6035 65 7.5 4.61 6.9<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 180<br />

ISSN 2250-3153<br />

IV. DEVELOPING ARTIFICIAL NEURAL NETWORK<br />

MODELS 1 AND 2<br />

This part of present work is devoted for developing<br />

artificial neural network model for the liquid-liquid extraction<br />

data generated experimentally.<br />

The accuracy of the ANN model is dependent upon the<br />

number of hidden layers & number of neurons in each hidden<br />

ANN model<br />

ANN<br />

model-1<br />

ANN<br />

model-2<br />

Input layer<br />

layer. Artificial neural network models 1 & 2 having different<br />

topology are developed in the present work using elite-<br />

ANN (C) .The details of architecture of topology of ANN models 1<br />

& 2 is given in table 2. The total data set of 48 points is divided<br />

into two parts; training & test data set having 36 & 12 data points<br />

respectively as shown in table-2.<br />

Table no. 2 Details of architecture of topology for ANN models 1 & 2<br />

1 st Hidden<br />

layer<br />

The details of the output values of parameters mass<br />

transfer rate & coefficient for training & test data sets obtained<br />

by using ANN model -1 & model -2 are given in table -3 & 4.the<br />

iteration and the corresponding error during the training mode for<br />

developing ANN model 1 & 2 are plotted as shown in figure<br />

numbers 3 & 4.<br />

Figure no. 3: Iterations and the corresponding RMSE error for<br />

ANN model 1<br />

No. of neurons Data points<br />

2 nd Hidden<br />

layer<br />

3 rd Hidden<br />

layer<br />

Output layer<br />

3 0 5 5 2<br />

3 0 10 10 2<br />

Training<br />

data<br />

Test data<br />

36 12<br />

RMSE error<br />

0.01443<br />

RMSE error<br />

0.02933<br />

36 12<br />

RMSE Error<br />

0.00704<br />

RMSE Error<br />

0.07008<br />

Figure no.4: Iterations and the corresponding RMSE error for<br />

ANN model2<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 181<br />

ISSN 2250-3153<br />

Sr no<br />

Table no 3: Output values of parameters mass transfer rate & coefficient for training data sets predicted by using ANN model - 1 &<br />

model - 2<br />

Equilibrium<br />

concentration<br />

Height of<br />

column<br />

Flow<br />

rate<br />

Mass transfer<br />

coefficient<br />

Mass transfer<br />

rate<br />

Predicted output<br />

mass transfer<br />

coefficient for<br />

ANN<br />

model 1<br />

Predicted<br />

output mass<br />

transfer<br />

coefficient for<br />

ANN<br />

model 2<br />

Predicted<br />

output mass<br />

transfer rate<br />

for ANN<br />

model 1<br />

Predicted<br />

output mass<br />

transfer rate<br />

for ANN<br />

model 2<br />

1 0.4901 50 5 3.2 3 3.225 3.177 3.019 3.057<br />

2 0.4901 50 6.66 5.13 4.8 5.219 5.176 4.775 4.779<br />

3 0.4901 50 7.5 6.43 6 6.285 6.291 6.074 6.029<br />

4 0.4901 55 3.33 1.68 1.73 1.583 1.612 1.823 1.837<br />

5 0.4901 55 6.66 4.8 4.93 4.734 4.795 4.993 4.937<br />

6 0.4901 55 7.5 6.14 6.3 6.076 6.122 6.218 6.254<br />

7 0.4901 60 3.33 1.6 1.8 1.565 1.574 1.833 1.833<br />

8 0.4901 60 5 2.99 3.3 2.965 2.926 3.221 3.237<br />

9 0.4901 60 7.5 5.76 6.45 5.775 5.792 6.432 6.491<br />

10 0.4901 65 3.33 1.58 1.93 1.547 1.553 1.850 1.839<br />

11 0.4901 65 5 2.79 3.4 2.821 2.833 3.428 3.430<br />

12 0.4901 65 7.5 5.57 6.75 5.641 5.547 6.671 6.717<br />

13 0.5769 50 3.33 1.56 1.73 1.548 1.565 1.870 1.824<br />

14 0.5769 50 6.66 3.74 4.13 3.810 3.739 4.020 4.095<br />

15 0.5769 50 7.5 4.49 4.95 4.672 4.573 4.875 4.933<br />

16 0.5769 55 3.33 1.48 1.8 1.547 1.544 1.895 1.842<br />

17 0.5769 55 5 2.39 2.9 2.414 2.420 2.866 2.824<br />

18 0.5769 55 7.5 4.46 5.4 4.497 4.411 5.391 5.359<br />

19 0.5769 60 3.33 1.46 1.93 1.542 1.539 1.924 1.880<br />

20 0.5769 60 5 2.26 3 2.358 2.312 3.019 2.987<br />

21 0.5769 60 7.5 4.31 5.7 4.332 4.284 5.819 5.771<br />

22 0.5769 65 5 2.22 3.2 2.276 2.221 3.192 3.185<br />

23 0.5769 65 6.66 3.44 4.93 3.401 3.510 4.935 4.869<br />

24 0.5769 65 7.5 4.29 6.15 4.277 4.231 6.235 6.184<br />

25 0.6035 50 3.33 1.61 1.86 1.557 1.570 1.931 1.864<br />

26 0.6035 50 5 2.6 3 2.529 2.611 3.046 2.986<br />

27 0.6035 50 7.5 5.21 6 5.049 5.157 6.107 6.001<br />

28 0.6035 55 3.33 1.52 1.93 1.553 1.554 1.956 1.912<br />

29 0.6035 55 5 2.44 3.1 2.465 2.442 3.139 3.132<br />

30 0.6035 55 7.5 4.97 6.3 4.947 4.977 6.336 6.323<br />

31 0.6035 60 5 2.38 3.3 2.393 2.276 3.238 3.314<br />

32 0.6035 60 6.66 3.66 5.06 3.689 3.707 5.104 5.087<br />

33 0.6035 60 7.5 4.78 6.6 4.808 4.800 6.478 6.540<br />

34 0.6035 65 3.33 1.46 2.2 1.538 1.569 2.008 2.151<br />

35 0.6035 65 6.66 3.56 5.33 3.604 3.496 5.382 5.347<br />

36 0.6035 65 7.5 4.61 6.9 4.737 4.682 6.621 6.699<br />

www.ijsrp.org


Sr no<br />

International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 182<br />

ISSN 2250-3153<br />

Figure no 5: Comparison of actual and predicted mass transfer<br />

coefficient obtained by ANN model 1 & model 2 for training<br />

data<br />

Figure no 6: Comparison of actual and predicted mass transfer<br />

rate by ANN model 1 & model 2 for training data<br />

Table no. 4: Output values of parameters mass transfer rate & coefficient for test data sets predicted by using ANN model 1 & model<br />

2<br />

Equilibrium<br />

concentration<br />

Height of<br />

column<br />

Flow<br />

rate<br />

Mass transfer<br />

coefficient<br />

Mass<br />

transfer rate<br />

Predicted<br />

output mass<br />

transfer<br />

coefficient for<br />

ANN<br />

model 1<br />

Predicted<br />

output mass<br />

transfer<br />

coefficient for<br />

ANN<br />

model 2<br />

Predicted<br />

output mass<br />

transfer rate<br />

for ANN<br />

model 1<br />

Predicted<br />

output mass<br />

transfer rate<br />

for ANN<br />

model 2<br />

1 0.4901 50 3.33 1.78 1.66 1.601 1.676 1.818 1.850<br />

2 0.4901 55 5 3.11 3.2 3.094 3.043 3.091 3.111<br />

3 0.4901 60 6.66 4.51 5.06 4.510 4.447 5.296 5.166<br />

4 0.4901 65 6.66 4.28 5.2 4.482 4.221 5.752 5.481<br />

5 0.5769 50 5 2.54 2.8 2.458 2.535 2.725 2.720<br />

6 0.5769 55 6.66 3.63 4.4 3.606 3.703 4.238 4.343<br />

7 0.5769 60 6.66 3.52 4.66 3.465 3.617 4.508 4.603<br />

8 0.5769 65 3.33 1.39 2 1.534 1.544 1.958 1.951<br />

9 0.6035 50 6.66 3.93 4.53 4.145 4.011 5.077 4.593<br />

10 0.6035 55 6.66 3.78 4.8 3.884 3.898 5.046 4.838<br />

11 0.6035 60 3.33 1.48 2.06 1.547 1.556 1.981 2.002<br />

12 0.6035 65 5 2.33 3.5 2.298 2.139 3.355 3.498<br />

V. RESULTS AND DISCUSSION<br />

Graphs are plotted between the actual and predicted values<br />

of output parameters mass transfer coefficient and mass transfer<br />

rate obtained by using ANN model 1 & 2, for training data set as<br />

shown in figure no. 5 & 6 respectively. It can be said that the<br />

actual & predicted values are close to each other. Both the ANN<br />

models 1 & 2 have high accuracy levels of prediction.<br />

Similarly graphs are plotted between the actual and<br />

predicted values of output parameters, mass transfer coefficient<br />

and mass transfer rate respectively for test data set for ANN<br />

model 1 & 2 as shown in figures 7 & 8 respectively. It can be<br />

said that the actual & predicted values are close to each other.<br />

Figure no 7: Comparison of actual and predicted mass transfer<br />

coefficient obtained by ANN mode -1 & model -2 for test data<br />

set<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 183<br />

ISSN 2250-3153<br />

Figure no 8: comparison of actual and predicted mass transfer<br />

rate by ANN model 1 and model 2 for test data set<br />

The criterion for selection of suitable ANN model is based on<br />

comparison between the relative error values for all the output<br />

data points estimated by using ANN model 1& 2 and is given in<br />

Table no. 5.<br />

Table no.5: Relative error of predicted output values for mass transfer coefficient and mass transfer rate using ANN model 1 and ANN<br />

model-2 for training data.<br />

Actual<br />

mass<br />

transfer<br />

coefficient<br />

Predicted<br />

mass<br />

transfer<br />

coefficient<br />

Model1<br />

Predicted<br />

mass<br />

transfer<br />

coefficient<br />

Model2<br />

Mass<br />

transfer<br />

coefficient<br />

Relative<br />

Error<br />

model 1<br />

Mass<br />

transfer<br />

coefficient<br />

Relative<br />

Error<br />

model 2<br />

Actual<br />

mass<br />

transfer<br />

rate<br />

Predicted<br />

mass<br />

transfer<br />

rate for<br />

Model 1<br />

Predicted<br />

mass<br />

transfer rate<br />

for Model 2<br />

Mass<br />

transfer rate<br />

for Relative<br />

Error for<br />

model 1<br />

Mass<br />

transfer<br />

rate for<br />

Relative<br />

Error for<br />

model 2<br />

3.2 3.225 3.177 -0.782 0.690 3 3.019 3.057 -0.647 -1.936<br />

5.13 5.219 5.176 -1.745 -0.901 4.8 4.775 4.779 0.505 0.421<br />

6.43 6.285 6.291 2.251 2.149 6 6.074 6.029 -1.247 -0.491<br />

1.68 1.583 1.612 5.729 4.027 1.73 1.823 1.837 -5.398 -6.207<br />

4.8 4.734 4.795 1.362 0.101 4.93 4.994 4.937 -1.306 -0.148<br />

6.14 6.076 6.122 1.034 0.287 6.3 6.218 6.254 1.290 0.715<br />

1.6 1.565 1.574 2.136 1.571 1.8 1.833 1.833 -1.835 -1.875<br />

2.99 2.965 2.926 0.816 2.109 3.3 3.221 3.237 2.365 1.887<br />

5.76 5.775 5.792 -0.261 -0.568 6.45 6.432 6.491 0.278 -0.636<br />

1.58 1.547 1.556 2.0473 1.690 1.93 1.850 1.839 4.117 4.685<br />

2.79 2.829 2.833 -1.130 -1.571 3.4 3.428 3.430 -0.827 -0.897<br />

5.57 5.641 5.5478 -1.289 0.395 6.75 6.671 6.717 1.160 0.475<br />

1.56 1.548 1.565 0.713 -0.347 1.73 1.870 1.824 -8.101 -5.437<br />

3.74 3.810 3.739 -1.896 0.0037 4.13 4.020 4.095 2.645 0.824<br />

4.49 4.672 4.573 -4.074 -1.850 4.95 4.875 4.933 1.510 0.332<br />

1.48 1.547 1.544 -4.532 -4.346 1.8 1.895 1.842 -5.326 -2.339<br />

2.39 2.414 2.420 -1.032 -1.289 2.9 2.866 2.824 1.146 2.598<br />

4.46 4.497 4.411 -0.838 1.087 5.4 5.391 5.359 0.157 0.759<br />

1.46 1.542 1.539 -5.648 -5.445 1.93 1.924 1.880 0.263 2.574<br />

2.26 2.358 2.312 -4.338 -2.339 3 3.019 2.987 -0.663 0.411<br />

4.31 4.332 4.284 -0.526 0.593 5.7 5.819 5.771 -2.089 -1.257<br />

2.22 2.276 2.221 -2.524 -0.059 3.2 3.192 3.185 0.245 0.464<br />

3.44 3.401 3.510 1.107 -2.058 4.93 4.935 4.869 -0.106 1.222<br />

4.29 4.277 4.231 0.287 1.371 6.15 6.235 6.184 -1.386 -0.557<br />

1.61 1.557 1.570 3.279 2.479 1.86 1.931 1.864 -3.843 -0.241<br />

2.6 2.529 2.611 2.719 -0.438 3 3.046 2.986 -1.536 0.4379<br />

5.21 5.049 5.157 3.081 0.999 6 6.107 6.001 -1.789 -0.018<br />

1.52 1.553 1.554 -2.221 -2.291 1.93 1.956 1.912 -1.353 0.897<br />

2.44 2.465 2.442 -1.050 -0.092 3.1 3.139 3.132 -1.264 -1.062<br />

4.97 4.947 4.977 0.445 -0.142 6.3 6.336 6.323 -0.574 -0.375<br />

2.38 2.393 2.276 -0.546 4.338 3.3 3.238 3.314 1.866 -0.453<br />

3.66 3.689 3.707 -0.817 -1.309 5.06 5.104 5.087 -0.872 -0.548<br />

4.78 4.808 4.800 -0.598 -0.427 6.6 6.478 6.540 1.839 0.899<br />

1.46 1.538 1.569 -5.369 -7.482 2.2 2.008 2.151 8.701 2.182<br />

3.56 3.604 3.494 -1.239 1.776 5.33 5.382 5.347 -0.980 -0.332<br />

4.61 4.737 4.682 -2.765 -1.577 6.9 6.621 6.699 4.036 2.901<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 184<br />

ISSN 2250-3153<br />

Fig no.9 & 10 show the graphs plotted between the relative error<br />

for the output parameters, mass transfer coefficient and mass<br />

transfer rate, estimated using ANN model 1 & ANN model 2<br />

respectively for training data set. It is seen that there are<br />

deviations of the relative error from the mean value for the ANN<br />

models, 1 & 2. The range of relative error for the output<br />

parameter, mass transfer coefficient for ANN model 1 & ANN<br />

model 2 is 0-6 & 0-4 respectively. Similarly the range for the<br />

second output parameter, mass transfer rate for ANN model 1 &<br />

ANN model 2 is 0-8% & 0-4% respectively. As the relative<br />

error for ANN model 2 is lower for both the output parameters<br />

than estimated by ANN model 1, hence it can be said that the<br />

ANN model 2 is superior to the ANN model 1.<br />

Figure no.9: Relative error of actual output and predicted output<br />

values for the mass transfer coefficient for training data<br />

Figure no.10: Relative error of actual output and predicted output<br />

values for the mass transfer rate for training data<br />

Similarly the relative error for all test data set points<br />

using models 1& 2 is calculated as given in Table 6.<br />

Table no.6: Relative error of predicted output values of mass transfer coefficient and mass transfer rate for ANN model 1 and ANN<br />

model-2 for test data.<br />

Actual<br />

mass<br />

transfer<br />

coefficient<br />

Predicted<br />

mass<br />

transfer<br />

coefficient<br />

Model1<br />

Predicted<br />

mass<br />

transfer<br />

coefficient<br />

Model2<br />

Mass<br />

transfer<br />

coefficient<br />

Relative<br />

Error<br />

model 1<br />

Mass<br />

transfer<br />

coefficient<br />

Relative<br />

Error<br />

model 2<br />

Actual<br />

mass<br />

transfer<br />

rate<br />

Predicte<br />

d mass<br />

transfer<br />

rate for<br />

Model 1<br />

Predicted<br />

mass<br />

transfer<br />

rate for<br />

Model 2<br />

Mass<br />

transfer<br />

rate for<br />

Relative<br />

Error for<br />

model 1<br />

Mass<br />

transfer<br />

rate for<br />

Relative<br />

Error for<br />

model 2<br />

1.78 1.601 1.676 10.013 5.792 1.66 1.818 1.850 -9.569 -11.501<br />

3.11 3.094 3.043 0.489 2.135 3.2 3.091 3.111 3.376 2.756<br />

4.51 4.510 4.447 -0.010 1.385 5.06 5.296 5.166 -4.664 -2.105<br />

4.28 4.482 4.229 -4.732 1.365 5.2 5.752 5.481 -10.62 -5.41<br />

2.54 2.412 2.535 3.227 0.167 2.8 2.725 2.720 2.676 2.828<br />

3.63 3.606 3.703 0.643 -2.020 4.4 4.238 4.343 3.673 1.290<br />

3.52 3.467 3.617 1.554 -2.758 4.66 4.508 4.603 3.250 1.214<br />

1.39 1.534 1.544 -10.400 -11.14 2 1.958 1.951 2.064 2.413<br />

3.93 4.145 4.011 -5.488 -2.071 4.53 5.077 4.593 -12.09 -1.4<br />

3.78 3.884 3.898 -2.756 -3.131 4.8 5.046 4.838 -5.142 -0.81<br />

1.48 1.547 1.556 -4.569 -5.188 2.06 1.981 2.002 3.825 2.802<br />

2.33 2.298 2.139 1.341 8.182 3.5 3.355 3.498 4.126 0.041<br />

Fig no.11 & 12 show the graphs plotted between the<br />

relative error for the output parameters, mass transfer coefficient<br />

and mass transfer rate, for ANN model 1 & ANN model 2<br />

respectively. It is seen that there are deviations of the percentage<br />

relative errors from the mean path of the ANN model 1 & 2. The<br />

range of relative errors for the output parameter, mass transfer<br />

coefficient for ANN model 1 & ANN model 2 is 0-10 & 0-6<br />

respectively. Similarly the range for the second output parameter,<br />

mass transfer rate for ANN model 1 & ANN model 2 is 0-12 &<br />

0-6 respectively. As the relative error for ANN model 2 is lower<br />

for both the output parameters than estimated by ANN model 1<br />

for the training as well as test data set, hence it can be conclude<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 185<br />

ISSN 2250-3153<br />

that the ANN model 2 is superior to the ANN model 1 baring one<br />

point.<br />

Figure no.11: Relative error of experimental output and predicted<br />

output values for the mass transfer coefficient.<br />

Figure no.12: Relative error of experimental output and predicted<br />

output values for the mass transfer rate.<br />

VI. CONCLUSION<br />

Artificial neural network models 1 & 2 are developed for<br />

modeling liquid-liquid extraction spray column, correlating mass<br />

transfer coefficient & mass transfer rate with flow-rate of extract<br />

phase , equilibrium concentration of acetic acid in aqueous phase<br />

& height of organic phase in column. The topology of the<br />

architecture was different for both the models. Based on results<br />

& discussions it can be concluded that both the models are<br />

successful in estimating the parameters but because of higher<br />

accuracy of estimation for both the training & test data sets ANN<br />

model 2 is more suitable. The work is demonstrative and the<br />

accuracy of estimation can be improved by altering the topology.<br />

ACKNOWLEDGMENT<br />

Authors are thankful to Director, LIT Nagpur for the<br />

facilities and the encouragement provided.<br />

REFERENCES<br />

[1] J.A. Anderson, ―An Introduction to Neural Networks (Prentice-Hall of<br />

India, Pvt. Ltd New Delhi),‖ 1999.<br />

[2] D.E. Rumelhart, McClleland ―Back Propagation Training Algorithm<br />

Processing,‖ M.I.T Press, Cambridge Massachusetts, 1986.<br />

[3] J.Y. Fan, M. Nikolau & R.E. White, ―An approach to Fault diagnosis of<br />

chemical processes in Neural networks,‖ AIChE, 1993, pp. 82-88.<br />

[4] J.C. Hoskins, K.M. Kaliyur & D.M. Himmelblau, ―Fault diagnosis in<br />

complex chemical plants using artificial neural network,‖ AIChEJ, 1991,<br />

pp. 137-141.<br />

[5] K. Watanabe., M. I. Matsuura Abe, M. Kubota, D. M. Himmelblau<br />

―Incipient fault diagnosis of chemical processes via artificial neural<br />

networks,‖ AIChEJ, 1989, pp. 1803-1812.<br />

[6] S. Belsito, S. Banerjee, ―Leak detection in liquefied gas pipelines by<br />

Artificial neural networks,‖ AIChEJ, 1998, pp. 2675-2688.<br />

[7] S. L. Pandharipande, Y.P. Badhe, ―ANN for leak detection in pipelines.‖<br />

Chem Eng World, 2003, pp. 70-72.<br />

[8] P. Zamankhan, P. Malinen, H. Lepomaki, ―Application of neural networks<br />

to mass transfer predictions in a fast fluidized bed of fine solids,‖ AIChEJ,<br />

1997, pp. 1684-1690.<br />

[9] R. Baratti, G. Vacca, A. Servida, ―Neural networks modeling of distillation<br />

columns,‖ Hydrocarbon Processing, 1995, pp. 35-38.<br />

[10] S. L. Pandharipande, R.S. Agarwal, B. B. Gogte, Y. P. Badhe, ―Detergent<br />

formulation by artificial neural network,‖ Chem Eng World, 2003, pp. 78-<br />

80.<br />

[11] S.L. Pandharipande, Y.P. Badhe, ―Unsteady state heat conduction in semi<br />

infinite solids artificial neural networks,‖ Chem Eng World, 2003, pp. 82-<br />

84.<br />

[12] S.L. Pandharipande, Y.P. Badhe, ―Prediction of mass transfer coefficient in<br />

downflow jet loop reactor using artificial neural network,‖ Indian Chemical<br />

Engineer, 2003, pp. 256-258.<br />

[13] S. L. Pandharipande, S. A. Mandavgane, ― Modeling of packed column<br />

using artificial neural networks,‖ Indian J Chem Tech, 2004, pp. 820-824.<br />

[14] S. L. Pandharipande, A. Bhaise, A. Poharkar, ―Steam tables: Using<br />

Artificial Neural Networks,‖ Chem Eng world, 2004, pp. 50-54.<br />

[15] S.L. Pandharipande, Y.P. Badhe, ―Artificial neural networks for Gurney-<br />

Lurie and Heisler Charts,‖ J Inst Eng, 2004, pp. 65-70.<br />

[16] S.L. Pandharipande, Y.P. Badhe,. elite-ANN©. 2004; ROC No SW-1471<br />

India.<br />

[17] Javad Saien & Shabnam Daliri, ―Modelling mass transfer coefficient for<br />

liquid-liquid extraction with the interface adsorption of hydroxyl ions,‖<br />

Korean Journal of chemical engineering, 2009,pp. 963-968<br />

[18] A. Chouai, M. Cabassud, M.V. Le Lann, C. Gourdon and G. Casamatta,<br />

―Multivariable Control of a Pulsed Liquid-Liquid Extraction Column by<br />

Neural Networks,‖ Neural computing & applications, 2009, pp. 181-189<br />

[19] O. Weinstein, R. Semiat, D.R. Lewin, ―Modeling, simulation and control of<br />

liquid-liquid extraction columns,‖ Chemical Engineering Science, 1998, pp.<br />

325–339<br />

[20] M. Menwer, Attarakiha, C. Hans-Jörg Bart, Tilmann Steinmetza, Markus<br />

Dietzena and Naim M. Faqirb, ―LLECMOD: A bivariate population balance<br />

simulation tool for liquid-liquid extraction columns,‖ The Open Chemical<br />

Engineering Journal, 2008, pp. 10-34<br />

[21] Normah Maan, Jamalludin Talib & Khairil Annuar Arshad, ―Use of neural<br />

network for modeling of liquid-liquid extraction process in The RDC<br />

Column,‖ Matematika, 2003, pp. 15–27<br />

AUTHORS<br />

First Author – S.L. Pandharipande, M. Tech, Associate<br />

Professor, Department of Chemical Engineering, Laxminarayan<br />

Institute of Technology, Rashtrasant Tukadoji Maharaj Nagpur<br />

University, Nagpur, India.<br />

E-mail id: slpandharipande@gmail.com<br />

Second Author – Aashish Nagdive, M.Tech, Department of<br />

Chemical Engineering, Laxminarayan Institute of Technology,<br />

Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 186<br />

ISSN 2250-3153<br />

Third Author – Yogesh Moharkar, M.Tech, Department of<br />

Chemical Engineering, Laxminarayan Institute of Technology,<br />

Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India.<br />

E-mail id: ymoharkar@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 187<br />

ISSN 2250-3153<br />

Testing Market Efficiency of Indian Stock Market<br />

Abstract- As long as financial markets are concerned, people<br />

tried to forecast the future movement of it. The purpose of<br />

forecast is to expect great fortunes. In reality it is an important<br />

question that ―is it possible to forecast market with the historical<br />

data?‖ If it is possible than excess returns can be made by<br />

picking up lottery stock. This situation is called ―Inefficient<br />

Market‖. On the other hand if market is efficient, it is west of<br />

time to predict stock market. The main intention of this paper is<br />

to study the efficiency level in Indian Stock market and the<br />

random walk nature of the stock market by using RUN test for<br />

the period from 1st January 2001 to 31st December 2010. In this<br />

paper, 6 major indices [BSE 30, BSE 100,200,500, BSE SMALL<br />

CAP and BSE MIDCAP] are studied.<br />

Keywords- Market efficiency, Random walk, Run test, ACF.<br />

―M<br />

I. INTRODUCTION<br />

y interest is in the future because I am going to spend<br />

the rest of my life there‖ - Charles F. Kettering<br />

(American engineer, inventor of the electric starter, 1876-1958).<br />

This quote explains the investors‘ attitude when they try to<br />

estimate future. The same efforts put by academicians to explore<br />

whether there is certain dependence in successive price changes<br />

that could profitably be exploited by various kinds of trading<br />

techniques.<br />

The Random Walk Hypothesis is concerned with the question<br />

of whether one can predict future prices from past prices. It<br />

assumed that successive price change is independent from the<br />

historical closings. There is no meaning to study past trend or<br />

patterns of prices to predict future movement. In its simple form,<br />

it states that price changes cannot be predicted from earlier<br />

changes in any meaningful manner (Weak form of hypothesis) 1 .<br />

The main purpose of this paper is to test the weak-from of<br />

efficiency of the Indian stock market by using daily data from the<br />

1 st January 2001 to 31 st December 2010. There are 2 major stock<br />

exchanges in India, Bombay Stock Exchange (BSE) and National<br />

Stock Exchange (NSE). There are various indices are available<br />

but for the study purpose only 6 indices of BSE is considered.<br />

Literature Review:<br />

In support of pattern finding, Lo, Mamaysky and Wang<br />

(2000) conclude that human judgment is superior to most<br />

computational algorithms. But recent advanced statistical model<br />

had successful applications in fingerprint identification,<br />

handwriting analysis, and face recognition which can be useful to<br />

identify pattern or trend in technical analysis 2 .<br />

In paper titled ―Quasi-Maximum Likelihood Estimation and<br />

Inference in Dynamic Models with Time Varying Covariance‖<br />

Mr. Divyang J Joshi<br />

Late. Smt. S. G. Patel Institute of Management, Dharmaj, India<br />

Brock, Lakonishok and LeBaron (1992) tested 26 simple<br />

technical trading rules on daily data of the Dow-Jones Industrial<br />

Average for the period 1897-1986. They conclude that buy<br />

signals generates higher returns during buy days compare to sell<br />

signals during sell signals 3 .<br />

The first researcher who linked the random walk process to<br />

economic processes was French mathematician Louis Bachelier<br />

in his Ph.D. dissertation titled "The Theory of Speculation" who<br />

noticed that changes of prices of French government papers are<br />

unpredictable what forced him to conclude that "The<br />

mathematical expectation of the speculator is zero" 4 .<br />

In against of Random walk theory, Alexander (1961) applies<br />

several filters to the DJIA in the period 1897 − 1929 and the S&P<br />

Industrials in the period 1929 − 1959. He developed a filter<br />

strategy. According to it buy the stock when price increases by x<br />

percent from a recent low and sell when price declines by x<br />

percent from a recent high. He concludes in support of technical<br />

analysis. He concludes that in speculative markets if price of a<br />

stock initiate one trend then it is going to persist for long time 5 .<br />

In the paper titled "A Comparative Analysis of Stock Price<br />

Behaviour on the Bombay, London and New York Stock<br />

Exchanges" Sharma and Kennedy (1977) compared the behavior<br />

of stock indices of the Bombay, London and New York Stock<br />

Exchanges for the period of 1963-73. He used run test and<br />

spectral analysis. He concludes that all 3 stock exchanges follow<br />

the random walk movement 6 ".<br />

MadhuriMalhotra, M. Thenmozhi, G Arun Kumar (2007), in<br />

their paper titled ―Stock Market Reaction and Liquidity Changes<br />

around Bonus Issue Announcement: Evidence from India‖ by<br />

(2007), examines share price reaction to the announcement of<br />

bonus issue for a sample of Indian companies. Standard event<br />

study methodology has been used for the purpose of studying the<br />

Bonus issue announcement reaction. Bonus issue announcement<br />

yields negative abnormal returns around the announcement date.<br />

There is a negative reaction after the bonus issue announcement<br />

conveying that the market under reacts after the announcement. It<br />

is also observed that there is no information leakage prior to the<br />

announcement 19 .<br />

II. OBJECTIVES OF THE STUDY<br />

The purpose of this study is to test the random walk theory in<br />

Bombay Stock Exchange (6 Indices). The 10 years daily closing<br />

data for 4 indices and 8 years data for Small-Cap and Midcap<br />

index is used to know whether past stock price movements<br />

follow a trend or not, so they can or cannot be used to predict<br />

their future movement. The results of the study are aimed to<br />

validate or not to validate the perceptions that stock prices in<br />

BSE do follow the random walk theory.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 188<br />

ISSN 2250-3153<br />

Hypothesis:<br />

1. Ho: BSE 30 Follows Random pattern.<br />

2. Ho: BSE 100 follows Random pattern.<br />

3. Ho: BSE 200 follows Random pattern.<br />

4. Ho: BSE 500 follows Random pattern.<br />

5. Ho: BSE Mid-Cap follows Random pattern.<br />

6. Ho: BSE Small-Cap follows Random pattern.<br />

III. METHODOLOGY<br />

For testing random walk of BSE indices, daily closing values<br />

used for the period of 1 st January 2001 to 31 st December 2010.<br />

The reason for selecting this period is that during this 10 years<br />

market seem too volatile. It touched the life time high in 2008<br />

and low in 2010. The total 2498 number of observations for BSE<br />

30, BSE 100, BSE 200 and BSE 500 each and 1938 for BSE<br />

Small-cap and Mid-cap each. The data are collected from BSE<br />

website only.<br />

Research methodology:<br />

After having 1 lag difference (t1 – t0), total runs are calculated<br />

with the help of Excel. The MINITAB software is used for<br />

applying run test.<br />

To check the Randomness among the data Run test is used.<br />

Run test is a non-parametric test. ―A Run test may be defined as<br />

a sequence of price changes of the same sign preceded and<br />

followed by price changes of different sign A ." It depends only on<br />

the sign of the price changes but not on the magnitude of the<br />

price. It does not require the specification of the probability<br />

distribution. It depends only on the sign of the price. They are<br />

essentially concerned with the direction of changes in the time<br />

series 1 .<br />

In a given time series of stock prices there are three possible<br />

types of price changes, namely positive, negative and no change.<br />

This gives three types of runs. A positive (negative) run is a<br />

sequence of positive (negative) price changes preceded and<br />

succeeded by either negative (positive) or zero price change.<br />

Similarly, a zero run is sequence of zero price changes preceded<br />

and succeeded by either negative or positive price change B . The<br />

assumption of Run test is that the successive price changes are<br />

independent and the sample proportion of positive, negative and<br />

zero price changes are unbiased estimates of the population<br />

proportions<br />

IV. RESULT AND DISCUSSION:-<br />

Table: 1 BSE Indices Run test output for 2001 to 2010<br />

Indices<br />

Run<br />

above &<br />

Below K<br />

Observed<br />

No. of<br />

Run<br />

Expected<br />

No. of Run<br />

Observation<br />

above K<br />

Observation<br />

below K<br />

P Value<br />

BSE 30 0.547676 1149 1237.65 1367 1129 0.000<br />

BSE 100 0.559696 1117 1231.21 1397 1099 0.000<br />

BSE 200 0.570513 1107 1224.18 1424 1072 0.000<br />

BSE 500 0.568510 1101 1225.57 1419 1077 0.000<br />

BSE MIDCAP<br />

(2003-10)<br />

BSE Small-Cap<br />

(2003-10)<br />

0.601240 773 929.314 1164 772 0.000<br />

0.598657 737 931.313 1159 777 0.000<br />

From the Table 1 it can observed that, the resulting p-value of all indices (0.0000) are smaller than the alpha level of 0.05, there is<br />

sufficient evidence to conclude that the data are not in random order and market is inefficient. It means with the help of past prices and<br />

trend we can predict the market. The above test was run on total observed runs of 10 years. And it can be interpret that market is not<br />

random.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 189<br />

ISSN 2250-3153<br />

But, if the run test applied on year wise data of BSE 30 and BSE 100, the result is different than the above.<br />

Table 2:- BSE 30 Run test output for 2001 to 2010<br />

BSE 30<br />

Run above<br />

& Below K<br />

Observed<br />

No. of Run<br />

Expected No.<br />

of Run<br />

Observation<br />

above K<br />

Observation<br />

below K<br />

P Value<br />

2001 0.506073 105 124.482 125 122 0.013<br />

2002 0.517928 112 126.339 130 121 0.069*<br />

2003 0.588933 105 123.498 149 104 0.016<br />

2004 0.562992 125 125.984 143 111 0.900*<br />

2005 0.573705 107 123.773 144 107 0.030<br />

2006 0.6 113 121 150 100 0.291*<br />

2007 0.574297 117 122.751 143 106 0.455*<br />

2008 0.451220 114 122.829 111 135 0.255*<br />

2009 0.555556 125 121 135 108 0.603*<br />

2010 0.543651 131 126.040 137 115 0.528*<br />

In table 2, it can observed that in the year 2001, 2003 and 2005 the P value is smaller than 0.05. It means market is non random. But<br />

in the year 2002, 2004, 2006, 2007, 2008, 2009 and 2010 the P value is greater than alpha value. It means in all 7 years, market follow<br />

the random pattern.<br />

Table 3:- BSE 100 Run test output for 2001 to 2010<br />

BSE<br />

100<br />

Run above<br />

& Below K<br />

Observed<br />

No. of Run<br />

Expected No.<br />

of Run<br />

Observation<br />

above K<br />

Observation<br />

below K<br />

P<br />

Value<br />

2001 0.477733 105 124.255 118 129 0.014<br />

2002 0.521912 112 126.259 131 120 0.071*<br />

2003 0.616601 99 120.621 156 97 0.004<br />

2004 0.574803 127 125.157 146 108 0.813*<br />

2005 0.581673 101 123.151 146 105 0.004<br />

2006 0.612 109 119.728 153 97 0.152*<br />

2007 0.606426 113 119.859 151 98 0.361*<br />

2008 0.459350 110 123.187 113 133 0.090*<br />

2009 0.588477 117 118.695 143 100 0.822*<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 190<br />

ISSN 2250-3153<br />

2010 0.555556 129 125.444 140 112 0.649*<br />

In table 3, it follows the same pattern of BSE 30. In the year 2001, 2003 and 2005 the P value is smaller than 0.05. It means market is<br />

non random. But in the year 2002, 2004, 2006, 2007, 2008, 2009 and 2010 the P value is greater than alpha value. It means in all 7<br />

years, market follow the random pattern.<br />

V. SCOPE OF THE STUDY<br />

The study is limited to 10 years and 6 indices only. The<br />

broader study is possible by increasing number of years and<br />

indices.<br />

The study is also limited to BSE, It can be expand by<br />

including NSE or other Nation‘s indices to prove randomness of<br />

the capital market.<br />

Here autoregression, ARIMA, GARCH tests are not applied.<br />

The detailed study is possible by knowing stationarity of the<br />

data.<br />

VI. CONCLUSION<br />

The results show the evidence of the inefficient form of the<br />

Indian Stock Market in long run but efficient form in short term.<br />

So, the findings support the Random-walk hypothesis in short<br />

duration but in long term doesn‘t. All indices of BSE do not<br />

support the weak form of market efficiency. The information<br />

regarding yesterday's and today‘s indices can be used to predict<br />

tomorrow‘s indices. The stocks in the index don‘t absorb the<br />

price information effectively. It means investors can identify<br />

available undervalued securities in the market make excess<br />

returns by correctly picking them.<br />

REFERENCES<br />

[1] Anand Pandeyy. [ October 2003] ―Efficiency of Indian Market‖. The paper<br />

was part of project for the Time Series Course by Dr. Susan Thomas.<br />

[2] Lo, A.W., Mamaysky, H., Wang, J. (2000), ―Foundations of technical<br />

analysis: computational algorithms, statistical inference and empirical<br />

implementation‖. Journal of Finance 55, 1705-1722.<br />

[3] Bollerslev, T., Wooldridge, J.M. (1992). ‖Quasi-Maximum Likelihood<br />

Estimation and Inference in Dynamic Models with Time Varying<br />

Covariances‖. Econometric Reviews 11,143-172.<br />

[4] Courtault, J.M., Kabanov, Y., Bru, B., Crepel, P., Lebon, I., Marchand, A.L.<br />

(2000). Louis Bachelier on the Centenary of Theorie De La speculation.<br />

Mathematical Finance, 10, 341- 353.<br />

[5] Alexander, S.S. (1961), Price Movements in Speculative Markets: Trends or<br />

Random Walks, Industrial Management Review 2, 7-26.<br />

[6] Sharma J. L. and Robert E. Kennedy [1977] "A Comparative Analysis of<br />

Stock Price Behaviour on the Bombay, London and New York Stock<br />

Exchanges", Journal of Financial and Quantitative Analysis Sep 1977.<br />

[7] D.B. Johnson and T. Mizoguchi (1978). "Selecting the Kth Element in X +<br />

Y and X1 + X2 + ... + Xm," SIAM Journal of Computing 7, pp.147-153.<br />

[8] Malkiel, B. (1995). Returns from Investing in Equity Mutual Funds 1971 to<br />

1991. Journal of Finance, 549-572.<br />

[9] McQueen, G., Pinegar M., & Thorley S. (1996). Delayed Reaction to Good<br />

News and the Cross-Autocorrelation of Portfolio Returns. Journal of<br />

Finance, 889-920.<br />

[10] Moore, A. (1964). Some Characteristics of Changes in Common Stock<br />

Prices Ed.: The Random Character of Stock Market Prices, Cambridge:<br />

Mass.<br />

[11] Guneratne, P.S.M., & Fernando, K.G.K., (2007) Market Response to Bonus<br />

Issues with Special Reference to Impact of Bonus Issue Ratio and Ex-day<br />

Price Adjustments; Evidence from Colombo Stock Exchange(2007)<br />

International Research Conference on Knowledge for Growth and<br />

Development Faculty of Management &Finance, University of Colombo,<br />

Sri Lanka.<br />

[12] Hirst, D.E., K.E. Jackson, and L. Koonce. 2003. ―Improving Financial<br />

Reports by Revealing the Prior Accuracy of Estimates‖, Contemporary<br />

Accounting Research, 20(spring): 1–31.<br />

[13] HumeraShahid, Xia Xinping, FaiqMahmood, Muhammad Usman (2010),<br />

Announcement Effects of Seasoned Equity Offerings in China, International<br />

Journal of Economics and Finance Vol. 2, No. 3; August 2010, Pages 163 –<br />

169<br />

[14] International Accounting Standards Board, IFRS 2: Share-Based Payment,<br />

IASB, London, 2004.<br />

[15] John Handly.C (1995) ―The pricing of Underwriting Risk in Relation to<br />

Australian Rights Issues‖ Australian Journal of Management, Vol.20, No.1,<br />

pp.43-58.<br />

[16] Kakati, M (2001), "price performance of Bonus issue", Finance India, Vol.<br />

XV, Nov-Dec, PP 1183-1190.<br />

[17] KaurKaramjeet and Singh Balwinder, Bonus Share Announcements and<br />

Market Efficiency: A Study of BSE Listed Companies, Advances in<br />

Management, 2010, vol. 3, issue 11.<br />

[18] Long, John B., Jr. 1978. "The Market Valuation of Cash Dividends: A Case<br />

to Consider." Journal of Financial Economics 6, no. 2/3: pp 235-264.<br />

[19] Malhotra, Madhuri; Thenmozhi, M.; Arun Kumar: Effect of bonus issue<br />

announcement on stock returns using market model, Journal of International<br />

Finance and Economics January 1, 2007.<br />

BOOKS<br />

[1] Richard I. Levin and David S. Rubin ―Statistics for Management‖, 7th<br />

edition. PP. 813, 839,840.<br />

[2] Donald R. Cooper and Pamela S. Schindler ―Business Research Methods‖,<br />

9th edition. PP. 660 to 665.<br />

AUTHORS<br />

Mr. Divyang J Joshi, Assistant Professor, Late. Smt. S. G. Patel<br />

Institute of Management, Dharmaj, India Email:<br />

divyang316ncm@yahoo.co.in, Phone: 094273 86078<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 191<br />

ISSN 2250-3153<br />

<strong>Online</strong> Shopping and the Transaction Protection in E-<br />

Commerce: A case Of <strong>Online</strong> Purchasing in Libya.<br />

Abdulghader.A.Ahmed, Hadya.S.Hawedi<br />

School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), Malaysia<br />

Center of System Science, Faculty of Computer and Mathematical Science, Universiti Teknologi MARA (UiTM) Malaysia<br />

E-mail: alyake2004@yahoo.com, hadia20008@yahoo.com<br />

Abstract- E-commerce is a successful business-based<br />

innovation via internet. This form of business transaction<br />

strategy offers many opportunities for growth in business and<br />

marketing services in various aspects. <strong>Online</strong> shopping is an<br />

intermediary mode between marketers or sellers to the end user<br />

or the consumers. Nature of online transaction in Libya is<br />

constrained by instability resulting from insecurity, unprotected<br />

transaction as well as trust. <strong>Online</strong> shopping could become<br />

predominant source of shopping method, if the barriers<br />

associated with insecurity, trust and customer‘s protection are<br />

tackled. Owing to the significance of e-commerce towards<br />

Libyan economic growth, this paper highlights the limitations<br />

associated with e-commerce transaction in Libya and proposes<br />

relevant steps towards overcoming these constrains. Relevance of<br />

integrating e-commerce in Libyan economic system is discussed<br />

with.<br />

Index Terms- E-commerce, online shopping, security,<br />

protection, trust<br />

E<br />

I. INTRODUCTION<br />

-commerce encompasses buying and selling of products and<br />

services through electronic systems<br />

Such as internet and other computer related networks. Recently,<br />

rapid global growth in e-commerce has increasingly become<br />

necessary component of business strategy for efficient<br />

transaction. E-commerce technology in business could<br />

revolutionize relationships within organizations and individual<br />

transaction settings [1].<br />

The Internet has improved traditional brick and mortar stores<br />

through the development of e-commerce web sites. Nowadays,<br />

many e-commerce especially online shopping had widened the<br />

access to their products through new methods of marketing via<br />

electronically mediated e-commerce. Good understanding of the<br />

requirements, expectations and the operational concept of<br />

internet shopping could an advantage to effective online retailing<br />

and as well help the manufacturers in developing more effective<br />

and targeted online retailer operations. E-stores can be operated<br />

by either a pure or a traditional retailer [4]. However, there is<br />

concern over online shopping especially when customer‘s<br />

personal information and financial transactions is required to<br />

facilitate transaction through internet medium. A lack of trust is<br />

likely to discourage online consumers‘ intentions from<br />

purchasing via online stores. However, with the existence ecommerce,<br />

Harridge-March [2] reported that e-commerce serves<br />

as cost-reducing strategy for customers through distribution<br />

network of goods and services from the provider to the<br />

consumer.<br />

Unlike conventional shopping which involves face-to-face<br />

transaction; online shopping uses internet, network and webbased<br />

technologies in creating interactive medium between<br />

sellers and consumers. In addition, the existence of online<br />

shopping yield benefits such as easy to business transaction<br />

network; saves times and reduces search costs compared to<br />

conventional shopping process. Because of these benefits,<br />

businesses and companies are widening their access to business<br />

transaction through fascinating method of delivery via<br />

electronically mediated shopping. With the recent growth of<br />

online shopping, it has become an attractive option for expanding<br />

the business opportunity available for sellers. By incorporating<br />

online shopping, into business transaction in companies can<br />

eliminate the need to construct new building to support services<br />

in other to accommodate the increase of consumers. E-commerce<br />

is potential tool for successful business innovation [3] with<br />

promising advantages over current Libyan online transaction<br />

which are noted to have been jeopardized by insecurity.<br />

However, this paper highlights the potential limitations<br />

associated with E-commerce transaction in Libya and proposes<br />

relevant steps to overcoming them. Relevance of integrating ecommerce<br />

into Libyan trade system is discussed with respect to<br />

their positive impact.<br />

II. THE CHALLENGES OF SECURITY, PROTECTION<br />

AND TRUST<br />

The problems associated with online shopping are more<br />

to consumer‘s protection in transaction that requires privacy and<br />

trust between different geographical locations or countries [5].<br />

There is increasing concern over online shopping because of<br />

insecurity, lack of customer‘s protection and trust which are vital<br />

elements for a successful online transaction between countries,<br />

organization as well as individual.<br />

Udo [6], report that the major problem faced by consumers in<br />

an online transaction is security. From survey report, it is obvious<br />

the most reports acknowledged that transaction base on ecommerce<br />

have been constrained by security. In addition,<br />

consumers are concern about their privacy especially when their<br />

personal information are required to facilitate transaction besides,<br />

potential risks are also posed to those using credit cards to make<br />

purchase online. Secured system is needed enhance online<br />

shopping since consumers cares for their privacy and security.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 192<br />

ISSN 2250-3153<br />

Furthermore, [6] online shopping paves way to fraudulent act and<br />

unworthy credit orders which is also attributed to unsecured<br />

services. Trust also plays an essential role on consumer‘s choice<br />

for online purchase. Roca et.al. [7] reported that trust in online<br />

businesses determines consumers‘ willingness to engage in<br />

online business.<br />

In another study [8], it was pointed out that security,<br />

protection policy and as well as reliabilities of companies are<br />

major barriers to online shopping. However, consumer‘s<br />

behavior towards online shopping includes and not limited to [9];<br />

concern over unauthorized sharing of personal information,<br />

unsolicited contacts from the online retailer, and undisclosed<br />

tracking of shopping behavior. Besides, system securityconsumers<br />

who are concern about illegal bridging technological<br />

protected devices to acquire consumer‘s personal, financial or<br />

transaction-related information. Concern over online retailer<br />

fraud cause by purposeful misrepresentation or non-delivery of<br />

goods paid for are among the potential threat over online<br />

purchase.<br />

Security such as the use of digital signature and certificates<br />

could be helpful in controlling risk of fraud for online-based<br />

transactions [7]. Improved security system for online shopping<br />

could reduce unworthy behavior of consumers‘ with increase<br />

intention for online transaction [10].<br />

Improved security in online shopping could tremendously<br />

encourage consumers to engage in e-commerce deal as well as its<br />

awareness and role among Libyan economic units. Consumers<br />

feel relaxed to use online medium when their capital and<br />

information are properly protected [11]. Disposing of the<br />

customer‘s personal detail and credit card information during and<br />

after online transaction should be avoided as it gives more room<br />

for illegal use of customer‘s information. Trust in online<br />

transaction could be enhanced through policies that incorporate<br />

legal, technical, rigorous standards for security, data protection<br />

and as well as certificates of independent trusted third parties<br />

[10]. In addition, online sellers should encourage trustworthy<br />

relationship in order to increase and attract consumers to online<br />

transaction by ensuring that every transaction is kept within the<br />

scope of agreement [12]. Owing to the need to facilitate ecommerce<br />

transaction in Libya we hereby proposed that efficient<br />

measures for effective implementation of e-commerce<br />

transaction in Libya economic developments should integrate<br />

web-based infrastructures so as to;<br />

a. Reduce high costs associated with internet access, such as<br />

pronounced in service connection charges, tariff on subscription<br />

and hosting charges for websites with sufficient bandwidth.<br />

b. Credit cards issuance should be regulated to monitor and<br />

control fraud through predetermined security code and features.<br />

c. Transportation infrastructure through which goods and<br />

services are delivered should be enhanced through adapting good<br />

maintenance and change of outdated facilities.<br />

d. Transaction should be carried out only through secured<br />

network besides; parties embarking on online transaction should<br />

be acquainted on security-related issues to ensure reliability.<br />

III. THE ISSUES OF SECURITY, PROECTION AND<br />

TRUST RAISED IN LIBYA ONLINE SHOPPING<br />

Last decade witnessed rapid accumulation of numerous studies<br />

on technology-oriented e-commerce weakness. As innovative<br />

approach of e-commerce spreads across various sectors, online<br />

marketers could benefit from the opportunities attached to online<br />

shopping by using taking into consideration the measure capable<br />

of reducing crime-prone shopping.<br />

E-commerce transaction in Libya is rapidly improving as<br />

industries and individual business unit faces increasing<br />

competition. Most companies in Libyan prefer online shopping<br />

however; creating globally-base competitive marketing will<br />

encourage the production of high value-added goods and<br />

services. However, Hunaiti et al. [13] recognizes that ecommerce<br />

in Libya are confronted with many challenges such as<br />

banking system services, postal system suitability, internet safety<br />

as well as customer‘s attitude towards the growth of e-commerce.<br />

With reference to blog at Face book website pertaining to online<br />

shopping in Libya, [14] many bloggers pointed out their thought<br />

and views on online shopping in Libya. Here are the listed<br />

bloggers‘ perceptions and most of them have pointed out that the<br />

issues that may rise if online shopping is introduced in Libya.<br />

The challenges of online shopping in Libya are;<br />

Anonymous Blogger 1:<br />

―There will be two main problems…the address and trust in the<br />

buyer and ways of payment.‖<br />

Anonymous Blogger 2:<br />

―…Libya is still fresh new to this kind of business‖<br />

Anonymous Blogger 3:<br />

―I personally think that Libya need to start having post codes and<br />

proper addresses because when you order something how are<br />

you going to receive it? You can't always rely on express<br />

couriers because they're expensive...”<br />

Anonymous Blogger 4:<br />

―I know online shopping in Libya isn't goanna be done and<br />

processed the same way its done in the U.S. etc. I guess the idea<br />

that I have is what Ahmed mentioned which is for people to go<br />

online. See something they like then they come to the warehouse<br />

and purchase it there. Not with a credit card. but just cash.”<br />

Anonymous Blogger 5:<br />

―Three things: Reliability (trust), payment methods, reachable<br />

addresses. E-commerce is a huge project and is an activity that<br />

needs to be coordinated by different entities including banks,<br />

suppliers, couriers and also and more importantly a willing<br />

buyer...”<br />

Based on these 5 different opinions from 5 different bloggers;<br />

frankly speaking from my opinion although e-commerce is not<br />

something new in this 21st century, however, e-commerce in<br />

Libya is at its early stage. Libyan consumers are ignorant about<br />

online shopping due to doubtful factors towards online shopping<br />

such as security, trust, privacy and when dealing with online<br />

sellers and consumers in and outside Libyan. Trust as an<br />

important factor affecting consumer behavior determines the<br />

success of online shopping in Libyan. In the other hand, lack of<br />

confidence and trust in online shopping are part of the<br />

determinant factor to mass acceptance of e-commerce as an<br />

efficient business transaction strategy in Libya. In addition,<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 193<br />

ISSN 2250-3153<br />

proper delivery address could raise concern among consumers<br />

embarking on online shopping in Libya.<br />

Libyan government and business organizations could lift the<br />

limitations by effectively planning and implementing quality ecommerce<br />

shopping strategy for consumers with accepted<br />

required. E-commerce remains a potential strategy to boost<br />

business transaction in Libya however, trust, security and<br />

protection offered in online transaction in Libya should be<br />

looked into.<br />

IV. POTENTIAL RELEVANCE OF E-COMMERCE TO<br />

LIBYAN ECONOMY<br />

Internet provides wider access for effective business<br />

transaction beside its inexpensive and reliability, transaction can<br />

be carried out faster and efficiently [15]. Libyan‘s developing<br />

economy could be effectively enhanced through integrating ecommerce<br />

technology into business related sectors. As a vast<br />

network of people and information, [16] the internet enables ecommerce<br />

transaction in Libya by showcasing product and<br />

services for sell to potential customers as well providing business<br />

access and information to interested partners. Electronic data<br />

interchanged to transact business among business parties in<br />

online should be kept private.<br />

Since the intranet allows instantaneous flow of goods and<br />

services as well as internal information, vital information could<br />

be processed simultaneously and matched with data flow from<br />

external e-commerce transactions which could allow for efficient<br />

and effective integration of organizational processes. Proper<br />

implementation of e-commerce in Libya will facilitate small and<br />

medium-sized enterprises to reach the global market since its<br />

operation is base on open standard [17].<br />

E-commerce implementation in Libya will facilitate mass<br />

customization through ordering systems that allow customers to<br />

make choice and order products with respect to their personal<br />

and unique specifications. For instance, a car manufacturing<br />

company with an e-commerce strategy allows for online order of<br />

newly built cars within few days based on the customer‘s desired<br />

specifications. However, the effectiveness of e-commerce<br />

integration into company‘s manufacturing process and ordering<br />

is profitable [17]. In addition, the integration of e-commerce<br />

could lead to reduction in costs, strategic targeted marketing, and<br />

the facilitation of selling add-on products, services, and new<br />

systems when needed.<br />

V. CONCLUSION<br />

E-commerce is a revolutionary tool with the potential to<br />

transform Libyan present business transaction. Integration of its<br />

benefits to Libyan economy will facilitate business services<br />

around the globe. The actual information of the security,<br />

protection and trust among consumers in Libya need to be<br />

investigated owing to consumers‘ perspective on the online<br />

shopping.<br />

The effect of security, protection and trust towards consumers<br />

as well as attitudes plays a key role in e-commerce<br />

implementation however, if well implemented, instantaneous<br />

flow of goods and services internally and externally. Besides,<br />

vital information could also be simultaneously processed to<br />

matched with data flowing from external e-commerce<br />

transactions which could allows for efficient and effective<br />

integration into organizational processes.<br />

ACKNOWLEDGMENT<br />

We appreciate the financial support from The Higher<br />

Education, Seventh of October University, Bane waleed and Al<br />

Mirqab University Libya.<br />

REFERENCES<br />

[1] Lee G-C., Lin H-F., ―Customer Perceptions of E-service Quality in <strong>Online</strong><br />

Shopping,‖ International Journal of Retail & Distribution Management, vol.<br />

33, no. 2, pp. 161-176, 2005.<br />

[2] Harridge-March S., ―Electronic Marketing, the New Kid on the Block,‖<br />

Marketing Intelligence & Planning, vol. 22, no. 3, pp. 297-309, 2004.<br />

[3] Yen C-H., Lu H-P., ―Factors Influencing <strong>Online</strong> Auction Repurchase<br />

Intention,‖ Internet Research, vol. 18, no. 1, pp. 7-25, 2008.<br />

[4] Lim H., Dubinsky A.J., ―Consumers‘ Perceptions of E-shopping<br />

Characteristics: An Expectancy-Value Approach,‖ Journal of Services<br />

Marketing, vol. 8 no. 7, pp. 500-513, 2004.<br />

[5] Patton M.A., Josang A., ―Technologies for Trust in vol. 4, pp. 9-21, 2004.<br />

[6] Udo G.J., ―Privacy and Security Concerns As Major Barriers for Ecommerce:<br />

A Survey Study,‖ Information Management & Computer<br />

Security, vol. 9, no.4, pp.165-174, 2001.<br />

[7] Roca J.C., Garcia JJ., de la Vega JJ., ―The Importance of Perceived Trust,<br />

Security and Privacy in <strong>Online</strong> Trading Systems,‖ Information Management<br />

& Computer Security, vol. 17, no. 2, pp. 96-113, 2009.<br />

[8] Chen Y-H., Barnes S., ―Initial Trust and <strong>Online</strong> buyer behavior,‖ Industrial<br />

Management & Data Systems, vol. 107, no. 1, pp. 21-36, 2007.<br />

[9] Roman S., Cuestas P.J., ―The Perceptions of Consumers Regarding <strong>Online</strong><br />

Retailers‟ Ethics and Their Relationship with Consumers‘General Internet<br />

Expertise and Word of Mouth: A Preliminary Analysis,‖ Journal of<br />

Business Ethics, vol. 83, pp. 641–656, 2008.<br />

[10] Grabner-Kraeuter S., ―The Role of Consumers‟ Trust in <strong>Online</strong>-Shopping‖<br />

Journal of Business Ethics, vol. 39, pp. 43-50, 2002.<br />

[11] Salo J., Karjaluoto H., ―A Conceptual Model of Trust in the <strong>Online</strong><br />

Environment‖ <strong>Online</strong> Information Review, vol. 31, no.5, pp. 604-621, 2007.<br />

[12] Mukherjee A., Nath P., ―Role of Electronic Trust in <strong>Online</strong> Retailing‖<br />

European Journal of Marketing, vol. 41, no. 9/10, pp. 1173-1202, 2007.<br />

[13] Hunaiti Z., Masa‘deh R.M.T., ―Electronic Commerce Adoption Barriers in<br />

Small and Medium-Sized Enterprises (SMEs) in Developing Countries: The<br />

Case of Libya‖ Ibima Business Review, no. 2, pp. 37-43, 2009.<br />

[14] Facebook, ―<strong>Online</strong> Shopping-Libya,”<br />

http://www.facebook.com/topic.php?uid=10594232095&topic=5234, 2010.<br />

[15] Mann, Catherine with Sue E. Eckert a Sarah Cleeland Knight. 2000. Global<br />

Electronic Commerce: A Policy Primer. Washington DC: Institute for<br />

International Economics.<br />

[16] Rosen, Anita. 2000. The E-commerce Question and Answer Book: A<br />

Survival Guide for Business Managers. American Management<br />

Association.<br />

[17] Smith, Dayle. 2001. The E-business Book: A Step-by-Step Guide to Ecommerce<br />

BIOGRAPHY<br />

Abdulghader.A.Ahmed.Moftah:<br />

He completed his undergraduate<br />

degree in computer science at 7th<br />

October University Bane wiled,<br />

Libya in 2001. He is a master<br />

candidate in computer science at<br />

Faculty of Computer Science &<br />

Information Technology.<br />

University Kebangsaan Malaysia (UKM),<br />

Malaysia.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 194<br />

ISSN 2250-3153<br />

Hadya.S.Hawedi :<br />

He received the degree in Computer Science<br />

from Al Mirqab University Libya in 1998.<br />

In 2007 He received the master degree of<br />

Information Technology and Communications<br />

From the Academy of Graduate Studies,<br />

Tripoli/Libya.<br />

He is a Ph.D candidate in IT Management at of<br />

Computer and Mathematical Science ,Universiti<br />

Teknologi MARA (UiTM) Malaysia .<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 195<br />

ISSN 2250-3153<br />

Potential Risk Comparison of Formaldehyde and<br />

Acetaldehyde Exposures in Office and Gasoline Station<br />

Workers<br />

Tanasorn Tunsaringkarn*, Wattasit Siriwong *, Tassanee Prueksasit**<br />

Saowanee Sematong *, Kalaya Zapuang*, Anusorn Rungsiyothin*<br />

*College of Public Health Sciences, Chulalongkorn University, Bangkok 10330, Thailand.<br />

** Department of General Science, Faculty of Science, Chulalongkorn University, Bangkok, 10330 Thailand<br />

Abstract- Assessment of exposures of formaldehyde and<br />

acetaldehyde that related to urinary biomarkers among office and<br />

gasoline station workers was conducted. Our results revealed that<br />

the evaluation of ambient air formaldehyde and acetaldehyde in<br />

official were significantly higher than in gasoline stations; 28.72<br />

to 11.31 µg m -3 and 7.85 to 3.34 µg m -3 respectively<br />

(independence t-test, p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 196<br />

ISSN 2250-3153<br />

D. Urinary Analyses<br />

The urinary analyses of formaldehyde, acetaldehyde and<br />

formic acid were analyzed by GC/FID [13]. The determinations<br />

of urinary creatinine (Cr) were performed by spectrophotometry<br />

method [14]. All urinary analyses performed at a standard<br />

laboratory (Special Laboratory, Bangkok, Thailand). All<br />

measured values were corrected by urinary Cr concentrations for<br />

clinical chemistry analysis.<br />

E. Cancer and Non-cancer Risk Calculation<br />

The cancer risk was calculated by multiplying chronic Daily<br />

Intake (CDI) by inhalation cancer slope factor (CSFi) and Hazard<br />

quotient (HQ) for non-cancer calculated by dividing exposure<br />

concentration (EC) by inhalation reference concentration (RfC)<br />

as followed equations:<br />

Cancer risk = CDIxCSFi;<br />

Where; CDI = (CAxIRxETxEFxED)/(BWxAT)<br />

CDI (mg kg -1 day -1 ) = Chronic Daily Intake; CSFi (mg kg -1 day -<br />

1 ) -1 = Inhalation cancer slope factor; CA (mg m -3 ) = Contaminant<br />

concentration in air; IR (m 3 hr -1 ) = Inhalation rate (0.875 m 3 hr -1<br />

assumed for adult); BW (kg) = Body weight (60.0 kg, average<br />

body weight of workers); ET (hrs day -1 ) = Exposure time (8 hr<br />

day -1 for workers); EF (days year -1 ) = Exposure frequency (350 d<br />

yr -1 for gasoline workers and 269 d yr -1 for official workers); ED<br />

(years) = Exposure duration (30 years for workers); AT (days) =<br />

Averaging time (70 yrs x 365 days)<br />

Cancer risk 1.00x10 -6 means Carcinogenic effects of concern;<br />

Cancer risk 1.00x10 -6 means Acceptable level<br />

For non-cancer risk assessment<br />

HQ = EC/RfCx1000; where; EC = (CAxETxEFxED)/AT<br />

EC (µg m -3 ) = Exposure concentration ; RfC (mgm 3 ) = Inhalation<br />

reference concentration<br />

HQ 1 means Adverse non-carcinogenic effects of concern; HQ<br />

1 means Acceptable level<br />

F. Statistical analyses<br />

All statistical analyses were carried out with SPSS 17.0<br />

statistical software package. Normal distribution was assessed by<br />

Kolmogorov-Smirnov test. The mean values of comparative<br />

variables were computed by descriptive statistics. The<br />

correlations between ambient air and urinary biomarkers were<br />

computed by Spearman‘s rho correlation. A statistically<br />

significant difference was accepted at a p-value of


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 197<br />

ISSN 2250-3153<br />

They also suggested that indoor sources are more important<br />

contributors to the indoor levels than outdoor sources such as<br />

infiltration of oxygenated gasoline and vehicle exhaust.<br />

Moreover, formaldehyde levels can be higher in indoor air than<br />

in outdoor air. Important determinants of indoor air levels<br />

include the sources of the formaldehyde, the age of the source<br />

materials, temperature, humidity, and ventilation rates [27].<br />

The averages lifetime cancer risk of office workers exposed to<br />

indoor air formaldehyde and acetaldehyde could be simply<br />

translated as 2.5 cancerous cases per 100,000 and 1.3 cancerous<br />

cases per 100,000 for the gasoline station workers over lifetime<br />

70-year [28]. It was possible that other environmental exposures<br />

during the remaining part of the day may aggravate both the<br />

actual cancer and non-cancer risk. The risk estimates assumed<br />

that the workers spend their life time (70 years) exposed to<br />

various hazardous air pollutants in their working areas [29]. The<br />

risk values estimated only inhalation dose with absolute<br />

absorption into the body, which means that the cumulative risk<br />

estimates for cancer and non cancer health effects may be under<br />

estimated [30].<br />

However, the HI for non-cancer risk, of formaldehyde and<br />

acetaldehyde were bellowed the reference levels (HI < 1). Thus,<br />

all workers did not have adverse health effects from<br />

formaldehyde and acetaldehyde exposures.<br />

Averages urinary formaldehyde and acetaldehyde<br />

concentrations of office workers were higher than those found in<br />

the gasoline workers but the urinary acetaldehyde showed<br />

significant higher in office workers. In addition, urinary<br />

formaldehyde was not correlated to ambient air formaldehyde but<br />

urinary acetaldehyde was significantly correlated to ambient air<br />

acetaldehyde while urinary acetaldehyde was significantly<br />

correlated to ambient air formaldehyde and urinary<br />

formaldehyde. However, formaldehyde can undergo rapid<br />

chemical changes immediately after absorption and is much more<br />

rapidly dialyzed by the kidneys and excreted through the urinary<br />

bladder than by respiration [31] but it reacts rapidly with serum<br />

protein and few protein in urine [32]. There were significantly<br />

and strongly correlated between ambient air formaldehyde and<br />

acetaldehyde as well as urinary formaldehyde was correlated to<br />

urinary acetaldehyde. In addition, urinary acetaldehyde was<br />

correlated to urinary formaldehyde. Thus, urinary formaldehyde<br />

may be correlated to ambient air formaldehyde in higher<br />

exposure concentration. Similar finding was done by Taranenko<br />

and Efimova studied [33] urinary formaldehyde from the<br />

pediatric population in the town of Shelekhov, of the Irkutsk<br />

Region and found significant correlation to air concentration of<br />

living rooms. Mautempo et al. [34] investigated the potential of<br />

using the formic acid for the biological monitoring of aldehyde<br />

exposure and report that the formaldehyde is metabolized in the<br />

body to formic acid and may be excreted in the urine which<br />

formic acid, which have a potential use as a biomarker of<br />

formaldehyde exposure in work environments. However, the<br />

amount of formaldehyde exposure had to be considered since if<br />

the formaldehyde exposure was less than 500 µg m -3 it did not<br />

significantly affect upon formic acid shift [35]. Our data<br />

exhibited the same results that ambient air formaldehyde and<br />

acetaldehyde levels in both groups investigated were not<br />

correlated to urinary formic acid level. However, the urinary<br />

formic acid in female gasoline workers was significantly higher<br />

than male. These high formic excretion and acidosis might be<br />

signaled the potential of inducing nephrotoxicity [36-37] so,<br />

female gasoline worker may had higher potential of this effect.<br />

V. CONCLUSION<br />

We concluded that the office workers had higher risk of<br />

formaldehyde and acetaldehyde exposures than gasoline workers.<br />

The urinary aldehyde may be used as non-invasive biomarkers<br />

for human exposures by inhalation.<br />

Table 1: Characteristic and biological measurements in<br />

formaldehyde and acetaldehyde exposed workers<br />

Parameter Official<br />

Workers<br />

(N=33)<br />

Gasoline<br />

Workers<br />

(N=41)<br />

pvalue*<br />

MeanSE MeanSE<br />

Age (year) 35.81.5 32.31.8 NS<br />

Male N(%) 16(48.5) 23(56.1) -<br />

Female N(%) 17(51.5) 18(43.9) -<br />

Ambient air<br />

formaldehyde<br />

(µg m -3 )<br />

28.721.15 11.310.20


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 198<br />

ISSN 2250-3153<br />

Total Risk 2.51E-05 - 0.40<br />

Gasoline station Workers<br />

Formaldehyde 5.42E-04 1.14E-05 1.55 0.16<br />

Acetaldehyde 1.60E-04 1.60E-06 0.46 0.05<br />

Total Risk 1.30E-05 - 0.21<br />

Table 3: Spearman‘s rho correlations between parameters<br />

Parameter<br />

Am. F Am. A U. F U. A U. FA<br />

Am.F 1 0.907 0.097 0.424 -0.139<br />

(p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 199<br />

ISSN 2250-3153<br />

Environmental Assessment, Environment Protection Agency, Washington<br />

DC, 1997, 20460.<br />

[30] L. Mckenzie, R. Witter, J. Adgate, Human health risk assessment for<br />

Battlement Mesa health impact assessment, University of Colorado Denver,<br />

Colorado School of Public Health, Denver, Colorado, 2010. Available from<br />

URL:<br />

http://www.tcgasmap.org/media/Health%20Risk%20Assessment%20Garfie<br />

ld%20Ritter%209-10.pdf. [Cited on 2011 June 1].<br />

[31] P. Spanel, D. Smith, T.A. Holland, W.A. Singary, J.B. Elder, ―Analysis of<br />

formaldehyde in the headspace of urine from bladder and prostate cancer<br />

patients using selected ion flow tube mass spectrometry,‖ Rapid Commun.<br />

Mass Spectrom. 1999, 13, 1354–1359.<br />

[32] Z. Tong, J. Zhang, W. Luo, W. Wang, F. Li, H. Li, H. Luo, J. Lu, J. Zhou,<br />

Y. Wan, R. He, ―Urine formaldehyde level is inversely correlated to mini<br />

mental state examination scores in senile dementia,‖ Neurobiol. of Aging.<br />

2011, 32(1), 31-41.<br />

[33] N. A. Taranenko, N. V. Efimova,. ―Biomonitoring of formaldehyde in the<br />

urinary samples from the pediatric population in the Irkutsk Region,‖ Gig.<br />

Sanit. 2009, 4 ,73-75.<br />

[34] C. Mautempo, M. D. L. Bastos, F. Carvalho, F. Remião, H. Carmo, P.<br />

Guedes-De-Pinho, ―Determination of formic acid in urine of workers<br />

occupationally exposed to formaldehyde,‖ Toxicol. Lett. 2010,<br />

196(Supplement 1), 74.<br />

[35] L. M. Gottschling, H. J. Beaulieu, W. W. Melvin, ―Monitoring of formic<br />

acid in urine of humans exposed to low levels of formaldehyde,‖ Am. Ind.<br />

Hyg. Assoc. J. 1984, 45, 19–23.<br />

[36] T. Green, J. Dow, J. Foster, ―Increased formic acid excretion and the<br />

development of kidney toxicity in rats following chronic dosing with<br />

trichloroethanol, a major metabolite of trichloroethylene,‖ Toxicology.<br />

2003, 191(2-3), 109-119.<br />

[37] G. Triebig, K.H. Schaller, ―A simple and reliable enzymatic assay for the<br />

determination of formic acid in urine,‖ Clinica. Chimica. Acta. 1980, 108<br />

(3), 355-360.<br />

AUTHORS<br />

First Author – Tanasorn Tunsaringkarn (M.Sc, Biochemistry):<br />

Corresponding author, she worked as researcher, assistant dean<br />

and an executive board member at College of Public Health<br />

Sciences (CPHS), Chulalongkorn University. She is a member<br />

of the Asia Pacific Academic Consortium of Public Health<br />

(APACPH). Her research interests include environmental health<br />

and toxicology. Her research interests include environmental<br />

health and toxicology. She has more than 50 papers in scientific<br />

journals as well as presentations in seminar and conference<br />

proceedings. College of Public Health Sciences, Chulalongkorn<br />

University, Institute Building 2-3, Soi Chulalongkorn 62<br />

Phyathai Rd., Bangkok 10330, Thailand.<br />

E-mail: tkalayan@chula.ac.th<br />

Second Author – Wattasit Siriwong (Ph.D., Environmental<br />

Management): He is a faculty member, Assistant Dean, and an<br />

executive board member of the College of Public Health<br />

Sciences (CPHS), Chulalongkorn University. He is an active<br />

researcher in the field of environmental health and also a member<br />

of the editorial board of International Journal of Occupational<br />

and Environmental Health and Journal of Health Research.<br />

College of Public Health Sciences, Chulalongkorn University,<br />

Institute Building 2-3, Soi Chulalongkorn 62 Phyathai Rd.,<br />

Bangkok 10330, Thailand.<br />

E-mail: Wattasit.S@chula.ac.th<br />

Third Author - Tassanee Prueksasit (Ph.D., Urban Engineering;<br />

Environmental Engineering): She is a lecturer and her research<br />

interests are the air pollution of some organic compounds<br />

including VOCs (BTEX, carbonyl compounds) and polycyclic<br />

aromatic hydrocarbons (PAHs), and of particulate matters, and<br />

health risk assessment of the exposure to such air pollutants.<br />

Department of General Science, Faculty of Science,<br />

Chulalongkorn University, Phyathai Rd., Bangkok 10330,<br />

Thailand<br />

E-mail: Tassanee.C@chula.ac.th<br />

Fourth Author - Saowanee Sematong (M.Sc., Ecology): She<br />

worked as researcher for College of Public Health Science,<br />

Chulalongkorn University. Her research interests include<br />

breastfeeding, environmental impact assessment and toxicology.<br />

College of Public Health Sciences, Chulalongkorn University<br />

Institute Building 2-3, Soi Chulalongkorn 62 Phyathai Rd.,<br />

Bangkok 10330, Thailand<br />

E-mail: Saowanee.Se@chula.ac.th<br />

Fifth Author - Kalaya Zapuang (B.Ed): She is a research-staff at<br />

College of Public Health Sciences (CPHS), Chulalongkorn<br />

University. College of Public Health Sciences, Chulalongkorn<br />

University Institute Building 2-3, Soi Chulalongkorn 62 Phyathai<br />

Rd., Bangkok 10330 Thailand<br />

E-mail: Zkalaya@chula.ac.th<br />

Sixth Author - Anusorn Rungsiyothin (B.Ed): He is a researchstaff<br />

in laboratory of College of Public Health Sciences (CPHS),<br />

Chulalongkorn University. College of Public Health Sciences,<br />

Chulalongkorn University Institute Building2-3, Soi Chulalon<br />

gkorn 62 Phyathai Rd., Bangkok 10330 Thailand<br />

E-mail:ranusorn@chula.ac.th<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 200<br />

ISSN 2250-3153<br />

An Approach to Increase Customer Retention and<br />

Loyalty in B2C World<br />

Abstract- Customers are always been important for the<br />

business. With the high rate of competition in every market, it is<br />

critical to retain the customer/ loyal customers. The purpose of<br />

the paper is to highlight how short term actions with bit<br />

compromise with the profit will turn into long term customer<br />

loyalty and hence long term benefit. In this paper we will be<br />

focusing on understanding the customer retention and customer<br />

loyalty, their importance to the business. After analyzing the<br />

importance of benefits, we will understand the approach of how<br />

to increase customer retention and customer loyalty towards your<br />

business. Though there will be many strategies for each of them,<br />

we will also understand what considerations should be done<br />

while deciding the best strategy for the business as different<br />

business has different scope and also their limitations too.<br />

Index Terms- Business-To-Customers (B2C), Return On<br />

Investment (ROI), Gift Certificate (GC), Equated Monthly<br />

Installment (EMI)<br />

I. INTRODUCTION<br />

With the increase in the options the customer have today, be it in<br />

online or at store, it has become a cumbersome job to get the<br />

customers back to you. Today, the use of loyalty programs as a<br />

technique for companies to enlarge customer loyalty is extremely<br />

popular as it is believed that both consumers and companies can<br />

reap benefits from it. [4] For many products, there has been the<br />

tendency to shift from mass marketing of a homogenous product<br />

to anonymous buyers towards customization of product to meet<br />

the needs of known individuals whose needs have become<br />

observable through some form of dialogue based relationship.[5]<br />

Customers also appear to prefer certain styles of marketing from<br />

suppliers. When customers enter into a relationship with a firm,<br />

they are often eager to forego other options and to limit their<br />

choice. Some of the motivations to do so result from greater<br />

efficiency in decision making, reduction in information<br />

processing, achievement of greater cognitive consistency in<br />

decisions, and reduction of perceived risks associated with future<br />

decisions. Customer loyalty is being seen as important to the<br />

success of any retail organization, because it is known that<br />

drawing new customers is more expensive than keeping existing<br />

one. [6]<br />

In this paper, we will discuss the strategies to increase the<br />

customer retention/loyalty which helps the business to make<br />

profit. We will first understand the importance of how they are<br />

important to the business, what could be the benefit while have<br />

the same customers to their business and then how to get them<br />

repeatedly.<br />

Roopa Singh, Imran Akhtar Khan<br />

Department of Computer Engg & IT, Shri JJT University, Jhunjhunu, Rajasthan, India<br />

II. WHAT IS CUSTOMER RETENTION/ LOYALTY?<br />

Customer loyalty can be loosely defined as the predisposition<br />

of any given customer to purchase your goods or services over<br />

comparable ones available in the marketplace. [1] Many<br />

companies have customer retention programs, incentives to<br />

motivate customers to remain customers. Think of supermarkets<br />

that recognize your patronage by giving you a percentage<br />

discount on your next purchase. [7]<br />

Customer Retention is the activity that a selling organization<br />

undertakes in order to reduce customer defections. Successful<br />

customer retention starts with the first contact an organization<br />

has with a customer and continues throughout the entire lifetime<br />

of a relationship. A company‘s ability to attract and retain new<br />

customers, is not only related to its product or services, but<br />

strongly related to the way it services its existing customers and<br />

the reputation it creates within and across the marketplace. [8]<br />

III. WHY CUSTOMER RETENTION AND LOYALTY IS<br />

IMPORTANT?<br />

On average, online retailers lose 25% of their customers every<br />

year. It has been published that a small increase in customer<br />

retention can increase profits by more than 25%. The calculation<br />

to prove this is actually very simple. Suppose that 100,000<br />

customers buy from you every year and you expect 20% to never<br />

buy from you again. If it costs you say $100 to acquire a new<br />

customer, then replacing the lost customers is costing you $2<br />

million dollars. In this scenario, for every percentage point that<br />

you decrease, you save $100,000. [2]<br />

Customer “satisfaction” isn’t enough anymore. Less than<br />

half of your satisfied customers will come back. You need to<br />

cross the bridge from customer satisfaction over to customer<br />

loyalty.[10] Customer retention is perhaps the most important<br />

influencer of profit growth, and a key motivator for executives to<br />

buy from you. It's so important because it costs so much to<br />

influence customers to buy and so little to induce a repurchase.<br />

[13]<br />

Customer retention in turn earns the business a good reputation<br />

and goodwill in the open market. It also generates a healthy<br />

competition with the opponents. The record of retention of the<br />

customer is the best proof regarding the quality of the products<br />

and the services provided to them. It also paves the way for more<br />

research and development to happen in their products and<br />

services. The business also hears the voice of its existing and<br />

potential customers and adopts a methodology to offer the best<br />

customer satisfaction products and services in the open market. If<br />

a business is able to add new clientele and retain customers then<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 201<br />

ISSN 2250-3153<br />

it is a good sign for the overall business and those associated<br />

with it. [13]<br />

It has been said and written many times – it‘s important to keep<br />

loyal customers happy and make them at least feel pampered as<br />

they repeat purchase, spend more and refer to your business,<br />

products and services to their peers [14]<br />

Figure 1: Why Customer Loyalty is Important?<br />

IV. WHAT IS THE BENEFIT?<br />

Customer Retention and Loyalty programs have very deep<br />

impact on the business which leads to a huge profit over a period<br />

of time. Fifty per cent consumer brands are taking their loyalty<br />

programs more seriously, said Florian Wolfframm, Head of<br />

Marketing and Rewards, PAYBACK India, while presenting the<br />

opening inaugural session of India‘s largest Loyalty summit. [18]<br />

A. Benefits of Customer Retention<br />

The benefits are innumerous but some of them are discussed<br />

below<br />

i. Customer Acquisition cost is negligible: We all know that<br />

hiring new customers require time. We need to itch out a<br />

strategy then create an acquisition plan, implement it, and<br />

wait for the data to flow in, so that we can analyze what is<br />

working and what is not. Meanwhile, it is also our job to<br />

keep an eye on the number of customers that come as an<br />

effect of new strategy. This will give us a lot of free time to<br />

create value by doing what we know best, and from what<br />

customers come to us.<br />

The cost of getting new customer is 5-12 times greater than<br />

the cost of retaining the old customer<br />

ii. Business knows who the existing customers are: Not just<br />

acquisition takes time, but building a relationship also takes<br />

time. After we have successfully wooed new customers, we<br />

need to spend time and energy on building a relationship<br />

with the new customers. We need time to understand their<br />

desires, aspirations, expectations, spending pattern, and their<br />

price sensitivity. And while we do that, the profit from new<br />

customers remain on the lower side<br />

iii. Helps to serve better: You are not in the business to have<br />

fun in hiring and firing your customers. We are here to make<br />

some money and that too without much effort — well, there<br />

are may be some people who love hiring and firing game<br />

iv. More profit: it takes time, energy, man power, and money<br />

to acquire a new customer, and all this add on to the cost,<br />

which means diminished profit. It is only after the customers<br />

are with us for some time that we recover the cost incurred<br />

during the acquisition process. With existing customers, we<br />

already have recovered the cost, so they are already<br />

profitable. This cannot be said about the new customers, as<br />

they are yet to prove their worth. And at the onset, we even<br />

do not know if they will stay with us or not. So why take<br />

chances? With existing customers, we already have<br />

recovered the cost, so they are already profitable. This<br />

cannot be said about the new customers, as they are yet to<br />

prove their worth. And at the onset, we even do not know if<br />

they will stay with us or not. So why take chances?<br />

The ROI is up to 10 times higher for investments in<br />

customer retention than for acquisition of new customers<br />

B. Benefits of Customer Loyalty<br />

While expanding your business' customer base is a crucial<br />

undertaking which you must work towards with clearly<br />

defined goals, the importance of retaining existing customers<br />

mustn't be overlooked. Working toward promoting customer<br />

loyalty (or brand loyalty) is critical to your goal for many<br />

reasons. [1] Some of the benefits obtained are:<br />

i. Increasing loyalty and customer retention by just 5% can<br />

increase profits by 75% [17]<br />

Figure 2: Retention Profit<br />

ii. Most dissatisfied customers will eventually tell nine other<br />

people about their problem [17]<br />

iii. Only 4% of dissatisfied customers actually complain to the<br />

company [17]<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 202<br />

ISSN 2250-3153<br />

iv. Satisfied customers, on the other hand, tell 5-6 other<br />

people about their positive experience [17]<br />

v. Repeat business: Loyal customers will offer you more<br />

business as these are the customers who tend to have<br />

approach and buy from you more than the new customers.<br />

In a year, you will end up in selling more to loyal<br />

customers as compared to the new customers coming in.<br />

vi. More Quantity: As you have built good and reliable<br />

relationship with the customers, it will lead to the selling<br />

of more number of goods. This comes naturally as they<br />

rely on you and your products more than anybody else. In<br />

any case, higher volumes means, greater sales resulting<br />

into higher profits<br />

vii. Cross Selling Opportunities: Customers who are loyal<br />

have faith in the quality and varieties you sell for the<br />

products. This creates a great opportunity to fulfill more of<br />

your customers' needs than the traditional ones you<br />

currently meet. What does this mean? You can make sales<br />

to loyal customers across product lines and thus increase<br />

your overall sales volume without needing to focus so<br />

much on attracting new customers<br />

viii. Less Competition: The more loyal customers you have in<br />

your business, the safer you are with the competition<br />

world around. [1] It works as immunity toward the<br />

competitive forces around you.<br />

V. CUSTOMER RETENTION ANALYSIS<br />

Customer Retention analysis helps us to answer the below<br />

queries<br />

i. What is my loyalty/retention rate?<br />

ii. What brands and product types did our customers defect to<br />

most often?<br />

iii. Why did they choose a competitor brand instead of ours?<br />

iv. Of those that repurchased us, what motivated them to stick<br />

with our brand?<br />

v. And, if you choose to include competitor brand owners in<br />

the analysis, you can also determine how your retention rate<br />

stacks up to the competition and why some competitor<br />

owners switch to your brand<br />

Customer Retention is calculated from the Churn Rate. Churn<br />

rate, when applied to a customer base, refers to the proportion of<br />

contractual customers or subscribers who leave a supplier during<br />

a given time period. It is a possible indicator of customer<br />

dissatisfaction, cheaper and/or better offers from the competition,<br />

more successful sales and/or marketing by the competition, or<br />

reasons having to do with the customer life cycle. The churn rate<br />

can be minimized by creating barriers which discourage<br />

customers to change suppliers (contractual binding periods, use<br />

of proprietary technology, unique business models, etc.), or<br />

through retention activities such as loyalty programs. It is<br />

possible to overstate the churn rate, as when a consumer drops<br />

the service but then restarts it within the same year. Thus, a clear<br />

distinction needs to be made between 'gross churn', the total<br />

number of absolute disconnections, and 'net churn', the overall<br />

loss of subscribers or members. The difference between the two<br />

measures is the number of new subscribers or members that have<br />

joined during the same period. [21]<br />

Retention Rate = 1 – (Churn Rate)<br />

VI. STRATEGY FOR CUSTOMER RETENTION AND LOYALTY<br />

With the innumerous benefits we have discussed with the<br />

Customer Retention and loyalty, it is important to know what<br />

should be the strategy in order to achieve them. It is a very<br />

cumbersome and important to understand the impact and<br />

implement them in our business<br />

A. Strategy for Customer Retention<br />

Though business implements some strategy to get the benefit<br />

out of the repeated customers, we need to understand the various<br />

strategies which they implement. Let us discuss some of the<br />

important ones below<br />

i. Proper Email Communication/Marketing: Avoid sending<br />

the emails to the huge list of customers with a high<br />

frequency. When the customer gets many mails which are<br />

not of their interest, then this leads to disengagement of<br />

customers rather than retention. Try to differentiate the<br />

customers with proper demographics and purchase<br />

information, and send the right mails with personalized<br />

information to the right customers.<br />

ii. Understand the value of lifetime: You should know how<br />

much business and profit you are going to gain with a<br />

customer over the lifetime. Once the analysis for a customer<br />

is done, it is easy to understand the importance of the<br />

customer retention in the business. Share of wallet combined<br />

with lifetime value help us to understand which customer<br />

has more potential for growth which allows to focus on the<br />

customers that is critical to the business<br />

iii. Analyze and sell: Retailers perform the research to find the<br />

frequency of customer visit and purchase of good. They<br />

focus on converting the site into the sale. You should know<br />

which products sell well together and which ones is an<br />

obvious after sale. You should also know how long it takes<br />

the customers to purchase again so you can strike when the<br />

customer is thinking of another purchase. [2] So, what you<br />

need to do is- sell and then analyze.<br />

iv. Customer Feedback and Solicit Complaints Regularly:<br />

There are a lot issues faced by the customers when they<br />

make a purchase of goods/services. But they feel hurt when<br />

there is nobody to help or resolve their issues – customer<br />

care representative did not answer your query, queue is long<br />

and unmanageable, no helper to describe the product. It<br />

takes less time to hear the customer‘s problem and resolve.<br />

When you do so immediately, customer feel they are being<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 203<br />

ISSN 2250-3153<br />

heard and valued. This may lead to forget the bad feedback<br />

he had and make him happier.<br />

v. Give Surprises To Customers: Loyalty programs will keep<br />

on adding the points when they make any purchase. There<br />

are several retailers who gift their customer when a threshold<br />

spent amount is reached. Consider that you are booking your<br />

flights with yatra.com by being registered user. Once you<br />

have reached to a reward point of 500, you will get the free<br />

Reebok wrist watch free. This would be a surprise for the<br />

customers as they were unaware of this.<br />

B. Strategy for Customer Loyalty<br />

Understanding the strategies for the customer loyalty is very<br />

important to the business as this provides them a huge profit over<br />

a period of time. The more better strategy, the more loyal<br />

customers and hence more benefit from them. Below we will<br />

discuss the different strategies:<br />

i. PAYBACK: PAYBACK is India‘s first and one of Europe‘s<br />

largest multi-partner loyalty programs. PAYBACK has 30<br />

partners in the network, namely ICICI bank, HPCL, BIG<br />

Bazaar, Make my trip, Megamart, UniverCell, Hometown,<br />

Food bazaar, Ezone, Central, Brand factory, book my<br />

show.com, Letsbuy.com. The largest partner portfolio and<br />

widest range of redemption points in India assure that<br />

members can not only collect points for everyday shopping<br />

quickly from many outlets using just one card but also easily<br />

convert them into attractive rewards. Companies benefit<br />

from PAYBACK‘s state-of-the art direct marketing and<br />

couponing services. [18]<br />

ii. Discount over time/volume of goods: The seller offers a<br />

low price of goods or services in return of the buyer<br />

purchasing the good at an extended period of time. Say, if<br />

you buy laptop from Croma and pay some amount then you<br />

may get extended warranty on your laptop. Also, there are<br />

offers from the retailer/seller that they provide the buyers<br />

with some percentage of the amount paid if you buy the<br />

premium for a period of time. This attracts many buyers and<br />

also makes the customer dedicated to the buyer for over the<br />

period of time.<br />

iii. Bundle goods: The seller sells ancillary goods or services<br />

with the main item at no extra cost. Personal computer<br />

manufacturers such as HP or Sony bundle printers, monitors<br />

and even 24-hrs service at the price of computer. But the<br />

seller needs to make sure that they do not compromise with<br />

the overall benefit with the bundles they create and sell<br />

iv. EMI option: With the price hikes over a period of time, it<br />

has become difficult for the middle class buyers to afford<br />

expensive products/services. In this case, EMI option is a<br />

boon to the sellers and the buyers. Buyers are attracted to the<br />

retailers which provide this facility which provide a term<br />

relationship and confidence with the sellers.<br />

v. Prepurchase/Buy Forward: The seller offers a discounted<br />

price to a buyer who pays in advance for an amount of goods<br />

or services to be delivered at some future date or over a<br />

certain time period, with the discount rate being greater than<br />

the interest rate paid on money placed in a low-risk<br />

investment. The benefit of this technique to the seller is that<br />

it locks in the buyer‘s business over a certain period. The<br />

benefit to the buyer is that it eliminates any price increases<br />

during the contracted period.[19]<br />

vi. Membership/Loyalty Program: Loyalty programs or<br />

memberships are structured marketing efforts that reward,<br />

and therefore encourage, loyal buying behavior - behavior<br />

which is potentially beneficial to the firm. In marketing<br />

generally and in retailing more specifically, a loyalty card,<br />

rewards card, points card, advantage card, or club card is a<br />

plastic or paper card, visually similar to a credit card or debit<br />

card, that identifies the card holder as a member in a loyalty<br />

program [20] Consider that a retailer sponsors a membership<br />

card which will add on the points to the purchases you do.<br />

Also the members of the loyalty program will get the special<br />

benefit (20% additional off on the current sales value). This<br />

will help the customers coming back to the retailer/seller<br />

repeatedly<br />

vii. Frequent Buyer Program: With the increase in<br />

competition in the retail world, retailers offer the rebate/low<br />

or free cost/service to the customers if the number of<br />

purchases or the total purchase amount reaches the limit.<br />

This creates the tendency in the customers to make those<br />

counts of purchases or the total purchase value in order to<br />

get the offer. It increases the sale of product leading to<br />

customer loyalty over that period of time<br />

viii. Issue Gift Card/Certificates: Retailers have introduced the<br />

concept of Gift vouchers (with some amount and validity) of<br />

their company known as Gift Certificates/cards (GC). With<br />

the variety of choices and different tastes of everybody, it is<br />

difficult to gift our dear ones with the things that they would<br />

love. So GC demand has increased a lot. With the GCs, it<br />

binds the buyer to go to the retailer who has issued the GCs<br />

and spend the amount. With the available amount of GC,<br />

customer will end up in buying the goods more than the cost<br />

and hence increase in selling of goods. If one likes the<br />

concept and the availability of goods, then customers<br />

become regular one. Also, issue some amount of gift<br />

certificate to the customer when the transaction amount<br />

reaches the offer limit (say make a purchase of Rs.2500, get<br />

the gift certificate of Rs200)<br />

ix. Return Policy for Privileged/Loyal Customer: The<br />

retailer/seller offers the extended return policy to the<br />

member of their shop (i.e. Loyal Customers). Consider that<br />

if you are member, you can return the goods within 45 days<br />

rather than 15 days for the regular customers who are not<br />

member. This provides confidence to the customers as return<br />

is always a major concern of many.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 204<br />

ISSN 2250-3153<br />

VII. HOW TO CHOOSE BEST LOYALTY PROGRAM?<br />

As we have discussed innumerous Loyalty Programs, it is<br />

important to understand which will suit your business. In order to<br />

come to a conclusion, it is good to consider the below<br />

i. Choose a web-based (cloud) solution that does not require<br />

local software<br />

ii. Choose a program that separates your business from the<br />

crowd and allows customized rewards<br />

iii. Keep it simple and focus on your business operations, not<br />

your loyalty program<br />

iv. Make sure you have the ability to quantify the use of your<br />

loyalty program<br />

v. Choose a loyalty program that gives you the ability to easily<br />

change rewards at any time<br />

vi. Choose a loyalty program that can also be used for direct<br />

email, mail, or social media marketing<br />

vii. A loyalty program that allows your business to provide<br />

nonprofits a fundraising program using your merchandise,<br />

food, or services is a bonus [16]<br />

VIII. CONCLUSION<br />

With the understanding of the behavior of the customers and<br />

satisfying them provides the benefit to the business in the long<br />

term. Establishing good relationship with them by providing<br />

better services will create customer loyalty and hence more visits<br />

over time. This will bring more profit to the business in longterm<br />

and will reduce the competition.<br />

We have identified the strategies which attract the customers to<br />

the retailer and also understood the considerations to be done<br />

while implementing them. With this, it will help the business to<br />

gain customer retention and loyalty towards their business if they<br />

implement them diligently. And also, we have scope to<br />

understand when the business has to re-visit their strategies so<br />

that they do not lag behind in this competitive world.<br />

REFERENCES<br />

[1] http://ezinearticles.com/?Why-is-Customer-Loyalty-Important-to-Your-<br />

Business?&id=2170553<br />

[2] http://www.imarkinteractive.com/general/tips-tricks/5-things-onlineretailers-can-do-to-improve-customer-retention/<br />

[3] http://www.business-standard.com/india/news/customer-loyalty-importantto-increase-retail-sales-emphasises-payback/463630/<br />

[4] Wulf K. D. Schroder G. O. Cannier M. H. and Oppen C. V. (2003) ‗What<br />

Drives Consumer Participation to Loyalty Programs? A Conjoint<br />

Analytical Approach‟, Journal of Relationship Marketing Vol.2 (1/2)<br />

[5] Palmer A. Bejou D. (2005) ‗The Future of Relationship Marketing‟, Journal<br />

of Relationship Marketing Vol.4 No. ¾<br />

[6] Sullivan, Malcolm and Adcock, Dennis. Retail Marketing. 1. Edition.<br />

Padstow: Thomson, 2002<br />

[7] http://www.cbsnews.com/8301-505125_162-31544189/dont-confusecustomer-retention-with-customer-loyalty/<br />

[8] http://en.wikipedia.org/wiki/Customer_retention<br />

[9] http://www.customerloyalty.org/<br />

[10] http://www.returnonhappiness.com/<br />

[11] http://www.va4business.com/business/472/why-customer-retention-ismore-important-than-customer-acquisition/<br />

[12] http://helpthembuy.com/articles/customer_retention.php<br />

[13] http://www.softsolutionsindia.net/softsolutionsindia.net/blog/default.aspx?i<br />

d=80&t=Why-Customer-Retention-is-so-important-f<br />

[14] http://www.business2community.com/loyalty-marketing/customer-loyaltyand-why-its-important-infographic-0131553<br />

[15] http://www.viralblog.com/social-media/why-is-customer-loyalty-important/<br />

[16] http://customerloyaltyprograms101.blogspot.in/<br />

[17] http://www.cvent.com/en/resources/customer-retention.shtml<br />

[18] http://www.business-standard.com/india/news/customer-loyalty-importantto-increase-retail-sales-emphasises-payback/463630/<br />

[19] Gitomer, Jeffrey. Customer Satisfaction is Worthless, Customer Loyalty is<br />

Priceless: How to Make Them Love You, Keep You Coming Back, and Tell<br />

Everyone They Know. Austin, TX: Bard Press, 1998.<br />

[20] http://en.wikipedia.org/wiki/Loyalty_program<br />

[21] http://en.wikipedia.org/wiki/Churn_rate<br />

AUTHOR<br />

First Author: Roopa Singh, MCA, Research Scholar in Shri JJT<br />

University, Jhunjhunu, Rajasthan, India.<br />

Email: roopas1983@gmail.com<br />

Second Author: Imran Akhtar Khan, MCA, Research Scholar in<br />

Shri JJT University, Jhunjhunu, Rajasthan, India.<br />

Email: imran4bc@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 205<br />

ISSN 2250-3153<br />

DIEL Variations of Physico-Chemical Factors and<br />

Planktonpopulation in a Swamp Of Harda, Purnia, Bihar<br />

(India)<br />

R.SIDDHARTHA, RANJANA KUMARI, K.D.TANTI* AND B.N.PANDEY<br />

P. G. DEPTT. OF ZOOLOGY, PURNIA COLLEGE PURNIA (854301) INDIA<br />

*DEPARTMENT OF ZOOLOGY,<br />

M.L.ARYA COLLEGE, KASBA, PURNIA (854301) INDIA<br />

E mail- b.n.pandey@hotmail.com<br />

Abstract- Diel variations of physic- chemical factors and<br />

plankton population were investigated in the swamps of Purnia<br />

district, Bihar on a seasonal basis, Air and water temperature,<br />

pH, DO2 and bicarbonate alkalinity were found to increase<br />

during day time which decreased during night hours. The amount<br />

of free CO2 was also observed higher during the night period.<br />

Water temperature showed a positive correlation with air<br />

temperature, pH, DO2 bicarbonate alkalinity and a negative one<br />

with free CO2 in most cases. Phytoplankton also showed<br />

increased number during day time. Not a very clear-cut pattern of<br />

diel variation was observed and this fluctuation was mostly due<br />

to photosynthetic activity of producers, respiratory activity of<br />

biota and fluctuation in water temperature. A complex interaction<br />

of various environmental factors e g., seasons, climate, nutrients,<br />

pollution, light hours etc. also play an important role to decide<br />

the fate of diel variation of abiotic factors and biotic population.<br />

Index Terms- Diel variations, Swamps, Physico-chemical<br />

factors, plankton population, Purnia<br />

C<br />

I. INTRODUCTION<br />

onsiderable investigations have been made on the diel<br />

variation in physico-chemical of various freshwater<br />

ecosystems, i.e., lakes, ponds, streams, reservoirs and rivers<br />

(Ganpati, 1955; George, 1961, Michael, 1970; Verma, 1967;<br />

Nasar and Datta Munshi; 1975; Saha and Bose, 1986; Saha and<br />

Pandit, 1986 b; Choudhary, et al., (1991). Saha (1981) even<br />

worked out the diel cycle of abiotic factors of the thermal stream<br />

of Bhimbandh, Munger. No such work has so far been done on<br />

any swamps in Purnia district (Bihar)).The present work was<br />

undertaken to study the diurnal changes of some abiotic factors<br />

and their relations with plankton population.<br />

II. TERRAIN<br />

The study site is located at a distance of 7 km. from Purnia<br />

district headquarters in the southward direction by NH 31 near<br />

Harda, a local halt. It is situated on 25º41‘ North Latitude and<br />

87º28‘ East longitude and at an altitude of 35 m. above sea level.<br />

It is a wide water body spread on either side of Saura river<br />

III. MATERIALS AND METHODS<br />

For the study of diel variations, the spot was selected keeping<br />

in mind its accessible position at night. For the investigation of<br />

fluctuation in physico-chemical parameters and plankton<br />

population, water samples were collected at 4 hour internal for a<br />

period of 24 hours and most of the analyses were made on the<br />

spot. Investigations were made on different dates to observe the<br />

results in different seasons i.e., on 20th March (Spring), 15th<br />

June (Summer), 21st September (Monsoon) and 18th December<br />

(Winter) during 2006. pH Temperature was measured by<br />

mercury –filled Celsius thermometer while p recovered with the<br />

help of a portable pH meter. Other chemical parameters e.g.,<br />

dissolved oxygen (DO2), free CO2, bicarbonate (HCO3‾)<br />

alkalinity and chloride were analysed at the spot adopting the<br />

standard methods (APHA, 1989, Trivedy and Goel,1984). Each<br />

sample of plankton was collected by filtering of water from<br />

different places, through a plankton net (made of bolting silk no.<br />

21 having 77 meshes/cm2). The concentrated planktons were<br />

then preserved in 4% formalin for subsequent qualitative and<br />

quantitative determination (Lackey, 1938; Ward and Whipple,<br />

1959; Desikachary, 1959; Fritsch, 1959). Counts were expressed<br />

in organisms per litre. Correlation coefficient among the physicochemical<br />

parameters and biological parameters were statistically<br />

calculated and analysed whether they follow any diel seasonal<br />

variations or not.<br />

IV. RESULTS AND DISCUSSION<br />

The diel cycle of abiotic factors and plankton population in<br />

different seasons has been presented in Table-1. The atmospheric<br />

temperature varied between 10.5ºC and 37.4ºC, maximum in<br />

summer and minimum in winter. Generally air temperature was<br />

observed lower in the morning hour and higher in noon periods.<br />

Temperature of water varied between 15.2ºC and 31.0ºC and<br />

observed to follow the same diel fluctuation pattern in all<br />

seasons. Similar results were observed by Michael (1970) and<br />

Datta et al. (1983). A significant positive correlation between the<br />

water temperature and atmospheric temperature was observed<br />

(Table-2) in almost all seasons while during winter, it was found<br />

insignificant. The lowest range of atmospheric temperature<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 206<br />

ISSN 2250-3153<br />

probably could not invade and affect the temperature provided by<br />

the bottom.<br />

Water temperature showed a direct relationship with<br />

DO2 and inverse relationship with free CO2 in spring and<br />

monsoon seasons. The increase in temperature increases DO2 by<br />

enhancing photosynthesis rate of phytoplanktons and<br />

macrophytes during day time. On the other hand, free CO2 in<br />

water decreased during day time and increased during night<br />

hours, as CO2 was utilized in the light periods while the amount<br />

of free CO2 increased in dark period due to biotic respiration and<br />

ceasing of photosynthesis. The number of phytoplanktons was<br />

also observed higher during day hours in almost all seasons.<br />

Similar observations were found by Itazawa(1957), Srivastava<br />

and Desai(1980), Saha (1981), Bhattacharya et al., (1988),<br />

Pandey et al., (1989), and Choudhary et al.,(1991).<br />

Inverse result was found in summer season during<br />

which water temperature showed a negative correction with<br />

dissolved oxygen and positive correction with free CO2. The high<br />

water temperature during summer season accelerated the<br />

decomposition of submerged vegetation causing increased value<br />

of free CO2 and decreased amount of dissolved O2. Pandey et al,<br />

(1989) also observed the hypoxic and hypercarbion condition of<br />

water due to decomposition of accumulated organic matters in<br />

the bottom sediments of the ponds. During the monsoon season,<br />

the amount of DO2 in the day hours was not found well due to<br />

the clouded weather decreasing the photosynthesis activity of the<br />

aquatic flora.<br />

Almost a significant negative correlationship was<br />

observed between DO2 and free CO2. Such inverse relationship is<br />

typical of a pond which is photo synthetically controlled<br />

(Goldman and Horne, 1983). The diel variations of free CO2 was<br />

noted between 9.2 mgl‾ 1 (16 hr of winter) and 40.4 mgl‾ 1 (16 hr.<br />

of summer) while the value of HCO3‾ was recorded maximum<br />

(148 mgl‾ 1 ) during 16 hr of spring and minimum (96 mgl‾ 1 )<br />

during 16 hr of summer. A positive and mostly significant<br />

correlation between HCO3‾ and pH was observed during almost<br />

all seasons while a negative correlation existed between free CO2<br />

and pH. Automatically free CO2 and HCO3 - were inversely<br />

correlated. The pH value was observed below 7 in summer while<br />

it was found almost above 7 in other seasons particularly during<br />

day hours. The low value of pH was due to high amount of free<br />

CO2 in water resulted from the decomposition of submerged<br />

vegetation. The graded decrease in pH value was observed from<br />

day to night hour (clearly) observed in spring and winter seasons)<br />

Such nocturnal decrease in pH was probably due to high level of<br />

free CO2, accumulated as a result of community respiration and<br />

absence of photosynthesis at night. According to Zafar (1966) the<br />

pH of water is controlled by the relative quantity of bicarbonate<br />

and CO2. Higher value of HCO3‾ and lower value of free CO2<br />

cause the higher value of pH. The changes in pH during day and<br />

night may be due to the conversion of carbon dioxide into<br />

carbonate and vice versa (Srivastava and Desai, 1980). The<br />

buffer system of most natural water involves the reversible<br />

transformation of carbon dioxide to bicarbonate to carbonate.<br />

Carbon dioxide recorded was in half bound state (HCO3‾) and<br />

free- state (CO2). As free CO2 and CO3 (Carbonate) cannot<br />

coexist, since they would neutralize each other to form<br />

bicarbonate (HCO3‾). The surplus CO2 was channelized into<br />

alkalinity system and retained in the form of HCO3‾ (Verma,<br />

1981).<br />

Thus it may be concluded that some physico-chemical<br />

factors of the swamps water, under investigation, such as<br />

temperature, pH, DO2, free CO2, bicarbonate alkalinity exhibit<br />

diel pattern of fluctuation to some extent which are controlled by<br />

complex interaction of various environmental factors operating<br />

in the system e.g., light hour, photosynthetic activity, community<br />

respiration of biota, seasons, climate, and nutrients present in<br />

water. All these physico-chemical factors also control each other<br />

and all these factors in turn influence the diel pattern of plankton.<br />

Table1 -Diel variations of some physico-chemical parameters and plankton population in swamps of Purnia<br />

Spring<br />

Summer<br />

Some interval<br />

Parameters<br />

4.00 8.00 12.00 16.00 20.00 24.00<br />

Atm.temp.(ºC) 19.5 22.2 26.0 29.2 24.0 22.5<br />

Wat.temp.(ºC) 18.0 19.3 22.2 25.5 22.1 21.0<br />

pH 7.3 7.2 7.4 7.4 7.1 7.1<br />

DO2(mgl‾ 1 ) 7.0 7. 8.0 8.2 6.9 6.8<br />

Free CO2(mgl‾ 1 ) 18.4 20.4 15.2 16.6 22.4 20.4<br />

HCO3‾(mgl‾ 1 ) 135 125 140 148 130 130<br />

Cl‾(mgl‾ 1 ) 20 19 22 22 20 22<br />

Phytoplank.(no/l) 11076 10030 11275 12817 7192 8225<br />

Zooplank.(no/l) 483 1025 795 924 371 324<br />

Atm.temp.(ºC) 26 28.2 36.6 37.4 31.5 30.0<br />

Wat.temp.(ºC) 24.6 26.0 30.2 31.0 28.1 26.5<br />

pH 6.8 6.7 6.2 6.0 6.4 6.8<br />

DO2(mgl‾ 1 ) 5.8 6.0 5.6 5.8 6.0 5.8<br />

Free CO2(mgl‾ 1 ) 28.2 30.6 38.2 40.4 32.2 26.0<br />

HCO3‾(mgl‾ 1 ) 122 110 102 96 115 120<br />

Cl‾(mgl‾ 1 ) 18 20 24 26 20 18<br />

Phytoplank(no/l) 6694 10112 8126 9845 7112 8814<br />

Zooplank(no/l) 70 62 96 106 92 68<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 207<br />

ISSN 2250-3153<br />

Monsoon<br />

Winter<br />

Atm.temp.(ºC) 24.7 26.2 34.5 32.4 28.0 26.2<br />

Wat.temp.(ºC) 18.5 20.6 27.2 26.0 20.8 20.0<br />

pH 7.2 7.1 7.0 7.0 7.2 7.3<br />

DO2(mgl‾ 1 ) 5.4 6.0 5.8 6.0 5.6 5.8<br />

Free CO2(mgl‾ 1 ) 28.2 20.6 18.4 20.2 22.2 26.0<br />

HCO3‾(mgl‾ 1 ) 144 140 130 135 140 142<br />

Cl‾(mgl‾ 1 ) 22 24 26 28 20 20<br />

Phytoplank(no/l) 2815 3008 3440 3612 3140 3208<br />

Zooplank(no/l) 322 255 338 294 235 208<br />

Atm.temp.(ºC) 11.5 12.2 15.6 14.4 13.5 10.0<br />

Wat.temp.(ºC) 17.2 15.6 18.0 16.0 15.2 16.5<br />

pH 6.9 7.0 7.3 7.4 7.0 6.9<br />

DO2(mgl‾ 1 ) 6.0 6.5 7.8 8.0 6.8 6.7<br />

Free CO2(mgl‾ 1 ) 16.2 12.8 10.2 9.2 12.0 14.4<br />

HCO3‾(mgl‾ 1 ) 128 130 140 144 138 130<br />

Cl‾(mgl‾ 1 ) 16 18 20 20 18 17<br />

Phytoplank(no/l) 12018 16522 14872 15522 12216 10143<br />

Zooplank(no/l) 33 45 61 50 36 45<br />

Table2 - Coefficient of Correlation (r) computed among various physico-chemical factors during their diel cycle in different seasons,<br />

of the swamps of Purnia<br />

AT = Atmospheric temperature<br />

WT = Water temperature<br />

Relationship Spring Summer Monsoon Winter<br />

r Prob. R Prob r Prob. r Prob.<br />

Water temp.vs. pH 0.342 Ins. -0.96 P>0.001 -0.538 Ins. 0.025 Ins.<br />

DO2 0.759 P0.05 -0.822 P


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 208<br />

ISSN 2250-3153<br />

[16] Srivastava, N.P. and Desai, V.R. (1980) Seasonal and diurnal variation in<br />

physico-chemicals of water and plankton in lotic sector of Rihand reservoir<br />

(U.P.). J. Inland Fish Soc. India, 12(1): 100-111.<br />

[17] Saha, S.K. (1981) The diel cycle of abiotic factors in a thermal stream:<br />

Comp. Physiol. Ecol. 6(3): 193-196.<br />

[18] Trivedy, R. K. and Goel, P.K. (1984) Chemical and Biological Methods for<br />

Water Pollution Studies. Environmental Publications, Karad<br />

[19] Verma, N. (1967): Diurnal variation in a fish pond in Seomi, India.<br />

Hydrobiol., 30: 129-137.<br />

[20] Verma, P.K. (1981) The limnological survey of Badua reservoir, Bhagalpur<br />

(Bihar). Doctoral thesis, Bhagalpur Univ., Bhagalpur, India.<br />

[21] Welch, P.S. (1948) Limnological Methods. McGraw Hill Book Co. New<br />

York.<br />

[22] Ward, H.B. and Whipple, G.C(1959) Fresh water Biology. Edited by W.T.<br />

Edmondson. John. Wiley & Sons, Inc. New York. 1248pp.<br />

[23] Zafar, A.R. (1966) Limnology of the Hussainsagar Lake, Hyderabad, India.<br />

Phykos, 5(1&2): 115 – 126.<br />

AUTHORS<br />

Editorial Correspondence: Acta Biologica Hungarica<br />

P.O. Box 35<br />

H-8237 Tihany, Hungary<br />

Phone: (36 87) 448 244 ext. 103<br />

Fax: (36 87) 448 006<br />

E-mail: elekes@tres.blki.hu<br />

SINET Editorial Office<br />

Faculty of Science, Addis Ababa University<br />

Freshman Building Last Floor (Room No. 403)<br />

Tel +251-111-232668 Fax +251-111-552350 PO Box<br />

31226<br />

E-mail: sinet-aau@ethionet.et<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 209<br />

ISSN 2250-3153<br />

Effect of Various Concentration of Octacosane,<br />

Pentacosane and Tricosane on Foraging Behavior of<br />

Trichogrammatids<br />

Shipra Mathur, Asfiya Zayeem, Srikanth Kanameni, Monica Tibrewal, Nitish Wadhwa, Priti Arora and Archna<br />

Kumar<br />

Amity Institute of Biotechnology, Amity University Uttar Pradesh, Sector -125, Expressway, Noida, U. P., 201303, India.<br />

Abstract- Semiochemicals especially their alkane constituents<br />

play vital role in governing the foraging behavior of egg<br />

parasitoids. Thus in the present study various concentrations of<br />

the three straight chain alkanes were prepared to determine the<br />

specific concentration(s) optimizing the foraging behavior of<br />

Trichogramma brasiliensis Ashmead and Trichogramma chilonis<br />

Ishii. Laboratory bioassays were carried out to assess the impact<br />

of various concentrations of octacosane, pentacosane and<br />

tricosane on the parasitic efficiency of targeted<br />

trichogrammatids. T. chilonis was found to exhibit enhanced<br />

parasitism for concentrations ranging from 7 000mg/L to 15<br />

000mg/L with maximum at 11 000mg/L for Pentacosane<br />

(17.23±0.56) whereas T. brasiliensis exhibited favorable<br />

response towards almost all the concentrations of tricosane and<br />

pentacosane showing more efficiency at 11 000mg/l<br />

(19.44±2.00) and 14 000mg/l(18.89±0.70) respectively. These<br />

studies indicate that alkanes can act as semiochemical source and<br />

can be exploited to enhance foraging efficiency of egg<br />

parasitoids in integrated pest management programs.<br />

Index Terms- Alkanes, Integrated Pest Management,<br />

Semiochemicals, Trichogramma.<br />

I<br />

I. INTRODUCTION<br />

n nature, tritrophic interactions of host plant, host insects and<br />

their natural enemies are mediated by a complex array of<br />

stimuli, of which the role of semiochemicals is commendable<br />

(Loughrin et al., 1994, Paul et al., 2008). The central role played<br />

by semiochemicals emanating from plants and host insects,<br />

during different phases of the natural enemies‘ searching<br />

behavior is well established (Hilker et al., 2002; Borges et al.,<br />

2003; Lou et al., 2005; Manrique et al., 2005; Yong et al., 2007;<br />

Tabone et al., 2010). Stimulus in form of infochemicals guide<br />

parasitoids to their host leading eventually to oviposition in or on<br />

the host (Moraes et al., 2005; Fatouros et al., 2008). Parasitoids<br />

exhibit varied foraging behavior in response to sensitization by<br />

semiochemical stimulus. The ability of infochemicals to enhance<br />

the orientation efficiency of parasitoids, culminating in control of<br />

the pest infestation forms the basis of IPM strategies (Powell,<br />

1991; Dicke and Vet, 1999; Romeis et al., 2005). Due to heavy<br />

reliance of natural enemies on infochemicals for optimal<br />

performance as biological control agents in IPM strategies<br />

identification of the chemical nature of these cues is vital.<br />

Various studies have reported these cues to be mainly<br />

hydrocarbons in nature (Yadav et al., 2002; Paul et al., 2008).<br />

Several follow-up studies have found saturated, straight chain<br />

hydrocarbons like tricosane, pentacosane, hexacosane,<br />

pentadecane, hexatriacontane, docosane, to act as biologically<br />

active cues and enhance the foraging efficiency of<br />

Trichogrammatids. Polyphagous nature of Trichogrammatids<br />

against many lepidopterous pests of economically high valued<br />

crops like rice, cotton tomato, and cole crops makes them one of<br />

the most promising biological control agents during field releases<br />

(Stinner, 1977; Bobendreier et al., 2003; Fatouros et al., 2008).<br />

Hence in present study various concentrations of straight chain<br />

saturated hydrocarbons viz., octacosane, pentacosane and<br />

tricosane were prepared to determine specific concentration(s)<br />

optimizing the foraging behavior of two Trichogrammatids viz.,<br />

Trichogramma brasiliensis Ashmead and Trichogramma chilonis<br />

Ishii.<br />

II. MATERIALS AND METHODS<br />

Insect rearing protocols<br />

The host, rice meal moth Corcyra cephalonica Stainton<br />

(Lepidoptera: Pyralidae), and isofemale lines of<br />

Trichogrammatids, T. brasiliensis and T. chilonis were obtained<br />

from a stock culture maintained at the Biological Control<br />

Laboratory, Amity Institute of Biotechnology, Amity University,<br />

Sec-125, Noida, U.P. Culture of C. cephalonica was established<br />

in rearing cages as described by Sreekumar and Paul (2000).<br />

Eggs of C. cephalonica were collected, cleaned and sterilized<br />

using UV; glued on paper egg cards in a single layer using<br />

Arabic gum and placed in glass vials (diameter = 2.5 cm, length<br />

= 10 cm). The 0-24-h-old C. cephalonica eggs were offered to T.<br />

brasiliensis for oviposition and the vials kept at 26±2 °C and<br />

65±5% RH for emergence (Bharti et al., 1994, Archna et al.,<br />

2009).<br />

Preparation of saturated hydrocarbon concentrations<br />

Three straight chain saturated hydrocarbons viz., tricosane,<br />

pentacosane, and octacosane- obtained from sigma-Aldrich were<br />

used for the preparation of test samples. Five different<br />

concentrations viz., 7 000 mg/L; 11 000 mg/L; 14 000 mg/L; 15<br />

000 mg/L and 25 000 mg/L, were prepared for each targeted<br />

hydrocarbon by adding appropriate quantity of distilled HPLC<br />

grade hexane. All concentrations of targeted hydrocarbons were<br />

tested for their activity with T. brasiliensis and T. chilonis.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 210<br />

ISSN 2250-3153<br />

Bioassay Protocol<br />

Petridish bioassays were carried out by placing egg cards (30<br />

eggs per card) sprayed with the respective hydrocarbon<br />

concentrations (@50 µl /egg card) in 150 x 15 mm petri dishes.<br />

In each petri dish, 10, 0-24h old Trichogrammatid females were<br />

released in the center. The petri dishes were replicated six times<br />

for each treatment. The parasitoids were observed at five minutes<br />

interval for 45 minutes and the total number of parasitoids that<br />

visited the egg card referred as ‗parasitoid activity index<br />

(PAI)‘was counted. Thereafter, the parasitoids were removed<br />

carefully from each egg card. The cards were kept individually in<br />

homeopathic vials (1 dram size) and number of blackened eggs<br />

was counted to estimate the parasitism (Singh et al., 1998).<br />

Laboratory conditions for the experiment were 26 ± 2°C, 65 ±<br />

5% RH and light intensity 160 LUX (Padamavathi and Paul,<br />

1998, Kumar et al., <strong>2012</strong>).<br />

Statistical analysis<br />

The data was tabulated and percent parasitism was calculated<br />

using the following formula:<br />

Percent parasitism = (Number of blackened eggs per card /<br />

Total number of eggs per card) X100.<br />

Data obtained for percent parasitism and PAI was analyzed<br />

by 2 way ANOVA, using applied indostat software version 8.5<br />

developed by Windostat Hyderabad, India. The difference<br />

between the means of various treatments was compared by LSD<br />

test at 5% significance level. Comparison of PAI and parasitism<br />

for different concentrations of crude hydrocarbon extracts with<br />

pure hexane (control) were carried out using paired T test.<br />

III. RESULT<br />

Effect on foraging efficiency of T. chilonis<br />

Highest parasitoid activity index was registered for<br />

15000mg/L concentration of tricosane for egg parasitoid T.<br />

chilonis, which was significantly different from control at 5%<br />

level of significance (14.00±1.16) (P=0.0001; t=10.6279).<br />

Parasitoid activity index was found to be significantly high for<br />

25000mg/L concentration of octacosane (3.50± 0.22) (P=0.0422;<br />

t=2.71) and 11000 mg/L and 14000 mg/L concentrations of<br />

Pentacosane (7.50± 0.22, 6.17± 0.83) (P=0.0001; t=12.47 and<br />

P=0.0422; t=2.71) respectively (Table 1).<br />

For egg parasitoid T. chilonis, 11000 mg/L concentration of<br />

pentacosane (17.23± 0.56) (P=0.0009; t=7.06) was found to<br />

register the highest mean percent parasitism. 7000mg/L and<br />

11000mg/L concentrations of octacosane (12.78± 1.03; 9.45±<br />

0.56) (P=0.0009; t=7.06 and P=0.002; t=5.97) respectively<br />

recorded significantly higher parasitism as compared to control at<br />

5% level of significance. Parasitization was recorded to be<br />

significantly high for 11000mg/L, 14000mg/L and 15000 mg/L<br />

concentrations of Pentacosane. 15000mg/L concentration of<br />

Tricosane registered significantly higher parasitism as compared<br />

to control (15.00± 3.19) (P=0.008; t=4.23) (Table 2).<br />

Effect on foraging efficiency of T. brasiliensis<br />

Highest parasitoid activity index was registered for<br />

25000mg/L concentration of tricosane (10.00±0.68) (P=0.01;<br />

t=4.10).. For pentacosane, 14000mg/L concentration reported<br />

significant level of response (8.00±0.37) (P=0.0001; t=19.03)<br />

whereas for octacosane 25000mg/L concentration shows<br />

significant level of parasitoid activity (4.17±0.17) (P=0.0001;<br />

t=13.00) (Table 3).<br />

11000mg/L concentration of tricosane elicited the highest<br />

mean percent parasitism (19.44+2.00) (P=0.0006, t=7.68) for T.<br />

brasiliensis, followed by 14000mg/L concentration of<br />

pentacosane (18.89+0.70) (P=0.0002, t=10.27) which were<br />

significantly different from control at 5% level of significance.<br />

All concentrations of pentacosane, except 15000 mg/L, were<br />

found to register a significantly high percent parasitism.<br />

Parasitism was recorded to be significant for all concentrations of<br />

Tricosane (Table 4).<br />

IV. DISCUSSION<br />

Foraging behavior of egg parasitoids is guided by a wide<br />

array of semiochemicals (Hilker and Meiners, 2006). Hendry et<br />

al., (1976) analyzed five host plants of Heliothis zea Boddie to<br />

determine the presence of hydrocarbons acting as synomones for<br />

Trichogramma evanescens Westwood. They identified series of<br />

hydrocarbons present in host plants ranging from C21 to C25 in<br />

varying quantities. Dutton et al. (2000) Yonggen et al. (2006)<br />

and Rani et al. (2008) revealed that variation in the quantity and<br />

concentration of saturated hydrocarbons influenced the<br />

parasitization efficiency of Trichogrammatids. Yadav et al.<br />

(2001) also reported the presence of pentacosane in potato<br />

(Solanum tuberosum) and soybean (Glycine max) and classified<br />

pentacosane as favourable saturated hydrocarbon for T. exiguum.<br />

Similarly in hexane extracts of ten different varieties of tomato<br />

(Lycopersicon esculentum Mill) obtained in the vegetative and<br />

flowering phase of growth, the synomonal response of the<br />

prominent egg parasitoid .T. chilonis was observed (Paul et al.,<br />

2008) which seemed to be associated mainly with tricosane (C23),<br />

heneicosane (C21), pentacosane (C25) and hexacosane (C26)<br />

during the vegetative period and heneicosane (C21), hexacosane<br />

(C26) during the flowering period. In present study, saturated<br />

hydrocarbons, tricosane, pentacosane and octacosane were found<br />

to elicit significant parasitism for T. chilonis. Among the eleven<br />

saturated hydrocarbons tested by Padmavathi and Paul (1998),<br />

tricosane, octacosane and docosane have been reported to<br />

enhance the activity and parasitic efficiency of T. chilonis. In<br />

another study, Trichogramma exiguum Pinto and Platner was<br />

found to respond positively to pentacosane, hexacosane,<br />

pentadecane, hexatriacontane, tricosane and docosane (Paul et<br />

al., 2002). This is in accordance with the current findings where<br />

tricosane and pentacosane were found to register a significant<br />

parasitization for T. brasiliensis whereas no significant<br />

parasitism was reported for octacosane. T. chilonis was found to<br />

exhibit enhanced parasitization at concentrations ranging from<br />

7000mg/L to 15000mg/L whereas T. brasiliensis exhibited<br />

favorable response towards almost all the concentrations of<br />

tricosane and pentacosane. Less response towards high<br />

concentrations of octacosane could be due to bulkiness of<br />

octacosane that led to deposition of flakes of this hydrocarbon on<br />

egg cards hindering the parasitization of eggs by the parasitoids.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 211<br />

ISSN 2250-3153<br />

V. CONCLUSION<br />

Present study results indicate that bulkiness and hence mass of<br />

hydrocarbons can influence their semiochemical activity and<br />

lesser the concentration of heavier hydrocarbons, more is their<br />

semiochemical activity. Utilization of optimal concentrations of<br />

favorable hydrocarbons can be exploited to enhance the foraging<br />

efficiency of Trichogrammatids in integrated pest management<br />

programs.<br />

ACKNOWLEDGMENT<br />

We are extremely grateful to Department of Science and<br />

Technology for granting financial support for this study. The<br />

authors are also thankful to the Director General, AIB, Amity<br />

University for providing the required facilities.<br />

REFERENCES<br />

[1] Archna, Singh A. K., Paul A.V.N. & Jain Anju, 2009. ―Synomonal effect of<br />

nine varieties and one culture of rice on Trichogramma japonicum Ashmead<br />

and Trichogramma chilonis (Ishii) (Hymenoptera: Trichogrammatidae)‖.<br />

Acta Entomol. Sin. 52(6): 656-664.<br />

[2] Babendreier, D., S. Kuske and F. Bigler, 2003. ―Parasitism of non-target<br />

butterflies by Trichogramma brassicae Bezdenko (Hymenoptera:<br />

Trichogrammatidae) under field cage and field conditions‖. Biological<br />

Control, 26: 139–145.<br />

[3] Bharti, D., A.V.N. Paul and S. Singh, 1994. ―UV radiation for prolonged<br />

storage of the eggs of Corcyra cephalonica Stainton (Galleriidae:<br />

Lepidoptera) for mass rearing of Trichogramma brasiliensis Ashmead<br />

(Trichogrammatidae: Hymenoptera)‖, Indian J. Entomol. 56: 352 – 355.<br />

[4] Borges, M., S. Colazza, P. Ramirez-Lucas, K.R. Chauhan, M.C.B. Moraes<br />

and J.R. Aldrich, 2003. ―Kairomonal effect of walking traces from<br />

Euschistus heros (Heteroptera: Pentatomidae) on two strains of Telenomus<br />

podisi (Hymenoptera: Scelionidae)‖. Physiol. Entomol. 28: 349 – 355.<br />

[5] Dicke, M., and L.E.M. Vet, 1999. ―Plant-carnivore interactions:<br />

evolutionary and ecological consequences for plant, herbivore and<br />

carnivore‖. In: Olff H, Brown VK, Drent RH, editors. Herbivores: between<br />

plants and predators. Oxford: Blackwell Science, 483–520.<br />

[6] Dutton, A., L. Mattiacci and S. Dorn, 2000. ―Learning used as a strategy for<br />

host stage location in an endophytic host-parasitoid system‖, Entomol. Exp.<br />

Appl. 94:123 – 132.<br />

[7] Fatouros, N.E., M. Dicke, R. Mumm, T. Meiners, and M. Hilker, 2008.<br />

―Foraging behavior of egg parasitoids exploiting chemical information‖.<br />

Behavioural Ecologie, 19: 677–689.<br />

[8] Hendry, L. B., J.K. Wichmann, D.M. Hindenlang, K.M. Weaver and S.H.<br />

Korzeniowski, 1976. ―Plants- the origin of kairomones utilized by<br />

parasitoids of phytophagous insects‖. J. Chem. Ecol. 2:271–283.<br />

[9] Hilker, M. and T. Meiners, 2006. ―Early herbivore alert: Insect eggs induce<br />

plant defense‖. J. Chem. Ecol., 32:1379–1397.<br />

[10] Hilker, M., C. Kobs, M.Varama and K. Schrank, 2002. ―Insect egg<br />

deposition induces Pinus sylvestris to attract egg parasitoids‖. J Exp Biol;<br />

205: 455-461<br />

[11] Kumar, A., A. Zayeem And S. Kanameni, <strong>2012</strong>. ―Synomonal effect of cole<br />

crops on individual and associative learning behavior of Cotesia plutellae‖.<br />

International Journal of Biology, Pharmacy and Allied Sciences 3: 285-298.<br />

[12] Lou Y.G., Ma B, and J.A.Cheng, 2005. ―Attraction of the parasitoid<br />

Anagrus nilaparvatae to rice volatiles induced by the rice brown<br />

planthopper Nilaparvata lugens‖, J Chem Ecol; 31: 2357-2372<br />

[13] Loughrin, J.H., A. Manukian, R.R. Heath, T.C.J. Turlings and J.H.<br />

Tumlinson, 1994. ―Diurna1 cycle of emission of induced volatile terpenoids<br />

by herbivoreinjured cotton plants‖. Proceedings of the National Academy of<br />

Sciences of the United States of America, 91: 11836-11840.<br />

[14] Manrique V, W.A. Jones and L.H. Williams, 2005. 3rd, Bernal JS.<br />

―Olfactory responses of Anaphes iole (Hymenoptera: Mymaridae) to<br />

volatile signals derived from host habitats‖. J Insect Behav; 18: 89-104.<br />

[15] Moraes M.C.B., R.Laumann, E.R., Sujii, C. Pires and M. Borges, 2005.<br />

―Induced volatiles in soybean and pigeon pea plants artificially infested<br />

with the neotropical brown stink bug, Euschistus heros, and their effect on<br />

the egg parasitoid, Telenomus podisi‖. Entomol Exp Appl; 115: 227-237.<br />

[16] Padmavathi, C. and A.V.N. Paul, 1998. ―Saturated hydrocarbons as<br />

kairomonal source for the egg parasitoid, Trichogramma chilonis Ishii<br />

(Hym.,Trichogrammatidae)‖. J Appl Entomol, 122:29–32.<br />

[17] Paul, A. V. N., M. Srivastava, P. Dureja, and A.K. Singh, 2008.<br />

‖Semiochemicals produced by tomato varieties and their role in parasitism<br />

of Corcyra cephalonica (Lepidoptera: Pyralidae) by the egg parasitoid<br />

Trichogramma chilonis (Hymenoptera: Trichogrammatidae)‖. International<br />

Journal of Tropical Insect Science, 28: 108–116.<br />

[18] Paul, A.V.N., S Singh, and A.K. Singh, 2002. ―Kairomonal effect of some<br />

saturated hydrocarbons on the egg parasitoids, Trichogramma brasiliensis<br />

(Ashmead) and Trichogramma exiguum, Pinto, Platner and Oatman (Hym.<br />

Trichogrammatidae)‖. Journal of Applied Entomology, 126: 409–416.<br />

[19] Powell, W., 1991. ―Tritrophic influence on aphid parasitoids(Hym.,<br />

Braconidae: Aphidiinae)‖. Redia 74(3); 129–133.<br />

[20] Rani, P.U., Y. Jyothsna and M. Lakshminarayana, 2008. ―Host and nonhost<br />

plant volatiles on oviposition and orientation behaviour of<br />

Trichogramma chilonis Ishii‖, J. Biopest. 1:17 – 22.<br />

[21] Romeis, J., D. Babendreier, F.L. Wäckers, and G. Shanower, 2005. ―Habitat<br />

and plant specificity of Trichogramma egg parasitoids – Underlying<br />

mechanisms and implications‖. Basic and Applied Ecolog., 3: 215-236.<br />

[22] Sreekumar, K.M. and A.V.N. Paul, 2000. ―Labour efficient technology for<br />

the mass production of rice meal moth Corcyra cephalonica‖. Indian. J.<br />

Entomol. 62:304 – 311.<br />

[23] Singh S, A.V.N. Paul and A.K. Singh, 1998. ―Host effect on the quality of<br />

Trichogramma brasiliensis and T. exiguum‖. Indian. J. Entomol. 60:379 –<br />

384.<br />

[24] Stinner, R.E., 1977. ―Efficacy of inundative release‖. Annu. Rev. Ent,<br />

22:513-531.<br />

[25] Tabone, E., C. Bardon, N. Desneux, and E. Wajnberg, 2010. ―Parasitism of<br />

different Trichogramma species and strains on Plutella xylostella L. on<br />

greenhouse cauliflower‖. Journal of Pest Science, 83; 251–256.<br />

[26] Yadav, B., A.V.N. Paul and R.K. Gautam, 2001. ―Synomonal effect of<br />

some potato varieties on Trichogramma exiguum Pinto, Platner and<br />

Oatman‖, In: Symposium on Biocontrol based Pest Management for<br />

Quality Crop Protection in the Current Millennium, 18 July – 19 July,<br />

Punjab Agricultural University, Ludhiana. 16 – 17.<br />

[27] Yadav, B., A.V.N. Paul, P. Dureja, and R.K. Gautam, 2002. ―Synomonal<br />

effect of some varieties of soybean on the egg parasitoid Trichogramma<br />

exiguum Pinto, Platner and Oatman‖, Biopesticides and Pest Management.<br />

(ed. by Koul O, Dhaliwal GS, Mawaha SS, Arora JK) Campus Books<br />

International, New Delhi, 2:260–270.<br />

[28] Yong, T.H., S. Pitcher, J. Gardner and M.P. Hoff mann, 2007. ―Odor<br />

specificity testing in the assessment of efficacy and non-target risk for<br />

Trichogramma ostriniae (Hymenoptera: Trichogrammatidae)‖. Biocontrol<br />

Sci Technol, 17:135–153.<br />

[29] Yonggen, L., H. Xiaoyan, T.C.J., Turlings, J. Cheng, X. Chen and G. Ye,<br />

2006. ―Differences in induced volatile emissions among rice varieties result<br />

in differential attraction and parasitism of Nilaparvata lugens eggs by the<br />

parasitoid Anagrus nilaparvatae in the field‖, J. Chem. Ecol. 32:2375–2387.<br />

AUTHORS<br />

Correspondence Author –Archna Kumar, Amity Institute of<br />

Biotechnology, Amity University Uttar Pradesh, Sector -125,<br />

Expressway, Noida, U. P., 201303, India,<br />

archnaaashi@yahoo.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 212<br />

ISSN 2250-3153<br />

Table 1: Effect of three saturated hydrocarbons on mean parasitoid activity index of T. chilonis:<br />

C1<br />

(7000 mg/L)<br />

C2<br />

(11000<br />

mg/L)<br />

C3<br />

(14000<br />

mg/L)<br />

C4<br />

(15000 mg/L)<br />

C5<br />

(25000<br />

mg/L)<br />

C6<br />

Hexane<br />

(control)<br />

Octacosane 1.83±0.31 0.67±0.21 1.50±0.22 2.50±0.22 3.50±0.22 1.50±0.21 2.00±0.20 c<br />

Pentacosane 5.50±0.81 7.50±0.22 6.17±0.83 3.50±1.15 1.67±0.33 3.67±0.21 4.87±0.49 b<br />

Tricosane 5.00±0.82 5.33±0.42 2.83±0.66 14.00±1.16 4.00±0.45 1.50±0.67 6.23±0.80 a<br />

*Value within column marked with different letters are significantly (P < 0.05) different.<br />

SE Cd<br />

hydrocarbon x hydrocarbon 0.35 0.69<br />

Concentration x concentration 0.42 0.84<br />

hydrocarbon x concentration 0.85 1.68<br />

Table 2: Effect of three saturated hydrocarbons on mean percent parasitism of T. chilonis:<br />

C1<br />

(7000 mg/L)<br />

C2<br />

(11000<br />

mg/L)<br />

C3<br />

(14000<br />

mg/L)<br />

C4<br />

(15000 mg/L)<br />

C5<br />

(25000<br />

mg/L)<br />

C6<br />

Hexane<br />

(control)<br />

Octacosane 12.78±1.03 9.45±0.56 2.78±0.56 2.22±0.70 2.78±0.55 3.33±0.86 6.00±0.85 b<br />

Pentacosane 8.33±2.95 17.23±0.56 16.11±2.00 16.11±1.59 8.88±1.11 7.78±1.41 13.33±1.19 a<br />

Tricosane 7.22±3.38 7.22±1.81 5.00±2.40 15.00±3.19 6.67±2.11 4.45±1.41 8.22±1.28 b<br />

*Value within column marked with different letters are significantly (P < 0.05) different.<br />

SE Cd<br />

Concentration x concentration 1.09 2.15<br />

hydrocarbon x hydrocarbon 1.33 2.64<br />

Mean<br />

Mean<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 213<br />

ISSN 2250-3153<br />

Octacosa<br />

ne<br />

Pentacos<br />

ane<br />

Tricosan<br />

e<br />

hydrocarbon x concentration 2.66 5.27<br />

Table 3: Effect of three saturated hydrocarbons on mean parasitoid activity index of T. brasiliensis:<br />

C1<br />

(7000 mg/L)<br />

C2<br />

(11000 mg/L)<br />

C3<br />

(14000 mg/L)<br />

C4<br />

(15000 mg/L)<br />

C5<br />

(25000 mg/L)<br />

C6<br />

Hexane<br />

(control)<br />

2.50±0.22 2.67±0.21 1.50±0.22 4.00±0.26 4.17±0.17 2.00±0.00 2.97±0.21 c<br />

2.00±0.45 4.33±0.42 8.00±0.37 0.83±0.17 5.67±0.21 1.50±0.22 4.17±0.50 b<br />

6.00±0.45 6.67±0.42 9.67±0.92 9.83±1.60 10.00±0.68 3.33±1.17 8.43±0.81 a<br />

*Value within column marked with different letters are significantly (P < 0.05) different.<br />

SE Cd<br />

hydrocarbon x hydrocarbon 0.25 0.50<br />

Concentration x concentration 0.31 0.61<br />

hydrocarbon x concentration 0.62 1.22<br />

Table 4: Effect of three saturated hydrocarbons on mean percent parasitism of T. brasiliensis:<br />

C1<br />

(7000 mg/L)<br />

C2<br />

(11000 mg/L)<br />

C3<br />

(14000 mg/L)<br />

C4<br />

(15000 mg/L)<br />

C5<br />

(25000 mg/L)<br />

C6<br />

Hexane<br />

(control)<br />

Octacosane 7.22±0.56 0.56±0.56 3.33±0.00 6.12±0.56 1.67±0.75 6.67±0.86 3.78±0.45<br />

b<br />

Pentacosane 12.22±0.70 12.22±0.70 18.89±0.70 4.44±0.70 11.67±0.75 4.44±0.70 11.89±0.9<br />

0 a<br />

Tricosane 10.00±1.49 19.44±2.00 17.22±3.38 11.11±0.70 16.11±1.59 5.56±0.70 14.78±1.8<br />

3 a<br />

*Value within column marked with different letters are significantly (P < 0.05) different.<br />

SE Cd<br />

hydrocarbon x hydrocarbon 0.51 1.01<br />

Concentration x concentration 0.63 1.24<br />

hydrocarbon x concentration 1.25 2.48<br />

Mean<br />

Mean<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 214<br />

ISSN 2250-3153<br />

Awareness of Health Insurance in Andhra Pradesh<br />

Jangati Yellaiah<br />

Ph.D. Scholar, Department of Economics, Osmania University, ICSSR Doctoral Fellow from (CESS), Hyderabad,<br />

Andhra Pradesh, India<br />

Abstract- This paper identifies the determinants of awareness<br />

of health insurance in Andhra Pradesh. The present study was<br />

carried out in Hyderabad city of Andhra Pradesh. Since the main<br />

objective of the study was to analyze determinants of awareness<br />

of the health insurance, we concentrated on the variables like the<br />

Age, Education, Gender, Occupation, Income, type of the family,<br />

and Health expenditure etc. Using pretested structured<br />

questionnaire, the primary data have been collected purposively,<br />

by covering the wide range of demographic, economic and social<br />

factors, from the randomly chosen two hundred respondents from<br />

the study area. We have applied simple statistical tools such as<br />

descriptive statistics, and along with logistic regression to<br />

identify the factors determining the awareness of the health<br />

insurance. We found that 33.5 percent of the respondents had<br />

aware of health insurance and 66.5 percent of the respondents<br />

had unaware of health insurance. The present paper concludes<br />

that the determinants of awareness of health insurance were<br />

religion, type of the family, education, occupation, annual<br />

income, when considered except type of the family, the other<br />

determinants had a statistically significant. The higher education<br />

and higher income had positive relation to the awareness of<br />

health insurance.<br />

Index Terms- Health Insurance, Awareness of Health<br />

insurance, Determinants of Health insurance<br />

W<br />

I. INTRODUCTION<br />

ealth is an important constituent of human resource<br />

development. Good health is real wealth of society. It not<br />

only increases human efficiency but also decreases private and<br />

public expenditure on sickness and diseases. Health has been<br />

declared as a fundamental human right. The present concern in<br />

both developed and developing countries is not only to reach the<br />

whole population with adequate healthcare services but also to<br />

secure an acceptable level of health for all though the application<br />

of primary healthcare programmes. Healthcare services help to<br />

reduce infant mortality rate, check crud death rate, keep diseases<br />

under control and raise life expectancy. Health insurance is fast<br />

emerging as an important mechanism to finance health care<br />

needs of the people. The need for an insurance system that works<br />

on the basic principle of pooling of risks of unexpected costs of<br />

persons falling ill and needing hospitalization by charging<br />

premium from a wider population base of the same community.<br />

There is growing evidence that the level of health care spending<br />

in India – currently at over 6 per cent of its total GDP – is<br />

considerably higher than that in many other developing<br />

countries. This evidence also suggests that more than threequarters<br />

of this spending includes private out-of-pocket expenses.<br />

1.1 Health Insurance<br />

Health insurance is a method to finance healthcare. The ILO<br />

defines health insurance as ―the reduction or elimination of the<br />

uncertain risk of loss for the individual or household by<br />

combining a larger number of similarly exposed individuals or<br />

households who are included in a common fund that makes good<br />

the loss caused to any one member‖ (ILO, 1996). To put it more<br />

simply, in a health insurance programme, people who have the<br />

risk of a certain event contribute a small amount (premium)<br />

towards a health insurance fund. This fund is then used to treat<br />

patients who experience that particular event (e.g.<br />

hospitalisation).<br />

1.2 Health Insurance in India<br />

Today many countries are shifting over to health insurance<br />

as a mechanism of financing their healthcare programme. In<br />

India, we need to shift from the current predominance of out-ofpocket<br />

payments to a health insurance programme. The reasons<br />

are very clear:<br />

Direct out-of-pocket payments are a financial barrier to<br />

accessing health services. On the other hand, an insured<br />

patient can walk into a health facility without the fear of<br />

financial burden;<br />

Direct out-of-pocket payments can push families into<br />

indebtedness or poverty. Health insurance protects the<br />

patient from the burden of raising funds at the time of<br />

illness;<br />

Direct out-of-pocket payments are inequitable as they<br />

place the burden on the vulnerable. Insurance through<br />

its risk pooling mechanism is more equitable; and<br />

Direct out-of-pocket payments do not permit patient‘s<br />

participation in his/her treatment. On the other hand, by<br />

its collective nature, a health insurance programme can<br />

negotiate for better quality care.<br />

Most health insurance schemes can be classified into three<br />

broad categories, social health insurance, private health insurance<br />

and community (or micro) health insurance. In India, we have a<br />

fourth category called government initiated health insurance<br />

schemes that do not fit into any of the above three categories.<br />

Each has its own specificities. However, there are some features<br />

that overlap among the three.<br />

A. Social Health Insurance (SHI)<br />

Social health insurance schemes are statutory programmes<br />

financed mainly through wage-based contributions and related to<br />

level of income. SHI schemes are mandatory for defined<br />

categories of workers and their employers. It is based on a<br />

combination of insurance and solidarity. The classical example<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 215<br />

ISSN 2250-3153<br />

of an SHI is the German or Belgian health insurance system.<br />

Here, employees and employers contribute to a ‗mutual fund(s)‘<br />

that is then used to finance the healthcare for the entire<br />

population. Citizens have to enroll compulsorily in one of these<br />

mutual funds. The government also provides significant funding<br />

to cover those who are not able to contribute.<br />

In many low-income countries, SHI has been<br />

implemented mainly for the civil servants and the formal sector.<br />

This can lead to gross inequities. For instance in India, 18 per<br />

cent of the central government budget is used to finance an SHI<br />

for the civil servants who constitute only 0.4 per cent of the<br />

population.<br />

In India, there are three well-known SHI schemes - the<br />

Employees‘ State insurance Scheme (ESIS), the Central<br />

Government Health Scheme (CGHS) and the ECHS (Ex-<br />

Servicemen‘s Contributory Health Scheme).<br />

B. Private Health Insurance (PHI)<br />

Private health insurance refers to insurance schemes that<br />

are financed through individual private health premiums, which<br />

are often voluntary, and risk rated. ‗For-profit‘ insurance<br />

companies manage the funds.<br />

In low-income countries like India, they provide<br />

primary insurance cover, i.e. they insure hospitalisations. On the<br />

other hand, in high-income countries, they usually provide<br />

supplementary secondary insurance cover.<br />

C. Community Health Insurance (CHI)<br />

Community health insurance is ―any not-for-profit<br />

insurance scheme aimed primarily at the informal sector and<br />

formed on the basis of a collective pooling of health risks, and in<br />

which the members participate in its management‖.<br />

The important point to note is that in CHI, the local<br />

community takes the initiative in establishing a health insurance<br />

scheme, usually to improve access to healthcare as well as<br />

protect against high medical expenses. The solidarity element is<br />

strongest in CHIs as most of the members know each other.<br />

Community health insurance as a movement is quite active<br />

in sub-Saharan Africa. Even in Asia, we have examples from<br />

India, the Philippines, Indonesia, Cambodia, Bangladesh, etc.<br />

D. Government-initiated Health Insurance Schemes (GHI)<br />

As stated earlier, India has a fourth category that is not<br />

usually seen in other countries. This is the ‗GHI‘. The specificity<br />

of this is that the government introduces a health insurance<br />

programme, usually for the poorest and vulnerable sections of the<br />

community. In many of the schemes, the premium is totally<br />

subsidised by the government (from tax-based revenues) and is<br />

paid directly to the insurance company. Rarely, the community<br />

may be expected to pay a token amount. The insurance company<br />

or an independent body is the organiser of the scheme. These<br />

schemes last for a couple of years, depending on the political will<br />

and longevity of the government. These are seen more as<br />

populist welfare schemes rather than a long-lasting intervention.<br />

II. REVIEW OF THE LITERATURE<br />

The review of literature of this study selected recent studies<br />

relating to awareness and determinants of health insurance India.<br />

B. Reshmi et al. (2007), they found that the awareness of health<br />

insurance was found to be 64.0 per cent. Around 45.0 per cent of<br />

the respondents came to know about health insurance from the<br />

media which played an important role in the dissemination of<br />

information. The middle and low socio-economic groups<br />

favoured government health insurance compared to private<br />

health insurance. They suggested that government should come<br />

out with a policy, where the public can be made to contribute to a<br />

health insurance scheme to ensure unnecessary out-of-pocket<br />

expenditures and also better utilization of health care facilities.<br />

Ahuja (2004) the study explained that health insurance was<br />

emerging as an important financing tool in meeting the health<br />

care needs of the poor. Households which have higher health<br />

expenditure and income have higher probability of renewing<br />

health insurance policy. Mudgal (2005) this study examined that<br />

whether consumption expenditure of households in rural India<br />

was insured against medical ailments. This study found that the<br />

villagers were not able to perfectly share the risk of all shocks.<br />

Indirani Gupta (2002) the study found a wide disparity across<br />

selections on willingness to participate. The challenges for the<br />

new system would be to pool individuals across risk and<br />

economic status categories, setup a multi-tier system to meet<br />

objectives of equity and efficiency in health care delivery and for<br />

planners and regulators, to keep health insurance separate from<br />

other non-health insurance. Gumber and kulkarani (2000), they<br />

found that there was strongly expressed need for health insurance<br />

among low income households in both rural and urban areas.<br />

This need has arisen primarily because of heavy burden of outof-pocket<br />

expenditure on them while seeking health care. The<br />

need for education for rural and urban populations alike on the<br />

concept of insurance and information on health insurance is a<br />

crucial aspect in extending health insurance coverage on large<br />

scale.<br />

III. OBJECTIVES OF THE STUDY<br />

1. To examine the socio- economic and demographic<br />

characteristics of the selected samples.<br />

2. To analyze the determinants of awareness of health<br />

insurance of selected samples.<br />

IV. DATA COLLECTION AND METHODS OF THE<br />

STUDY<br />

The present study was carried out in Hyderabad city of Andhra<br />

Pradesh. Since the main objective of the study was to analyze<br />

determinants of awareness of the health insurance, we<br />

concentrated on the variables like the Age, Education, Gender,<br />

Occupation, Income, type of the family, Premium of health<br />

insurance, and Health expenditure etc. Using pretested structured<br />

questionnaire, the primary data have been collected purposively,<br />

by covering the wide range of demographic, economic and social<br />

factors, from the randomly chosen two hundred respondents from<br />

the study area. The period of collection of the data was 2010-11.<br />

We have applied simple statistical tools such as descriptive<br />

statistics, percentages, mean and standard deviation along with<br />

logistic regression to identify the factors determining the<br />

awareness of the health insurance.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 216<br />

ISSN 2250-3153<br />

V. FINDINGS AND DISCUSSION<br />

Table 1 Socio- Demographic Characteristics of the<br />

Respondents<br />

Characteristics<br />

respondents<br />

Age (years)<br />

of the<br />

Numbers Percentage<br />

20-30 68 34<br />

31-40 77 38.5<br />

41-50 34 17<br />

51-60 12 6<br />

Above 61<br />

Gender<br />

8 4<br />

Male 144 72<br />

Female<br />

Religion<br />

56 28<br />

Hindu 131 65.5<br />

Christian 25 12.5<br />

Muslim<br />

Type of family<br />

44 22<br />

Joint 50 25<br />

Nuclear<br />

Education<br />

150 75<br />

Illiterate 13 6.5<br />

Primary 33 16.5<br />

Secondary 44 22<br />

Higher secondary 36 18<br />

Graduate 58 29<br />

Post-graduate<br />

Annual Income<br />

16 8<br />

Up to 25000 19 9.5<br />

25001-50000 129 64.5<br />

50001-75000 20 10<br />

75001-100000 11 5.5<br />

100001-125000 7 3.5<br />

125001-150000 5 2.5<br />

Above 150001 9 4.5<br />

The above table shows that socio demographic characteristics<br />

of the respondents. Most of the respondents were in the age<br />

group of 31-40 years of age (38.7 %) followed by 20-30 years of<br />

age (34 %). Only 8 percent of respondents were in the age group<br />

of above 61 years of age. Males constituted 72 per cent and<br />

females 28 per cent of the respondents. 65.5 per cent of<br />

respondents were Hindus while Christians and Muslims were<br />

12.5 per cent and 22 per cent respectively. 75 per cent of the<br />

respondents stayed in nuclear family and 25 per cent in the joint<br />

family, 29percent of the respondents were graduates, 22percent<br />

of the respondents were secondary education level, 18percent of<br />

the respondents were higher secondary level, 16.5percent of the<br />

respondents were primary level, 8percent of the respondents<br />

were post-graduates and only 6.5percent of the respondents were<br />

illiteracy. 64.5 per cent of the respondents had annual income<br />

between Rs. 25001 to 50000 and 4.5 per cent respondents had an<br />

income of above Rs. 150001.<br />

Table 2 Awareness and Source of information about Health<br />

insurance among the Respondents<br />

Awareness of the<br />

total respondents<br />

Number Percentage<br />

Awareness<br />

Yes<br />

No<br />

67<br />

133<br />

33.5<br />

66.5<br />

Total 200 100<br />

Source of<br />

Information<br />

Television 13 6.5<br />

Radio 2 1<br />

Newspaper 26 13<br />

Family/ friends 18 9<br />

Internet 2 1<br />

Insurance agents 6 3<br />

Total 67 33.5<br />

The whole study was based on the awareness of the<br />

respondents. 33.5 per cent of the respondents were aware of<br />

health insurance. Of the total 200 respondents, 33.5 per cent of<br />

the respondents were aware of health insurance whereas 66.5 per<br />

cent of them had no idea about it (Table 2). The present study<br />

found that the respondents have low awareness of the health<br />

insurance.<br />

Table 2 depicts the source of information and awareness of<br />

health insurance. 13 per cent of the respondents said that<br />

newspaper was the source of information followed by from<br />

family/friends (9 %), television (6.5 %), insurance agents (3 %)<br />

radio (1 %) and internet (1 %).<br />

Sl. No<br />

1 Male<br />

Table 3 Gender of the Respondents<br />

Gender of the<br />

Respondents<br />

Awareness on Health<br />

Insurance Scheme Total<br />

Yes No<br />

44 100 144<br />

(22%) (50%) (72%)<br />

23 33 56<br />

2 Female<br />

(11.5%) (16.5%)<br />

Total<br />

67<br />

(33.5%)<br />

133<br />

(66.5%)<br />

Note: Figures in the percentiles are percentage<br />

(28%)<br />

200<br />

(100.0%)<br />

The above table shows that 22 percent of the male respondents<br />

and 11.5 percent of the female respondents were aware of health<br />

insurance. Compare the male respondents, female respondents<br />

had less aware of the health insurance.<br />

Table 4 Religion wise awareness of the respondents<br />

Awareness on Health<br />

Sl. No Religion<br />

Insurance Scheme<br />

Total<br />

Yes No<br />

1 Hindu<br />

40<br />

(20 %)<br />

91<br />

(45.5 %)<br />

131<br />

(65.5 %)<br />

2 Christian<br />

12<br />

(6 %)<br />

13<br />

(6.5 %)<br />

25<br />

(12.5 %)<br />

3 Muslim 15 29 44<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 217<br />

ISSN 2250-3153<br />

(7.5%) (14.5 %) (22 %)<br />

Total<br />

67<br />

(33.5%)<br />

133<br />

(66.5%)<br />

200<br />

(100.0%)<br />

Note: Figures in the percentiles are percentage<br />

The above table shows that religion wise awareness of the<br />

respondents. 20 percent Hindu religion respondents, 6 percent<br />

Christian and 7.5 percent Muslim responds were had aware of<br />

health insurance. Compare to these three groups Hindu religion<br />

respondents had high rate of aware of health insurance.<br />

Table 5 Type of Family of the Respondents<br />

Awareness<br />

Health<br />

on<br />

Sl. No Type of Family Insurance Scheme Total<br />

Yes No<br />

1 Joint<br />

23<br />

(11.5%)<br />

27<br />

(13.5%)<br />

2 Nuclear<br />

44<br />

(22%)<br />

106<br />

(53%)<br />

Total<br />

67<br />

(33.5%)<br />

133<br />

(66.5%)<br />

Note: Figures in the percentiles are percentage<br />

50<br />

(25%)<br />

150<br />

(75%)<br />

200<br />

(100.0%)<br />

The above table 5 represents the type of family. Here joint<br />

family respondents were less aware of health insurance (11.5<br />

percent), 22 percent of the nuclear respondents were aware about<br />

health insurance.<br />

Sl.<br />

No<br />

Table 6 Educational levels of the Respondents<br />

Educational<br />

levels of the<br />

Respondents<br />

1 Illiterate<br />

2 Primary<br />

4 Secondary<br />

5<br />

6<br />

Higher<br />

secondary<br />

Graduate/<br />

Diploma<br />

Awareness on<br />

Health<br />

Insurance Scheme Total<br />

Yes No<br />

2 11 13<br />

(1%) (5.5%) (6.5%)<br />

4 29 33<br />

(2%) (14.5%) (16.5%)<br />

18 52 70<br />

(9%) (26 %) (35 %)<br />

4 19 23<br />

(2%) (9.5%) (11.5%)<br />

32 26 58<br />

(16%) (13%) (29%)<br />

13 3 16<br />

7 Post-Graduate<br />

(6.5%) (1.5%)<br />

Total<br />

67<br />

(33.5%)<br />

133<br />

(66.5%)<br />

Note: Figures in the percentiles are percentage<br />

(8%)<br />

200<br />

(100.0%)<br />

The above table 6 represents the education levels of the<br />

respondents. It is shown that there is less awareness about health<br />

insurance among the respondents who are less educated (primary<br />

2%). As the education qualification increases (graduates 16 %<br />

and post-graduates 6.5 %), it is clearly seen that the awareness<br />

among the respondents is being increased.<br />

Hence we can say from the above analysis that there is<br />

positive relationship between education and awareness of the<br />

health insurance.<br />

Sl.<br />

No<br />

Table 6 Occupations of the Respondents<br />

Occupation<br />

of the<br />

Respondents<br />

Awareness on<br />

Health<br />

Insurance Scheme Total<br />

Yes No<br />

1<br />

Self<br />

employment<br />

9<br />

(4.5%)<br />

60<br />

(30%)<br />

2<br />

Private<br />

employ<br />

31<br />

(15.5%)<br />

38<br />

(19%)<br />

3<br />

Government<br />

employ<br />

13<br />

(6.5%)<br />

0<br />

(.0%)<br />

4 Business<br />

14<br />

(7%)<br />

35<br />

(17.5%)<br />

Total<br />

67<br />

(33.5%)<br />

133<br />

(66.5%)<br />

Note: Figures in the percentiles are percentage<br />

69<br />

(34.5%)<br />

69<br />

(34.5%)<br />

13<br />

(6.5%)<br />

49<br />

(24.5%)<br />

200<br />

(100.0%)<br />

In the following table it was shows that the private employees<br />

(15.5 %) and government employees (6.5 %) were more aware of<br />

the health insurance, when compare to those respondents who are<br />

self employed (9 %) and business (7 %).<br />

Determinants of Awareness of Health insurance<br />

To analyze the determinants of awareness of health insurance,<br />

a logit model will be used in the analysis of individual<br />

household's choice between awareness of health insurance and<br />

un aware of health insurance. The model uses awareness of<br />

health insurance among the households as the dichotomous<br />

dependent variable. The model uses various households as the<br />

factors influencing determinants of awareness of health<br />

insurance.<br />

Pi = E<br />

<br />

<br />

<br />

Y<br />

1<br />

X<br />

i<br />

<br />

<br />

<br />

<br />

<br />

1<br />

b<br />

1 1<br />

<br />

b X<br />

e<br />

k ik<br />

<br />

<br />

<br />

. ( 1)<br />

Pi = Probability that awareness of health insurance<br />

b1 = constant term<br />

bk = coefficients<br />

Xk = for K = 1....5, are the independent variables and subscript i<br />

denotes i th observation.<br />

K1 = Religion<br />

K2 = Type of the Family<br />

K3 = Education<br />

K4 = Occupation<br />

K5 = Income<br />

Let<br />

Zi = b1 + ∑bk Xik ….. (2)<br />

Then<br />

Pi =<br />

e<br />

Z <br />

1<br />

1<br />

…… (3)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 218<br />

ISSN 2250-3153<br />

As Zi ranges from -∞ to + ∞, Pi ranges from 0 to 1 and Pi is nonlinearly<br />

related to Zi.<br />

In estimable form, the model is,<br />

Pi <br />

Z b b<br />

X<br />

Li = Ln 1<br />

Pi i 1 k ik<br />

..(4)<br />

Where L is the logit. It shows how the log odds in favor of<br />

awareness of health insurance change as the respective<br />

independent variable changes.<br />

Table 7<br />

Sl. No. Variables Coefficient P>|z|<br />

1 Religion -0.476 0.28**<br />

2<br />

Type of the<br />

Family<br />

0.203 0.619<br />

3 Education 0.402 0.002*<br />

4 Occupation -0.276 0.80***<br />

5 Income 0.012 0.000*<br />

6 Constant 5.103 0.000*<br />

R 2 0.277<br />

-2 Log likelihood 190.144<br />

Prob > chi 2 = 4.324<br />

* indicates significant at 1 % level, ** significant at 5 % and ***<br />

significant at 10 %.<br />

The above table shows that R Square 0.277, -2 Log likelihood<br />

is -190.144 and chi 2 4.324. The determinants of awareness were<br />

religion, type of the family, education, occupation, annual<br />

income, when considered except type of the family; the other<br />

determinants had a statistically significant association.<br />

Education and annual income had 1 percent level of significant,<br />

religion factor had 5 percent level of significant and occupation<br />

had 10 percent level of significant.<br />

VI. CONCLUSION<br />

From our study we conclude that the determinants of<br />

awareness of health insurance were: religion, type of the family,<br />

education, occupation, annual income. Education, annual<br />

income, occupation of the respondent and religion plays vital role<br />

of the Determinants of awareness of the health insurance. Higher<br />

education and higher annual income increase awareness of health<br />

insurance also will increase. Gumber and Kulkarni in their study<br />

found out that the need for education for rural and urban<br />

population was alike on the concept of health information which<br />

is a crucial aspect on extending awareness about health insurance<br />

on a large-scale. This calls for an effective information,<br />

education and communication activities which will improve the<br />

understanding of the people about insurance. The health<br />

insurance companies should come out with clear cut policy<br />

details, as many of the respondents had vague ideas about the<br />

various benefits and risks involved in a policy. And also health<br />

insurance companies to develop a viable health insurance<br />

scheme, it is important to understand people‘s perceptions and<br />

develop a package that is accessible, available, affordable and<br />

acceptable to all sections of the society.<br />

REFERENCES<br />

[1] Ahuja Rajeev, (2004), ―Health Insurance for the poor‖, Economic and<br />

Political Weekly, july 10, pp.3171-78.<br />

[2] Ahuja, R and A Narang (2005), ―Emerging Trends in Health Insurance for<br />

Low-income Groups‖, Economic and Political Weekly, September 17.<br />

[3] Anil Gumber and Veena Kulkarni, (2000). ―Health Insurance in Informal<br />

Sector: Case Study of Gujarat‖. Economic and Political Weekly, September<br />

30, PP.3607-13.<br />

[4] B. Reshmi et al. (2007), Awareness of health insurance in a south Indian<br />

population – a community-based study, Health and Population-<br />

Perspectives and Issues 30 (3): 177-188.<br />

[5] Berman (1996). Health Care Expenditure in India in Monica Dasgupta et al<br />

(eds), Health, Poverty and Development in India, Oxford University Press,<br />

Delhi, p.331-58.<br />

[6] Devadasan.N, et at (2004a), ―Accord Community Health Insurance<br />

Increasing Access to Hospital Care‖, Economic and Political Weekly, July<br />

10, PP.3189-3193.<br />

[7] Indrani Gupta, (2002) ―private Health Insurance and Health Costs Results<br />

from a Delhi Study‖, Economic and Political Weekly, July 6, PP.2795-2801.<br />

[8] Kirigia, et al. (2005), ―Determinants of health insurance ownership among<br />

South African women‖, BMC Health Services Research 2005,<br />

http://www.biomedcentral.com/1472-6963/5/17.<br />

[9] Mahal Ajay,(2002), ”Assessing private health insurance in India: Potential<br />

impact and regulatory issues‖, Economic and Political Weekly, February 9,<br />

pp. 559-71.<br />

[10] Mudgal Jyothi, Subrata Sarkar, et.al (2005), ―Health insurance in Rural<br />

India‖, Economic and Political Weekly, October 22, pp 460-469.<br />

[11] Reddy et al, 2011, A Critical Assessment of the Existing Health Insurance<br />

Models in India, Report submitted by Public Health Foundation of India.<br />

[12] Rao Sujatha, (2004), ―Health Insurance Concepts, Issues and Challenges‖,<br />

Economic and Political Weekly, August 21, PP.3835-44.<br />

[13] Sethi Jyotsna and Nisswa Bhatia, ―Elements of Banking and Insurance‖ PHI<br />

Publication, Learning Private Limited‖, New Delhi, (2009).<br />

[14] Srinivasan.J. and P.Ponmuthusaravanan, (2009). ―Detrminanats of Health<br />

Insurance In Pondicherry Region: An Econometric Analysis‖, International<br />

Research journal of Social Sciences Puducherry, Vol.2, No.2, PP.215-227.<br />

AUTHORS<br />

J.YELLAIAH, M.A., M.Phil., Ph.D Scholar, Department of<br />

Economics, Osmania University, ICSSR Doctoral Fellow from<br />

Centre for Economic and Social Studies (CESS), Hyderabad,<br />

Andhra Pradesh -500007. Mobile No: +91 9533118847, Email:<br />

yellaiah.ja@gmail.com.<br />

Correspondence Author<br />

J. Yellaiah, Email: yellaiah.ja@gmail.com, Contact Number: +91<br />

9533118847.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 219<br />

ISSN 2250-3153<br />

Comparative Study of Sign Language Recognition<br />

Systems<br />

Abstract- Sign Language (SL) is the communication method<br />

for deaf people. But these sign languages are not standard &<br />

universal. The grammar differs from country to country. As the<br />

sign language is the only method for deaf community to<br />

communicate with normal people, we need Sign Language<br />

Translators (SLT).<br />

The basic automatic SLT uses two approaches. First one is<br />

using the electronic data gloves. These gloves have inbuilt<br />

sensors & it is worn by the signer to detect hand posture. But<br />

these gloves are having high cost. So, visual approach is most<br />

suitable & widely used. Here a camera is used to capture images<br />

of signer & then image processing is carried out to perform<br />

recognition. For the vision based Sign Language Recognition<br />

(SLR), various methods are available. Three such methods are<br />

discussed & compared in this paper.<br />

Index Terms- Sign Language Recognition (SLR)<br />

Ms. Rashmi D. Kyatanavar, Prof. P. R. Futane<br />

Department of Computer Engineering, Sinhgad College of Engineering,<br />

Pune, India<br />

I. INTRODUCTION<br />

Deaf people interfacing is a very challenging issue due to its<br />

cardinal social interest and its inherent complexity like,<br />

(1) Nature of information is multi-channel.<br />

(2) Signing vary from person to person.<br />

(3) Presence of disturbances (surrounding furniture,<br />

cloths)<br />

(4) Sign languages from different region differ<br />

significantly.<br />

There are two main directions in sign language recognition. One<br />

is using data gloves & other is visual approach. Instrumented<br />

glove approach simplifies the recognition but complicates the<br />

hardware. Also it is expensive & less user friendly. On the other<br />

hand, vision-based approach is most suitable, user-friendly &<br />

affordable. So, it is widely used.<br />

II. VISION BASED METHODS FOR SIGN LANGUAGE<br />

RECOGNITION<br />

A. SLR Based on Skin Color [2]<br />

This is an intelligent & simple system for converting sign<br />

language into voice signal by tracking head & hand gestures.<br />

This system proposes a simple gesture extraction algorithm for<br />

extracting features from the images of a video stream.<br />

Figure 1: System block diagram for SLR using skin color [2]<br />

This system is very simple & subject is not required to wear<br />

any glove. But the subject must wear a dark color, long sleeve<br />

shirt. Then the gesture signs are recorded. Each image frame is<br />

segmented into three regions- head, left hand and right hand.<br />

Then these segmented images are converted into binary images.<br />

In feature extraction stage, for each frame the area of objects in<br />

segmented binary image is calculated. So, each frame has 3<br />

segmented areas- head area, left hand area and right hand area.<br />

There is a different segmented area for each gesture type. Each<br />

segmented area is treated as a discrete event & DCT is applied to<br />

it. First 15 DCT coefficients are considered as features. They<br />

correspond to each segmented area. Combination of DCT<br />

coefficients from 3 segmented image areas are used as feature<br />

vector for Neural Network (NN). Here, a simple NN model is<br />

developed for sign recognition. The features computed from<br />

video stream are given as an input to this NN. To classify the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 220<br />

ISSN 2250-3153<br />

gesture, a NN model uses error back propagation. So we get the<br />

classified signs at the end of gesture classification phase. Finally,<br />

an audio system is used to play words corresponding to gesture.<br />

B. SLR Using Custom Made Color Gloves [1]<br />

This is an automatic vision based SLT system. It uses custom<br />

made color gloves. These are ordinary gloves with specific color<br />

on palm & each fingertip. Initially, image acquisition is done<br />

using a camera & custom made color gloves. Then the frames of<br />

images are collected. Then, motion of hand is tracked using color<br />

segmentation & image processing. Finally, Artificial Neural<br />

Network (ANN) is used to classify gestures & to translate them.<br />

Figure 2: Vision-based automatic SLT using custom made color<br />

gloves [1]<br />

In image acquisition stage, camera is used to obtain images &<br />

video of signer. Signer uses color coded gloves. The color helps<br />

in extraction of data from sign images through color<br />

segmentation. In image acquisition, we collect frames of images<br />

at suitable interval so that frames are sufficient to detect the<br />

movement of hand. In motion tracking phase, color segmentation<br />

is performed to remove influence of moving objects in<br />

background. Then, centroid of color segmented region is found.<br />

Motion tracking phase consists of two steps:<br />

A. Hand posture extraction<br />

B. Tracking of hand movement<br />

In Hand Posture Extraction, location of each finger is determined<br />

& finally, NN classifier is used. Here we use two layered feed<br />

forward NN.<br />

C. SLR Using Finger Detection [3]<br />

This method introduces an efficient & fast algorithm for<br />

identifying the number of fingers opened in gesture. Here the<br />

finger detection is performed using the concept of boundary<br />

tracing & finger tip detection. This system does not have<br />

limitations like hand should be perfectly aligned to camera, use<br />

of special markers, use of input gloves on the hand etc.<br />

According to this method, it is possible to identify the gesture of<br />

an alphabet if we know the number of fingers opened. The aim of<br />

this method is to design a system that should automatically<br />

capture, recognize & translate sign language to the speech for<br />

blind people. Also it should analyze & convert the speech to<br />

either sign or textual display on screen for deaf people.<br />

This method has three main steps of processing – edge<br />

detection, clipping and boundary tracing.<br />

Figure 3: SLT using Finger Detection [3]<br />

The first phase of this method is edge detection. It is the process<br />

of identifying points in the digital image at which image<br />

brightness changes sharply or has discontinuities. For this phase<br />

Canny edge operator is used. The output of this step is an edge<br />

detected image. The next phase is clipping. It clips or removes<br />

the undesirable portion of edge detected image for further<br />

processing. The final step is boundary tracing. It is the phase<br />

which actually detects the finger tips n the number of fingers<br />

open.<br />

III. COMPARISON OF RESULTS<br />

A. SLR Based on Skin Color [2]<br />

This gesture recognition method based on skin color is an<br />

intelligent & simple system for converting sign language into<br />

voice signal using head & hand gesture. This system is very<br />

simple & subject is not required to wear any glove. But the<br />

subject must wear a dark color, long sleeve shirt. This system has<br />

minimum and maximum classification rates as 88.47 and 95.69<br />

respectively.<br />

B. SLR Using Custom Made Color Gloves [1]<br />

This method is an automatic visual based sign language<br />

translator system. This automatic visual-based sign language<br />

translator can achieve the recognition rate of over 90%.<br />

C. SLR Using Finger Detection [3]<br />

The finger detection algorithm designed for sign language<br />

recognition is a simple, fast, efficient and robust method to locate<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 221<br />

ISSN 2250-3153<br />

finger tips and enables us to identify a class of hand gestures.<br />

This system does not have limitations like hand should be<br />

perfectly aligned to camera, use of special markers and use of<br />

input gloves on the hand etc. Finger recognition works accurately<br />

for 95% of the cases.<br />

IV. CONCLUSION<br />

There are various methods for sign language recognition.<br />

Some use electronic glove while other use vision based approach.<br />

But, as the electronic glove approach is the costlier one, vision<br />

based approach is widely used. Three such methods are discussed<br />

and compared. The skin color based method is simple & does not<br />

require the signer to wear any glove. The accuracy of this method<br />

is also good. The custom made color glove method requires the<br />

color segmentation to be performed. But the accuracy is less. The<br />

SLR using finger detection is simple, fast and efficient. But it can<br />

detect only those gestures that have fingers open. Also, two<br />

different gestures having same number of fingers open will be<br />

recognized ambiguously. Each of these three methods has its<br />

own pros and cons. So, depending on the type of application,<br />

appropriate method should be chosen.<br />

ACKNOWLEDGMENT<br />

The research in this paper was carried out at Sinhgad College<br />

of Engineering, Pune. So, special thanks to Head of Computer<br />

Department, Principal and Management of Sinhgad College of<br />

Engineering.<br />

REFERENCES<br />

[1] Rini Akmeliawati, Melanie Po-Leen Ooi and Ye Chow Kuang, “Real-Time<br />

Malaysian Sign Language Translation using Colour Segmentation and<br />

Neural Network”, IMTC 2007 - Instrumentation and Measurement<br />

Technology Conference Warsaw, Poland, 1-3, May 2007.<br />

[2] Paulraj M P, Sazali Yaacob, Hazry Desa, Hema C.R., “ Extraction of Head<br />

& Hand Gesture Feature for Recognition of sign language”, International<br />

Conference on Electronic Design, Penang, Malaysia, December 1-3, 2008.<br />

[3] Ravikiran J, Kavi Mahesh, Suhas Mahishi, Dheeraj R, Sudheender S, Nitin<br />

V Pujari, “Finger Detection for Sign Language Recognition” , Proceedings<br />

of the International MultiConference of Engineers and Computer Scientists<br />

2009 Vol I IMECS 2009, Hong Kong, March 18 - 20, 2009.<br />

[4] Wu jiangqin Gao wen Song yibo Liu wei Pang bo, “A Simple Sign<br />

Language Recognition System Based On Data Glove”, firneedings of IiXP ,<br />

1998.<br />

[5] Tan Tian Swee, Sh-Hussain Salleh, A.K. Ariff, Chee-Ming Ting, Siew<br />

Kean Seng and Leong Seng Huat, “Malay Sign Language Gesture<br />

Recognition System”, International Conference on Intelligent and Advanced<br />

Systems, 2007.<br />

[6] Pham The Bao, Nguyen Thanh Binh, Tu Duy Khoa, “A New Approach To<br />

Hand Tracking And Gesture Recognition By A New Feature Type And<br />

Hmm”, Sixth International Conference on Fuzzy Systems and Knowledge<br />

Discovery, 2009.<br />

AUTHORS<br />

First Author – Ms. Rashmi Kyatanavar, ME Computer<br />

Networks, Sinhgad College of Engineering, Pune,<br />

r.d.kyatanavar@gmail.com<br />

Second Author – Prof. P. R. Futane, Head o Computer<br />

Department, Sinhgad College of Engineering, Pune,<br />

prfutane.scoe@sihngad.edu<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 222<br />

ISSN 2250-3153<br />

Age Related Changes in the Parasympathetic Control of<br />

the Heart<br />

Vinutha Shankar MS, Shivakumar Veeraiah<br />

Dept of Physiology, Sri Devaraj Urs Medical College, Sri Devaraj Urs Academy of Higher Education & Research,<br />

Kolar, Karnataka, India.<br />

Abstract- Age related impairment in the parasympathetic<br />

control of the heart is a causal component for increased risk of<br />

cardiovascular diseases like arrhythmia and sudden cardiac death<br />

in the elderly. Abnormal heart rate responses as a result of<br />

parasympathetic dysfunction have demonstrated altered<br />

sympatho vagal modulation of the heart in the elderly. Simple,<br />

bedside, non invasive ECG based tests designed by Ewing &<br />

Clarke assess parasympathetic function. These are heart rate<br />

responses to Deep breathing, Valsalva maneuver and to standing.<br />

Parasympathetic function was assessed by the above mentioned<br />

cardiovascular autonomic function tests in 60 elderly subjects<br />

above 60 years who were further grouped as young old (60-74<br />

yrs) and old old (75-90 yrs). The results thus obtained were<br />

compared with young healthy subjects (18-33 yrs) who served as<br />

controls to study the effect of aging on the parasympathetic<br />

control of heart rate. There was a significant reduction in heat<br />

rate responses to Deep breathing, Valsalva maneuver and to<br />

standing indicating reduction in parasympathetic function in the<br />

elderly above 60 years. There was no significant difference in all<br />

the tests of parasympathetic function between the young old and<br />

the old old suggesting no further decline in parasympathetic<br />

function after 75 years.<br />

Index Terms- parasympathetic, dysfunction, elderly, valsalva,<br />

aging.<br />

M<br />

I. INTRODUCTION<br />

ajority of deaths in the older population stem from<br />

cardiovascular disorders accounting for a third of the<br />

elderly mortality. Approximately 50% of these occur suddenly.<br />

Lethal ventricular arrhythmias are responsible for 80% of sudden<br />

cardiac deaths (1). Age related autonomic dysfunction in the<br />

cardio vascular regulatory control is a contributing factor for the<br />

increased incidence of arrhythmias in the elderly. Autonomic<br />

changes with aging include reduction in parasympathetic<br />

function and these changes are associated with high rates of<br />

cardiovascular disease and mortality (2). Aging is known to alter<br />

the neurohormonal mechanisms that control the cardiovascular<br />

system. Published reports have demonstrated a decline in<br />

sinoatrial node parasympathetic activity(3). Previous studies<br />

have demonstrated that there is parasympathetic decline in<br />

elderly leading to impaired parasympathetic control of heart<br />

rate.(4) Cardio vascular disturbances due to impaired<br />

parasympathetic control are usually subclinical and precede<br />

symptoms. So it goes unnoticed unless carefully scrutinized.<br />

Effects of aging on parasympathetic nervous system have been<br />

much studied. The impetus for continuing interest in this topic<br />

have come in part from the recognition that in a range of<br />

cardiovascular disorders including sudden cardiac death and<br />

ventricular arrhythmia, for all of which incidence rises with age,<br />

parasympathetic nervous system pathophysiology may be an<br />

important causal component. The Autonomic Nervous System<br />

mechanisms involved in the aging process are extremely<br />

complex and many questions concerning the neurologic effects<br />

of aging have yet to be answered. Some of the mechanisms<br />

associated with aging are pathologically induced but the<br />

distinction between these mechanisms and those that are part of<br />

the normal aging process remains somewhat cloudy (5). The<br />

importance to be able to differentiate between autonomic<br />

abnormalities which are associated with systemic diseases and<br />

those which are purely the consequence of the natural processes<br />

of aging is thus obvious.<br />

Cardiac Autonomic Neuropathy is grossly under diagnosed<br />

due in part to its frequently asymptomatic presentation and in<br />

part to the non utilization of tests for its diagnosis. Ewing and<br />

Clark have designed a battery of standardized quantitative<br />

autonomic function tests to test parasympathetic function that<br />

have been widely used to assess parasympathetic control of heart<br />

(6).These tests are performed since the procedures are straight<br />

forward, reproducible, non invasive and performed bedside.<br />

This study was conducted to evaluate the association between<br />

aging and parasympathetic function by assessing the<br />

parasympathetic function in the elderly and comparing it with<br />

young healthy subjects.<br />

II. MATERIALS AND METHODS<br />

Subjects.<br />

The study comprised of 90 subjects. 60 elderly subjects<br />

residing in old age homes / attending medical OPDs/ patients‘<br />

attendants between the age 60-90 yrs with a normal 12 lead ECG<br />

were included in the study. Informed consent was obtained from<br />

each subject. The 60 elderly subjects above 60 yrs were further<br />

grouped as young old aged between 60 – 74 yrs(n=30) and old<br />

old aged between 75 and 90 yrs(n=30). The study was approved<br />

by the Institutional ethical Committee. The control group<br />

consisted of 30 healthy subjects who were between the age 18 –<br />

33 yrs and with a normal 12 lead ECG. Subjects with history of<br />

hypotensive drug intake, heart or lung disease, Diabetes Mellitus,<br />

hypertension, alcohol consumption , smoking and any inter<br />

current illness like pyrexia and diarrhea were excluded from the<br />

study.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 223<br />

ISSN 2250-3153<br />

Methods:<br />

Autonomic function tests that evaluate the parasympathetic<br />

function were conducted on all the subjects. These are ECG<br />

based heart rate response tests to deep breathing, Valsalva<br />

maneuver and to change in posture. All of the tests were<br />

conducted between 11.30 and 13.30 hours. The temperature of<br />

the examination room was typically between 22 - 24°C. The<br />

subjects were also instructed not to have coffee, tea, cola 12<br />

hours before the tests and were asked to have light breakfast two<br />

hours before the tests. The subject was asked to relax in supine<br />

position for 30 minutes in the laboratory prior to conducting the<br />

tests. The resting heart rate was recorded on a standard ECG<br />

from lead II, at a paper speed of 25mm/sec. The cardiovascular<br />

tests that test parasympathetic function were performed after<br />

demonstrating these tests to the subjects.<br />

1. Deep breathing test:<br />

The subject was trained to breathe deeply at a rate of 6<br />

breaths/minute while sitting. The subject was asked to breathe<br />

deeply, steadily and slowly for I mm at the rate of 6 breaths/mm<br />

(5 sec inspiration and 5 sec expiration) while ECG was being<br />

continuously recorded. The heart rate change with deep breathing<br />

(deep breathing difference) was then expressed as the mean of<br />

the differences between the maximal and minimal heart rate in 6<br />

respiratory cycles.<br />

Deep Breathing Difference (DBD) = mean of heart rate<br />

differences in 6 breath cycles.<br />

2. Heart rate response to Valsalva maneuver:<br />

The subject was trained to maintain an expiratory pressure of<br />

40 mm Hg for 10 sec. Valsalva maneuver was performed by<br />

asking the subject to blow through a mouthpiece attached to a<br />

mercury manometer and maintain a pressure of 40 mm Hg up to<br />

15 sec (straining period not less than 7sec). A nose clip was<br />

applied and small air leakage (through a needle) incorporated in<br />

the mouthpiece to ensure that the expiratory pressure comes from<br />

the chest and that the subject does not blow with his cheeks.<br />

Cardiovascular Indices<br />

Heart rate response tests<br />

Table 1: Scoring of Cardiovascular autonomic function tests.<br />

Throughout the Maneuver, ECG was recorded continuously and<br />

for 30 sec after release of pressure. The heart rate changes<br />

induced by the Valsalva maneuver were expressed as the ratio of<br />

the maximal tachycardia during the maneuver to the maximal<br />

bradycardia after the maneuver. This ratio was defined as the<br />

Valsalva ratio and was calculated as the ratio of maximum R-R<br />

interval after the maneuver to minimum R-R interval during the<br />

maneuver.<br />

3. Heart rate response to standing (Postural tachycardia index,<br />

PTI):<br />

The subject was asked to rest in a supine position for at least two<br />

minutes and to stand unaided and remain standing for about a<br />

minute. While ECG was being recorded continuously. The heart<br />

rate response to standing (postural tachycardia index) is defined<br />

as the ratio between the heart rate at beat 15 after rising to the<br />

vertical position and the heart rate at beat 30.<br />

PTI = RR interval at 30 th beat / RR interval at 15 th beat.<br />

Autonomic Score:<br />

Each individual test was given a score of 0, 1, or 2 depending<br />

on whether they were normal, borderline or abnormal<br />

respectively(Table 1). The scores of individual tests are added<br />

and an overall autonomic score of 0-6 can then be obtained. This<br />

scoring by Bellavere et al provides a simple and efficient<br />

―staging‖ of autonomic involvement in subjects with autonomic<br />

neuropathy(7). Autonomic score of 4 – 6 is suggestive of definite<br />

cardiac autonomic neuropathy with involvement parasympathetic<br />

pathways (8).<br />

Normal<br />

(score 0)<br />

Borderline<br />

(score 1)<br />

Abnormal<br />

(score 2)<br />

Heart rate response to Valsalva Maneuver(VR) ≥1.21 1.11 -1.20 ≤1.10<br />

Heart rate response during deep breathing.<br />

(Deep Breathing Difference or DBD in bpm)<br />

≥15<br />

11-14<br />

beats/min<br />

Heart rate response to standing(PTI) ≥1.04 1.01-1.03 ≤1.00<br />

≤10<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 224<br />

ISSN 2250-3153<br />

III. RESULTS AND ANALYSIS<br />

Statistical Treatment of the data:<br />

Chi-square test was carried out to evaluate the significance of sex distribution between the 3 study groups. One way ANOVA was<br />

done to compare the cardiovascular indices and autonomic score between the 3 study groups. When difference was found Bonferroni<br />

test was used. The mean difference was defined as significant at p0.05).<br />

Table 3: DBD, VR, PTI and the total autonomic score in the 3 study groups with ANOVA results.<br />

Controls(18-<br />

33 yrs)<br />

Young old<br />

(60-74 yrs)<br />

Old old(75-<br />

90 yrs)<br />

ANOVA( F<br />

value)<br />

Heart rate<br />

response to<br />

Deep<br />

breathing<br />

DBD<br />

Heart rate<br />

response to<br />

Valsalva<br />

Maneuver<br />

VR<br />

Heart rate<br />

response to<br />

standing PTI<br />

# significant at p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 225<br />

ISSN 2250-3153<br />

Table 4: post hoc (Bonferroni test) to compare means of DBD, VR, PTI and autonomic score between the 3 study groups<br />

Control<br />

vs young<br />

old<br />

Control<br />

vs old old<br />

Young<br />

old vs old<br />

old<br />

IV. DISCUSSION<br />

The mean age in years of the subjects was 24.77 ± 4.38, 67.13<br />

± 4.32 and 81.17 ± 4.06 in the control, young old and old old<br />

groups respectively. Cardiovascular indices (DBD, VR and PTI)<br />

obtained by performing the tests of parasympathetic function and<br />

the autonomic score are expressed as mean ± SD (Table 3)<br />

ANOVA shows significant difference between the 3 study<br />

groups. Results of post hoc test (Bonferroni test) done to<br />

compare DBD, VR, PTI and Autonomic score between the<br />

control, young old and old old is shown in table 4.There was a<br />

significant difference in the young old and old old as compared<br />

to controls in all the tests of parasympathetic function. There was<br />

no significant reduction in the heart rate response to deep<br />

breathing, Valsalva maneuver and to standing in the old old<br />

above 75 yrs as compared to young old between 60 and 75 years.<br />

Heart rate response to Deep breathing:<br />

There was a significant reduction in DBD in both young old<br />

and old old as compared to young subjects who served as<br />

controls .Heart rate response to breathing is a normal<br />

phenomenon and is due primarily due to fluctuations in<br />

parasympathetic output to heart. Cardiac vagal innervation<br />

decreases with age as clearly shown by a reduction in DBD that<br />

reflects respiratory sinus arrhythmia. During inspiration impulses<br />

in vagi from stretch receptors in the lungs inhibit the cardioinhibitory<br />

area in the medulla oblangata. The tonic vagal<br />

discharge that keeps the heart rate slow decreases and heart rate<br />

rises (9). Depression of respiratory sinus arrhythmia with age<br />

also suggests a decrease in parasympathetic influence on sinus<br />

node function (10).<br />

DBD VR PTI Autonomic<br />

score<br />

p=0.000* p=0.000* p=0.000* p= .000*<br />

p=0.000* p=0.000* p=0.000* p=0.000**<br />

p = 0.123 ns<br />

p=0.84 ns<br />

p=0.46 ns<br />

* significant at p75 years(21).<br />

Heart rate response to Valsalva Maneuver:<br />

There was a significant reduction in VR in both young old<br />

and old old as compared to the controls.<br />

It can thus be concluded that there is a decrease in VR in the<br />

healthy elderly above 60 years thus demonstrating involvement<br />

of parasympathetic nervous system. Heart rate response to<br />

Valsalva maneuver relies to some extent on the integrity of<br />

sympathetic as well as parasympathetic pathways. Many factors,<br />

including blood volume, antecedent period of rest, cardiac<br />

sympathetic as well as peripheral sympathetic functions and NE<br />

response affect the Valsalva maneuver. Age may affect different<br />

components of Valsalva maneuver in different directions.<br />

This study is in conformity with the earlier studies done by<br />

Albert.B.Levin (22) & SJ. Piha (23)<br />

The present study is not in agreement with earlier studies<br />

like Ewing et al (15), Braune S et al(19) & C Neumann and<br />

Schnmid(20). It may be due to higher upper limit of age range of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 226<br />

ISSN 2250-3153<br />

subjects (up to 90 years) in our study. The less consistent effect<br />

of age on VR likely relates to the smaller change and greater<br />

complexity of the maneuver. C Neumann (20) was of the opinion<br />

that results of the test proposed by Ewing and Clarke, however<br />

might differ between researchers because of differences in the<br />

maneuvers and equipment (they are not commercially available),<br />

and because some techniques are completely computerized<br />

whereas others are not. Previous studies have demonstrated that<br />

age related reduction in Heart Rate Variability in response to<br />

Valsalva maneuver suggested that aging is associated with<br />

impaired parasympathetic control of heart rate. There was no<br />

significant difference in VR between young old and old old<br />

suggesting that there is no further decline after 75 years. This is<br />

similar to the observation made by Phyllis et al(21) and Islam et<br />

al (24) suggesting that parasympathetic impairment seen after 60<br />

years is not dependent on age with further advancement of age.<br />

Heart response to standing (PTI):<br />

Old group did not differ significantly from young-old with<br />

respect to heart rate response to standing.<br />

It can be concluded that heart rate response to standing, a<br />

measure of cardiac parasympathetic function is significantly<br />

reduced in healthy elderly subjects above 60 years comprising of<br />

both the young old and old-old groups. In elderly the immediate<br />

postural reflexes are controlled neurally by sympathetic and<br />

parasympathetic nerves whereas the later neural regulation of the<br />

postural adaptation is controlled via sympathetic nerves. Since<br />

the parasympathetic nervous system is more prone to the effect<br />

of aging (9) than sympathetic function, it is likely that the<br />

transient dysregulation of postural reflexes in older subjects at<br />

the beginning of standing is due to decrease in parasympathetic<br />

activity (23). This study is in conformity with earlier studies<br />

done by G.Vita (25), J.Gert van Dijk (26), S.J.Piha (14)and C.<br />

Neumann (20). This study differs from the study of Ewing D.J et<br />

al (27) who initially promoted PTI as an age-independent test of<br />

parasympathetic function, may be due to smaller sample size of<br />

older control( 10 subjects) and younger age of the older<br />

group(48-67 years).<br />

As seen with heart rate responses to deep breathing and<br />

valsalva maneuver, heart rate response to standing (PTI) is not<br />

different between the young old and old subjects. This<br />

strengthens the possible explanation that parasympathetic<br />

dysfunction seen after 60 years does not continue to decline with<br />

further advancing age. This observation is similar to that of<br />

Phyllis et al (21) and Islam et al(24).<br />

Autonomic score: Mean and SD of autonomic score are 1.77±<br />

1.30, 4.62± 1.27 and 5.03±1.03 respectively. Autonomic score<br />

differed significantly between the control, young old and old old<br />

groups.<br />

Autonomic score was significantly high in the young-old and<br />

old old (p = 0.000) when compared to controls suggesting the<br />

presence of severe cardiac autonomic neuropathy in the elderly.<br />

There was no difference in autonomic score between young old<br />

and old old (p = 0.17). Our study demonstrates reduction in<br />

parasympathetic function as suggested by significant decline in<br />

autonomic score after 60 with no further decline after 75 years.<br />

Phyllis et al(24) characterized the association between age, aging<br />

and HRV in 585 adults aged above 65 years and showed that<br />

cardiac autonomic function based on parasympathetic nervous<br />

system declines mostly at 60 – 75 years and levels off at age > 75<br />

years.<br />

Heart rate response to deep breathing:<br />

Valsalva maneuver and standing that reflect integrity of<br />

parasympathetic nervous system showed a significant decline in<br />

deep breathing difference, VR and PTI in both the young-old (60<br />

- 74 years) and old-old (75 years – 90 years) when compared to<br />

control (18 - 33) suggesting impairment of parasympathetic<br />

function in the elderly aged > 60 years. The basis for this finding<br />

is multifactorial and may be at multiple levels of neuraxis<br />

including peripheral and central mechanisms. Dysfunction in the<br />

activity of the neural portion (afferent, central or efferent) of the<br />

vagal system and the cardiac muscarinic receptor may be<br />

involved in the parasympathetic changes associated with aging<br />

(2).<br />

The underlying mechanisms of aging are complex and<br />

uncertain. Aging is a, multifactorial process that clearly affects<br />

the Autonomic Nervous System. Its impact on the autonomic<br />

neuraxis is at multiple levels and heterogeneous. The altered<br />

autonomic function at the transition from adulthood to old age is<br />

continuation of process of modulation of autonomic function<br />

from fetal to postnatal and postnatal to adulthood. Age related<br />

changes in cardiovascular Structure and function increase the<br />

probability of disease modify the threshold at which symptoms<br />

and signs arise and affect the clinical course and prognosis.<br />

The altered autonomic function of long term heart rate<br />

behavior with advancing age may arise from age related changes<br />

in various organs and body systems, which may interact with<br />

each other and thereby impair the function of cardiovascular<br />

autonomic regulatory systems. Altered autonomic regulation of<br />

cardiac function may contribute to the onset of cardiovascular<br />

disease and provide a substrate for malignant ventricular<br />

arrhythmia.<br />

Additional changes in the heart with aging are structural<br />

changes in the SA node, with reduction in cell no‘s of such a<br />

degree (28) that the capacity for chronotropic responses might be<br />

impaired. Factors such as these could blunt cardiac<br />

responsiveness in the elderly. Cardiac electrophysiologic studies<br />

have demonstrated a progressive decline in sinoatrial conduction<br />

and sinus node recovery time with age (29).<br />

V. CONCLUSION<br />

According to available literature and the findings of present<br />

study, heart rate response to deep breathing, Valsalva maneuver<br />

and to standing which reflect integrity of parasympathetic<br />

function is reduced after the sixth decade even in normal healthy<br />

subjects. There was no significant difference in all the tests of<br />

parasympathetic function between the young old and old old<br />

indicating no further decline in parasympathetic function after 75<br />

years. Physicians have to bear in mind the age related<br />

impairment of autonomic function while evaluating<br />

cardiovascular diseases in elderly.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 227<br />

ISSN 2250-3153<br />

REFERENCES<br />

[1] Satyendra C. Gupta MD, Cardiovascular problems. In: Geriatric Medicine<br />

for the House Officer edited by Kim Goldenberg, Alice Faryana, Williams<br />

and Wilkins p 150.<br />

[2] Wichi Rogério Brandão, De Angelis Kátia, Jones Lia, Irigoyen Maria<br />

Claudia. A brief review of chronic exercise intervention to prevent<br />

autonomic nervous system changes during the aging process. Clinics [serial<br />

on the Internet]. 2009 Mar ; 64(3): 253-258.<br />

[3] Mark AL. Sympathetic dysregulation in heart failure: mechanisms and<br />

therapy. Clin Cardiol 1995;18:I3-8.<br />

[4] Aging and the Autonomic Nervous system. In;Primer on the Autonomic<br />

Nervous System edited by David Robertson, Italo Biaggioni, Geoffrey<br />

Burnstock, Phillip A. Low, Julian F.R. Paton.p 272<br />

[5] Kathryn L. Mc. cance, Sue.E. Iluel, Pathophysiology, 2nd Edition. 1994 by<br />

Mosby Year Book,Inc.pp-428.<br />

[6] David. J. Ewing ,basil. F.Ciarke, 9 – Autonomic neuropathy: its diagnosis<br />

and prognosis. Clinics in Endocrinology and MetabolismV ol. 15,No.4,Nov.<br />

l986.pp855-885.<br />

[7] Bellavere F, Bosello G, Fedele D, C Cardone, and M Ferri. Diagosis and<br />

management of diabetic autonomic neuropathy [letter]. BMJ 1983;287:61.<br />

[8] Ekta Khandelwal, Ashok Kumar Jaryal and Kishore Kumar Deepak. Pattern<br />

and prevalence of cardiovascular autonomic neuropathy in diabetics visiting<br />

a tertiary care referral center in India. Indian J Physiol Pharmacol 2011; 55<br />

(2) : 119–127<br />

[9] Michael A. Pfeifer M.D. Differential changes of Autonomic Nervous<br />

System..Function with Age in Man., The American journal of Medicine Vol<br />

75 Aug 1983.<br />

P248- 258.<br />

[10] Kuo TB, Lin T, Yang CC, Li CL, Chen CF, Chou P. Effect of aging on<br />

gender differences in neural control of heart rate. Am J Physiol. 1999; 277:<br />

H2233-9.<br />

[11] Shailaja Moodithaya, Sandhya T. Avadhany. Gender Differences in Age-<br />

Related Changes in Cardiac Autonomic Nervous Function Journal of Aging<br />

Research Volume <strong>2012</strong> (<strong>2012</strong>), Article ID 679345, 7<br />

pages.doi:10.1155/<strong>2012</strong>/679345.<br />

[12] Malvin Torsvik , Amanda Häggblom, Geir E Eide, Erich<br />

Schmutzhard, Kaare Vetvik , Andrea S Winkler. Cardiovascular autonomic<br />

function tests in an African population. BMC Endocrine<br />

Disorders 2008, 8:19 doi:10.1186/1472-6823-8-19<br />

[13] Pandian JD, Dalton K, Scott J, Read SJ, Henderson RD. Cardiovascular<br />

autonomic function tests to provide normative data from a healthy older<br />

population. J Clin Neurosci. 2010 Jun;17(6):731-5. Epub 2010 Mar 19.<br />

[14] Piha SJ, Age-related diminution of the cardiovascular autonomic responses:<br />

diagnostic problems in the elderly. Clin Physiol. 1993 Sep;13(5):507-17.<br />

[15] Ewing DJ, Martyn CN, Young RJ, Clarke BF. the value of cardiovascular<br />

function tests: 10 years experience in diabetes. Diabetes care 1985: 8; 491-<br />

498<br />

[16] Bengt. Bergstrom, Autonomic nerve function tests, Reference values in<br />

healthy subjects. Clinical Physiology (1986) 6,523-528.<br />

[17] Kaijser L, Sachs C Autonomic cardiovascular responses in old age. Clin.<br />

Physiol. 1985,Aug; 5(4):347-57.<br />

[18] Phillip A Low The Effect of Aging on Cardiac Autonomic and<br />

Postganglionic sudomotor function. Muscle and Nerve 13: 152-157 1990.<br />

[19] S. Braune, A. Auer, J. Schulte-Mönting, S. Schwerbrock and C. H. Lücking<br />

. Cardiovascular parameters: sensitivity to detect autonomic dysfunction<br />

and influence of age and sex in normal subjects. Clin Auton Res. 1996.<br />

Feb;6(1):3-16.<br />

[20] Neumann.C, Schmid H, Standardization of a computerized method for<br />

calculating autonomic function test responses in healthy subjects and<br />

patients with diabetes mellitus, Braz J Med Biol Res, February 1997,<br />

Volume 30(2)197 - 205.<br />

[21] Phyllis K Stein, Joshua I Barzilay, Paulo H M Chaves, Peter P Domitrovich,<br />

John S Gottdiener Heart rate variability and its changes over 5 years in<br />

older adults. Age and Ageing (2009).Volume: 38, Issue: 2, Publisher:<br />

Oxford University Press, Pages: 212-218<br />

[22] Albert.B Levin, A simple test of cardiac function based upon the heart<br />

changes induced by the Valsalva manouver, The American Journal of<br />

Cardiology,Vol 18, July<br />

1966, pp90-99.<br />

[23] Piha SJ, Cardiovascular autonomic reflex tests: normal responses and agerelated<br />

reference values. Clin Physiol. 1991 May;11(3):277-90.<br />

[24] Islam T, Begum N, Begum S, Ferdousi S, Ali T , Evaluation of<br />

Parasympathetic Nerve Function Status in Healthy Elderly Subjects. J<br />

Bangladesh Soc Physiol.2008 Dec;(3):23-28.<br />

[25] G. Vita, P. Princi, R. Calabro,A. Toscano,L. Manna,C. Messina1 ,<br />

Cardiovascular reflex tests: Assessment of age-adjusted normal range, J<br />

Neurol Sci. 1986 Oct;75(3):263-74.<br />

[26] van Dijk JG, Koenderink M, Zwinderman AH, Haan J, Kramer CG, den<br />

Heijer JC, Autonomic nervous system tests depend on resting heart rate and<br />

blood pressure, Journal of autonomic nervous system, 35 (1991) p15-24.<br />

[27] D. J. Ewing, I. W. Campbell, A. Murray, J. M. M. Neilson and B. F. Clarke<br />

Immediate heart-rate response to standing: simple test for autonomic<br />

neuropathy in diabetes, BMJ, 1978, 1, 145-157.<br />

[28] Davies MJ. Pathology of the conduction system. In: Caird FI, Dall JLC,<br />

Kennedy RD, eds. Cardiology in old age. New York: Plenum Press,<br />

1976:57-9.<br />

[29] M. De Marneffe, P. Jacobs, R. Haardt..M. Englert. Variations of normal<br />

sinus node function in relation to age: role of autonomic influence.<br />

.European Heart Journal.Volume 7, Issue 8<br />

AUTHORS<br />

First Author –Dr Vinutha Shankar MS, Professor, Dept Of<br />

Physiology, Sri Devaraj Urs Medical college, Sri Devaraj Ur<br />

Academy of Higher Education & Research, Kolar, Karnataka,<br />

India, E mail: vinutha.shankar@gmail.com<br />

Second Author –Dr. Shivakumar Veeraiah, Professor & HOD,<br />

Dept of Physiology, Bangalore Medical College & Research<br />

Institute, Bangalore, Karnataka, India.<br />

Correspondence Author – Dr vinutha Shankar MS, Professor,<br />

Dept Of Physiology, Sri Devaraj Urs Medical college, Sri<br />

Devaraj Urs Academy of Higher Education & Research, Kolar,<br />

Karnataka, India, E mail: vinutha.shankar@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 228<br />

ISSN 2250-3153<br />

The Folk Medicinal Plants of the Mao Naga in Manipur,<br />

North East India<br />

Abstract- The present paper exclusively deals with the Mao<br />

Naga Folk medicinal plants which are used for treating various<br />

ailments and diseases in their day today life. They are settled<br />

agriculturist and have a very rich knowledge on plant based<br />

resources utilization for their survival since time immemorial.<br />

They practices folk medicines to take care of their health and<br />

related problems primarily from the plant resources available<br />

within and the vicinity of their environment. During the<br />

investigation it has recorded 61 species belonging to 39 families<br />

and 57 genera which are widely used as medicines by this ethnic<br />

community. The most common part of the plant utilized by the<br />

indigenous people as the source of medicine is the leaves with 32<br />

species. Flower and inflorescence are the least part of the plant<br />

with only two species viz. Crassocephalum crepidiodes and<br />

Hibiscus subdariffa which used for treating cuts, wounds and<br />

appetizer during sickness. The most dominant family is<br />

Asteraceae with 10 species that are used for several diseases.<br />

Index Terms- Mao Naga, Ethno-medicinal plants,<br />

Agriculturalist, Makhel.<br />

T<br />

I. INTRODUCTION<br />

he Northeast India comprises of eight states viz., Assam,<br />

Arunachal Pradesh, Manipur, Meghalaya, Mizoram,<br />

Nagaland, Sikkim and Tripura and they are physiographically<br />

categorized into the Eastern Himalayas, Northeast hills (Patkai-<br />

Naga Hills and Lushai Hills) and Brahmaputra and the plains of<br />

Barak valley. There are approximately 225 tribes hailing from<br />

the Northeast region, out of the total 450 tribes that are found in<br />

the country (Chatterjee et al., 2006). Besides ethnic and cultural<br />

diversity, it is one of the mega biodiversity regions in the world<br />

which falls under the Himalaya and the Indo-Burma biodiversity<br />

hotspots forming a unique biogeographic province harbouring<br />

major biomes recognized in the world. It has the richest reservoir<br />

of plant diversity and supporting about 50% of India‘s<br />

biodiversity (Mao, Hyniewta & Sanjappa, 2009). Majority of the<br />

tribal communities resides in the hills and some parts of the<br />

plains and valleys in different parts of the region. Ethnic-cultural<br />

diversity and rich biodiversity in the region are one of the charms<br />

that attract the attention of the tourists and equally the<br />

academicians or researchers for various reasons. There is a huge<br />

potential to do ethnobotanical research in the region, primarily,<br />

because, half of the total Indian tribal communities lives and<br />

practices their cultures in its own unique way. Several works has<br />

been done on Ethnomedicinal plants used by the different tribal<br />

communities from Northeast India, the north Cachar hills<br />

Adani Lokho<br />

Department of Botany, Siksha Bhavan, Visva Bharati, Santiniketan<br />

West Bengal-731235, India<br />

(Sanjem, Rout and Nath, 2008); Tai-Khamyangs of Assam (<br />

Sonowal and Barua, 2011); Mizoram (Rai & Lalramnhinglova,<br />

2010); Sikkim (Singh, Birkumar and Rai, 2007); Tinsukia,<br />

Assam (Buragoham, 2011); Apatani, Arunachal Pradesh (Kala,<br />

2005); Khasi and Garos, Meghalaya (Neogi, Prasad and Rao,<br />

1989); Reang, Tripura (Sil and Choudhury, 2009); Angami-a,<br />

Nagaland (Megoneitso and Rao, 1983); Lotha, Nagaland (Jamir,<br />

Takatemjen and Limasengla, 2008) etc. However this is the first<br />

report on the Mao Naga Folk medicinal plants.<br />

The Naga tribes belong to the Mongolian stock and speak a<br />

Tibeto-Burmese language, and have socio-cultural affinities with<br />

the Southeast Asia (Ao Alemchiba, 1970). They have a very rich<br />

culture and traditional practices which is unique from one tribe to<br />

the other. The Nagas have a great heritage of oral traditions<br />

which involves beliefs and practices associated with nature,<br />

plants and animals. The diversity of the ethnic tribes among the<br />

Nagas presents a vast scope of ethnobotanical researches. There<br />

are 31 different tribes- Angami, Chakeshang, Ao, Sema,<br />

Rengma, Lotha, Chang, Konyak, Sangtam, Phom, Zeliang, Mao,<br />

Maram, Tangkhul, Maring, Anal, Mayan-Monsang, Lamkang,<br />

Nockte, Haimi, Htangun, Ranpan, Kolyo, Kenyu, Kacha,<br />

Yachimi, Kabui, Uchongpok, Makaoro, Jeru and Somra (Horam,<br />

1975). However, only a few accounts on ethnobotany mainly<br />

emphasized on medicinal and wild edible plants used by the<br />

Angami-a (Megoneitso and Rao, 1983); Ao (Rao and Jamir,<br />

1990); Nagaland (Rao and Jamir, 1982a, 1982b); Zeliang (Jamir<br />

and Rao, 1990); Zeme (Rout et al., 2010); Lotha (Jamir et al.,<br />

2008); Mao (Mao and Hyneiwta, 2009; Mao, 1993, 1998, 1999);<br />

Nagaland (Chankija, 1975), has been reported by few<br />

researchers. The Nagas people live and spread out in the state of<br />

Nagaland, Naga hills in Manipur, North Cachar and Mikir hills,<br />

Lakhimppur, Sibsagar and Nowgong in Assam, north-east of<br />

Arunachal Pradesh, Somrat tract and across the border into<br />

Burma.<br />

The Mao Naga tribe inhabits the northern most part of the<br />

hills of Manipur, under Senapati district in the Northeast region<br />

of India. The termed ‗Mao‘ has two connotations which refer the<br />

name of the place as well as the people living in the area. The<br />

vernacular name for the people is „Ememie‟ and the place is<br />

„Ememiechiijii‟. Historically, ‗Makhel‘ a village from Mao is the<br />

place of origin for settlement for most of the Naga tribes and has<br />

a significant mark in the pages of Naga history and civilization.<br />

A symbolic „wild Pear tree‟ which was protected and guarded<br />

for several hundred years by the Naga ancestors signified as the<br />

evidence and revered by everyone, stands tall in the midst of the<br />

Mao Naga till today. They are settled agriculturalist and practices<br />

both terrace and wet paddy field cultivation. Apart from the two<br />

major forms of cultivation (terrace & wet paddy) kitchen<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 229<br />

ISSN 2250-3153<br />

gardening for vegetables and fruits for the family is a common<br />

practice amongst the tribe. In general the agricultural practices of<br />

the Mao tribe are considered to be the most advance form<br />

amongst the various Naga tribes in North-east India (Mao, 1993).<br />

The most common cash crops are Potato, Maize, Millet, Soya<br />

bean, Cabbage both leafy and ball, Tomato, Chilli, Paddy,<br />

Pumkin, Brinjal, Beans, Peas, Raddish, Leafy mustard, Summer<br />

onion, Tamarillo, Squash, Ginger, Garlic etc. The common fruits<br />

that are grown are Peach, Plums of several varieties, Pears,<br />

Passion fruit, Banana, Lemon, Guava, Mango, Cucumber,<br />

Avocado, Kiwi fruit, Strawberry and Cherry etc. There are<br />

several works done on ethnobotany, medicinal plants and<br />

traditional techniques from the northeast region by various<br />

workers for different ethnic tribal communities. However, very<br />

few works has been done on the ‗Mao‘ and ethnic Naga groups<br />

in general. Thus, the present work is an attempt to assess and<br />

study the folk medicinal plants of the Mao Naga in Manipur,<br />

India<br />

II. METHODOLOGY<br />

The information was gathered during the study period from<br />

2009-2011 through interviewed conducted to the village elders<br />

and practitioners from the Mao area in Manipur, India. The<br />

details were recorded in the information sheets. The field survey<br />

was conducted in the respective localities and the plant materials<br />

are collected by following the standard method (Rao and Jain,<br />

1977). All the informations presented in the paper are the actual<br />

version of the people interviewed during the study period. The<br />

specimens were identified with the help of adjacent floras, the<br />

Flora of Assam (Kanjilal), Forest Flora of Meghalaya<br />

(Haridasan) and consulted the Botanical Survey of India (BSI)<br />

museum, Shillong. The specimens were submitted to the North<br />

Eastern Biodiversity Research Cell (NEBRC), N.E.H.U. Shillong<br />

for future reference.<br />

Ethnomedicinal Plants and Their Uses:<br />

The vernacular name, botanical name, family and the parts used<br />

and its utilization were presented under its plant species.<br />

Polygonum orientale Linn.<br />

Vernacular name: Obuvii<br />

Family: Polygoncaeae<br />

Part used: Leaves<br />

Treatment: Diarrhoea and Dysentry<br />

Mode of Utilization: Fresh leaves are boiled with or without rice<br />

and serve the patient suffering from serious diarrhea and<br />

dysentery for quick relief.<br />

Maesa indica (Roxb) A. DC.<br />

Vernacular name: Kohravii<br />

Family: Myrsinaceae<br />

Parts used: Leaves<br />

Treatment: Throat/Vocal cord<br />

Mode of utilization: Young leaves are boiled with water and<br />

taken for treating hoarse voice.<br />

Paedaria foetida Linn.<br />

Vernacular name: Oboripro<br />

Family: Rubiaceae<br />

Part used: Leaves<br />

Treatment: Gastritis and Fungal/Bacteria infection<br />

Mode of utilization: A bunch of fresh leaves are crush and the<br />

squeeze juice is mixed with water in a cup and drink for<br />

gastritis/acidity. The paste of fresh leaves apply for<br />

fungal/bacterial infections between the toes during rainy seasons.<br />

Melia azaderach Linn.<br />

Vernacular name: Siikhasii<br />

Family: Meliaceae<br />

Part used: Barks<br />

Treatment: Blood pressure, Acidity and Ringworm infection<br />

Mode of utilization: A handful of fresh peelings of the endoderm<br />

of the bark is crush or grounded and boiled with water and the<br />

decoction is taken for treating blood pressure and acidity. The<br />

paste of the bark is applied on the skin for ring worm.<br />

Anthogonium gracile Wall.<br />

Vernacular name: Oke<br />

Family: Orchidaceae<br />

Part used: Tuber/Rhizome<br />

Treatment: Cracking heels<br />

Mode of utilization: The tuber/rhizome is crush/grounded into a<br />

paste and applies on the cracking heels for quick relief from pain.<br />

Chenopodium ambrosoides Linn.<br />

Vernacular name: Nopuepro<br />

Family: Chenopodiaceae<br />

Part used: Leaves<br />

Treatment: Headache, fever and blood pressure<br />

Mode of utilization: One or two handfuls of leaves are boiled in<br />

water and the decoction is taken for treating headache, fever and<br />

blood pressure.<br />

Morus nigra Linn.<br />

Vernacular name: Khelosii<br />

Family: Urticaceae<br />

Part use: Leaves and Roots<br />

Treatment: Jaundice<br />

Mode of utilization: A hand of fresh young leaves or the<br />

covering of the roots are crush along with water and the<br />

decoction is taken for treating jaundice.<br />

Urtica dioca Linn.<br />

Vernacular name: Shiingho<br />

Family: Urticaceae<br />

Part used: Leaves<br />

Treatment: Mumps<br />

Mode of utilization: Five to ten numbers of fresh leaves are crush<br />

or grounded and the paste is apply on the affected part for<br />

treating mumps.<br />

Cannabis sativa Linn.<br />

Vernacular name: Kanjapro<br />

Family: Cannabaceae<br />

Part used: Leaves<br />

Treatment: Bone fracture, Sprain and Muscle pain<br />

Mode of utilization: Five to ten leaves are crush and the paste is<br />

apply on the affected part for cuts and wounds for blood clotting.<br />

Two to three handfuls of leaves are boiled in water and the mixer<br />

is use for treating muscle pain, sprain and fracture of the bones.<br />

Ricinus communis Linn.<br />

Vernacular name: Midziipro<br />

Family: Euphorbiaceae<br />

Part used: Leaves<br />

Treatment: Sprain and Muscle pain<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 230<br />

ISSN 2250-3153<br />

Mode of utilization: Five to ten numbers of leaves are heated or<br />

boiled in water and apply on the affected part of sprain, tearing<br />

of ligaments and muscle pain to reduce swollen and quick relief<br />

from pain.<br />

Dichrocephala integrifolia (Linn.f.) Kuntze<br />

Vernacular name: Orekoropro<br />

Family: Asteraceae<br />

Part used: Leaves<br />

Treatment: Fungal infection<br />

Mode of utilization: Three to five numbers of fresh leaves are<br />

crush and squeeze juice is apply on the affected part on the face<br />

from fungal infection.<br />

Acorus calamus Linn.<br />

Vernaculr name: Donia<br />

Family: Araceae<br />

Part used: Root<br />

Treatment: Stomache<br />

Mode of utilization: Fresh roots extracts are taken for stomache.<br />

Cucurma aromatic Salisb.<br />

Vernaculr name: Kodziipa<br />

Family: Zingiberaceae<br />

Part used: Rhizome<br />

Treatment: Stomache<br />

Mode of utilization: The fresh rhizome/roots extracts is taken for<br />

stomache.<br />

Polytricum juniperinum Hewd.<br />

Vernacular name: Shiipa<br />

Family: Polytricaceae<br />

Part used: Whole plant<br />

Treatment: Cuts and Nose bleeding<br />

Mode of utilization: The whole plant is crush or grounded and<br />

applies on the cuts and wounds for blood clotting and nose<br />

bleeding.<br />

Bidens pilosa Linn.<br />

Vernacular name: Shanghapiti-e<br />

Family: Asteraceae<br />

Part used: Leaves<br />

Treatment: Cold and fever, Headache and Blood presssure<br />

Mode of utilization: One or two handful of fresh leaves is boiled<br />

in water and the mixer is taken orally for cold, flu, fever,<br />

headache and blood pressure.<br />

Centella asiatica Linn.<br />

Vernacular name: Korivii<br />

Family: Umbelliflorae<br />

Part used: Whole plant<br />

Treatment: Gastritis, Ulcer and Blood pressure<br />

Mode of utilization: The whole plant is taken raw or boiled with<br />

water and taken for gastritis/acidity, ulcer pain and blood<br />

pressure.<br />

Erythrina variegate Linn.<br />

Vernacular name: Letosii<br />

Family: Papilionaceae<br />

Part used: Bark<br />

Treatment: Poison<br />

Mode of utilization: A handful of the fresh peelings of the bark,<br />

the endodermis layer is crush with water and the decoction is use<br />

as an antidote.<br />

Acacia pruinescens Kurz.<br />

Vernacular name: Motusii<br />

Family: Mimosaceae<br />

Part used: Bark<br />

Treatment: Fish poisoning<br />

Mode of utilization: The fresh peelings of the bark are grounded<br />

along with water and used for stupefying fish in the streams or<br />

river for fishing.<br />

Elsholtzia ciliate Thunb.<br />

Vernacular name: Shipriikholo<br />

Family: Lamiaceae<br />

Part used: Leaves<br />

Treatment: Gas formation<br />

Mode of utilization: A handful of fresh leaves extract is taken for<br />

stomached due to gas formation and quick relief from stomach<br />

upset.<br />

Rhus semialata Linn.<br />

Vernacular name: Omoshii<br />

Family: Anacardiaceae<br />

Part used: Fruits<br />

Treatment: Dysentry and Diarrhoea<br />

Mode of utilization: One or two handful of fresh or dried ripens<br />

fruits are boiled with water and the decoction is taken for treating<br />

dysentery and diarrhea. The decoction is also good for stomach<br />

upset and gas formation.<br />

Clerodendron colebrookianum Walp.<br />

Vernacular name: Pijiivii<br />

Family: Verbanaceae<br />

Part used: Leaves<br />

Treatment: Blood pressure and Abdominal pain<br />

Mode of utilization: A bundle of leaves consisting of 15 to 20<br />

numbers are boiled with water as vegetables and taken for blood<br />

pressure and abdominal problems.<br />

Gynura bicolor (Roxb. & Willd) DC.<br />

Vernacular name: Tabovii<br />

Family: Asteraceae<br />

Part used: Leaves and young stems<br />

Treatment: Ulcer, Chronic acidity<br />

Mode of utilization: One or two handful of leaves along with the<br />

young stems is boiled with or without rice and is taken for<br />

treating gastritis/chronic acidity and blood pressure. The crush of<br />

the fresh leaves is squeeze and the juice is mixed with water and<br />

taken fresh for ulcer and abdominal cleansing.<br />

Spilanthus paniculata Wall ex DC.<br />

Vernacular name: Cheviivii<br />

Family: Asteraceae<br />

Part used: Whole plant<br />

Treatment: Abdominal pain and Expulsion of worms<br />

Mode of utilization: A handful bundle of whole plant is boiled<br />

with water and taken for treating stomached and abdominal<br />

problem. It is taken for expulsion of worms from the stomach.<br />

Houttuynia cordata Thunb.<br />

Vernacular name: Shakama<br />

Family: Saururaceae<br />

Part used: Whole plant<br />

Treatment: Stomache, Gas formation and Expulsion of worms<br />

Mode of utilization: Fresh whole is either taken raw or boiled<br />

with water or taken for stomached, gas formation and expulsion<br />

of worms from abdomen. The fresh roots are sliced into small<br />

pieces and taken as salad for the same purpose of treatment.<br />

Artemisia vulgaris Buch. Linn.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 231<br />

ISSN 2250-3153<br />

Vernacular name: Shiipriiprini<br />

Family: Asteraceae<br />

Part used: Leaves<br />

Treatment: Dandruff, Cuts and Wounds<br />

Mode of utilization: Depending on the size of the cuts bruised<br />

and wounds few or a handful of fresh leaves are crush with a few<br />

drops of water or saliva and the juices is squeeze and apply on<br />

the affected part. The paste of the leaves is pasted on the wounds<br />

and cuts. The leaves crush is also use as shampoo for dandruff.<br />

Artemisia nilgarica (CL.) Camp.<br />

Vernacular name: Shupriipriso<br />

Family: Asteraceae<br />

Part used: Leaves<br />

Treatment: Dandruff, Cuts and Wounds<br />

Mode of utilization: Depending on the size of the cuts bruised<br />

and wounds few or a handful of fresh leaves are crush with a few<br />

drops of water or saliva and the juice is squeezed and applies on<br />

the affected part. The paste of the leaves is pasted on the wounds<br />

and cuts. The leaves crush is also use as shampoo for dandruff.<br />

Eupatorium adenophorum Spreng<br />

Vernacular name: Japanpro<br />

Family: Asteraceae<br />

Part used: Leaves<br />

Treatment: Acidity, Cuts and Wounds<br />

Mode of utilization: A handful of fresh leaves are crush with a<br />

few drops of water or saliva and the juice is squeezed and applies<br />

on the affected part. The paste of the leaves is pasted on the<br />

wounds and cuts. The young tender shoots are taken raw for<br />

chronic acidity for quick relief.<br />

Eleutherococcus cissifolius Griff. ex C. B. Clarke<br />

Vernacular name: Kosa Motsii<br />

Family: Araliaceae Juss.<br />

Part used: Leaves<br />

Treatment: Stomache upset<br />

Mode of utilization: One or two handful bundles of fresh leaves<br />

are boiled and taken for stomach disorder.<br />

Berchemia floribunda Wall.<br />

Vernacular name: Tovuni Rei<br />

Family: Rhamnaceae<br />

Part used: Whole plant<br />

Treatment: Dandruff<br />

Mode of utilization: The whole is crush with water and the<br />

extract is use as shampoo for washing hairs and dandruff.<br />

Xanthosoma sagittifolium (Linn.) Schott<br />

Vernacular name: Birovii<br />

Family: Araceae<br />

Part used: Stem<br />

Treatment: Bees sting and Insects bites<br />

Mode of utilization: Freshly cut stems juice is rubbed against on<br />

the skin to prevent swollen and suppress the pain from sting of<br />

bee wasps and insects.<br />

Elsholtzia blanda Bentham<br />

Vernacular name: Shiipriikholo<br />

Family Lamiaceae<br />

Part used: Leaves<br />

Treatment: Hypertension, Headache and Blistered lips<br />

Mode of utilization: One or two handful of bundles of fresh<br />

leaves is boiled with water and the decoction is taken for treating<br />

hypertension and headache. Three to five leaves are warm/<br />

heated gently and dabbed against the affected part of the<br />

sore/blistered lips.<br />

Zanthophyllum armatum DC.<br />

Vernacular name: Momo mochu<br />

Family: Rutaceae<br />

Part used: Fruits<br />

Treatment: Gas formation and Stomache<br />

Mode of utilization: The whole fruit is crush and apply on the<br />

abdomen or stomach or three to five seeds fleshy covers are<br />

chewed and taken for stomached, stomach disorder and<br />

expulsion of gas from the stomach.<br />

Butea buteiformis (Voigt) Grierson & D. G. Long<br />

Vernacular name: Chiikhovii<br />

Family: Fabaceae<br />

Part used: Seed<br />

Treatment: Expulsion of worms<br />

Mode of utilization: The seed pop containing a single seed is<br />

roasted and taken for expulsion of tape worms and worm from<br />

the stomach and intestine.<br />

Bombax ceiba Linn.<br />

Vernacular name: Pikriisii<br />

Family: Malvaceae (Bombacaceae)<br />

Part use: Bark<br />

Treatment: Snake bites<br />

Mode of utilization: The fresh peeling of the bark is crush in the<br />

form a paste and stuck on the affected portion of the snake bites<br />

to prevent swellings and quick healing. It is also use on the cattle<br />

for the same purposes.<br />

Viburnum foetidum Wallich.<br />

Vernacular name: Shiikriisii<br />

Family: Adoxaceae<br />

Part used: Leaves<br />

Treatment: Ear pain<br />

Mode of utilization: A handful of fresh leaves are boiled with<br />

little water and the concentrated mixture/ decoction or few fresh<br />

leaves are crush and the squeeze juice is used as an ear drops.<br />

Brugmansia sauveolens (Humb. & Bonpl. ex Willd.) Bercht.<br />

& J. Presl.<br />

Vernacular name: Mikrii Tabopro<br />

Family: Solanaceae<br />

Part used: Leaves and barks<br />

Treatment: Sprain, Muscle pain and Snake bites<br />

Mode of utilization: Several fresh leaves are warm/heat up<br />

gently till the colour changes to dark green and dabbed/ rubbed<br />

on the affected part for reducing the pain and swelling for sprain,<br />

tearing of muscles and ligaments and dislocation of the joints.<br />

Fresh peelings of the bark are crush into a paste and bandage<br />

with a soft cloth on the affected portion for snake bites.<br />

Drymeria cordata (Linn.) Willd. ex Schultes<br />

Vernacular name: Pfiipfiipro<br />

Family: Caryophyllaceae<br />

Part used: Whole plant<br />

Treatment: Sinitis and Sprain of body parts<br />

Mode of utilization: The plant is crush into a paste and stick on<br />

the affected part of the sprain on the body. For sinusitis, a<br />

handful of plant is gently warm or heat up and rolled with a soft<br />

cloth/handkerchief and sniff through the nostril for quick relief.<br />

Thalictrum foliossum D. C.<br />

Vernacular name: Okhruvii<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 232<br />

ISSN 2250-3153<br />

Family: Ranunculaceae<br />

Part used: Whole plant<br />

Treatment: Diarrhoea and Dysentry<br />

Mode of utilization: The whole plant is boiled or taken raw for<br />

chronic acidity, diarrhea and dysentery,<br />

Oroxylon indicum (Linn.) Benth. ex Kurz.<br />

Vernacular name: Kakidziihe<br />

Family: Bignonaceae<br />

Part used: Bark and Root<br />

Treatment: Cancer, Diarrhoea, Diabetes and Hypertension<br />

Mode of utilization: Decoction of the freshly peelings of the bark<br />

and outer covering of the root is taken for treating cancer,<br />

diabetes and hypertension. Dried peels of the bark grounded and<br />

mixed with water and drink for diabetes.<br />

Achyranthes aspera Hook. F. /Justicia adhota Linn.<br />

Vernacular name: Tohuopa<br />

Family: Acanthaceae<br />

Part used: Leaves and Roots<br />

Treatment: Malarial fever, Abdominal pain, Indigestion and<br />

Urine disorder<br />

Mode of utilization: Decoction of fresh leaves, seeds and fruits is<br />

taken for acidity, abdominal pain, indigestion, appetizers and<br />

preventing reoccurring of malarial fever and promote urine flow.<br />

Hibiscus subdariffa Linn.<br />

Vernacular name: Okhrivii<br />

Family: Malvaceae<br />

Part used: Leaves and Calyx<br />

Treatment: Tonic and Skin allergy<br />

Mode of utilization: Fresh as well as dried leaves and sepals is<br />

boiled and taken as a tonic to improve blood count in the body.<br />

Fresh sepals are crush and apply on the skin for allergy.<br />

Crassocephalum crepidiodes Benth.<br />

Vernacular name: Tabo Khephapha Pro<br />

Family: Asteraceae<br />

Part used: Leaves and inflorescence<br />

Treatment: Cuts and Wounds<br />

Mode of utilization: Fresh leaves and inflorescence are crushed<br />

into a paste and apply on the cuts and wounds to stop blood<br />

oozing.<br />

Physalis perviana Linn.<br />

Vernacular name: Tsiibobopro<br />

Family: Solanaceae<br />

Part used: Leaves and Fruit<br />

Treatment: Dysentry, Diarrhoea, Jaundice and Tonic<br />

Mode of utilization: The leaves are taken raw or boiled and the<br />

decoction is taken for diarrhea and dysentery. Leaves are crushed<br />

along with water in proportion with amount of leaves and taken<br />

for jaundice. The fruit is taken as a tonic and purifier of blood.<br />

Solanum torvum Sw.<br />

Vernacular name: Modoro Shiikhokha<br />

Family: Solanaceae<br />

Part used: Fruits<br />

Treatment: Blood pressure, Headache and fever<br />

Mode of utilization: Both fresh and dried ripe and unripe fruits is<br />

crushed and boiled with water and taken for blood pressure,<br />

headache, cold and fever.<br />

Solanum nigrum Linn.<br />

Vernacular name: Ohomira Kosopro<br />

Family: Solanaceae<br />

Part used: Fruits and leaves<br />

Treatment: Malarial fever and Jaundice<br />

Mode of utilization: The decoction of fresh leaves or with fruits<br />

is taken for jaundice and malarial fever.<br />

Solanum khasianum C. B. Clarke<br />

Vernacular name: Sokheriibvii<br />

Family: Solanaceae<br />

Part used: Seedpod<br />

Treatment: Toothache<br />

Mode of utilization: The dried seedpod as well as the placenta of<br />

the seed are rolled up in a paper and fumigate the affected teeth<br />

for toothache.<br />

Viscum articulatum Burm.<br />

Vernacular name: Otsiibu<br />

Family: Viscaceae<br />

Part used: Root<br />

Treatment: Bone fracture and Sprained<br />

Mode of utilization: The peelings of the epidermal layer of the<br />

root are crushed into a paste and apply to the affected part of the<br />

body from sprain and bone fracture.<br />

Zingiber officinale Rosc.<br />

Vernacular name: Ravo<br />

Family: Zingiberaceae<br />

Part use: Rhizome<br />

Treatment: Cough, Cold and fever, Throat and Witch spelled<br />

Mode of utilization: A thumb size of the rhizome is crush and<br />

boils with water and the decoction is drunk for treating cold and<br />

cough. The decoction is used for clearing the throat so as to<br />

produce a clear voice for singing. Also the rhizome is used for<br />

protection against the spell of evils by the witch or from the evil<br />

spirit.<br />

Momordica charantia Linn.<br />

Vernacular name: Khenavii<br />

Family: Cucurbitaceae<br />

Part used: Leaves<br />

Treatment: Fever, Headache, Blood pressure and Cold<br />

Mode of utilization: A bundle of fresh leaves or preferably a<br />

pinch or two of dry leaves is boiled and the whole preparation is<br />

taken to treat any type of fever, headache and cold.<br />

Cucurbita maxima Linn.<br />

Vernacular name: Omo<br />

Family: Cucurbitaceae<br />

Part used: Seed<br />

Treatment: Expulsion of Worms<br />

Mode of utilization: The roasted seeds numbering 10-15 are<br />

taken for the expulsion of worms from the stomach of the young<br />

ones.<br />

Passiflora edulis Lindl.<br />

Vernacular name: Kheboshii<br />

Family: Passifloraceae<br />

Part used: Fruit and leaves<br />

Treatment: Dysentry and Diarrhoea<br />

Mode of utilization: A handful or two bunches of fresh leaves are<br />

boiled with water and the decoction as well as the leaves is taken<br />

for treating dysentery, diarrhea and stomach upset. The fruit is<br />

also taken alone or in the form of chutney for the same treatment.<br />

Colocassia esculenta (Linn.) Schott<br />

Vernacular name: Obi<br />

Family: Araceae<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 233<br />

ISSN 2250-3153<br />

Part used: Rhizome/Tuber<br />

Treatment: Labour pain<br />

Mode of utilization: The rhizome/tubers are cooked in significant<br />

amount and given to the pregnant mother during labour pain for<br />

easy and quick delivery.<br />

Musa paradisica Linn.<br />

Vernacular name: Ovii<br />

Family: Musaceae<br />

Part used: Fruit<br />

Treatment: Diarrhoea<br />

Mode of utilization: One to three ripe bananas is taken at a time<br />

to subdued or stopped loose motion/ diarrhea. Unripe banana is<br />

roasted and taken for serious condition for the same ailment.<br />

Musa velutina Wendl. & Drude<br />

Vernacular name: Ovii Viichu<br />

Family: Musaceae<br />

Part used: Leaves<br />

Treatment: Sore Lips<br />

Mode of utilization: One or two fresh leaves are taken and warm<br />

up gently near the fire and dabbed on the affected part of the sore<br />

lips before going to bed for three to four times daily.<br />

Psidium guajava (Linn.) Kuntze<br />

Vernacular name: Pondal<br />

Family: Myrtaceae<br />

Part used: Fruit and young tender Leaves<br />

Treatment: Dysentry and Diarrhoea<br />

Mode of utilization: One or two handful bunches of young tender<br />

leaves are boiled and the decoction is taken for treating diarrhea<br />

and serious dysentery. Also the young leaves are also taken raw<br />

for the same treatment. The fruit is also taken raw for subduing<br />

the effect of loose motion or diarrhea.<br />

Glochidion oblatum J. D. Hooker<br />

Vernacular name: Lokhro todu<br />

Family: Euphorbiaceae<br />

Part used: Stem and Root<br />

Treatment: Dysentry<br />

Mode of utilization: Fresh stem and roots extracts are taken for<br />

dysentery.<br />

Embilica officinalis Gaertn.<br />

Vernacular name: Shiihoshii<br />

Family: Euphorbiaceae<br />

Part used: Fruit<br />

Treatment: Cold and Cough<br />

Mode of utilization: 3-5 numbers of fruits are eaten after every<br />

meal along with warm water for treating cold and cough.<br />

Mentha arvensis Linn.<br />

Vernacular name: Opfokoso pro<br />

Family: Lamiaceae<br />

Part used: Young shoot and Leaves<br />

Treatment: Stomache, Stomach upset and Constipation<br />

Mode of utilization: A bunch of young shoots and the leaves are<br />

either taken raw or boiled with water and the whole content is<br />

consumed for stomache, stomach upset and constipation.<br />

Chrysanthemum morifolium (L) Desmond<br />

Vernacular name: Shiipriipa<br />

Family: Asteraceae<br />

Part used: Leaves<br />

Treatment: Cough, diarrhea and dysentery<br />

Mode of utilization: Five to ten young leaves are raw chewed and<br />

taken for cough, diarrhea and dysentery.<br />

Juglans regia Linn.<br />

Vernacular name: Okhoshii<br />

Family: Juglandaceae<br />

Part used: Bark<br />

Treatment: Tooth plague and bleeding gums<br />

Mode of utilization: The peelings of the bark especially the inner<br />

layer are used for tooth plague as well as for gum bleeding by<br />

brushing against the teeth gently.<br />

Prunus persica (Linn.) Batsch.<br />

Vernacular name: Mikriihoshii<br />

Family: Rosaceae<br />

Part used: Leaves<br />

Treatment: Ring worm<br />

Mode of utilization: Five to ten fresh leaves are crushed by hands<br />

and the juice is rubbed on the affected portion for treating ring<br />

worm.<br />

III. RESULTS AND DISCUSSION<br />

The present study is the first of its kind with reference to Folk<br />

medicinal plants of the Mao Naga in northeast, India, which has<br />

reveals the use of diverse plants consisting of 39 families, 57<br />

genera and 61 species for treating various ailments and diseases<br />

in a traditional method. It is observed that many of the plant<br />

species that are used by them have a broad spectrum for treating<br />

for various diseases with the same plant. The thirty common<br />

diseases that are prevailing amongst the community are treated<br />

with 61 species which are available in their surroundings. The<br />

most common part of the plant utilized by the indigenous people<br />

is leaves with 32 species recorded for various ailments and<br />

treatments. Flower and inflorescence are the least part of the<br />

plant with only two species viz. Crassocephalum crepidiodes and<br />

Hibiscus subdariffa used for treating cuts and wounds and tonic<br />

as an appetizer in the present study. The whole plant, stem, bark,<br />

seeds and fruits are moderately used by the Mao‘s as medicinal<br />

purposes. The most common plant used for fever and headache is<br />

the leaves of Mormodica charantia. The indigenous people<br />

considered this plant as a panacea and heavily depended on the<br />

plant for all purposes for treating the sick persons. The fruit of<br />

Rhus semialata is considered a potent for treating diarrhoea,<br />

dysentery and stomach related problems and the dry fruit is<br />

preserved and kept throughout the year in every home. The fruit<br />

and the seeds of Solanum torvum are dried and preserved and<br />

kept at home throughout the year for any eventuality among the<br />

family for treating several diseases such as cold, fever, headache,<br />

stomache and blood pressure. These are some of the important<br />

medicinal plants for the indigenous people as a home remedy<br />

since time immemorial. The leaves of Maesa indica used by the<br />

Mao Naga from northeast India, as an agent for clearing the<br />

throat/vocal cord for producing a melodious sound is unique and<br />

interesting. The most dominant family of the present study is<br />

Asteraceae with 10 species which is in conformity with study of<br />

Saklani & Jain (1994) in which they have reported the same<br />

family as the most dominant family of medicinal plants across<br />

the North Eastern States of India. The second most important<br />

family with a record of 5 species as medicinal plants during the<br />

present survey is Solanaceae. Despite of the richness of plant<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 234<br />

ISSN 2250-3153<br />

wealth in the area the numbers are dwindling every passing day<br />

due to deforestation for agricultural practices and various<br />

developmental activities. Therefore there is a dearth need for<br />

conservation of these precious medicinal plants for further<br />

scientific study to harvest its constituents to cater the needs of<br />

vibrant healthcare products in future.<br />

IV. CONCLUSION<br />

The Mao Nagas are settled agriculturalist and heavily<br />

depended upon the cultivated and wild plants for their survival as<br />

they live at the proximity of the hill forest. They practiced<br />

organic farming since time immemorial and consumed the<br />

products which are free from hazardous elements that keep them<br />

healthy. Thorough scientific study is required so as to tap the<br />

plant rich resources with special reference to the Mao folk<br />

medicinal plants, which, there is a probability of discovering new<br />

compounds for developing into a modern medicine. Despite of<br />

the richness of plant wealth in the area the numbers are<br />

dwindling every passing day due to deforestation for agricultural<br />

practices and various developmental activities. Therefore there is<br />

an urgent need for conservation and management of these<br />

precious medicinal plants for sustainable use and scientific study<br />

so as to harvest its constituents to cater the needs of vibrant<br />

healthcare products in future.<br />

ACKNOWLEDGMENT<br />

The author is thankful to all the Folk medicine practitioners,<br />

elders and the people of the Mao Naga tribe for their helped and<br />

sincere co-operation throughout the survey and field trips in their<br />

respective locality. Sincere thanks to BSI, Shillong for<br />

identification and accessed to their herbarium.<br />

REFERENCES<br />

[1] Ao Alemchiba, M.<br />

1970 A brief historical account of Nagaland, Kohima: Naga Institute of<br />

Culture.<br />

[2] Buragohain Jitu.<br />

2011 Ethnomedicinal Plants Used by the ethnic Communities of Tinsukia<br />

District of Assam, India. J. Rec. Res. Sci. and Techno, 3(9): 31-42.<br />

[3] Chankija, S.<br />

1999 Folk medicial Plants of the Nagas in India. Asian Folk Studies, 58:<br />

205-230.<br />

[4] Chatterjee , S., Saikia, A., Dutta, P., Ghosh, D., Pangging, G. and<br />

Goswami, A. K.<br />

2006 Biodiversity Significance of North East India. WWF-India, New<br />

Delhi.<br />

[5] Haridasan, K. and Rao, R. R.<br />

1985-86 Forest flora of Meghalaya, 2 vols. Bishen Singh Mahendra Pal<br />

Singh, Dehradun.<br />

[6] Horam, M.<br />

1975 Naga Polity, B. R. Publ. Corp. Delhi.<br />

[7] Jain, S. K. Rao, R. R.<br />

1977 A handbook of field and herbarium methods. Today and tomorrow‘s<br />

printers and Publishers, New Delhi.<br />

[8] Jamir, N.S. and Rao, R. R.<br />

1990 Fifty new or interesting medicinal plants used by the Zeliang of<br />

Nagaland (India), Ethnobotany 2: 11-18.<br />

[9] Jamir, N. S., Takatemjen and Limasemba.<br />

2008 Traditional knowledge of Lotha-Naga tribes in Wokha district,<br />

Nagaland, Indian J. Tradit. Knowle. 9(1): 45-48.<br />

[10] Kala Chabdra, P.<br />

2005 Ethnomedicinal botany of the Apatani in the Eastern Himalayan<br />

region of India. http://www.ethnobiomed.com/content/1/1/11.<br />

[11] Kanjilal, U. N. Kanjilal, P. C., De, R. N. and Das, A.<br />

1991 Flora of Assam. 1-4 vols. Govt. of Assam. Shillong.<br />

[12] Mao A. A.<br />

1993 A preliminary report on the folklore Botany of Mao Naga of Mnaipur<br />

(India), Ethnobotany 5: 143-147.<br />

[13] Mao A. A.<br />

1998 Ethnobotanical Observation of Rice Beer ‗Zhuchu‘ preparation by the<br />

Mao Naga tribe from Manipur (India), Bull. Bot. Surv. India. 40(1-4): 53-<br />

57.<br />

[14] Mao, A. A, Hyniewta, T. M and Sanjappa, M.<br />

2009 Plant Wealth of Northeast India with reference to ethnobotany, Ind. J.<br />

Tradit. Knowle. 8(1): 96-103.<br />

[15] Mao, A. A, Hynniewta, T. M.<br />

2009 Plants used as Agricultural seasons indicator by Mao Naga tribe,<br />

Manipur, India, Ind. J Tradit Knowle,10(3): 578-580.<br />

[16] Mao, A. A.<br />

1999 Some symbolic and superstitious botanynical, folklore about Mao<br />

Naga tribe of Manipur (India), J. Econ. Taxon. Bot. 23(2): 625-628..<br />

[17] Megoneitso and Rao R. R.<br />

1983 Ethnobotanical studies in Nagaland, sixty two medicinal plants used<br />

by the Angami-a Naga, J. Econ. Taxon. Bot. 4(1): 167-172.<br />

[18] Neogi, B., Prasad M. N. V. and Rao R. R.<br />

1989 Ethnobotany of some weeds of Khasi and Garo Hills, Meghalaya,<br />

Northeastern India, J. Economic Botany. 43(4): 471-479.<br />

[19] Rai, P. K. and Lalramnhinglova, H.<br />

2010 Lesser Known Ethnomedicinal plants of Mizoram, North East India:<br />

An Indo-Burma hotspot region, J. Medicinal Plants Research. 4(13): 1301-<br />

1307.<br />

[20] Rao, R. R. and Jamir, N. S.<br />

1990 Ethnobotanical of the Ao and Angami Nagas of Nagaland. J. Econ.<br />

Bot. 4(3): 593-604.<br />

[21] Rao, R. R. and Jamir, N. S.<br />

1982a. Ethnobotanical studies in Nagaland 1. Medicinal plants, Econ.<br />

Bot.36: 176-181.<br />

[22] Rao, R. R. and Jamir, N. S.<br />

1982b.Ethnobotanical studies in Nagaland 2. Fiftyfour Medicinal plants<br />

used by Nagas, J. Econ. Bot.3 (1): 11-17.<br />

[23] Rout, J., Sanjem, A. L. and Nath, M.<br />

2010 Traditional Medicinal Knowledge of the Zeme (Naga) tribe of North<br />

Cachar Hills District, Assam on the treatment of Diarrhoea, Assm. Univ. J.<br />

Sci. and Tech. Biol. and Environ. Sci. 5(1): 63-69.<br />

[24] Saklani, A and Jain, S. K.<br />

1994 Cross cultural ethnobotany of Northeast India. New Delhi: Deep<br />

Publications.<br />

[25] Sanjem Albert, L., Rout, J. and Nath, Minaram.<br />

2008 Traditional Tribal knowledge and Status of some Rare and Endemic<br />

medicinal Plants of north Cachar Hills District of Assam, Northeast India, J.<br />

Ethnobotanical Leaflets. 12: 261-275.<br />

[26] Shil, S. and Choudhury, M. D.<br />

2009 Ethnomedicinal Importance of Pteridophytes used by Reang tribe of<br />

Tripura, North East India, J. Ethnobotanical Leaflets. 13: 634-43.<br />

[27] Singh, H., Birkumar Prasad, P. and Rai L. K.<br />

2002 Folk Medicinal Plants in the Sikkim Himalayas of India. 61: 295-310.<br />

[28] Sonowal, R. and Barua, I.<br />

2011 Ethnomedical Practices among the Tai-Khamyangs of Asssam, India.<br />

J. Ethno. Med. 5(1): 41-50.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 235<br />

ISSN 2250-3153<br />

AUTHORS<br />

First Author – Adani Lokho, Department of Botany, Siksha<br />

Bhavan, Visva Bharati, Santiniketan West Bengal-731235,<br />

Email:lokhoabba@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 236<br />

ISSN 2250-3153<br />

Women and Soap-Operas: Popularity, Portrayal and<br />

Perception<br />

Abstract- In the multi-media world of today, television has<br />

emerged as an important instrument of transmission of<br />

knowledge and information. Working as a complimentary agent<br />

to other sources, television has enhanced the process of change<br />

by providing timely information about education, hygiene,<br />

health, customs and so on. The purpose of television is to inform,<br />

educate and entertain its viewers. Television, because of its<br />

predominance of visual movement has the capacity of bringing<br />

the world into the living room with great authenticity and<br />

efficacy. As a result of this, television has a more profound and<br />

persuasive impact on its viewers, particularly women. Women<br />

are treated as ―special audience groups‖, so that appropriate<br />

measures can be taken to cater to their propensities and<br />

inclinations. In this context, problems and issues pertaining to<br />

women are shown regularly on television in different<br />

programmes. Soap operas are one of the most popular genres on<br />

television and as a cultural produce, this format is extremely<br />

popular among the masses. Soap-operas, inevitably, have<br />

attracted a large and loyal fan base. Soaps enjoy a momentous<br />

and immense popularity among the contemporary society and<br />

they have found a place for themselves and also allow a<br />

multiplicity of interpretations to suit the diverse tastes of the<br />

dominant Indian middle class.<br />

Index Terms- Television, women, soap-operas, popularity,<br />

audience.<br />

T<br />

I. SOAP OPERAS<br />

he term "soap opera" was coined by the American press in<br />

the 1930s to denote the extraordinarily popular genre of<br />

serialized domestic radio dramas, which, by 1940, represented<br />

some 90% of all commercially-sponsored daytime broadcast<br />

hours. The "soap" in soap opera alluded to their sponsorship by<br />

manufacturers of household cleaning products; while "opera"<br />

suggested an ironic incongruity between the domestic narrative<br />

concerns of the daytime serial and the most elevated of dramatic<br />

forms. The defining quality of the soap opera form is its seriality.<br />

Soap operas are of two basic narrative types: "open" soap operas,<br />

in which there is no end point toward which the action of the<br />

narrative moves; and "closed" soap operas, in which, no matter<br />

how attenuated the process, the narrative does eventually close.<br />

(Pingree and Cantor,1983). Examples of the open soap include<br />

(The Guiding Light, etc.), the wave of primetime U.S. soaps in<br />

the 1980s (Dallas, Dynasty, Falcon Crest), such British serials as<br />

Coronation Street, East Enders, and Brook side), most Australian<br />

serials (Neighbours, Home and Away, A Country Practice), and<br />

Indian soaps as Balika Vadhu, Uttaran Pavitra Rishta enjoy<br />

Dr. Aaliya Ahmed<br />

Media Education Research Centre, Kashmir University, India<br />

immense popularity. The closed soap opera is more common in<br />

Latin America, where it dominates primetime programming from<br />

Mexico to Chile. In India, Geet, Dil Mil Gaye fall in this<br />

category. These ‗telenovelas‘ are broadcast nightly and may<br />

stretch over three or four years and hundreds of episodes. They<br />

are, however, designed eventually to end, and it is the<br />

anticipation of closure in both the design and reception of the<br />

closed soap opera that makes it fundamentally different from the<br />

open form. The term itself signals an aesthetic and cultural<br />

incongruity: the events of everyday life elevated to the subject<br />

matter of an operatic form.<br />

II. AUDIENCE AND SOAP OPERAS<br />

Soaps in general have a predominantly female audience,<br />

although prime-time soaps such as Dallas (U.S), Bade Acche<br />

lagte hain (BALH) are aimed at a wider audience, and in fact at<br />

least 30% of the audiences for this soap are male. According to<br />

Ang, in Dallas the main interest for men was in business<br />

relations and problem and the power and wealth shown, whereas<br />

women were more often interested in the family issues and love<br />

affairs. In the case of BALH, it is clear that the programmes<br />

meant something different for female viewers compared with<br />

male viewers.<br />

The audience for soaps does include men sometimes but<br />

some theorists argue that the gender of the viewer is 'inscribed' in<br />

the programmes so the soaps address women in particular. Soaps<br />

appeal to those who value the personal and domestic world.<br />

Dorothy Hobson argues that women typically use soaps as a way<br />

of talking indirectly about their own attitudes and behavior.<br />

There is no doubt that viewing and talking with family and<br />

friends about soap operas is experienced by many women as a<br />

pleasurable experience, and the dismissal of the worth of the<br />

genre by many commentators, including some feminists critical<br />

of gender stereotyping, is open to the charge of cultural elitism.<br />

Some feminist theorists have argued that soap operas spring from<br />

a feminine aesthetic, in contrast to most prime-time television.<br />

Women are stereotyped in soap operas but the image of the<br />

modern women has changed. From being a meek, docile,<br />

subservient housewife, she has grown and evolved into a strong<br />

individual. She not excels in her profession but is also an able<br />

homemaker. This change is partially if not fully perceptible in<br />

the soap operas shown on Indian television.<br />

Soaps create a world dominated by interpersonal relationship,<br />

where characters discuss marital, romantic and family problems.<br />

There is little physical violence or crime. The soap opera world<br />

seems emotionally hazardous-mainly because of the continual<br />

sorting and re-sorting of relationships.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 237<br />

ISSN 2250-3153<br />

Soaps undoubtedly have immense potential to present positive<br />

images of contemporary women, a potential similar to that of<br />

other forms of media designed for women‘s service-newspapers,<br />

magazines, radio forums and so on. Soaps focusing on<br />

relationships and family life could easily present more story lines<br />

and characters, discussing social issues and problems central to<br />

their changing roles. Soaps opera writers have contended that<br />

part of their mission is to teach the ―lesson of life‖ to their<br />

viewers (Nixon, 1972, LeMay, 1982). Soaps are an example of<br />

women‘s literature that supports the status quo regarding<br />

women‘s place in the social order. Women‘s concern in soaps are<br />

changing somewhat. Many women leave a family – centered<br />

world to become an integral part of the work world.<br />

III. PORTRAYAL IN SOAP OPERAS<br />

Though not as strongly as in earlier years, the portrayal of<br />

both men and women on television is largely traditional and<br />

stereotypical. This serves to promote a polarization of gender<br />

roles. With femininity are associated traits such as emotionality,<br />

prudence, co-operation, a communal sense, and compliance.<br />

Masculinity tends to be associated with such traits as rationality,<br />

efficiency, competition, individualism and ruthlessness. Meehan<br />

has shown how on TV, 'good' women are presented as<br />

submissive, sensitive and domesticated; 'bad' women are<br />

rebellious, independent and selfish. The 'dream-girl' stereotype is<br />

gentle, demure, sensitive, submissive, non-competitive, sweetnatured<br />

and dependent. The male hero tends to be physically<br />

strong, aggressive, and assertive, takes the initiative, is<br />

independent, competitive and ambitious. TV and film heroes<br />

represent goodness, power, control, confidence, competence and<br />

success. They are geared, in other words, to succeed in a<br />

competitive economic system. There is no shortage of aggressive<br />

male role-models in Westerns war films and in contemporary<br />

Indian soap-operas. Soaps have no beginning or end, no<br />

structural closure. (Pingree and Cantor,1983). They do not build<br />

up towards an ending or closure of meaning. Viewers can join a<br />

soap opera at any point. There are built-in devices to recap on<br />

aspects of the plot. There is no single narrative line. In this sense,<br />

the plots of soaps are not linear. Narrative lines are interwoven<br />

over time. The structure of soaps is complex and involves<br />

multiple perspectives and no consensus. Ambivalence and<br />

contradiction is characteristic of the genre. This leaves soaps<br />

particularly open to individual interpretations. .<br />

Television offers a wide range of potential role-models, both<br />

positive and negative. Many people find these models of some<br />

use to them. It is not inevitable that viewers accept television<br />

gender images without question, but many popular commentators<br />

tend to assume that they are more discriminating than ordinary<br />

mortals. Not all women, children - or even men - are passive<br />

victims of patriarchal stereotyping. Though there is little doubt<br />

that television presents largely traditional gender images, there is<br />

mixed evidence about the impact of such images on gender<br />

attitudes and behavior. It is difficult to isolate the role of<br />

television, since people are influenced by their whole<br />

environment, although there is fairly widespread agreement that<br />

over time television seems likely to influence people's ideas<br />

about gender roles.<br />

Most significantly though, soap opera's concern with the<br />

everyday lives of everyday people and their problems, big and<br />

small, appears to be one of the main reasons why this genre is so<br />

popular .’Hum Log’, the first soap on Indian television also<br />

represented the values, thinking and beliefs of the middle-class<br />

Indians and was tremendously popular among all sections of<br />

society.(Singhal and Rogers, 2001). The soaps that followed<br />

dealt with different issues prevalent at that time. Soaps that<br />

gained immense popularity were „Humrahi‟, „Bunyaad‟, „Yeh jo<br />

hai Zindagi‟ „Tamas‟, „Mahabharata‟, „Ramayana‟. Telecast at<br />

the national level, they were watched by a large section of<br />

society across the country. The surveys conducted by various<br />

agencies revealed that the viewers rotated their work and leisure<br />

patterns around the timing of these soaps so as to avoid missing<br />

of any of the episodes. These soaps were telecast from<br />

Doordarshan which is available throughout the country.<br />

However, soaps gained momentum in Indian history of<br />

broadcasting when cable television came to India and soaps<br />

became a regular fare in television programming. They soon<br />

captured the attention of the viewers and these soaps took the top<br />

position in the rating scales. For a majority of viewers, soaps are<br />

a major attraction for them to watch television for 2-3 hours<br />

every day and without any breaks. Each satellite channel<br />

approximately telecasts 10-12 soaps everyday of half hour<br />

duration and run into 100s of episodes for 3-4 years<br />

continuously.<br />

IV. TELEVISION AND SOAP OPERAS IN INDIA<br />

Television, in recent times, has emerged as the most powerful<br />

and all pervading force throughout the world. It can disseminate<br />

information with lightning speed and impact, as well as infuse<br />

viewers with images and values in subtle and imperceptible<br />

manner. Because of its very inherent nature, television not only<br />

reflects the values of our society but also influence them.<br />

Indications from research suggests that TV has had a significant<br />

impact on the personal reality structure of its viewers.(Seiter,<br />

Borchers, Kreutzner and Warth, 1989). Television programmes<br />

lead to awareness, provide information which creates curiosity in<br />

the minds of its viewers. Communication is not only an essential<br />

element to the persistence of social order but to look at it more<br />

positively, communication can be an effective means to<br />

developmental change. There is no denying the fact that<br />

television is a major force to be dealt with in our society.<br />

Television in India today has acquired newer dimensions, greater<br />

popularity and a much wider reach. The satellite invasion of<br />

India in 1993 has contributed the most to the multi-lateral, multilingual,<br />

and multi-channel television system, operating on an<br />

elaborate schedule. The moving images of television demand<br />

attention and eventually influence the thoughts and behavior of<br />

the viewers Television has entered our life and become an<br />

inseparable part of our daily lives<br />

The phenomenal expansion of Indian television in recent<br />

years has influenced people in two ways. First, those living in<br />

remote corners have been pulled and merged into the national<br />

mainstream. Secondly television has contributed to an<br />

unprecedented explosion of information in our times. (Gopal<br />

Saxsena, 1996) An awareness of the socio-economic<br />

developmental plans can be ascribed to the wide-reach of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 238<br />

ISSN 2250-3153<br />

television. The breaking down of social-barriers can reasonably<br />

be attributed to the presence of television in our lives<br />

Waves of dynamic changes have flashed across the canvas of<br />

Indian television during the last decade. Earlier Indian television<br />

was restricted to Government-controlled Doordarshan only. But<br />

currently there are more than 400 channels available on the<br />

Indian television diaspora offering round the clock services and<br />

multifarious programming to a huge, heterogeneous television<br />

audience. STAR TV, ZEE TV, Sony, have been offering<br />

variegated programmes of various dimensions and perspectives.<br />

Invariably, Doordarshan projected some interesting programmes.<br />

They not only included programmes like ―Patrika‖ or<br />

―Spectrum‖ but also number of serials were telecast. These<br />

included well known works of literature like ―Raag<br />

Darbari‖,―Nirmala‖ (Premchand), ―Pratham Pratishruti‖<br />

(Ashapoorna Devi)‖Charitraheen‖ and ―Shrikant‖(Sharat<br />

Chandra). Epics like ―Mahabharata‖ , ‖Ramayana‖ and ―The<br />

Bible‖ have been among the very popular telecasts. Equally<br />

noteworthy has been: Gul Gulshan Gulfam: bearing on the life in<br />

a Shikara in Kashmir and other aspects of its social life. (Gopal<br />

Saxsena,1996).<br />

―Hum Log‖ however, was successful in setting a trail for the<br />

soap-opera to assert itself with an identity in this country. Along<br />

with ―Yeh Jo Hai Zindagi‖ which was packed with fun and<br />

frolic, made a substantial contribution to Doordarshan's software<br />

programming in those years. Both were immensely popular and<br />

became the measuring yardsticks for other serials that followed.<br />

―Khandaan‖ was yet another popular soap-opera which was<br />

telecast in 1985. It portrayed the day-to-day wranglings,<br />

intrigues, conspiracies and rivalries of high-class industrialists.<br />

Those identifying with the various characters found their own<br />

moods and moorings reflected in the soap-opera. ―Nukkad‖ was<br />

another sponsored serial on the soap-operatic style, which made<br />

its presence felt in India. It portrayed common man‘s actions and<br />

reactions, caused by different incidents taking place in the life of<br />

different characters.<br />

However, it was ―Buniyaad‖ which was presented in the true<br />

tradition of a soap-opera. Running into 104 episodes, it was<br />

woven round the life of a family of pre-partition Punjab. The<br />

sufferings and acts of fortitude of those affected were shown in<br />

this soap-opera. This was followed by ‖Humraahi‖ which was<br />

conceived and designed as a purposive serial from Doordarshan.<br />

The important aspect of the serial was the emphasis it laid on the<br />

status of women in India. Their various problems from early<br />

marriage to higher education and other problems were taken up<br />

in different episodes of this serial. Clashes between tradition and<br />

modernity were depicted. It was a success story and even<br />

garnered international acclaim as an effort to motivate people to<br />

reinforce the power of social communication. America‘s ―The<br />

Soap Opera Digest‖ attributed it as ―Soap in the Service of<br />

Society.‖<br />

There are clear indications that soap-operas are a format<br />

which carry great appeal for a large audience. Popularity of soaps<br />

like from ―Parvarish‖(Sony), ‗Kya Hua Tera<br />

Wada‖(Sony),‖Afsar Bitiya,‖ ―Punar Vivaah―(ZeeTV) ―Iss Pyaar<br />

Ko Kya Naam Doon‖ (STAR),‖Kucch To Log Kahenge‖(Sony)<br />

confirm that soaps have come to stay in India.<br />

Watching these soaps has become a way of life. The<br />

engagements, both indoors and outdoors are once again<br />

conditioned by the telecast schedule of these soaps. According to<br />

Anand Mitra:<br />

―Television and all that encompasses it now implicates<br />

popular culture, social, political practices. It is this mature<br />

medium that can now reshape Indian popular Culture.‖(Gopal<br />

Saxsena,1996)<br />

Frank and Gerbner (1980), in their study combined market<br />

segmentation and need and gratification research in their survey.<br />

They present explanation for why people watch that vary from<br />

one audience segment to another. Members of the soap opera<br />

audience are intellectually limited and watch soap because they<br />

are socially isolated, lonely and emotionally deprived. Herta<br />

Herzog (1944) reported three reasons for listening to radio soaps.<br />

a. Emotional release – a chance to know that others<br />

have a problem too.<br />

b. Wishful thinking -they fill in gaps in the listeners<br />

own lives or compensate for families.<br />

c. Advice -practical explanations of appropriate<br />

patterns of behavior, useful when confronted with<br />

various life situations.<br />

One important area of mass media research is the extent to<br />

which television influences viewers concepts of social reality,<br />

Gerbner and Gross (1976) argue that television is the central<br />

cultural arm of American society serving to socialize people into<br />

standardized roles and behaviors. Television accomplishes this<br />

through a presentation of basic assumption about the way life is<br />

and what values are important. They suggest that television<br />

cultivates people‘s beliefs, about how the world works more<br />

through the sum total of interactions, behaviors and values<br />

present in television content. Buerkle-Rothfuss and Maryes<br />

argue.<br />

―There appears to be an important relationship between what<br />

a person watches on soap operas and what he or she believes to<br />

be true about those aspects of the ‗real world‘ which tends to be<br />

portrayed with exaggerated frequency on soap operas‖.<br />

While reviewing soap opera audience, less attention has<br />

been paid to how soap operas affect consciousness, especially<br />

feminist consciousness. Feminist have argued that although soaps<br />

are women‘s fiction, they present a conservative view of the<br />

world. Many of the interactions that occur on soaps are family<br />

centered / spouses, parent, child and so forth. Viewers may tend<br />

to believe that families are centrally important.<br />

Soap operas are a unique form of entertainment, different<br />

from other television drama, although both are broadcast over the<br />

same networks. There are suitable differences among the soaps<br />

themselves-differences in format, content / expressive elements<br />

and audience. As the audiences have changed over the years, so<br />

has the content of soap operas, more so by the production mode,<br />

which has extended glamour and glitz to this T.V. format.<br />

V. SOAP OPERAS AND THEIR POPULARITY<br />

Soap-opera is the most popular form of television<br />

programming in the world. A large proportion of television<br />

viewers watch and enjoy soap-operas. Soap-operas dominate the<br />

national audience ratings over other programmes that are<br />

telecast. The popularity of soap-opera appears to rest on its<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 239<br />

ISSN 2250-3153<br />

undemanding nature and its preoccupation with everyday<br />

concerns. (Pingree and Cantor, 1983) .This undemanding nature<br />

has been seen as one of the contributory factors to the genres<br />

popularity. Most significantly, soap operas concern with the<br />

everyday lives of everyday people and their problems, big and<br />

small, appears to be the other reason for this genre being so<br />

popular. Some soaps, like Balika Vadhu ( Colors) are referred to<br />

as being 'realistic' in that they focus on the domestic and<br />

personal, and on everyday concern and problematic issues such<br />

as death, friendship, marriage, romance and divorce, personal<br />

relationship and the role of the female in the marital home. Soap<br />

operas which contain these 'social realist conventions' attract the<br />

attention of the soap viewer, who enjoys watching the portrayal<br />

of many things that are happening today, including the problems<br />

that we face in day to day lives. It can, however, be argued that<br />

soap opera owes a part of its popularity to the fact that the viewer<br />

even enjoys forming a kind of participatory 'relationship' with the<br />

character, and also like to identify themselves with the plots and<br />

character. At the same time, they experience the gratification of<br />

forming para - social relation with the character. It is due to this<br />

formation of para - social relations that enables the soap- opera<br />

viewers to gain pleasure from being able to understand how a<br />

certain character feels or behaves in particular circumstances,<br />

due to themselves having been in a similar situation. This para<br />

social relationship can be recognized in its extreme form when a<br />

viewer puts himself deeply into a character, so that he can feel<br />

the same emotion and experience, the same events as the<br />

character is supposed to feel. (Pingree and Cantor,1983).<br />

Another point of identification which the viewer enjoys<br />

forming with the characters is that of personal identity. Based on<br />

personal experience, it is evident that viewers often use the<br />

behavior of a character in order to justify their behavior in a<br />

similar situation. In this context, the popularity of soap- opera<br />

stems from the pleasures offered by the points of identification<br />

presented by the characters. Viewers want to watch what happens<br />

to those specific characters locked into specific network of<br />

relationships. (Pingree and Cantor,1983).<br />

Soap-opera is also popular due to its continuity, regularity and<br />

familiarity. It has been labeled as a' ritual pleasure ' which offers<br />

reassurance in its familiarity and longevity, its predictable<br />

familiarity being the main force which pulls us in. (Mary Ellen<br />

Brown,1994) .Also due to the soap being solely based in one<br />

place geographical and portraying the lives of same characters in<br />

each episode, the viewer can be assured of familiarity and<br />

continuity. This familiarity, however does not cause it to become<br />

boring because as Geraghty argues, ―the presence of' well<br />

established characters leads to value familiarity and predictability<br />

in the audience who relish change and disruption (Mary E.<br />

Brown,1994).<br />

The distinct popularity of soap-opera can also be attributed to<br />

its ―openness―in that it is an open text with no start, middle or<br />

end. It is continuous, consistent and open-ended following into<br />

the next episode. ―The viewer is presented with a range of<br />

conflicting viewpoints- interest rests on the juxtaposition of'<br />

them, in that there‘s no single answer, and he has to resolve the<br />

issue himself"' (Mary E. Brown, 1994). The implication is<br />

evident that the viewer is actively involved as he predicts and<br />

speculates the future events. The resolutions are left open to<br />

viewer‘s interpretation (Mary E. Brown,1994) and he enjoys it,<br />

thus adding to the popularity of the genre.<br />

Talking about television program‘s and what has happened in<br />

them is essential to making a program popular (Seiter, Borchers,<br />

Kreutzner and Warth, 1989). It has been argued that discussing<br />

soaps can seem to be very therapeutic, as there is some evidence<br />

to prove that viewers talk about certain issues in the soaps as a<br />

way of discussing their own problems, "with some of the serious<br />

issues we have dealt with, they were carefully researched and<br />

they have had positive results in the community". (Seiters,<br />

Borchers, Kreutzner and Warth, 1989)<br />

We cannot escape from the fact that soap operas are one of<br />

the most popular genres on television. An increasing amount of<br />

research has been carried out as to why this is the case, one<br />

important field of study being associated with the uses and<br />

gratifications of the viewers. The presence of suspense, where<br />

viewers are kept guessing about the characters and their fate also<br />

seems to be a major factor relating to the soaps' popularity. Many<br />

viewers also like to predict future events, and gain pleasure from<br />

doing so.<br />

Remarkably, there are a large number of different characters<br />

who all take an equal role in the soaps, although during one<br />

episode one may find particular focus on one or two specific<br />

characters: it is not usually for too long, before the camera<br />

focuses on another character. In this way, the viewer cannot<br />

become bored with certain characters and their problems.‖ The<br />

popularity of soap opera appears to rest on its undemanding<br />

nature and its preoccupation with everyday concerns"<br />

(Livingstone 1990). Indeed, it has been argued that the<br />

undemanding nature of soap opera can be seen as a contributory<br />

factor to the genre's popularity. For example, a regular viewer of<br />

a particular soap opera may find viewing an undemanding<br />

activity due to his or her familiarity with the plots and characters.<br />

This could, therefore, mean that soaps are easy viewing for their<br />

fans due to the low level of concentration needed in<br />

comprehending each episode, as illustrated here: a person who<br />

has been a fan of a particular show hasn't seen the show for<br />

years, only to catch up for the missed years by watching only one<br />

or two episodes" (Brown 1994).<br />

Soap opera as a genre has been successful in creating a style<br />

that fits well with women‘s discourse and problems. Women in<br />

the relationship established through discussion about the soap<br />

and in the affective pleasure of watching practice can establish<br />

solidarity among themselves that they may operate as a threat to<br />

dominant ideological system.<br />

VI. SOAP OPERAS IN DEVELOPING COUNTRIES<br />

Soap- operas are proving to be especially influential in<br />

developing countries. They can improve marital communication,<br />

advise people on HIV and AIDS prevention, and counsel<br />

children about how to get along with their parents. Researchers<br />

in Ohio University, in their study of a radio soap-opera broadcast<br />

in India suggest the programs can carry effective educational<br />

messages and change mass behavior. According to Arvind<br />

Singhal, ―if the message is appropriate and the problem is<br />

common, you reach a large number of people with this<br />

communication‖. Soaps -operas needn't be perceived as a<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 240<br />

ISSN 2250-3153<br />

mindless genre. Viewers have an ongoing relationship with<br />

characters so they become an important part of their daily life.<br />

His studies have also drawn from the social learning theory,<br />

which suggests that human beings don't always learn directly<br />

from the humans, but learn from observing characters in mass<br />

media .Evidence was seen where a radio soap -opera was used in<br />

Northern India-where .population problems were increasing and<br />

soap operas changed the perspectives of people on a number of<br />

issues. Researchers at University of Mexico and Ohio University<br />

analyzed feedback to the themes in "Tinka Tinka Sukh "<br />

.(Happiness lies in Small Things ).It was a 104 episode program<br />

broadcast in 1996 over 27 radio stations to an estimated tens of<br />

millions of listeners in the Hindi speaking region. Topics<br />

included community pride, equal treatment of boys and girls,<br />

marital issues, empowerment of women, educating women and<br />

many other gender themes. Nearly 150,000 letters were received;<br />

including a letter signed by an entire village that noted the soap-<br />

opera encouraged better treatment of women and increased<br />

school attendance among children in the village.<br />

VII. CONCLUSION<br />

Media are very effective, powerful and influential in<br />

disseminating new knowledge, useful for behavior change among<br />

women, thus influencing women‘s empowerment variables as<br />

well. Hum Log in 1987, which reached an audience of 80 million<br />

promoted smaller families and equal status for women. Humraahi<br />

focused on the rights of women to equal education and<br />

employment, to choose their own marriage partners, and to<br />

determine whether and when to have children. The exposure of<br />

woman to media, media portrayal of women in the media, are<br />

some of the important dimensions to be analyzed to examine the<br />

role of media in women‘s empowerment. Exposure to media,<br />

particularly television because of its visual aspect causes<br />

knowledge accumulation and behavior change among women<br />

reflecting the participation of women in decision – making, inter<br />

family communication and role-negotiation of women at home<br />

which can help in achieving better quality of life. The Beijing<br />

Platform of Action (BPFA) outlines two strategic objectives in<br />

regard to women and media that are aimed at promoting<br />

women‘s empowerment and development-1) increase the<br />

participation and access of women to expression and decision –<br />

making through the media and new – technologies of<br />

communication ; 2) promote a balanced portrayal of women in<br />

the media.<br />

Television is a cultural commodity. At the same time, it is a<br />

two vision mirror-reflecting society and in turn being modified<br />

by society. McLuhans medium is the message holds true even in<br />

the new millennium. Genre of soap –opera has over the years<br />

made rapid development in terms of content, presentation and<br />

production. Issues like rape, extra marital relationship, murder<br />

which were considered taboo even to be talked have earned<br />

acceptance in the social setup of our country. People no-longer<br />

switch off their TV sets when a situation of this type arises. They<br />

are curious to see how the issue is resolved. But soaps portraying<br />

interpersonal problems, crisis in the family, balance between<br />

career and home, modern yet traditional in beliefs and values<br />

have gained immense popularity among the masses.<br />

It can be said that soap operas in some ways have given<br />

women their voice. Discussions about soap-operas provide an<br />

outlet for a kind of discourse in which problems about women<br />

can be heard. Paradoxically, soap operas are still spoken of as<br />

trash. If women‘s lives and women‘s stories are to be taken<br />

seriously, then women genres need a serious look.<br />

Women feel connected to the soap operas since they can<br />

relate their own personal and business life to the show. The<br />

viewers sustain a steady relationship with the characters that<br />

relate to themselves and these characters help the viewers find<br />

their own inner self. Watching soap-operas is more meaningful to<br />

women. They are a reflection of the viewer‘s life. It helps the<br />

viewers deal with their own problems and it motivates them to do<br />

what normally women consider the impossible to achieve and do.<br />

Femininity is also shown by the way ―the viewer is positioned by<br />

the narrative‖, who analyses the character he is watching. This<br />

makes the viewer utilize the skills she is watching being enacted.<br />

Also lot of beauty and glamour is attached to the different roles<br />

of women. This offers another ―textual contribution of possible<br />

modes of femininity on which women can draw when<br />

constructing and reconstructing their feminine identities‖.<br />

Consequently, women can relate their life and themselves to<br />

soap-operas.<br />

Television has transformed our social and cultural<br />

environment. It has transformed the relationships between public<br />

and private spheres and between physical and social spaces. It<br />

has made the world visible and accessible in new ways. What is<br />

it there in television that makes it such a potential object for<br />

ushering in change? It is a reasonable question because television<br />

is neither malleable nor neutral object. Television comes prepacked<br />

– a combination of complex communication of sound and<br />

image with powerful reality and emotional claims. Television is<br />

constantly available in almost all homes. It can and it does<br />

occupy a potential space throughout an individual‘s life, though<br />

with varying degrees of intensity and significance. Television has<br />

become the most persuasive and pervasive means of information<br />

diffusion in society. The medium of television plays a very<br />

significant role in bringing about change among people.<br />

Television has the potential and strength to act as a ‗modern<br />

information multiplier‘ which can help people in smoothening<br />

the process of national development, economic growth and social<br />

development. The part played by television, through its varied<br />

content, as a galvanizer in the spectrum of change cannot be<br />

overlooked or ignored. The need of the hour is to harness its<br />

potential in the right direction or rather than let it be a trite<br />

reflection of society‘s lowest common denominator.<br />

Indian soap opera emphasize the process of decision making<br />

showing the plethora of details and nuances in the articulation of<br />

problems that advance the plot lines. If one is reading from a<br />

dominant perspective, one could say that women are only<br />

interested in the trivial details of everyday life, and soap operas,<br />

therefore, reinforce already problematic aspects of women‘s<br />

lives. Another way of reading is that soaps value the fabric of<br />

women‘s lives. Women in contemporary soap operas are given<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 241<br />

ISSN 2250-3153<br />

powerful positions in different contexts. This genre of television<br />

programming can be an effective tool for creating awareness<br />

about the changing dynamics of society.<br />

REFERENCES<br />

[1] Ang, Ien. ―Dallas‖: Soap Opera and the Melodramatic Imagination.<br />

London.Methuen.1985<br />

[2] Brown, Ellen Mary.(ed). Television and Women‘s Culture: The Politics of<br />

the Popular: London: Sage Publication.1991<br />

[3] Cantor, Muriel G. and Pingree, S. The Soap Opera: California: Sage<br />

Publication.1983<br />

[4] Doordarshan. Doordarshan. New Delhi. Prasar Bharati Corporation of<br />

India. 1998.<br />

[5] Gerbner. G and Gross. Larry. Journal of Communication. 1976<br />

[6] Geraghty. C. Women and Soap Opera. Cambridge. Polity Press. 1991<br />

[7] Livingstone. Sonia M. Making Sense of Television. Oxford. Pergamon<br />

Press.1990<br />

[8] Mitra. Charulata. Women‘s Development Goals: Reshaping Globalization:<br />

Delhi. Authorpress Global Network.2003.<br />

[9] Meehan. D. M. Ladies of the Evening: Women Characters of Prime Time<br />

Television. Metuchen. NJ-Scarecrow. 1983.<br />

[10] Newcomb. Horace. Television: The Critical View. New York. Oxford<br />

University. 1987.<br />

[11] Prasad. Kiran. Women and Media: Challenging Feminist Discourse. Delhi.<br />

The Women Press. 2005.<br />

[12] Saxena. Gopal. . Television in India: Changes and Challenges. New Delhi.<br />

Vikas Publishing House. 1996<br />

[13] Seiter. E. Borchers, H. Kreutzner. G and Warth, Eva-Maria. Remote<br />

Control: Television Audiences and Cultural Power. New York. Routledge.<br />

1989<br />

[14] Singhal, Arvind and Rogers. M. Everett. India‘s Communication<br />

Revolution: From Bullock Carts to Cyber Marts. New Delhi. Sage<br />

Publication. 2001<br />

[15] United Nations. Report of the Fourth World Conference on Women.<br />

Beijing. China.<br />

Zoonen. Van.E. Feminist Media Theory. London. Sage Publications. 1994.<br />

AUTHORS<br />

First Author – Dr. Aaliya Ahmed Ph.D. Sr. Asst. Professor,<br />

Media Education Research Centre, University of Kashmir,<br />

Email:aaliyahmed@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 242<br />

ISSN 2250-3153<br />

Global and Factor Domination in Fuzzy Graph<br />

G.Nirmala 1 , M.Sheela 2<br />

1<br />

Associate Prof. PG and Research Department of Mathematics, K.N.G.A.College (Women), Autonomous, Thanjavur, Tamilnadu, India<br />

2<br />

Research Scholar, Manonmaniyam Sundharanar University, Thirunelveli, Tamilnadu, India<br />

Abstract- The purpose of this paper is to introduce the concept<br />

of Global Domination number in fuzzy graph .Then we introduce<br />

the concept of Factor Domination number in fuzzy graph and<br />

theorems based on Global and Factor domination in fuzzy graphs<br />

are proved.<br />

Index Terms- Fuzzy Global Domination Number, Fuzzy<br />

Factor Domination Number<br />

T<br />

I. INTRODUCTION<br />

he study of dominating sets in graphs was begun by ore and<br />

berge, the domination number is introduced by cockayne and<br />

Hedetniemi. Rosenfeld introduced the notion of fuzzy graph and<br />

several fuzzy analogs of graph theoretic concepts such as paths,<br />

cycles and connectedness. A Somasundram and S. Somasundram<br />

discussed domination in fuzzy graph. They defined domination<br />

using effective edges in fuzzy graph. Nagoor Gani and<br />

Chandrasekaran discussed domination in fuzzy graph using<br />

strong arc. We also discuss the domination number γ (G) of the<br />

fuzzy graph G, the fuzzy factor domination number of the fuzzy<br />

graph G and the fuzzy global domination number of the fuzzy<br />

graph are discussed in this paper.<br />

Preliminaries1.1<br />

A fuzzy subset of a nonempty set V is a mapping σ: V<br />

→ [0,1]<br />

A fuzzy relation on V is a fuzzy subset of V × V.<br />

A fuzzy graph G = (σ , μ) is a pair of function σ:<br />

V→[0,1] and μ :V×V→[0,1] where μ(u, v )≤σ(u)Λ σ(v)<br />

for u ,v є V.<br />

The underlying crisp graph of G= (σ , μ) is denoted by<br />

G*=(V,E) where V={u є V :σ(u)>0}and E={(u , v) є V<br />

× V : (u ,v )>0}.<br />

The order p and size q of the fuzzy graph G = (σ , μ )<br />

are defined by<br />

p= ∑σ(v) and q= ∑μ ( u ,v ) .<br />

v є V (u, v)є E<br />

Let G be a fuzzy graph on V and S⊆V, then the fuzzy<br />

cardinality of S is defined to be ∑σ(v).<br />

v є S<br />

The strength of the connectedness between two nodes<br />

u , v in a fuzzy graph G is μ ∞ (u , v)=sup{μ k (u<br />

,v):k=1,2,3…..},where μ k (u ,v)=sup{μ(u,u1)Λ<br />

μ(u1,u2)………Λ μ(uk-1,v)}.<br />

An arc (u, v) is said to be a strong arc or strong edge, if<br />

μ (u, v) ≥ μ ∞ ( u ,v) and the node v is said to be a<br />

strong neighbor of u.<br />

A node u is said to be isolated if μ (u , v)=0 for all u ≠ v.<br />

In a fuzzy graph, every arc is a strong arc then the graph<br />

is called strong arc fuzzy graph.<br />

A path in which every arc is a strong arc then the path is<br />

called strong path and the path contains n strong arcs is<br />

denoted by pn<br />

Let u be a node in a fuzzy graph G then N(u)={v: (u ,<br />

v) is a strong arc} is called neighborhood of u and<br />

N[u]=N(u)U{u} is called closed neighborhood of u.<br />

Let G be a fuzzy graph and S be a subset of V.A node v<br />

is said to be fuzzy private neighbor of uє S with respect<br />

to S or S- private neighbor of u, if N[v]∩ S= {u}.<br />

Define a fuzzy private neighborhood of u є S with<br />

respect to S to be P N [u , S] = {v: N[v]∩S={u}} In<br />

other words P N[u,S]=N[u]-N[S-{u}].<br />

If u є P N [u , S], then u is an isolated node in G[S]. It<br />

is also stated that u is its own private neighbor.<br />

II. FUZZY GLOBAL AND FACTOR DOMINATION NUMBER<br />

Definition 2.1:<br />

The complement of a fuzzy graph G=(σ , μ) is a fuzzy<br />

graph G=(σ , μ) where σ=σ and μ(u ,v )=σ(u) Λ σ(v)-μ(u ,v ) for<br />

all u , v in V.<br />

Example2.2<br />

www.ijsrp.org


V 6(0.2)<br />

International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 243<br />

ISSN 2250-3153<br />

Figures 2.1, 2.2 be a fuzzy graph and its complement<br />

Definiton2.3<br />

A Fuzzy graph is self complementray if G =G<br />

Definition2.4<br />

Let G=(σ , μ) be a fuzzy graph. A subset D of V is said to be<br />

fuzzy dominating set of G if for every v є V-D there exists u єD<br />

such that (u,v) is a strong arc.<br />

Definition 2.5<br />

A fuzzy graph H=(σ,μ) is said to have a fuzzy t-factoring into<br />

factors F(H)= {G1 G2,G3,......Gt} if each fuzzy graph<br />

Gi=(σi,μi)such that σi=σ and the set{μ1,μ2,μ3……..μt}form a fuzzy<br />

partition of μ.<br />

Definition 2.6<br />

Given A t-factoring F of H, a subset Df⊆V is a fuzzy factor<br />

dominating set if Df is a fuzzy dominating set of Gi, for1≤i≤t.<br />

Example2.7<br />

0.15<br />

V6(0.2)<br />

0.15<br />

0.15<br />

0.15<br />

V1(0.25) 0.2 V2(0.5)<br />

V3(0.3) 0.3<br />

V1(0.25)<br />

Figure2.3: H<br />

0.2<br />

0.2<br />

V3(0.3)<br />

0.15<br />

V5(0.2)<br />

Figure 2.4: G1<br />

V5(0.2)<br />

0.15<br />

0.15<br />

0.15<br />

0.3 0.30.3<br />

V2(0.5)<br />

0.3<br />

V4(1.0)<br />

0.3<br />

V4(1.0)<br />

V1(0.25) 0.2 V2(0.5)<br />

V6(0.2) 0.2 V5(0.2) 0.3<br />

0.15<br />

V3(0.3)<br />

Figure 2.5 G2<br />

V4(1.0)<br />

The fuzzy t-factoring and a fuzzy factor dominating set in<br />

given in figures 2.3,2.4 and 2.5 the set of vertices<br />

{v2(0.5),v6(0.2)} in H dominate each of the fuzzy factor G1 and<br />

G2, while no smaller fuzzy factor dominating set exists, since G1<br />

and G2has two fuzzy components that is at least two vertices are<br />

required to dominate G1 and G2<br />

Definition2.8<br />

The fuzzy factor domination number γft(F(H)) is the<br />

minimum cardinality of a fuzzy factor dominating set of F(H).<br />

The fuzzy factor domination number is that max{γi}≤γft≤Σγi<br />

1≤i≤t i=1 to t<br />

Definition2.9<br />

In a fuzzy graph G=(σ, μ) the minimum cardinality set D of<br />

G which is the fuzzy dominating set of both G and G . is called<br />

a fuzzy global dominating set.<br />

Definiton2.10<br />

The minimum cardinality of a fuzzy global dominating set is<br />

denoted by γg(G) is called the fuzzy global domination number.<br />

Definition2.11<br />

A vertex cover of a fuzzy graph G is a set of vertices that<br />

covers all the edges and an edge cover of a fuzzy graph is a set<br />

of edges that covers all the vertices. The minimum cardinality of<br />

vertex cover is α0(G) and the minimum cardinality of edge<br />

cover isα1(G).<br />

Theorem2.1<br />

If I is the set of vertices in V(H) which are isolated in atleast<br />

one fuzzy graph Gi, then γft≤α0(H)+│I│<br />

Proof.<br />

Let S be a minimum vertex cover for a fuzzy graph H and let<br />

v be a non isolated vertex of Gi with an incident edge μ. since μ<br />

is an edge in H, at least one vertex, say u, covers μ in H, and<br />

therefore this vertex u dominates v in Gi . It follows that the set<br />

SUIis a fuzzy factor dominating set F(H)<br />

Theorem2.2<br />

For any fuzzy graph H, γft≥t if t≤∆(H). γft=n otherwise<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 244<br />

ISSN 2250-3153<br />

Proof.<br />

Let Df be a minimum fuzzy factor dominating set for F(H).<br />

If t≤∆(H), then any vertex v in V(H)-Df must have in H at least<br />

μt edges to Df so it can be dominated in each Gi. Hence<br />

│Df│≥t.If t>∆(H), no such vertex v can exist and H-Df must be<br />

empty, that is γft=n<br />

Theorem2.3<br />

For any fuzzy graph H,γft≤γ+t-2 if t≤∆(H): γft=n otherwise<br />

Proof.<br />

The proof of theorem 2.2 shows that for t>∆(H),γft=n.<br />

Therefore, assume that t≤∆(H) and let Df be a minimum fuzzy<br />

factor dominating set. If Df=V(H) then γft=n≥γ+∆(H)≥γ+t>γ+t-<br />

2.If Df≠V(H),let vєV(H)-Df. since v must be adjacent to at least t<br />

vertices of Df. let X⊆Df be a set of t-1 vertices contained in<br />

N(v)in H. In H every vertex of V(H)-(DfU{v })is adjacent to at<br />

least one vertex of Df-X. Thus(Df-X)U{v} dominates H.so<br />

γ≤│Df-X│+1=γft-(t-1)+1, or γft≤γ+t-2<br />

Theorem2.4<br />

For any fuzzy graph H and any fuzzy t-factoring<br />

F(H)={G1,G2,G3,….Gt}of H,γft+єft=n<br />

Proof.<br />

If t>∆(H), then γft=n and єft=0 and the equality holds .Assume<br />

therefore, that t≤∆ and γft3, then diam(G)


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 245<br />

ISSN 2250-3153<br />

[8] B.Bollabas, E.J.Cockayne, Graph Theoretic Parameters Concerning<br />

Domination, Independence, and Irredundance, Journal of Graph Theory,<br />

Vol-3 (1979) 241-249.<br />

[9] B.R.Allan and R.Laskar on domination and Independent domination<br />

numbers of a graph, Discrete Mathematics, 23, (1978) 73-76.<br />

[10] E.J.Cockayne, O.Favaron, C.Payan, and Thomason, A.G. Contribution to<br />

The Theory of Domination Independence and Irredundance in Graph,<br />

Discrete Mathematics 33 (1981) 249-258.<br />

[11] J.N.Mordeson, and P.S.Nair, Fuzzy Graphs and Fuzzy Hyper Graphs,<br />

Physica-Verlag, Heidelberg, 1998; Second Edition, 2001.<br />

[12] K.R.Bhutani, and A.Rosenfeld, Strong arcs in fuzzy graphs, Information<br />

Sciences, 152 (2003), 319-322.<br />

[13] O.Faravan, Stablity, Domination and Irredundance in Graph, Journal of<br />

Graph Theory, Vol-10 (1986) 429-438.<br />

[14] T.Haynes, S.T.Hedetniemi., P.J.Slater, Fundamentals of Domination in<br />

Graph, Marcel Deckker, New York, 1998.<br />

AUTHORS<br />

First Author –G. Nirmala, Associate Prof. PG and Research<br />

Department of Mathematics, K.N.G.A.College (Women),<br />

Autonomous, Thanjavur, Thanjavur District. Tamilnadu, India.<br />

Second Author – M. Sheela, Research Scholar, Manonmaniyam<br />

Sundharanar University, Thirunelveli, Tamilnadu, India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 246<br />

ISSN 2250-3153<br />

Active Device Usage in Filter Design – An Overview<br />

SHEIKH AJAZ BASHIR *<br />

Department of Electronics& Instrumentation Technology,<br />

University of Kashmir, Srinagar-190006<br />

Kashmir, India<br />

Email: iamsheikhajaz@gmail.com<br />

*corresponding author<br />

N.A.SHAH<br />

Department of Electronics& Instrumentation Technology,<br />

University of Kashmir, Srinagar-190006<br />

Kashmir, India<br />

Email: nassgr@hotmail.com<br />

ABSTRACT<br />

Usage of Inductors as passive components in filter design poses a number of problems in terms of non-linearity, losses,<br />

large physical size , weight and possibility of their integration at very high frequencies only.<br />

Bulky nature of Inductors put a question mark on the foot print of filters designed using them. Microminiaturization of<br />

circuits resulted in desire for replacement of Inductors by active elements like Operational Amplifiers which led to the<br />

introduction of new class of filters called as active filters. Active filter design has evolved over a period of time. Starting<br />

with OP AMPs , we have witnessed phenomenal growth of active component usage in filter design and development<br />

catering to varying requirements. This has contributed greatly in emergence of circuits with minimal limitations and<br />

advantages in terms of wide Bandwidth and High slew rates.<br />

The aim of this paper is to review and compare the functionality of certain novel active blocks .<br />

While doing so it will be amply clear that the development of newer active blocks follows a pattern and one<br />

combination of blocks leads to a new active element design and the process goes on.<br />

KEYWORDS<br />

OA; CDBA ; OTA;CFA ; CC-II ; FTFN ; CDTA; Trade Off : Signal Linearity ; Bandwidth ;<br />

INTRODUCTION<br />

In the development of microelectronic technologies the demand for electronic circuits with extremely low supply voltages and low<br />

power consumption constitute long-term trends [1]. The speed or the accuracy of signal processing are the other requirements<br />

which are needed in case of certain specific applications. While fulfilling one requirement another may have to be<br />

compromised which leads to non fulfillment of all parameters simultaneously. To overcome this impediment a trade-off<br />

solution is used in practice.<br />

Over a period of time , the evolution of modern applications of analog signal processing has followed the trends of so-called<br />

current mode [2], when signals, representing the information being processed, are in the form of electric currents. In contrast to the<br />

conventional voltage mode, which utilizes electric voltages, the current mode circuits can exhibit under certain conditions – among<br />

other things – higher bandwidth and better signal linearity. Since they are designed for lower voltage swings, smaller supply voltages<br />

can be used. Simultaneously with the development of current-mode applications, the mixed-mode circuits are also analyzed because of<br />

the necessity of optimizing the interface between the sub-blocks, which are working in different modes.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 247<br />

ISSN 2250-3153<br />

The mixed-mode operation and even the comeback to the conventional voltage mode alsohave another justification: it appears that<br />

some generally accepted statements about the advantages of the current mode probably have no real basis [3]. However, the criticism<br />

of [3] not with standing, the current-mode techniques have given way to a number of important analog signal processing - signal<br />

generating circuits as is evident from a vast amount of literature on current-mode circuits and techniques published in the recent past .<br />

Advancements in integrated circuit (IC) technology during the last two decades, have led circuit designers to exploit the potential of<br />

current-mode analog techniques for evolving elegant and efficient solutions to several circuit design problems. As a consequence, the<br />

current-mode approach to signal processing has often been claimed to provide one or more of the following advantages: higher<br />

frequency range of operation, lower power consumption, higher slew rates, improved linearity, and better accuracy.<br />

Besides classical active filters, the target applications of the blocks include advanced fully-integrated input blocks of modern<br />

communication circuits. With the exception of DC-precise low-pass filters, the requirements on DC precision of the new blocks are<br />

not so relevant in comparison with the requirements on their speed.<br />

In the case of oscillators and other generators, some additional requirements regarding their precision (linearity, offset, etc.) have<br />

appeared. For non-linear circuits such as rectifiers of weak signals, precise comparators and Schmitt triggers, shaping networks, etc.,<br />

the demands for accuracy can be considerable.<br />

The initial set of active elements for analog signal processing is currently proceeding and evolving in following pattern.<br />

The evolution of active blocks is happening by modification of the basic elements such as VFA (Voltage Feedback Amplifier),<br />

CFA (Current Feedback Amplifier), OTA (OperationalTrans conductance Amplifier), and particularly current conveyors (CC). The<br />

important motivations for such modifications consist in the effort to increase the application potential of the element. Simultaneously,<br />

this element should have a simple internal structure in order to retain low power consumption and high-speed operation.<br />

An important urge for new elements is due to electronic control requirements . Evolution of active elements , besides the<br />

modification of current ones , is happening by way of emergence of new elements which extend the original VFA-CFA-OTA-CC<br />

active set.<br />

Now we will evaluate a few active blocks in brief to drive home the point that the process of evolution has been<br />

going on and follows a particular pattern.<br />

Evolution of Current Feedback Amplifier (CFA) from Current Conveyor CC<br />

II<br />

Current Feedback Amplifier (CFA) was developed to improve the finite gain-bandwidth product of the conventional<br />

voltage - feedback operational amplifier[07]. It can provide not only a constant bandwidth independent of closed loop gain but<br />

also a high slew – rate capability[08]. Usage of CFA as a basic building block in active filter design is highly beneficial on<br />

account of these factors.The applications and advantages in realizing active filter transfer functions using current feedback<br />

amplifiers have received great attention because the amplifier enjoys the features of constant bandwidth independent of closed-loop<br />

gain and high slew rate, besides having low output impedance. Thus, it is advantageous to use CFA as a basic building block in the<br />

accomplishment of various analog signal processing tasks.<br />

CFA is an operational transimpedance amplifier and is internally a CCII+ followed by a voltage follower [10].<br />

CFA can be represented symbolically as shown in Fig-1<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 248<br />

ISSN 2250-3153<br />

FIG-1 Symbolic Representation of CFA<br />

Evolution of Four Terminal Floating Nullor (FTFN) bycascading CFAs<br />

Four Terminal Floating Nullor (FTFN) was introduced after the advent of Current Feedback amplifier .As part of the<br />

process of development of continuous-time circuits FTFN [09] was introduced as more flexible and versatile building block than<br />

an operational amplifier (OP-AMP) or a second-generation current conveyor (CCII) .The circuit symbol of the FTFN is shown in<br />

Figure-2 . The positive FTFN can be implemented by cascading two Current feedback amplifiers (AD844s from analog devices)<br />

as shown in Fig-2(b)<br />

Fig-2 (a) Symbolic representation of FTFN (b) Realization of FTFN using two CFAs<br />

Further the FTFN functionality is subservient to following port relations;<br />

Vx=Vy ; Ix=Iy=0 ; Iw=Iz<br />

Evolution of Current Differencing Buffered Amplifier(CDBA) fromCFACascading.<br />

Current Differencing Buffered Amplifier (CDBA), a current-mode component, has beenintroduced by C. Acar and S. Ozoguz<br />

in 1999 [6]. It offers advantageous features such as high slew rate, absence of parasitic capacitance, wide bandwidth, and simple<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 249<br />

ISSN 2250-3153<br />

implementation .Since the CDBA consists of a unity-gain current differential amplifier and a unity-gain voltage amplifier, this element<br />

would be suitable for the implementation of voltage and current-mode signal processing applications. As far as the applications of the<br />

CDBA are concerned, various voltage-mode and current-mode filters and oscillators have been reported in literature.<br />

CDBA can be represented symbolically as shown in Fig-3<br />

Fig-3 (a) Symbolic representation of CDBA (b) Cascading of CFAs to build CDBA<br />

Evolution of Current Difference Transconductance Amplifier (CDTA) by adding two Current Conveyors CC II & OTA<br />

Current Difference Transconductance Amplifier being analogous to the CDBA, has difference currentinputs p and n. The<br />

difference of these currents flows from terminal z into an outside load. The voltageacross the z terminal is transferred by a<br />

transconductanceg to a current that is taken out as a current pair to the x terminals. This last element part is the familiar<br />

transconductance operational amplifier (OTA). In general, the transconductance is controllable electronically through an auxiliary port<br />

.The pair of output currents from the x terminals, shown in Fig. 4, may have three combinations of directions:<br />

1. Both currents can flow out.<br />

2. The currents have different directions.<br />

3. Both currents flow inside the CDTA element.<br />

This leads us tothe CDTA configurations of CDTA++, CDTA+-, and CDTA-- elements. It is suitable to mark the current<br />

directions in the circuit symbol by the signs + (outside) and – (inside) as shown in Fig. 4.<br />

Fig- 4 Symbolic representation of CDTA<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 250<br />

ISSN 2250-3153<br />

Fig-5 Realization of CDTA with CC II & OTA.<br />

The effort is going on to evolve new buiding blocks to address the problem of higher acceptability of a circuit<br />

element. Universality of a circuit element without making it complex is a big challenge for circuit developers. Removal of<br />

parasitic effects , better analog or digital control of parameters and decreasing the footprint by way of usage of lesser<br />

number of components are some of the new challenges that designers will face in future.<br />

OA<br />

CC-II<br />

Four Terminal<br />

Floating Nullor<br />

Voltage<br />

Follower<br />

OTA<br />

CC-II CFA FTFN CDBA CDTA<br />

Current<br />

Feedback<br />

Amplifier<br />

Current<br />

Feedback<br />

Amplifier<br />

Current<br />

Conveyor-II<br />

Current<br />

Differencing<br />

Buffered<br />

Amplifier<br />

Current<br />

Conveyor-II<br />

Current<br />

Differencing<br />

Transconductance<br />

Amplifier<br />

Fig-6 :Evolution of active devices by suitable modifications of basic active blocks.<br />

Operational<br />

Transconductance<br />

Amplifier<br />

Operational<br />

Transconductance<br />

Amplifier<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 251<br />

ISSN 2250-3153<br />

CCCDT<br />

A<br />

CDTA<br />

MO-<br />

FTFN<br />

OFA<br />

DDOF<br />

A<br />

DC-<br />

CDTA<br />

GCMI<br />

Fig-7 Active Element Tree.<br />

( Not in an order)<br />

DC-<br />

CDBA<br />

TCOA<br />

DDC-<br />

CFA<br />

VFA<br />

OTRA<br />

OC<br />

CCCDB<br />

A<br />

CDBA<br />

DDA<br />

DCCF+<br />

CC-<br />

CFA<br />

BOTA<br />

DV-<br />

CFA<br />

DC-<br />

CCTA<br />

CTTA<br />

OTA<br />

TOA /<br />

CFA<br />

DC-<br />

CCII<br />

+1<br />

FBFTF<br />

N<br />

TFTFN<br />

CCTA<br />

CCCCT<br />

A<br />

OMA<br />

CD-<br />

CTTA<br />

FTFN<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 252<br />

ISSN 2250-3153<br />

CONCLUSION<br />

The tree of active building blocks is growing and the present family of active blocks as shown by Fig-7 will<br />

have additions as we address the issues of Universality , Smaller Footprint , Digital Control and decreased component<br />

density .<br />

The development of new circuit elements over the last ten years, Viz; CDBA, CDTA, ICCII, FDCCII, MCCIII, CCOA, DDOFA,<br />

FBFTFN, CFA-OTA, CC-CFA, CCTA, CCCDTA,CCCCTA, CTTA, CCCDBA, DC-CDBA, CMI, DCCF, etc. shows that the<br />

procedure of finding new circuit elements is going at a very good pace and we will continue to evolve in right direction<br />

with respect to design of better active elements.<br />

Further as is depicted in Fig-6 , the development and evolution of Active elements used as gain devices in Filter design<br />

is following a pattern and the combination of building blocks gives birth to new elements with better acceptability ,<br />

smaller size with less component usage and better control.<br />

REFERENCES<br />

[1] FERRI, G., GUERRINI, N.C. Low-Voltage Low-Power CMOS Current Conveyors. Cluwer Academic Publishers, 2003.<br />

[2] TOUMAZOU, C., LIDGEY, F.J., HAIGH, D.G. Analogue IC Design: The current mode approach. IEEE Circuits and<br />

SystemsSeries 2. Peter Peregrinus Ltd., 1990.<br />

[3] SCHMID, H. Why ‖Current Mode‖ does not guarantee goodperformance. Analog Integrated Circuits and Signal<br />

Processing,2003, vol. 35, p. 79-90.<br />

[4] SMITH, K.C., SEDRA, A. The current conveyor: a new circuit building block. IEEE Proc. CAS, 1968, vol. 56, no. 3, p.<br />

1368-1369.<br />

[5] SEDRA, A.S., SMITH, K.C. A second generation current conveyor and its application.IEEE Trans., 1970, CT-17, p. 132-<br />

134.<br />

[6] C. Acar and S. O¨ zogˇuz, “A new versatile building block: current differencing buffered amplifier suitable for analog signal<br />

processing filters,”Microelectronics Journal, vol. 30, no. 2, pp. 157–160, 1999.<br />

[07] Comlinear Corp., “Designer‘s guide for 200 series Op amp”,Application note 200-1, 4800, wheaton Drive, Ft.collins, CO<br />

80525, Nov.1984.<br />

[08] Analog Devices: “Linear Products Data Book ”Norwood MA, 1990.<br />

[09] ABUELMA‘ATI, M.T., Al-ZAHER, H. A. Universal two-input current-mode active biquad using FTFNs. Int. Journal<br />

ofElectronics, 1999, vol. 86, p. 181-188.<br />

[10] SVOBODA, J.A, Mc GORY, L., WEBB, S. Application of commerciallyavailable current conveyors. International Journal<br />

ofElectronics, 1991, p. 159-164.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 253<br />

ISSN 2250-3153<br />

Tracking of Reference Signals by Advanced Unified<br />

Power Flow Controller<br />

K. Manoz Kumar Reddy<br />

Associate professor, Electrical and Electronics Department, Sri Aditya Engineering College, A.P, India<br />

Abstract- Unified Power Flow Controller (UPFC) is the most<br />

real time multivariable device among the different FACTS<br />

controllers. Control of power flow in the transmission line is the<br />

most important property of UPFC. Due to importance of power<br />

flow control in transmission lines, the proper controller should be<br />

reliable against uncertainty and faults . For this purpose, an<br />

advanced controller is designed based on the Lyapunov theory .<br />

The main objective of this paper is to design an advanced<br />

controller which enables a power system to reach reference<br />

signals accurately and to be reliable in the presence of<br />

uncertainty of system parameters and faults. The performance of<br />

the proposed controller is simulated on a two bus test system and<br />

compared with a conventional PI controller. Simulations were<br />

carried out using MATLAB software to check the performance<br />

of UPFC.<br />

Index Terms- Multivariable device, Power flow control, Two<br />

bus system, UPFC<br />

G<br />

I. INTRODUCTION<br />

enerally the growth of power systems will rely more on<br />

increasing capability of existing transmission systems,<br />

rather than on building new transmission lines and power<br />

stations, for economical and environmental reasons. Due to<br />

deregulation of electricity markets, the existence for new<br />

controllers capable of increasing transmission capability,<br />

controlling power flows through predefined corridors and<br />

ensuring the security of energy transactions will certainly<br />

increase.<br />

In order to expand or enhance the power transfer capability of<br />

existing transmission network the concepts of FACTS (Flexible<br />

AC transmission system) is developed by the Electric Power<br />

Research Institute (EPRI) in the late 1980s. The main objective<br />

of facts devices is to replace the existing slow acting mechanical<br />

controls required to react to the changing system conditions by<br />

rather fast acting electronic controls. FACTs means alternating<br />

current transmissions systems incorporating power electronic<br />

based and other static controllers to enhance controllability and<br />

increase power transfer capability [1].<br />

The potential benefits with the utilization of flexible ac<br />

transmission system (FACTS) devices include reduction of<br />

operation and transmission investment costs, increasing system<br />

security and reliability, and increasing transfer capabilities in a<br />

deregulated environment. FACTS devices are able to change, in<br />

a fast and effective way, the network parameters to achieve a<br />

better system performance [2].<br />

UPFC is a power electronic based device which can provide a<br />

proper control for impedance, phase angle and reactive power of<br />

a transmission line. Each converter of a UPFC can independently<br />

generate or absorb reactive power. This arrangement enables free<br />

flow of active power in either direction between the ac terminals<br />

of the two converters. In the case of the parallel branch of<br />

UPFC, the active power exchanged with the system, primarily<br />

depends on the phase shift of the converter output voltage with<br />

respect to the system voltage, and the reactive power is<br />

controlled by varying the amplitude of the converter output<br />

voltage. However series branch of UPFC controls active and<br />

reactive power flows in the transmission line by amplitude and<br />

phase angle of series injected voltage. Therefore active power<br />

controller can significantly affect the level of reactive power<br />

flow and vice versa.<br />

In recent years a number of investigations have been carried<br />

out on various capabilities of UPFC such as power flow control,<br />

voltage control, transient stability enhancement, oscillation<br />

damping and control of active and reactive power flows in<br />

transmission lines [3].<br />

The performance of the control scheme deteriorates in the<br />

presence of uncertainties in system parameters. In this paper, a<br />

new controller of UPFC based on Lyapunov theory for power<br />

flow control is designed which is able to reach reference signals<br />

accurately and is reliable in the presence of uncertainty of system<br />

parameters and faults [8]. The proposed controller is considered<br />

as effective controller which always consists of a set of error<br />

terms to provide stability condition in the presence of uncertainty<br />

and faults.<br />

II. UPFC MODEL<br />

The schematic diagram of a UPFC is shown in Figure 1. It<br />

consists of two back-to-back, self-commutated, voltage source<br />

converters connected through a common dc link.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 254<br />

ISSN 2250-3153<br />

Figure 1: Schematic diagram of the UPFC system.<br />

As it can be seen Figure 1 converter1 is coupled to the AC<br />

system through a shunt transformer (excitation transformer) and<br />

the converter 2 is coupled through a series transformer (boosting<br />

transformer). Note that, subscripts‗s‘ and ‗r‘ are used to represent<br />

sending and receiving end buses respectively. By regulating the<br />

series injected voltage vse, the complex power flow (Pr + jQr)<br />

through the transmission line can be controlled. The complex<br />

power injected by the converter 2, (Pse + jQse) depends on its<br />

output voltage and transmission line current. The injected active<br />

power Pse of the series converter is taken from the dc link, which<br />

is in turn drawn from the AC system through the converter 1. On<br />

the other hand, both converters are capable of absorbing or<br />

supplying reactive power independently. The reactive power of<br />

the converter 1 can be used to regulate the voltage magnitude of<br />

the bus at which the shunt transformer is connected [4-7].<br />

The single-phase representation of a three-phase UPFC<br />

system is shown in Figure 2. In this figure both converters are<br />

represented by voltage sources vse and vsh, respectively. Also<br />

(R = Rse + RL) and (L = Lse + LL) represent the resistance and<br />

leakage inductance of series transformer and transmission line<br />

respectively, similarly Rsh and Lsh represent the resistance and<br />

leakage inductance of the shunt transformer respectively.<br />

Figure 2: Single phase representation of the UPFC system.<br />

The current through the series and shunt branches of the circuit<br />

of Figure 2 can be expressed by the following differential<br />

equations for one phase of the system. These equations can be<br />

written for other phases similarly.<br />

The three-phase system differential equations can be transformed<br />

into a ―d, q” reference frame using Park‘s transformation as<br />

follows:<br />

where ωb = 2πfb, and fb is the fundamental frequency of the<br />

supply voltage. Since the Park‘s transformation used in finding<br />

(3) and (4) keeps the instantaneous power invariant and the daxis<br />

lies on the space vector of the sending end voltage vs, thus<br />

vs = (vsd + jvsq) = (vsd + j0).<br />

Note that in the above equations, subscripts ‗d‘ and ‗q‘ are<br />

used to represent the direct and quadrature axes components,<br />

respectively (x = xd + jxq).<br />

Since the dynamic equations of converter 1 are identical to<br />

that of converter 2 as described before, both converters should<br />

have identical control strategy. Therefore for the sake of brevity<br />

in this paper only the technique of designing the controller of<br />

converter 2 is described in detail in the form of state space.<br />

where d is the uncertainty vector and x, u and y are respectively<br />

state, control and output variables vector of converter 2 which<br />

are defined as ,X=[ised iseq] T , u =[ vsed vseq] T and<br />

y = [ised iseq] T .Comparing Eqs (3 )and (5), when vs and vr are<br />

kept constant, the system matrices A, B, and C can be written as:<br />

As mentioned previously, the common connection between the<br />

two converters is formed by a dc-voltage bus. When the losses in<br />

the converters are neglected, the active power balance equation at<br />

the dc link can be written as Eq. (8)<br />

(1)<br />

(2)<br />

(3)<br />

(4)<br />

(5)<br />

(6)<br />

Pdc=Pse+Psh (7)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 255<br />

ISSN 2250-3153<br />

where Psh and Pse are active power supplied by the converters 1<br />

and 2, respectively which can be obtained as follows:<br />

(9)<br />

Note that, since the power loss of the shunt transformer can be<br />

ignored, active power of converter 1 Eq.(9) can be written<br />

approximately as:<br />

(10)<br />

Also the active power of the dc link is represented as<br />

equation(11)<br />

Substituting Eq.(11) in (7) , Eq.(12) will be obtained.<br />

(8)<br />

(11)<br />

(12)<br />

It is clear that the above equation is non linear, therefore for<br />

linearizing and simplifying, Eq.(14) is defined by substituting<br />

Eq.(13) into (12).<br />

(13)<br />

(14)<br />

The following section is assigned to introduce the design of a<br />

controller based on the Lyapunovtheory. This analysis is based<br />

on a simplified mathematical model of the converter connected<br />

to a two bus system as shown in Figure 1.<br />

III. CONTROLLER DESIGN BASED ON LYAPUNOV THEORY<br />

Figure 3 shows the schematic of a system state space. As it<br />

was mentioned, the main objective of this paper is to design an<br />

advanced controller which enables the power system to track<br />

reference signals accurately and to be reliable in the presence of<br />

uncertainty of system parameters and faults [8]. To reach this<br />

purpose a new controller is designed based on the Lyapunov<br />

theory in this paper. The controller based on the Lyapunov<br />

method is designed as slope changes of energy function which<br />

always remains negative ( ). This energy function consists<br />

of a set of error terms which provides stability condition of error<br />

terms in the presence of uncertainty and disturbance. Therefore<br />

the tracking error and its derivative are defined as below:<br />

e=Xd - X (15)<br />

where x is the vector of state variables and<br />

is the vector of reference signals. In xd<br />

(16)<br />

equation, and can be obtained similarly by Eq.(8) and (9)<br />

knowing the active and reactive power references of transmission<br />

line Pr * and Qr *<br />

where<br />

.<br />

Figure 3: Schematic of system state space.<br />

(17)<br />

(18)<br />

Substituting Eqs. (15) and (16) in (5), the derivative of tracking<br />

(dynamic error) can be obtained:<br />

(19)<br />

To fulfill stability condition of the system dynamic error,<br />

multiplication of control matrix and control variables vector is<br />

defined as:<br />

(20)<br />

(21)<br />

The control variables vector (21) is calculated by<br />

multiplication of B -1 by Eq.(20). The amounts of variables of row<br />

matrix k at (20) are set such as the whole Eigen values of matrix<br />

(A−Bk) are laid on the left side of imaginary axis. Vector us is<br />

also values of matrix (A−Bk) are laid on the left side of<br />

imaginary axis. Vector us is also described as a robustness signal.<br />

The function of this vector is to accomplish stability condition<br />

based on Lyapunov theory. Therefore by substitution Eq. (20)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 256<br />

ISSN 2250-3153<br />

into (19), the new equation is obtained for dynamic error of the<br />

system.<br />

where in the above equation, A0=A-Bk<br />

(22)<br />

To accomplish stability condition, the robustness signal is<br />

defined as below:<br />

where I ∗ is a positive number I ∗ ≥ 1.<br />

(23)<br />

It is necessary to be noted that (e T P) is not a square matrix<br />

and therefore pseudo inverse matrix is used to calculate us vector<br />

.. The block diagram of the overall UPFCcontrol system is<br />

depicted in Figure 4. This block diagram is implemented for d–q<br />

axis.<br />

Figure 4: Block diagram of the overall UPFC control system.<br />

IV. SIMULATION RESULTS<br />

In an ideal system, there is no uncertainty in system<br />

parameters. However, in a practical system, it is considered that<br />

the system parameters are corrupted by some uncertainties. It<br />

should be mentioned that such uncertainties are usually present<br />

in any physical system and will be often limited to achieve the<br />

desired performance. In this paper, the proposed controller is<br />

designed so as the uncertainty in the system is reduced. The<br />

uncertainty is entered to the system equations as a vector. The<br />

performance of the proposed controller, for various disturbances<br />

is evaluated through MATLAB/SIMULINK software in a two<br />

bus test system. The simulation results of proposed controller are<br />

compared with a conventional PI controller. The parameters of<br />

converters 1 and 2 of PI controllers are given in Table 1<br />

TABLE 1<br />

parameters Converter 1 Converter 2<br />

KP 0.27 0.3<br />

KI 62 66<br />

TABLE 2<br />

parameters Value<br />

R( pu) 0.051<br />

wL (pu) 0.25<br />

Rsh (pu) 0.015<br />

wLsh (pu) 0.15<br />

1/ wC (pu) 0.5<br />

According to the parameters of the system and UPFC which<br />

are presented in the Table 2, the system matrices for these<br />

converters are as follow:<br />

In the above matrices, fundamental frequency (fb) is equal to<br />

50 Hz. In this study, as it is shown in Figure 4 the sending and<br />

receiving end bus voltages are maintained constant and the dc<br />

link voltage, active and reactive powers of the transmission line<br />

are controlled.<br />

The initial complex power flow (Pr + jQr) at the receiving<br />

end of the transmission line is found as (1.278−j0.5) p.u. In the<br />

first case study, the active power of the transmission line is<br />

changed from 1.278 to 2.278 p.u at t = 2 s for a system with 10%<br />

uncertainty. The simulation results of this study are depicted in<br />

Figure 5. It is shown that the speed of response of the proposed<br />

controller is much better than that of the conventional controller<br />

approach (PI controller).<br />

In the second case study, both the active and reactive powers<br />

of the transmission line is changed from initial values to<br />

(2.278−j0.8) at t = 2 s. In this case, the uncertainty factor is<br />

considered to be equal to 16%. The simulation results of this<br />

scenario are displayed in Figure 6. As mentioned, the reactive<br />

power of the transmission line is changed too and the uncertainty<br />

factor is changed much more than previous case, but it is seen<br />

that the proposed controller has a good response to this changes.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 257<br />

ISSN 2250-3153<br />

Figure 5: Response of UPFC system with 10% uncertainty.<br />

Blue line, advanced controller; green line, PI controller.<br />

(a) Real power of the transmission line;<br />

(b) Kvar power of transmission line;<br />

(c) D axis current reference of converter 2;<br />

(d) Q axis current reference of converter 2;<br />

(e) D axis voltage reference of converter 2;<br />

(f) Q axis voltage reference of converter 2.<br />

Figure 6: Response of UPFC system with 16% uncertainty.<br />

Blue line, advanced controller; green line, PI controller.<br />

(a) Real power of the transmission line;<br />

(b) Kvar power of transmission line;<br />

(c) D axis current reference of converter 2;<br />

(d) Q axis current reference of converter 2;<br />

(e) D axis voltage reference of converter 2;<br />

(f) Q axis voltage reference of converter 2.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 258<br />

ISSN 2250-3153<br />

V. CONCLUSION<br />

This paper presented an advanced design of controller which<br />

enables a power system to reach reference signals accurately and<br />

to be reliable in the presence of uncertainty of system parameters<br />

and faults. The new controller which is designed based on the<br />

Lyapunov theory is successful in reaching the reference signals.<br />

The main advantage of the proposed approach with respect to PI<br />

controller is the stability of the closed loop system under<br />

uncertainties. The proposed approach also has simple structure<br />

and quick performance in comparison with intelligence methods<br />

such as fuzzy theory and neural network. The simulation results<br />

of the proposed controller are compared with a conventional PI<br />

controller and its performance is evaluated in a two bus test<br />

system. In this study, the sending and receiving end bus voltages<br />

were maintained constant and the dc link voltage, active and<br />

reactive powers of the transmission line were controlled. The<br />

obtained results from above case studies describe the power,<br />

accuracy, fast speed and relatively low overshoot response of the<br />

proposed controller.<br />

REFERENCES<br />

[1] N.G.Hingorani and L.Gyugyi, ―Understanding FACTS,‖ Concepts and<br />

Technology of Flexible AC Transmission Systems.IEEE press,2000.<br />

[2] L.gyugi, ―A unified power flow concept for flexible AC transmission<br />

systems,‖ IEEE proc.c 139(4)1992.<br />

[3] S.kannan,S.jayaram and M.salama, ―Real and reactive power coordination<br />

for a unified power flow controller,‖ IEEE transactions on power systems,<br />

vol 19,no 3 ,august 2004.<br />

[4] H.f.wang, ‖Interactions and multi variable design of unified power flow<br />

controller,‖ electrical power and energy systems 24(2002).<br />

[5] I. papic, P. zunko, D. povh, M. Weinhold, ―Basic control of Unified power<br />

flow controller,‖ IEEE transactions on power systems.12 (4) (1997) 1734-<br />

1739.<br />

[6] A.W.Green,J.T.Boys, ―Hysteresis current forced three phase voltage<br />

source reversible rectifiers,‖ IEEEproc.136(1989) 113-120.<br />

[7] K. Manoz kumar reddy, ―simulation of unified power flow controller,‖<br />

proceedings of National conference on recent trends in power systems and<br />

power electronics,( Feb <strong>2012</strong>)148-151.<br />

[8] M.I.EI Hawwary, A.L.Elshafei, ―output feedback control of a class of<br />

nonlinear systems using direct adaptive fuzzy controller,‖ IEE proc. On<br />

control theory applications 151 (5) (2004) 615-625.<br />

AUTHORS<br />

K. Manoz kumar reddy, Mtech, Associate professor, SriAditya<br />

Engineering College, India, kmkreddyy@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 259<br />

ISSN 2250-3153<br />

Robust Digital Watermarking Using MDKP<br />

Mr A. Chandra, Ms. T. Kavitha<br />

Department of Computer Science and Systems Engineering, Sree Vidyanikethan Engineering College,<br />

A.Rangampet, Tirupathi, India<br />

Abstract- The growth of digitalization of data creates a need<br />

for protecting digital content against counterfeiting, piracy and<br />

malicious manipulations. Digital water marking is one of the<br />

methods of protecting multimedia data. A robust digital<br />

watermarking method is proposed in this paper, which has<br />

greatest robustness against various attacks and preserves the<br />

image quality after water marking. It embeds a watermark into an<br />

image in DCT domain. The image is divided into blocks and<br />

each block is processed using Multi Dimensional Knapsack<br />

Problem (MDKP) and in turn converts to spatial domain. The<br />

watermark is extracted from the image and compared with the<br />

original image. The measurement of quality of image is also<br />

concerned. The proposed scheme exhibits better performance in<br />

robust digital watermarking. The experiment is carried using<br />

MATLAB 7.x and results are verified.<br />

Index Terms- Copyright protection, Digital Watermarking,<br />

DCT, MDKP<br />

D<br />

I. INTRODUCTION<br />

igital technologies have grown dramatically and widely<br />

used within home computers and open networks. Digital<br />

content is volatile and easily processed. Digital objects may be<br />

modified easily without any control. Digital watermark is a piece<br />

of information embedded into potentially vulnerable images in<br />

such a way it is in separable from the image.<br />

The digital watermarks can be divided into three different<br />

types as visible watermark, Invisible-Robust watermark, and<br />

Invisible-Fragile watermark. Visible watermark is a transparent<br />

object overlaid into the primary image. The watermark will be<br />

visible to a casual viewer on a careful observation. The invisiblerobust<br />

watermark is embedded in such a way that changes made<br />

to the pixel value are not noticed, which can be recovered only<br />

with appropriate decoding mechanism. The invisible-fragile<br />

watermark is embedded in such a way that any alternations of the<br />

image would alter or destroy the watermark [3].<br />

Several applications of watermarking have been considered<br />

by researchers [2]:<br />

Copyright: In this case, the mark is associated with an identity<br />

number. In this way, the mark identifies the owner of the content<br />

and can be used for copyright purposes (prevent illegal copies).<br />

The embedding and the detection of the mark depend on a secret<br />

key. The mark has to be robust and detectable after numerous<br />

processing treatments or attacks that preserve the original<br />

content.<br />

Database Retrieval and Data Hiding: In this case, the mark<br />

permits the identification of the content. The mark contains a<br />

description of the content or a pointer to this description and can<br />

be used for database ―classification.‖ In this application, the<br />

robustness of the mark is not decisive but the mark has to be<br />

detected after basic format conversion.<br />

Authentication: The mark can be a fragile mark that will<br />

disappear after image manipulation. It can be used to authenticate<br />

the content and to prove that its integrity has been preserved. The<br />

function of the mark is to prove that the content has not been<br />

manipulated and consequently the robustness of the marking<br />

algorithm is not a prior achievement.<br />

Original<br />

Image<br />

Watermark<br />

Embedding<br />

Procedure<br />

Watermarked<br />

Image<br />

Figure 1: Block Diagram of Watermarking<br />

Attacks which attempt to destroy or invalidate watermarks<br />

can be classified into two types, noise-like signal processing and<br />

geometric distortions. Noise like signal processing is intended to<br />

remove embedded water marks from the cover image by a signal<br />

processing approach. Geometric distortion makes a detector fail<br />

to detect the existence of watermark even if they are still on the<br />

image. Geometric distortions can be resisted by transform-based,<br />

pilot-based and feature-based schemes [1].<br />

Watermark can be inserted into the image using various<br />

techniques like spread spectrum and feature based techniques.<br />

Insertion and detection of watermark using the above techniques<br />

consumes too much computation time. As a result, we propose a<br />

method of inserting watermark into image using MDKP in DCT<br />

domain to reduce the computation time. The cover image is<br />

divided into blocks and an MDKP is formulated to optimize the<br />

selection of most robust blocks in the image. Watermark is<br />

inserted into the blocks by transforming them to DCT domain.<br />

After insertion of watermark they transformed back to spatial<br />

domain. The experimental results is applied to some images the<br />

proposed method will have better robustness than existing<br />

methods.<br />

The paper is organized as follows. Various watermarking<br />

schemes are described in section II. Proposed watermarking<br />

scheme using MKDP in DCT domain is described in section III<br />

and concluding remarks is made in section IV.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 260<br />

ISSN 2250-3153<br />

II. RELATED WATERMARKING SCHEMES<br />

Several previous digital watermarking methods have been<br />

proposed. In [4], the authors propose a scheme for watermarking<br />

images. The method breaks up an image into 8×8 block and<br />

computes a DCT to each of these blocks. A pseudorandom subset<br />

of the blocks is chosen, then, in each such block, a triple of<br />

frequencies is selected from one of 18 predetermined triples and<br />

modified so that their relative strengths encode a one or zero<br />

value. The 18 possible triples are composed by selection of three<br />

out of eight predetermined frequencies within the 8 × 8 DCT<br />

block. The choice of the eight frequencies to be altered within the<br />

DCT block is based on a belief that the ―middle<br />

frequencies...have moderate variance,‖ i.e. they have similar<br />

magnitude. This property is needed in order to allow the relative<br />

strength of the frequency triples to be altered without requiring a<br />

modification that would be perceptually noticeable.<br />

Chih-Wei Tang and Hsuesh-Ming Hang [5] propose a<br />

scheme that takes original image; the feature extraction method<br />

which generates reference centers of disks for watermark<br />

embedding and detection. Then it performs the image<br />

normalization technique on disks in the original image. The<br />

coordinate transformation coefficients between the original<br />

image disks and the normalized ellipse images are generated. The<br />

location of blocks in the original image for watermark<br />

embedding is determined from the normalized image. Then,<br />

coordinates of selected points are transformed from normalized<br />

image back to the original image. Next, a 2-D FFT is applied to<br />

these 32×32 blocks on each qualified disk in an original image.<br />

The watermark is embedded in the transform domain. Last, the<br />

watermarked blocks are 2-D IFFT converted back to the spatial<br />

domain to replace the original image blocks. The drawback of<br />

this scheme is watermark resistance is low for severe geometric<br />

distortions.<br />

Jin S. Seo and Chang D. Yoo [6] propose a procedure that<br />

constructs invariant regions at each scale from the scale space<br />

Harris points of an image; selects invariant regions for<br />

watermarking, considering the spatial positions and the<br />

repeatability measures. Watermark is embedded additively into<br />

the selected regions after geometric normalization according to<br />

the shape of the regions.<br />

Jen-Sheng Tsai, Win-Bin Huang and Yau-Hwang Kuo [1],<br />

in this scheme a region set is obtained by a feature detector. Here<br />

the algorithm works in two phases. During the primary feature<br />

set searching stage, watermark is inserted into the detected<br />

feature regions and secondly simulated attacking is performed.<br />

By analyzing the attack resistance of the regions primary feature<br />

set is identified. On which genetic algorithm based feature set<br />

solution is done to resist undefined attacks. There are several<br />

drawbacks of this scheme. Only predefined attacks can be<br />

simulated and algorithm consumes too much computation time<br />

robustness of feature regions due to simulated attacking.<br />

The existing techniques are generally resistant to various<br />

attacks but consume more computation time. The proposed<br />

method is a secure digital watermarking scheme and is a faster<br />

robustness measurement scheme.<br />

III. WATERMARKING USING MDKP<br />

One of the major difficulties for watermarking is that<br />

watermark embedding and detection should be performed over<br />

the same blocks of an image. The flow diagram of the scheme<br />

shown in fig 2. Watermark is embedded into the original image<br />

in DCT domain using MDKP. Extraction of watermark is also<br />

implemented.<br />

A. Implementation of Work<br />

We propose an algorithm which works in DCT domain<br />

using MDKP. The algorithm uses the DCT block size as 2×2.<br />

The original size of the image considered in the experiment is<br />

64×64. The image is processed into blocks; the blocks are<br />

transformed using DCT.<br />

The symbol is defined to indicate the overall resistance<br />

degree of the block b against attack a. It is determine by<br />

Where , indicates if block b can resist the i th<br />

predefined attack ai and Na is the total number of predefined<br />

attacks. The symbol indicates the property related to corner<br />

response of the block b. It is zero, if it is less than threshold is set<br />

to 1% of the maximum response value. We use binary symbol<br />

to indicate whether region belongs to the middle scale band or<br />

not. This can be formulated into an MDKP as [8]<br />

maximize (2)<br />

subjected to<br />

is defined as<br />

(3)<br />

1, if the block is selected (4)<br />

0, otherwise.<br />

(1)<br />

The variables and represent the composite weights<br />

and constraints of quality distortion and overlapping conditions.<br />

This MDKP is solved for determining the best choice of blocks.<br />

Insert watermark into the block, transform block back into<br />

spatial domain and move on to the next block, and write the<br />

watermarked image out to a file. Finally separate the watermark<br />

from the image using DCT block size. Compare the watermark<br />

extracted image to the file compare it with the original image. If<br />

the change is less than threshold then the image is not distorted.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 261<br />

ISSN 2250-3153<br />

T<br />

T<br />

Image Distorted<br />

Start<br />

Set the DCT block size 2x2 size of the image is 64x64<br />

Process the image into block; Transform the block using DCT<br />

Identify the Blocks into which<br />

watermark is to be inserted by<br />

solving MDKP<br />

Insert watermark, transform the<br />

block back to spatial domain<br />

Any block<br />

remaining<br />

Write the watermarked image to a file<br />

Figure 2: Flow diagram of the proposed scheme<br />

F<br />

Remove the watermark from the<br />

above image and compare with<br />

original image<br />


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 262<br />

ISSN 2250-3153<br />

Figure 3: comparison between block selection and region<br />

selection<br />

Best fitness is for block selection and mean fitness is for<br />

feature region selection [1].<br />

IV. CONCLUSION<br />

In this paper, a method based on DCT domain using MDKP<br />

solving procedure is developed to select image blocks for robust<br />

digital image watermarking under the constraint of preserving<br />

image quality. The robustness of the watermark is significantly<br />

improved and image quality after watermarking is still preserved.<br />

The development of a MDKP techniques leads to numerous<br />

perspectives. The next step of the work can be JPEG<br />

watermarking. The techniques proposed in this paper can help<br />

validate claims of ownership that required for intellectual<br />

property law enforcement.<br />

REFERENCES<br />

[1] Jen-Sheng Tsai, Win-bin Huang and Yau-Hwang Kuo, ―On the Selection of<br />

optimal Feature Region Set for Robust Digital Image Watermarking‖, IEEE<br />

Transactions on Image Processing, Vol.20,No.3,March 2011.<br />

[2] Patrick Bas, Jean-Marc Chassery, and Benoit Macq, ―Geometrically<br />

Invariant Watermar king Using Feature Points‖, IEEE Transactions on<br />

Image Processing, Vol.11,No.9,Sepetember 2002.<br />

[3] Munesh Chandra, Shika Pandey, and Rama Chaudary, ―Digital<br />

Watermarking Technique for Protecting Digital Images‖, IEEE 2010.<br />

[4] Inegar J. Cox , Joe Kilian, F.Thomson Leigthon and Talal Shamoon ,<br />

―Secure Spread Spectrum Watermarking for multimedia‖, IEEE<br />

Transactions on Image Processing, Vol.6,No.12,December 1997.<br />

[5] Chih-Wei Tang and Hsueh-Ming Hang, ―A Feature-Based Robust Digital<br />

Image Watermarking Scheme‖, IEEE Transactions on Image Processing,<br />

Vol.51, No.4, April 2003.<br />

[6] Jin S. Seo and Chang D.Yoo, ―Image Watermarking Based on Invariant<br />

Regions of Scale-Space Representation‖, IEEE Transactions on Image<br />

Processing, Vol.54, No.4, April 2006.<br />

[7] E.Koch , J.Rindfrey and J.Zhao, ―Copyright Protection of Multimedia<br />

Data‖, in proceedings International Conference Digital Media and<br />

Electronic Publishing,1994.<br />

[8] H. Kellerer, U. Pferschy, and D. Pisinger, Knapsack Problems. Berlin:<br />

Springer,2004.<br />

[9] Jen-Sheng Tsai, Win-bin Huang, Chao-Leigh Chen, Yau-Hwang Kuo ―A<br />

Feature-Based Digital Image Watermarking for Copyright Protection and<br />

Content Authentication‖ IEEE, 2007<br />

AUTHORS<br />

First Author – Mr A. Chandra, Department of Computer<br />

Science and Systems Engineering, Sree Vidyanikethan<br />

Engineering College, A.Rangampet, Tirupathi, India<br />

Second Author – Ms. T. Kavitha, Mr A. Chandra, Department<br />

of Computer Science and Systems Engineering, Sree<br />

Vidyanikethan Engineering College, A.Rangampet, Tirupathi,<br />

India<br />

Mr. A.Chandra was born in<br />

Katherapalli, Chittoor(Dt),<br />

A.P.,India. He received his<br />

B.Tech degree in Computer<br />

Science and Engineering in<br />

2004 from JNT University, Hyderabad. He had his<br />

M.Tech student from JNTUA, Anantapur. His research<br />

interests are image processing, computer networks and<br />

network security. Presently he is working as Assistant<br />

professor in the Department of Computer Science and<br />

Systems Engineering, Sree Vidyanikethan Engineering<br />

College, A.Rangampet, Tirupati.<br />

Ms. T.Kavitha was born in<br />

Chittoor, A.P, India.<br />

She received her<br />

B.Tech degree in Computer<br />

Science and Engineering in<br />

2006 from JNT University, Hyderabad. She received her<br />

M.Tech degree from Acharya Nagarjuna University,<br />

Guntur. Her research interests are computer networks<br />

and network security. Presently She is working as<br />

Assistant professor in the Department of Computer<br />

Science and Systems Engineering, Sree Vidyanikethan<br />

Engineering College, A.Rangampet, Tirupati.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 263<br />

ISSN 2250-3153<br />

Evaluation of antifungal activities of certain plant against<br />

Fusarium udum Butler causing wilt in pigeonpea (Cajanus<br />

cajan (L.) Millsp.)<br />

Tongbram Ranjana Devi and GKN Chhetry<br />

Department of Life sciences, Manipur University, Canchipur, Imphal – 795003<br />

Abstract- The antifungal effect of aqueous extracts of locally<br />

available plant species have been investigated in vitro conditions<br />

against Fusarum udum , the causal agent of Fusarium wilt of<br />

pigeonpea. The plant extracts were screened against mycelial<br />

growth and spore germination of F. udum at different<br />

concentrations of 5%, 10%, 15%, and 20% using poisoned food<br />

technique and cavity slide method. Among the tested plants<br />

higher inhibition was noticed in Allium sativum, Azadirachta<br />

indica,Spilanthes acmella and Adhatoda vasica.The remaining<br />

plants produced less inhibitory effect. Among them A. sativum at<br />

20% alone recorded 100% inhibition of mycelial growth and<br />

spore germination. In field experiment, aqueous extract of A.<br />

sativum showed highest percentage of disease control.<br />

Index Terms- Antifungal properties, Fusarium udum,<br />

Pigeonpea, Plant extract, Wilt<br />

P<br />

I. INTRODUCTION<br />

igeonpea (Cajanus cajan (L.) Millsp.) is an important grain<br />

legume crop of the family Fabaceae. It is the most important<br />

kharif pulse crop with much higher productivity. In Manipur the<br />

crop is cultivated on marginal lands by resource-poor farmers,<br />

who commonly grow traditional medium- and long- duration<br />

landraces. It is cultivated either as sole crop or mixed with<br />

pearlmillet (Pennisetum glaucum L) and maize (Zea mays L) [3].<br />

Diseases are major biological constraints to production. Of these<br />

Fusarium wilt are widespread and causes heavy damage. As the<br />

management of this soil borne disease through conventional<br />

technology such as growing resistant varieties, fungicidal seed<br />

treatment, single treatment of fungicide or bio-agent cannot<br />

provide a remedy for disease control [6], a need was felt to<br />

develop botanical based biofungicides for control of plant<br />

diseases. Because non judicious use of synthetic fungicides since<br />

last four decades led to several problems to human and animal<br />

health besides environmental problems. This scenario, therefore,<br />

calls for alternative approaches which are economically feasible<br />

and ecofriendly to increase yield of pigeonpea. In view of the<br />

hazardous effect of synthetic fungicides, that too for the soil<br />

borne ones the present investigation has been carried out for<br />

evaluating the phytotoxic activity of locally available plants<br />

against wilt disease of pigeonpea.<br />

II. MATERIALS AND METHODS<br />

Ten plants viz., Allium cepa, Allium sativum, Carica papaya,<br />

Citrus limon, Eryngium foetidum, Gynura angulosa, Aloe vera,<br />

Azadirachta indica, Spilanthes acmella, Adhatoda vasica,<br />

locally known for their medicinal values for the treatment of<br />

common human diseases were selected to determine the<br />

antifungal activity against F. udum. Extracts of plant parts such<br />

as leaf, flower, bulb, clove, etc. were prepared by the standard<br />

method used by Gerard Ezhilan et al. [2]. Fresh plant parts were<br />

washed with tap water followed by sterile distilled water,<br />

processed with sterile distilled water @1mlg -1 of plant tissue<br />

(1:1v/w) with pestle and mortar and filtered through a double<br />

layered cheese cloth. The filtrate so obtained formed the<br />

standard plant extract solution. The plant extract so prepared<br />

were screened in vitro against F. udum using poisoned food<br />

technique. Stock solution 5, 10, 15, and 20 ml were mixed<br />

respectively with 95, 90, 85 and 80 ml of sterilized molten<br />

Potato Dextrose Agar (PDA) media to obtained 5, 10, 15 and 20<br />

percent concentration of plant extract. The mixed medium was<br />

thoroughly shaken to ensure uniform mixing of extract. 20 ml of<br />

poisoned PDA was poured into sterile petriplates. Five<br />

replications were maintained for each concentration. After<br />

solidification of poisoned media, the plates were inoculated with<br />

mycelium disc (4mm diameter) of vigorously growing pure<br />

culture colony of F. udum. The control petriplates in five<br />

replications were maintained using only sterile water without<br />

any plant extract but with mycelium disc (4mm) for comparison .<br />

The inoculated petriplates were incubated at 25 ± 1 0 C. The radial<br />

growth of F. udum was measured in treated and control<br />

petriplates after seven days of incubation . The percent growth<br />

inhibition was calculated following the formula given by Vincent<br />

[8].<br />

C T<br />

I x100<br />

where, I=percent inhibition<br />

C<br />

C = growth in control<br />

T = growth in treatment<br />

Effect of plant extracts on the spore germination of Fusarium<br />

udum.<br />

Antifungal activity of aqueous extract of the test plants on the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 264<br />

ISSN 2250-3153<br />

spore germination of F. udum was assayed by cavity slide<br />

method. One drop( about 0.1ml ) of spore suspension containing<br />

40-50 spores per microscopic field (10×40x) was put over a<br />

concentrations viz. 5,10,15 and 20 percent .The slides were kept<br />

in moist chamber prepared by putting two folds of filter paper in<br />

both sides of petriplates. These plates were incubated at 25± 1 0 C<br />

for 24 hours. Cavity slides with sterilized distilled water serve as<br />

control. Three replications were kept for each treatment. Spore<br />

germination was calculated by observing the number of spores<br />

germinated / microscopic field. Percent inhibition of<br />

germination over control was calculated.<br />

FIELD EXPERIMENT:<br />

The experiments were carried out in Chirang a village located at<br />

the outskirt of Imphal city where pigeonpea was grown regularly<br />

in a randomized block design for two consecutive years (2009<br />

and 2010). A wilt susceptible local variety was shown in third<br />

week of April in each plot (2×2m 2 ).<br />

Plant extracts that produced high percentage of inhibition at<br />

20% concentration viz. A.sativum, A. indica, S.acmella, A. vasica<br />

were tested further to see their effect in vivo conditions. Plant<br />

extracts of test plant were prepared afresh on the day of foliar<br />

application and used for spray immediately after preparation. The<br />

spray treatments were started after 45 days of planting followed<br />

by two subsequent sprays at 15 days interval. A standard check<br />

with untreated control (water spray) was also maintained. Data<br />

on disease incidence were recorded and calculated by using the<br />

formula:<br />

Botanicals Parts<br />

used<br />

Eryngium<br />

foetidum<br />

Carica<br />

papaya<br />

Adhatoda<br />

vasica<br />

IV. TABLES<br />

Percent Disease incidence<br />

(DI%) ×100<br />

III. RESULTS<br />

Result showed significant effect of plant extracts against the<br />

mycelial growth of F. udum causing wilt of pigeonpea (table 1).<br />

Among them, extract of Allium sativum showed complete<br />

inhibition of radial growth of F. udum followed by Azadirachta<br />

indica (79.4%), Spilanthes acmella (68.8%) and Adhatoda<br />

vasica (58.8%), Gynura angulosa (55.9%), Aloe vera (55.9%),<br />

Eryngium foetidum (50%).The other test extracts showed less<br />

than 50% inhibition of mycelial growth. Result presented in table<br />

2 showed that highest inhibition of spore germination was<br />

observed in A. sativum extract followed by A.indica(60.7%),<br />

S.acmella and A. vasica showed more or less similar inhibitory<br />

effect. The other tested plants showed less inhibitory effect. .<br />

Under field conditions, among the four plants, maximum control<br />

of disease was observed with A. sativum(35.3%), followed by A.<br />

indica(25.9%), S acmella(14.2%) and A. vasica(10.2%). The<br />

results proved that application of bulb extract of A. sativum<br />

could be biopesticidal and ecofriendly substitute for chemical<br />

fungicide. However, further studies are needed to standardized<br />

the dose of bulb extract for foliar spray in the field to achieve<br />

better results.<br />

Table1: Effect of plant extracts on the radial growth of mycelium of F. udum<br />

Local name *Mycelial growth (cm) mean Percent inhibition of<br />

mycelium growth over<br />

control<br />

leaf awaphadigo<br />

m<br />

5% 10% 15% 20% 5% 10% 15% 20%<br />

2.9 2.9 1.9 1.7 2.35 14.7 14.7 44.1 50.0<br />

leaf awathabi 2.7 2.6 2.2 1.9 2.35 20.6 23.5 35.3 44.1<br />

leaf Nongmangk<br />

ha<br />

angouba<br />

2.5 2.4 1.8 1.4 2.03 26.5 29.4 47.1 58.8<br />

Allium cepa bulb tilhou 3.0 2.9 2.9 2.7 2.86 11.8 14.7 14.7 20.6<br />

Citrus<br />

limon<br />

leaf champra 2.9 2.7 2.4 2.4 2.60 14.7 20.6 29.4 29.4<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 265<br />

ISSN 2250-3153<br />

Spilanthes<br />

acmella<br />

flowe<br />

r<br />

chinlengbi 2.5 2.1 1.3 0.9 1.70 26.5 37.7 61.2 68.8<br />

Gynura<br />

angulosa<br />

leaf terapaibi 2.5 2.5 1.8 1.5 2.08 26.4 29.4 47.1 55.9<br />

Allium<br />

sativum<br />

clove chanam 1.5 0.3 00 00 0.45 55.9 92.1 100 100<br />

Aloe vera leaf ghritakumari 2.5 2.3 1.5 1.5 1.95 26.5 32.4 55.9 55.9<br />

Azadirachta<br />

indica<br />

leaf neem 1.9 1.5 0.9 0.7 1.25 44.1 55.9 73.5 79.4<br />

Control 3.5 3.5 3.2 3.4 3.40<br />

Mean 2.6 2.3 1.8 1.7<br />

CD@5% Between plant extracts : 2.7<br />

Between concentrations:4.4<br />

*mean of five replications<br />

Table2: Effect of plant extrac ts on the spore germination of F. udum<br />

Botanicals *Spore germination (%) Mean * Percent inhibition<br />

5% 10% 15% 20% 5% 10% 15% 20%<br />

E.foetidum 82.6 78.2 72.3 65.6 74.68 10.3 15.1 21.5 28.8<br />

C.papaya 82.8 78.3 72.8 70.2 76.03 10.1 15.0 20.9 23.8<br />

A. vasica 81.1 74.9 71.0 61.3 72.73 11.9 18.7 22.9 33.4<br />

A.cepa 86.5 80.4 75.4 73.5 78.95 6.1 12.7 18.1 20.2<br />

C.limon 85.1 78.6 73.4 72.6 77.43 7.6 14.7 20.3 21.2<br />

S. acmella 75.8 74.1 68.1 60.6 69.65 17.7 19.5 26.1 34.2<br />

G.angulosa 81.7 75.4 71.6 65.5 73.55 11.3 18.1 22.3 28.9<br />

A. sativum 9.2 7.0 4.5 00 5.12 9.0 92.4 95.1 100<br />

A.vera 79.0 74.3 69.1 63.9 70.93 14.2 19.3 25.0 30.6<br />

A. indica 60.5 40.6 45.5 36.2 45.70 34.3 55.9 50.6 60.7<br />

Control 93.0 92.1 92.5 90.8 92.1<br />

Mean 74.3 68.5 65.1 60.0<br />

CD@5% Between plant extracts : 2.6<br />

Between concentrations : 4.4<br />

*mean of three replications<br />

Table 3: Effect of plant extracts on wilt disease of pigeonpea under field condition<br />

Name of plants *DI%<br />

2009 2010<br />

Pooled mean % Disease control<br />

A. sativum 61.1 (51.41) 62.8 (52.42) 62.0 (51.94) 35.3<br />

A. indica 71.1 (57.48) 71.1 (57.48) 71.1 (57.48) 25.9<br />

S. acmella 76.7 (61.14) 87.8 (69.56) 82.3 (65.12) 14.2<br />

A. vasica 82.2 (65.05) 90.0 (71.57) 86.1 (68.11) 10.2<br />

Control 94.5 (76.44) 97.2 (80.37) 95.9 (78.32)<br />

*average value of the occurrence of disease<br />

*figure in parentheses are arcsin transformed values<br />

V. DISCUSSION<br />

The major setback in the control of Fusarium udum has been<br />

low capita per income, with household poverty which has<br />

hindered farmers acquiring synthetic chemicals to control the<br />

disease. Locally available plants have been tested as an<br />

alternative to synthetic chemicals. A. sativum extract completely<br />

inhibited mycelial growth and spore germination.A.indica also<br />

inhibited the growth of the pathogen above 50%.The<br />

effectiveness of garlic and neem extract in micelial growth and<br />

spore germination might be due to the presence of antifungal<br />

compounds like diallyl disulphide and diallyl trisulphide and<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 266<br />

ISSN 2250-3153<br />

azadirachtin. Effectivenees of garlic and neem as bio-fungicides<br />

has already been reported by many against different fungi. Garlic<br />

extract at 15% inhibited the growth of the pathogen (88.26%) [1].<br />

Pradeep Kumar Singh et al [5] also reported highest inhibition of<br />

radial growth of F. udum by A. indica(67.8%) at 5%.<br />

Effectiveness of garlic and neem extract in different fungi is also<br />

reported by many workers [4,7].<br />

VI. CONCLUSION<br />

Present investigation suggests that locally available plant<br />

resources such as A. sativum and A. indica may be of use for<br />

possible control of F.udum. However, further work is needed to<br />

explore potential of selected plants at the field level.<br />

REFERENCES<br />

[1] Ankita Shukala and S. K. Dwivedi.(<strong>2012</strong>). Bioefficacy of plant extracts<br />

against Fusarium species causing wilt in pulses.IOSR Journal of<br />

Engineering. 2(1): 136-144.<br />

[2] Gerard E .Chandrasekar and V. Kurucheve. (1994).Effect of six selected<br />

plant products and oil cakes on the sclerotial production and germination of<br />

Rhizoctonia solani. Indian Phytopath. 47 (2): 183-185.<br />

[3] G.K.N. Chhetry.(2004). Dispersion statistics and sequential sampling plan<br />

for timing fungicides application against Cercospora cajani leaf spot in<br />

pigeonpea. J. Mycol. Pl. Pathol. 34 (2):554-557.<br />

[4] N. Siva, S.Ganesan, N. Banumathy and Muthuchelian.(2008). Antifungal<br />

effect of leaf extract of some medicinal plants against Fusarium oxysporum<br />

causing wilt disease of Solanum melogena L. Ethnobotanical Leaflets 12:<br />

156-163.<br />

[5] Pradeepkumar Singh, Anish Khan, Robin Gogoi and Ritesh Kumar Jaiswal<br />

(2010). Plant leaf extracts and bioagents for eco-friendly management of<br />

wilt of pigeonpea caused byFusarium udum. Indian Phytopath. 63 (3) : 343<br />

– 344.<br />

[6] R. M. Gade , K.K. Zote and C. D. Mayee. (2007). Integrated management<br />

of pigeonpea wilt using fungicide and bio-agent. Indian Phytopath. (60) 1:<br />

24-30.<br />

[7] R. R. Sharma, H.N. Gour and Pankaj Sharma.(2005). Effect of plant<br />

extracts on growth of Rhizoctonia solani and disease development in<br />

maize. J. Mycol. Pl. Pathol. 35(2): 377-379.<br />

[8] Vincent JM. (1947). Distortion of fungal hyphae in the presence of certain<br />

inhibitors. Nature 150:850.<br />

AUTHORS<br />

First Author – Tongbram Ranjana Devi. Ph,D Student,<br />

Department of Life Sciences, Manipur University, Imphal,<br />

Canchipur,795003<br />

Email address: ranjanatongbram@yahoo.in<br />

Second Author – GKN Chhetry, Professor, Department of Life<br />

Sciences, Manipur University, Imphal, Canchipur,79500<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 267<br />

ISSN 2250-3153<br />

Recent Developments in Signal Encryption – A Critical<br />

Survey<br />

S. Rajanarayanan and A. Pushparaghavan<br />

Department of computer science and Engineering, Selvam College of Technology, Namakkal, India<br />

srnarayanan_slm@yahoo.co.in<br />

Abstract- In digitally modern world, the fundamental issue<br />

of multimedia data security (such as digital audio signals,<br />

images, and videos) is becoming a major concern due to the rapid<br />

development of digital communications and networking<br />

technologies. The methods and algorithms which are currently<br />

available for data protection uses cryptographic primitives for<br />

secure data transmission and reception by assuming that both<br />

sides must trust on each other. Nowadays, the range of<br />

cryptography applications have been expanded a lot in the<br />

modern area after the development of communication means;<br />

cryptography is essentially required to ensure that data are<br />

protected against penetrations and to prevent espionage. The<br />

major two conceptual blocks of cryptography is encryption and<br />

decryption. This is achieved by sending encrypted version of the<br />

data to the untrusted computers to process. Once when the<br />

computation process is completed on the encrypted data, the<br />

results will be sent back and the decryption is applied to extract<br />

the original data content. To ensure the decrypted result to be<br />

equal to the intended computed value, a structural method of<br />

encryption should be followed. Encryption is a technique<br />

which maintains confidentiality while sending and receiving data<br />

or storing the information. The principle of Kerckoffs‘ on the<br />

encryption states that the security must not rely on the<br />

obfuscation of code, but only on the secrecy of the decryption<br />

key. In this paper detailed description of symmetric and<br />

asymmetric encryption are given to provide a wider view of<br />

encryption techniques. The field of secure signal processing<br />

poses significant challenges for both signal processing and<br />

cryptography research; only few ready-to-go fully integrated<br />

solutions are available.<br />

Index Terms- Encryption, Cryptography, Kerckoffs‘,<br />

Symmetric, Asymmetric<br />

D<br />

I. INTRODUCTION<br />

igital signal processing field has immensely wide range of<br />

applications including communication systems, multimedia<br />

data production, biological signal processing for health<br />

monitoring etc. Although these applications are widely<br />

developed, protection of information for secure communication<br />

is one of the major requirements. The methods and algorithms<br />

which are currently available for data protection uses<br />

cryptographic primitives for secure data transmission and<br />

reception by assuming that both sides must trust on each other.<br />

Using this technique, data cannot be accessed by third parties,<br />

but just not enough to provide complete security to the<br />

application.<br />

Confidentiality of data should be ensured during<br />

communication and data storage while encryption is taken place.<br />

Recently, some additional features providing ability to delegate<br />

computations for encryption in untrusted computers or devices<br />

are added. This is achieved by sending encrypted version of the<br />

data to the untrusted computers to process. Once when the<br />

computation process is completed on the encrypted data, the<br />

results will be sent back and the decryption is applied to extract<br />

the original data content. To ensure the decrypted result to be<br />

equal to the intended computed value, a structural method of<br />

encryption should be followed.<br />

Rivest et al. in 1978 proposed a homomorphic encryption [1] to<br />

solve this issue. Brickell and Yacobi in [2] pointed out some of<br />

the security weakness in the first proposals of Rivest et al.<br />

Followed the first attempt of Rivest et al, a numerous methods<br />

and algorithms have proposed to solve issues related to the data<br />

encryption on various contexts. These are: secret sharing<br />

schemes, threshold schemes [3], zero-knowledge proofs [4],<br />

oblivious transfer [5], commitment schemes [3], anonymity,<br />

privacy, electronic voting, electronic auctions, lottery protocols<br />

[6], protection of mobile agents[7], multiparty computation [3],<br />

mix-nets [8, 9], watermarking or fingerprinting protocols [10–<br />

11], and so forth.<br />

II. FUNDAMENTALS OF ENCRYPTION<br />

Encryption is a technique which maintains confidentiality<br />

while sending and receiving data or storing the information. The<br />

principle of Kerckoffs‘ on the encryption states that the security<br />

must not rely on the obfuscation of code, but only on the secrecy<br />

of the decryption key. In general, encryption techniques are<br />

classified into two broad categories: symmetric and asymmetric.<br />

The detailed explanation of these two types is given in the<br />

following section.<br />

A. Symmetric Encryption<br />

The term ―Symmetric‖ states that both encryption and<br />

decryption of the data are carried out with the same secret key.<br />

Hence, the key must be known to both sender and the receiver in<br />

order to perform any secure communication. The major<br />

advantage of using symmetric encryption is for its fastness.<br />

However, it is not possible for two people who never met to use<br />

such schemes directly. Block ciphers (AES [14, 15]) and stream<br />

ciphers (One-time pad [16], Snow 2.0 [17]), which are belongs to<br />

this category performs encryption faster.<br />

B. Asymmetric Encryption<br />

In terms of asymmetric encryption, the key used for encryption<br />

is different for it is used in decryption procedure. The encryption<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 268<br />

ISSN 2250-3153<br />

key is public as the decryption key remains private. Since there is<br />

no need of sender or receiver to agree on the sharing of secret<br />

key, these schemes are more functional than the symmetric<br />

techniques. More number of features are added to asymmetric<br />

schemes. However, asymmetric schemes have two major<br />

disadvantages; they are based on nontrivial mathematical<br />

computations, and much slower than the symmetric ones. RSA<br />

[18] and ElGamal [19] are the prominent algorithms belong to<br />

this category.<br />

C. Issues of Encryption Performance<br />

When compared block cipher against RSA algorithm, like AES<br />

it is typically 100 times faster while encryption and 2000 times<br />

faster while decryption, with about 60MB per second on a<br />

modest platform. Stream ciphers are even faster, some of them<br />

being able to encrypt/decrypt 100MB of data per second or more.<br />

Thus, the whole content of a DVD will take about a minute with<br />

a fast stream cipher encryption/decryption. In practice, it would<br />

require hours, or even days, to encrypt or decrypt for such huge<br />

amount of data when asymmetric encryption/decryption is used.<br />

Hence, the asymmetric cipher is used to encrypt only a short<br />

data, while the symmetric one is used for the longer one. The<br />

sender and the receiver do not need to share anything before<br />

performing the encryption/decryption as the symmetric key is<br />

transmitted with the help of the public key of the receiver. By<br />

combining the advantages of both efficiency of symmetric<br />

schemes and functionalities of the asymmetric schemes,<br />

performance of the encryption can be improved.<br />

D. Encryption Security Issues<br />

In first, Shannon [20] formalized the security of encryption<br />

schemes in his seminal paper. He introduced the notion of perfect<br />

secrecy/unconditional security. According to this, knowledge of<br />

a cipher text does not give any information either about the<br />

corresponding plain text or about the key. Estimation of the<br />

security level is necessary in order to evaluate how secures the<br />

encryption schemes. Different authors addressed this security<br />

level estimation on their papers. This estimation may not be<br />

sufficient for several reasons. First, there may be other ways to<br />

break the system than solving the reference mathematical<br />

problem [21, 22]. Second, most of security proofs are performed<br />

in an idealized model called the random oracle model. In recent,<br />

more realistic model called the standard model is used to perform<br />

proofs ([23], [24]). Usually, to evaluate the attack capacity of the<br />

opponent, we distinguish among several contexts [25]: cipher<br />

text-only attacks where the opponent has access only to some<br />

cipher texts, known-plaintext attacks where the opponent has<br />

access to some pairs of corresponding plaintext-cipher texts,<br />

chosen-plaintext attacks which is same as previous, but the<br />

opponent can choose the plaintexts and get the corresponding<br />

cipher texts, and chosen-cipher text attacks ,the opponent has<br />

access to a decryption oracle, behaving as a black-box, that takes<br />

a cipher text and outputs the corresponding plaintext.<br />

E. Appropriate Encryption Technique Selection<br />

Selection of a right encryption scheme involves consideration<br />

of many constraints such as time, memory, security, and so forth.<br />

The time and memory criteria are very important in highly<br />

constrained architectures, often encountered in very small<br />

devices (PDAs, smart cards, RFID tags, etc.). They are also very<br />

important when a huge amount of data is processed at the same<br />

time. Schemes such as AES or RSA are generally used because<br />

of their reputation, but it is also to be noted that new schemes are<br />

proposed each year. Also, any new encryption proposal should<br />

satisfy the following diversity. First, it is necessary in order to be<br />

able to face new kinds of requirements. Second, should be able to<br />

rely an attack breaks.<br />

III. LITERATURE REVIEW<br />

Cuomo et al. in 2008[26] proposed a feature-based data<br />

embedding framework that synchronizes both embedder and<br />

receiver for error correction. The method employs modification<br />

of pitch for data embedding and uses Davey and Mackay's codes<br />

for insertion, deletion, and substitution (IDS) for synchronization<br />

and error recovery. Also, performance of the presented algorithm<br />

is improved using the expectation-maximization algorithm at the<br />

receiver end by estimating the channel parameters for the IDS<br />

decoding. The proposed method is very robust to the low-bit-rate<br />

speech coding channels.<br />

An algorithm that embeds the data in the phase of non-voiced<br />

speech was presented by Hofbauer et al. in 2009 [27]. The<br />

method replaces the autoregressive excitation signal of speech<br />

signal in a frequency sub-band, which is robust against band pass<br />

filtering channels. Several sets of pulse shapes are derived to<br />

prevent inter-symbol interference for creating pass band<br />

embedding signal by simple filtering. Location of the embedded<br />

data is detected using a marker based scheme without the<br />

insertions or deletions occurrence. Chen et al. in 2007[28]<br />

proposed a Vector quantization (VQ) of linear prediction<br />

coefficients (LPCs) based method for speech encryption. Secret<br />

key is generated using the vector quantization indices of<br />

neighboring frames derived from the natural speech‘s characters.<br />

Chen et al. in 2007[29] presented a Codebook-excited linear<br />

prediction (CELP)-based speech encryption algorithm. This<br />

proposed algorithm utilizes compressed speech data for insertion,<br />

deletion and replacement for data embedding. Initially, speech<br />

data are slatted into multiple speech frames groups. The data<br />

encryption in the current frame is generated using the feature,<br />

line spectrum frequency (LSF) extracted in the current frame, the<br />

extracted pitch from of the succeeding frame, the embedded data<br />

in the preceding frame and the location index of the current<br />

frame. Finally, some of the least significant bits (LSBs)<br />

indicating the excitation pulse positions or excitation vectors are<br />

substituted for the watermark.<br />

Speech encryption based on the time-trajectory model of the<br />

sinusoidal components of voiced speech signals is addressed<br />

Laurent Girin et al. in 2007[30]. This global approach is called<br />

long-term (LT) model, which uses amplitude and phase<br />

parameters of the discrete cosine functions for each entire voiced<br />

section of speech. Stankovic et.al in 2010 [31] proposed a unified<br />

encryption approach that can be used for different types of data<br />

such as audio, image or video based on multidimensional timefrequency<br />

analysis is presented over here. Speech signals utilize<br />

time-frequency analysis while space/spatial-frequency analysis is<br />

used for image encryption. The combination of both methods<br />

used in speech and image encryption is extended for video<br />

encryption. Encryption coefficients are selected by computing<br />

local frequency content of the signal. Also, non-stationary<br />

filtering of the host signal is carried out in order to provide<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 269<br />

ISSN 2250-3153<br />

imperceptibility of the encryption. A study on the perceptual<br />

watermarking impacts on the stationary audio signals was<br />

presented by Larbi et.al in 2005[32]. The study is based on<br />

stationary indices, which represent a measure of variations in<br />

spectral characteristics of signals, using time-frequency<br />

representations. Separation of multiple source audio signals from<br />

a mixture using the watermarking concept was presented by<br />

Parvaix et.al in 2010[33]. In their approach, a specific two level<br />

encoder-decoder procedure is discussed over here. At the<br />

encoder end, before the mixing of source audio signals, each<br />

signal is encrypted with set of parameters that gives additional<br />

information. Then, these encrypted signals are mixed and<br />

transmitted. At the receiver end, using the prior knowledge of the<br />

encrypted source signals, each signal is separated from the<br />

mixture. This method of separation is called informed source<br />

separation (ISS). Results obtained in this method shows high<br />

performances.<br />

Xiangyang et.al in 2007[34] proposed a novel approach for<br />

adaptive blind digital audio encryption. The method uses support<br />

vector regression algorithm for the extraction of the embedded<br />

information. The signal to be encrypted is first embedded in the<br />

audio signal along the template information. Adaptive<br />

quantization according to the local audio correlation and human<br />

auditory masking is used for embedding the information. At the<br />

decoding, corresponding template feature is selected and SVR is<br />

trained. Then, this trained model is used to predict actual outputs<br />

of the embedded information. The main features of this method<br />

include inaudible, robustness and high practicability. In addition<br />

to these, the algorithm can also extract the embedded information<br />

without original audio help.<br />

Chen et.al in 2008[35] presented an audio encryption method<br />

which solves the tradeoff between robustness and<br />

imperceptibility of the echo hiding method. The method<br />

combines analysis-by-synthesis approach, interlaced kernels, and<br />

frequency hopping in order to achieve high robustness,<br />

perceptual quality and security. During the embedding process,<br />

the algorithm not only considers the characteristics of the host<br />

signal, but also the various attacks of embedded audio signals.<br />

Also, the influence of host signals and various attacks on the<br />

embedded data are minimized by introducing the interlaced<br />

kernels. In addition to these two techniques, frequency hopping<br />

is used to increase the security and robustness of the proposed<br />

algorithm. In frequency hopping, each audio segment for<br />

embedding is established by combining the fractions selected<br />

from all frequency bands based on a pseudo noise sequence as a<br />

secret key. The presented algorithm is superior in terms of<br />

robustness, security, and perceptual quality.<br />

Satti et.al in 2009[36] presented a method for scrambling the<br />

signal for secret data hiding using quasi-group. This is a<br />

multilevel indexed transformation which is very effective in<br />

destroying the structure of the input signal and, therefore, it can<br />

be used as an excellent encryption technique. A novel method<br />

that hides data in digital audio was presented by Malik et.al in<br />

2007[37]. Their algorithm exploits the low sensitivity of the<br />

human auditory system for the distortion of phase. Data hiding is<br />

carried out using set of all pass filters and its pole-zero locations<br />

are chosen as parameters to encode the information. In the<br />

separation procedure, power spectrum of the audio signal is<br />

estimated in the z-plane away from the unit circle. The estimated<br />

power spectrum is used to find the pole locations of the all pass<br />

filters in decoding procedure. The results of the mentioned<br />

algorithm shows effectiveness to withstand data attacks and<br />

provides improved perceptual and robustness to the data hiding.<br />

A wavelet based Patchwork Method (MPM) for audio signal<br />

embedding is presented by Kalantari et.al in 2009[38]. The<br />

embedding process in their method uses two subsets features of<br />

the host signal. One subset is modified multiplicatively according<br />

to the embedding information while another one is not changed.<br />

The approximation coefficients of the wavelet domain are used<br />

to embed data. To achieve error free detection, data embedding is<br />

carried out only in the frames where the energy ratio of the<br />

subsets lies between two predefined values. The quality of the<br />

method is achieved using iterative algorithm and the quality is<br />

evaluated using Perceptual Evaluation of Audio Quality (PEAQ)<br />

method at each iteration level. The algorithm presented in this<br />

paper is high robustness and provides inaudibility of the<br />

watermark insertion.<br />

A binary information hiding system in the audio data was<br />

presented Baras et.al in 2006[39]. Their innovative embedding<br />

method consist various stages. A procedure for controlling<br />

inaudibility of the embedding, robustness of the system is<br />

maximized using informed embedding method and an efficient<br />

synchronization mechanism for low computation cost. The<br />

mentioned algorithm is evaluated on a real time audio signal and<br />

shows improved inaudibility, transmission reliability and<br />

computation cost. A modified Patchwork Algorithm for audio<br />

encoding was presented by In-Kwon Yeo et.al in 2003[40]. This<br />

statistical algorithm uses not only discrete cosine transform, but<br />

also discrete Fourier and wavelet domain. This enhanced<br />

Patchwork algorithm withstands various attacks defined by the<br />

Secure Digital Music Initiative (SDMI).<br />

Sridharan et.al in 1991[41] presented a DFT based speech<br />

encryption system. Coefficients of DCT are modified to achieve<br />

the desired permutation in their method. The presented algorithm<br />

is used in band limited telephone channel for its low residual<br />

intelligibility and good recovered voice quality. Servetti et.al in<br />

2002[42] proposed a speech encryption method based on the low<br />

complexity perception based partial schemes. In their proposed<br />

algorithm, the speech signal which is compressed by ITU-T<br />

G.729 standard is partitioned into two classes. These are: one, to<br />

be encrypted which is most perceptually relevant and another one<br />

is to be left unprotected. A two level partial encryption<br />

techniques are carried out, a low-protection and high-protection<br />

technique. The first one is used to prevent eavesdropping and the<br />

second one is used for performing full encryption of the<br />

compressed bit stream. Goldburg et.al in 1993[43] proposed an<br />

analog speech encryption based on the discrete transform domain<br />

is discussed. In their method, four discrete orthogonal transforms<br />

have been evaluated for their suitability in encryption and found<br />

that DCT is the best transform to use in transform based<br />

encryption. Scrambling of the speech is achieved by modifying<br />

the DCT coefficients in this paper. Dawson et.al in 1991[44]<br />

described a discrete cosine transform based speech-encryption<br />

system suitable for communication over band-limited telephone<br />

channels. An energy modification technique is presented which<br />

dramatically reduces the residual intelligibility of the scrambled<br />

speech. In addition, a method used to reduce the undesirable<br />

effects of band limitation is described. Simulation results are<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 270<br />

ISSN 2250-3153<br />

included which demonstrate the improved performance of the<br />

scheme.<br />

Goldburg et.al in 1993[45] investigated a technique for the<br />

frequency domain speech encryption. This method investigates<br />

codebook vector which is similar to the vector quantization of<br />

speech that can be used in speech scramblers attacks. The<br />

proposed algorithm shows improved security in the frequency<br />

domain speech encryption. Li et.al in 2003[46] proposed a novel<br />

condition for synchronization and stabilization of Chua's<br />

cryptosystems which is used for multimedia encryption. As per<br />

their concept, a magnifying glass is used to enlarge and observe<br />

any mismatch in the parameter and hence increase the security<br />

level and sensitivity of the Chua‘s cryptosystem.Chung-Ping Wu<br />

et.al in 2005[47] proposed an algorithm which uses two<br />

approaches for combining encryption and compression of<br />

multimedia data. They are selective encryption and modified<br />

entropy coders. First, the limitation of the selective encryption is<br />

examined using cryptanalysis, and, using multiple statistical<br />

models, entropy coders are turned into encryption ciphers. A<br />

high level security is achieved in this technique without affecting<br />

the performance and computational speed of the encoders.<br />

A wavelet based approach for speech encryption was proposed<br />

by Shahreza et.al in 2008[48]. The algorithm utilizes Least<br />

Significant Bits of detail coefficients of the wavelet transform to<br />

achieve encryption in an adaptive manner. Since, the information<br />

is not hidden in the silent parts of the speech signal; there is no<br />

need of silent detection algorithms when using this approach.<br />

When compared to a typical wavelet domain LSB, this method<br />

achieves zero error in hiding/unhiding process. Also, the SNR<br />

measure of the encrypted signal using this method implies that<br />

the imperceptible level of the audio is high than original audio. A<br />

method using augmented identity matrix for the speech<br />

encryption was presented by Tingting Xu et.al in 2009 [49]. By<br />

analyzing the redundancy parameters of the coded speech signal,<br />

enhanced encryption is achieved with low computational<br />

complexity in real time applications using this method.Shirali-<br />

Shahreza et.al in 2010[51] proposed a novel algorithm for speech<br />

signal encryption. In their method, information hiding is<br />

achieved by changing the silent intervals of the speech signal.<br />

The main features of this method are robustness MPEG-1 layer<br />

III (MP3) compression, low computation without scarifying the<br />

quality of the speech.<br />

Aoki in 2010[51] proposed a loss less steganography technique<br />

for G.711 codec which is mainly used in telephony systems such<br />

as VoIP. The LSB of the redundancy parameters of G.711 is<br />

exploited in order to achieve encryption.<br />

Chai Peiqi et.al in 2005[52] proposed a novel blind speech<br />

authentication algorithm which comprises linear predictive<br />

coding (LPC) and least significant bit (LSB) steganography. In<br />

this method of speech authentication, the encryption is carried<br />

out by replacing the LSB with extracted invariable LPC<br />

prediction error feature of the speech signal. Djebbar et.al in<br />

2010[53] addressed a method to limits the impact of large data<br />

embedding on to the wideband speech signal. The maximum<br />

number of bits that can be confined without inducing any<br />

noticeable distortion on the speech is first determined and the<br />

encryption is applied only on selected frequency components.<br />

The algorithm is very robust against noise addition, achieves<br />

high security without affecting the quality of the noise signal.<br />

Yong Feng Huang et.al in 2011[54] presented a data<br />

embedding algorithm using G.723.1 codec mainly used in Voice<br />

over Internet Protocol (VoIP). The algorithm analyzes the<br />

inactive frames of low bit rate audio streams for the embedding<br />

process. The proposed algorithm in this paper achieves high<br />

perfect imperceptibility with a high data embedding capacity.<br />

Another speech encryption on VOIP was presented by Hui Tian<br />

et.al in 2009[55]. Their algorithm uses well known least<br />

significant bits substitution approach for information embedding<br />

with a trade between well security and high hiding capacity. By<br />

distributing the LSBs non-uniformly, the algorithm provides<br />

resistance to the statistical detection of the data with the use of<br />

M-sequence technique. The encrypted information is accurately<br />

retrieved using a RSA key agreement and the synchronized<br />

sequence transmission techniques. The proposed system is<br />

effective and provides good security and transparency.<br />

Zhi-jun Wu et.al in 2003[56] presented an analysis by synthesis<br />

approach for speech information embedding. This approach<br />

provides the ability to embed dynamic secret speech information<br />

onto the host speech signal with good achievement in efficiency<br />

and quality. Rui Miao et.al in 2011[57] presented an effective<br />

speech encryption using least significant bits substitution in<br />

VOIP. Unlike a conventional LSB encryption which uses flat<br />

regions of speech signal for embedding, the presented method<br />

suggests a adaptive steganography scheme that selects lower<br />

embedding bit rate in the flat segments, while the sharp segments<br />

can camouflage more secret message. A study that analysis and<br />

encrypts message on the unused bits of G.723.1 codec audio<br />

frames was presented by Huang et.al in 2011[58]. In this novel<br />

analysis, the authors suggest second detection and regression<br />

analysis in order to achieve encryption over VOIP. A system for<br />

speech information hiding telephone was presented by Wu Zhijun<br />

et.al in 101[59]. The overall system is designed using one<br />

fixed point DSP TMS320C54x and three floating DSPs<br />

TMS320C31, and a single-chip micro-controller for embedding<br />

the information. Hui Tian et.al in 2008[60] proposed another<br />

speech encryption method for VOIP using LSBs. The system<br />

presented by them can not only protect the information, but can<br />

also withstand both extraction attack and deceptive attack<br />

effectively.<br />

Skopin et.al in 2010[61] proposed an analog audio<br />

steganography, which allows embedding human speech signal to<br />

the sound file. The authors presented two approaches for the<br />

speech hiding. In their first approach, unheard places of human<br />

speech in a music spectrum is analyzed and used for speech<br />

encryption using the technology called spectrum shift. In the<br />

second method of their proposal, a technique called spectrum<br />

spreading is used for the purpose of encryption on a new signal<br />

which is obtained by inverse Fourier transform of combined<br />

human voice harmonics and music. A study that addresses<br />

solution for speech quality degradation due to the packet loss in<br />

VOIP using steganography was presented by Aoki in 2007[62].<br />

The authors suggest a technique called packet loss concealment<br />

for the reduction speech quality degradation. Sinha et.al in 2006<br />

[63] attempted a speech signal encryption onto the image using<br />

the concept neuro-genetic speech processing. In this method, null<br />

ciphers are extracted from the voice signal of Bengali speaker<br />

using neuro genetic approach and then veiled with an image.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 271<br />

ISSN 2250-3153<br />

COMPARATIVE SECURITY TECHNIQUES<br />

Fig.1 Monte-carlo simulation results illustrating dependence of<br />

synchronization performance on QIM step size.<br />

To further examine the performance of the Monte-Carlo<br />

simulations were performed and the percent of times the<br />

successful synchronization and data recovery was accomplished<br />

was determined. This percentage was computed for different<br />

value of the QIM embedding steps Δ for the case of no<br />

compression. The corresponding result are shown in Fig.1. Note<br />

that the performance degrades with decrease in QIM steps size as<br />

expected. For Δ = 15 no cases of failed synchronization /<br />

recovery were observed and for Δ=10 over 95% of times<br />

synchronization was regained. To evaluate the pitch-modificaton<br />

based speech watermark with synchronization.[26]<br />

CDW (CONTENT DEPENDENT MULTIPURPOSE<br />

WATERMARKING ).Ten varieties of gray-scale cover images<br />

of size 512 X 512 were used. One of them was watermarked,<br />

estimated, and copied to the other 9 unwatermarked images to<br />

form 9 counterfeit stego images. By repeating this procedure,90<br />

counterfeit stego images were obtained. All BERs obtained by<br />

applying IWCA to our method fell within [0.4847 0.5198] (all<br />

were sufficiently larger than T), which indicates the absence of<br />

watermarks. Obviously, the experimental results are consistent<br />

with the analytic result (Eq. (4)) [27].<br />

The implementation target device is the TMS320C5502 digital<br />

signal processor, which is a commercially popular device in lowpower<br />

areas. Under the assumption that the PE algorithms are<br />

implemented on this device using the C language, the execution<br />

cycle counts of the PE algorithms with the different PESs are<br />

compared in Table 3. To quantify the computational complexity<br />

in an actual condition, the cycle counts were measured during a<br />

three-minute period, which is equivalent to the average call<br />

duration. Implementation results show that, compared to the FE<br />

algorithm, the PE algorithm with the class 3 PES only requires<br />

nearly 40% cycle counts.[42]<br />

Table 1. Comparison of computational load of the PESs<br />

PES Encryption<br />

rate(%)<br />

Cycle counts<br />

per<br />

call(3min)<br />

Cycle count<br />

ratio (%)<br />

Class 1 5 3,528,000 26.20<br />

Class 2 10 4,284,000 31.82<br />

Class 3 20 5,292,000 39.30<br />

Class 4, LPS 30 6,480,000 48.13<br />

Class 5 40 7,704,000 57.22<br />

HPS 45 8,388,000 62.30<br />

FE 100 13,464,000 100.00<br />

#cycles<br />

(key,block<br />

length)<br />

Table 2. Number of cycles for the key expansion<br />

AES CD(Ansi C) BrianGladman<br />

(VC++)<br />

Rijndael Rijndael-1 Rijndael Rijndael-1<br />

(128,128) 2100 2900 305 1389<br />

(192,128) 2600 3600 277 1595<br />

(256,128) 2800 3800 374 1960<br />

The cipher and its inverse take the same time. The difference in<br />

performance that is discussed in the section on mplementation,<br />

is only caused by the difference in the key set-up. Table 3 gives<br />

the figures for the raw encryption, when implemented in C,<br />

without counting the overhead caused by the AES API.[14]<br />

Table 3.Cipher (and inverse) performance<br />

(key,block AES CD(Ansi C) BrianGladman<br />

length)<br />

(VC++)<br />

Speed #cycl Speed #cycles/blo<br />

(mbits/s es/blo (mbits/s ck<br />

ec) ck ec)<br />

(128,128) 27.0 950 70.5 363<br />

(192,128) 22.8 1125 59.3 432<br />

(256,128) 1.8 1295 51.2 500<br />

We gratefully accepted the generous offer from Cryptix to<br />

produce the Java implementation. Cryptix provides however no<br />

performance figures. Our estimates are based on the execution<br />

time of the KAT and MCT code on a 200 MHz Pentium, running<br />

Linux. The JDK1.1.1 Java compiler was used. The performance<br />

figures of the Java implementation are given in Table 4.<br />

Table 4.Cipher (and inverse) performance in java<br />

Key/block length Speed #cycles for rijndael<br />

(128,128) 1100 kbit/s 23.0kcycles<br />

(192,128) 930 kbit/s 27.6kcycles<br />

(256,128) 790 kbit/s 32.3kcycles<br />

IV. CONCLUSION<br />

In this paper, we have presented the art encryption and<br />

decryption schemes discussing their performances and security<br />

issues. Different researchers have contributed their work to this<br />

field, and some of the algorithms are been explained here.<br />

Nowadays, such techniques are studied in wide application<br />

contexts, but the research is still challenging in the<br />

encryptographic community to design more powerful/secure<br />

schemes.<br />

REFERENCES<br />

[1] R. Rivest, L. Adleman, and M. Dertouzos, ―On data banks and privacy<br />

homomorphisms,‖ in Foundations of Secure Computation, 1978, pp. 169–<br />

177.<br />

[2] E. Brickell and Y. Yacobi, ―On privacy homomorphisms,‖ in Advances in<br />

Cryptology (EUROCRYPT ‘87), Lecture Notes in Computer Science,<br />

Springer, 1987, vol. 304, pp. 117–126,<br />

[3] D. Rappe, ―Homomorphic cryptosystems and their applications‖, Ph.D.<br />

thesis, University of Dortmund, Germany, 2004,.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 272<br />

ISSN 2250-3153<br />

[4] R. Cramer and I. Damgard, ―Zero-knowledge for finite field arthmetic, or:<br />

can zeroknowledge be for free?‖ in Advances in Cryptology (CRYPTO<br />

‘98), Lecture Notes in Computer Science, Springer, vol. 1462 , pp. 424–<br />

441.<br />

[5] H. Lipmaa, ―Verifiable homomorphic oblivious transfer and private<br />

equality test,‖ in Advances in Cryptology (ASIACRYPT‘03), Lecture<br />

Notes in Computer Science, Springer, vol. 2894, pp. 416- 433.<br />

[6] P.-A. Fouque, G. Poupard, and J. Stern, ―Sharing decryption in the context<br />

of voting or lotteries,‖ in Proceedings of the 4th International Conference<br />

on Financial Cryptography, 2000,vol. 1962, pp. 90–104 .<br />

[7] T. Sander and C. Tschudin, ―Protecting mobile agents against malicious<br />

hosts,‖ in Mobile Agents and Security, Springer, 1998, vol. 1419, pp. 44–<br />

60.<br />

[8] P. Golle,M. Jakobsson, A. Juels, and P. Syverson, ―Universal reencryption<br />

for mixnets,‖ in Proceedings of the RSA Conference Cryptographers,2004,<br />

vol. 2964, pp. 163–178.<br />

[9] I. Damgard and M. Jurik, ―A length-flexible threshold cryptosystem with<br />

applications,‖ in Proceedings of the 8th Australian Conference on<br />

Information Security and Privacy, 2003, vol. 2727.<br />

[10] A. Adelsbach, S. Katzenbeisser, and A. Sadeghi, ―Cryptology meets<br />

watermarking: detecting watermarks with minimal or zero-knowledge<br />

disclosures,‖ in Proceedings of the European Signal Processing Conference,<br />

2002.<br />

[11] M. Kuribayashi and H. Tanaka, ―Fingerprinting protocol for images based<br />

on aditive homomorphic property,‖ IEEE Transactions on Image<br />

Processing, 2005, vol. 14, no. 12, pp. 2129–2139.<br />

[12] A. Kerckhoffs, ―La cryptographie militaire (part i),‖ Journal des Sciences<br />

Militaires, 1883, vol. 9, no. 1, pp. 5–38.<br />

[13] A. Kerckhoffs, ―La cryptographie militaire (part ii),‖ Journal des Sciences<br />

Militaires, 1883, vol. 9, no. 2, pp. 161–191.<br />

[14] J. Daemen and V. Rijmen, ―The block cipher RIJNDAEL,‖ (CARDIS‘98) ,<br />

Springer ,2000, vol. 1820, pp. 247–256.<br />

[15] J. Daemen and V. Rijmen, ―The design of Rijndael,‖ in AES—the<br />

Advanced Encryption Standard, Informtion Security and Cryptography,<br />

Springer, 2002.<br />

[16] G. Vernam, ―Cipher printing telegraph systems for secret wire and radio<br />

telegraphic communications,‖ Journal of the American Institute of<br />

Electrical Engineers,1926, vol. 45, pp. 109-115.<br />

[17] P. Ekdahl and T. Johansson, ―A new version of the stream cipher SNOW,‖<br />

in Selected Areas in Cryptography (SAC ‘02), Springer, 2002, vol. 2595,<br />

pp. 47–61.<br />

[18] R. Rivest, A. Shamir, and L. Adleman, ―Amethod for obtaining digital<br />

signatures and public-key cryptosystems,‖ Communications of the ACM,<br />

1978, vol. 21, no. 2, pp. 120–126.<br />

[19] T. ElGamal, ―A prublic key cryptosystem and a signature scheme based on<br />

discrete logarithms,‖ in Advances in Cryptology (CRYPTO ‘84), Springer,<br />

1985, vol. 196, pp. 10–18.<br />

[20] C. Shannon, ―Communication theory of secrecy systems,‖ Bell System<br />

Technical Journal, 1949, vol. 28, pp. 656–715.<br />

[21] M. Ajtai and C. Dwork, ―A public key cryptosystem with worstcase/average-case<br />

equivalence,‖ in Proceedings of the 29th ACM<br />

Symposium on Theory of Computing, 1997, pp. 284–293.<br />

[22] P. Nguyen and J. Stern, ―Cryptanalysis of the Ajtai- Dwork cryptosystem,‖<br />

in Advances in Cryptology (CRYPTO ‘98), Springer, 1999, vol. 1462 , pp.<br />

223–242.<br />

[23] R. Canetti, O. Goldreich, and S. Halevi, ―The random oracle model,<br />

revisited,‖ in Proceedings of the 30th ACM Symposium on Theory of<br />

Computing, 1998, pp. 209–218.<br />

[24] P. Paillier, ―Impossibility proofs for RSA signatures in the standard model,‖<br />

in Proceedings of the RSA Conference, 2007, vol. 4377, pp. 31–48.<br />

[25] W. Diffie and M. Hellman, ―New directions in cryptography,‖ IEEE<br />

Transactions on Information Theory, 1976, vol. 22, no. 6, pp. 644–654.<br />

[26] Coumou, D.J.; Sharma, G,‖ Insertion, Deletion Codes With Feature-Based<br />

Embedding: A New Paradigm for Watermark Synchronization with<br />

Applications to Speech Watermarking‖, 2008, vol. 3, No.2, pp: 153 – 165.<br />

[27] Hofbauer, K.; Kubin, G.; Kleijn, W.B.,‖Speech Watermarking for Analog<br />

Flat-Fading Bandpass Channels‖, IEEE Transactions on Audio, Speech,<br />

and Language Processing, 2009,vol.17, no.8, pp: 1624 – 1637.<br />

[28] Chen, N.; Zhu, J., ―Robust speech watermarking algorithm‖, Electronics<br />

Letters,2007, vol. 3,no. 24, pp: 1393- 1395.<br />

[29] Chen, O.T.-C.; Chia-Hsiung Liu,‖ Content-Dependent Watermarking<br />

Scheme in Compressed Speech With Identifying Manner and Location of<br />

Attacks‖, IEEE Transactions on Audio, Speech, and Language Processing,<br />

2007,vol. 15, no.5, pp: 1605 – 1616.<br />

[30] Laurent Girin; Mohammad Firouzmand; Sylvain Marchand,‖ Perceptual<br />

Long-Term Variable-Rate Sinusoidal Modeling of Speech‖, IEEE<br />

Transactions on Audio, Speech, and Language Processing, 2007, vol.15,<br />

no.3, pp: 851 – 861.<br />

[31] Stankovic, S.; Orovic, I.; Zaric, N, ― An Application of Multidimensional<br />

Time-Frequency Analysis as a Base for the Unified Watermarking<br />

Approach‖, IEEE Transactions on Image Processing, 2010, vol.19, no.3, pp:<br />

736 – 745.<br />

[32] Larbi, S.D.; Jaidane-Saidane, M, ―Audio watermarking: a way to<br />

stationnarize audio signals‖, IEEE Transactions on Signal Processing, 2005,<br />

vol. 53, no.2, pp: 816 – 823.<br />

[33] Parvaix, M.; Girin, L.; Brossier, J.-M, ―A Watermarking-Based Method for<br />

Informed Source Separation of Audio Signals With a Single Sensor‖, IEEE<br />

Transactions on Audio, Speech, and Language Processing, 2010, vol.18,<br />

no.6, pp: 1464 – 1475.<br />

[34] Xiangyang Wang; Wei Qi; Panpan Niu, ―A New Adaptive Digital Audio<br />

Watermarking Based on Support Vector Regression‖, IEEE Transactions on<br />

Audio, Speech, and Language Processing,2007, vol.15, no.8, pp: 2270 –<br />

2277.<br />

[35] Chen, O.T.-C.; Wen-Chih Wu, ―Highly Robust, Secure, and Perceptual-<br />

Quality Echo Hiding Scheme‖, IEEE Transactions on Audio, Speech, and<br />

Language Processing, 2008 vol.16, no.3, pp: 629 – 638.<br />

[36] Satti, M.; Kak, S, ―Multilevel Indexed Quasigroup Encryption for Data and<br />

Speech‖, IEEE Transactions on Broadcasting, 2009, vol.55, no.2, pp: 270 –<br />

281.<br />

[37] Malik, H.M.A.; Ansari, R.; Khokhar, A.A, ―Robust Data Hiding in Audio<br />

Using Allpass Filters‖, IEEE Transactions on Audio, Speech, and Language<br />

Processing, 2007, vol.15, no.4, pp: 1296 – 1304.<br />

[38] Kalantari, N.K.; Akhaee, M.A.; Ahadi, S.M.; Amindavar, H, ―Robust<br />

Multiplicative Patchwork Method for Audio Watermarking‖, IEEE<br />

Transactions on Audio, Speech, and Language Processing, 2009, vol. 17,<br />

no. 6, pp; 1133 – 1141.<br />

[39] Baras, C.; Moreau, N.; Dymarski, P, ―Controlling the inaudibility and<br />

maximizing the robustness in an audio annotation watermarking system ―,<br />

IEEE Transactions on Audio, Speech, and Language Processing, 2006,<br />

vol.14, no.5, pp: 1772 – 1782.<br />

[40] In-Kwon Yeo; Hyoung Joong Kim, ―Modified patchwork algorithm: a<br />

novel audio watermarking scheme‖, IEEE Transactions on Speech and<br />

Audio Processing, 2003, vol.11, no.4, pp: 381 – 386.<br />

[41] Sridharan, S.; Dawson, E.; Goldburg, B, ―Fast Fourier transform based<br />

speech encryption system‖, IEEE Communications, Speech and Vision,<br />

1991, vol.138, no.3, pp: 215 – 223.<br />

[42] Servetti, A.; De Martin, J.C., ―Perception-based partial encryption of<br />

compressed speech‖, IEEE Transactions on Speech and Audio Processing,<br />

2002, vol.10, no.8, pp: 637 – 643.<br />

[43] Goldburg, B.; Sridharan, S.; Dawson, E., ―Design and cryptanalysis of<br />

transform-based analog speech scramblers,‖, IEEE Journal on Selected<br />

Areas in Communications, 1993,vol.11, no.5, pp: 735 – 744.<br />

[44] Dawson, E. ―Design of a discrete cosine transform based speech<br />

scrambler‖, Electronics Letters , 1991, vol. 27, no.7, pp: 613 – 614.<br />

[45] Goldburg, B.; Sridharan, S.; Dawson, E.;, ―Cryptanalysis of frequency<br />

domain analogue speech scramblers‖, in Proceedings IEE Communications,<br />

Speech and Vision, 1993, vol.140, no.4, pp: 235 – 239.<br />

[46] Li, K.; Soh, Y.C.; Li, Z.G., ―Chaotic cryptosystem with high sensitivity to<br />

parameter mismatch‖, IEEE Transactions on Circuits and Systems I:<br />

Fundamental Theory and Applications, 2003, vol. 50, no.4, pp: 579 – 583.<br />

[47] Chung-Ping Wu; Kuo, C.-C.J., ―Design of integrated multimedia<br />

compression and encryption systems‖, IEEE Transactions on Multimedia,<br />

2005, vol.7, no.5, pp: 828 – 839.<br />

[48] Shahreza, S.S.; Shalmani, M.T.M., ―High capacity error free wavelet<br />

Domain Speech Steganography‖, IEEE International Conference on<br />

Acoustics, Speech and Signal Processing, 2008, pp: 1729 – 1732.<br />

[49] Tingting Xu; Zhen Yang;, ―Simple and effective speech steganography in<br />

G.723.1 low-rate codes‖, International Conference on Wireless<br />

Communications & Signal Processing, 2009, pp: 1 – 4.<br />

[50] Shirali-Shahreza, M.H.; Shirali-Shahreza, S., ―Real-time and MPEG-1 layer<br />

III compression resistant steganography in speech‖, IET Information<br />

Security, 2010, vol.4, no.1, pp: 1 – 7.<br />

[51] Aoki, N, ―A Semi-lossless Steganography Technique for G.711 Telephony<br />

Speech‖, International Conference on Intelligent Information Hiding and<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 273<br />

ISSN 2250-3153<br />

Multimedia Signal Processing (IIH-MSP), 2010, pp: 534 – 537.<br />

[52] Chai Peiqi; Liu Jingyong; Pei Dingyu; Yang Zhiqiang, ―LPC Prediction<br />

Error Combined with LSB Steganography for Blind Speech<br />

Authentication‖, IEEE 7th Workshop on Multimedia Signal Processing,<br />

2005, pp: 1 – 4.<br />

[53] Djebbar, F.; Hamam, H.; Abed-Meraim, K.; Guerchi, D., ―Controlled<br />

Distortion for High Capacity Data-in-Speech Spectrum Steganography‖,<br />

Sixth International Conference on Intelligent Information Hiding and<br />

Multimedia Signal Processing , 2010, pp: 212 – 215.<br />

[54] Yong Feng Huang; Shanyu Tang; Jian Yuan; ―Steganography in Inactive<br />

Frames of VoIP Streams Encoded by Source Codec‖ IEEE Transactions on<br />

Information Forensics and Security, 2011, vol.6, no.2, pp: 296 – 306.<br />

[55] Hui Tian; Ke Zhou; Hong Jiang; Jin Liu; Yongfeng Huang; Dan Feng; ―An<br />

M-Sequence Based Steganography Model for Voice over IP‖, IEEE<br />

International Conference on Communications, 2009, pp: 1 – 5.<br />

[56] Zhi-jun Wu; Wei Yang; Yi-xian Yang; ―ABS-based speech information<br />

hiding approach‖, Electronics Letters, 2003, vol.39, no.22, pp: 1617 – 1619.<br />

[57] Rui Miao; Yongfeng Huang; ―An Approach of Covert Communication<br />

Based on the Adaptive Steganography Scheme on Voice over IP‖, IEEE<br />

International Conference on Communications, 2011, pp: 1 – 5.<br />

[58] Huang, Y.; Tang, S.; Bao, C.; Yip, Y.J.; ―Steganalysis of compressed<br />

speech to detect covert voice over Internet protocol channels‖, IET<br />

Information Security, 2011, vol.5, no.1, pp: 26 – 32.<br />

[59] Wu Zhi-jun; Niu Xin-Xin; Yang Yi-xian; ―Design of speech information<br />

hiding telephone‖, in Proceedings IEEE Region 10 Conference on<br />

Computers, Communications, Control and Power Engineering, 2002, vol.1,<br />

pp: 113 – 116.<br />

[60] Hui Tian; Ke Zhou; Yongfeng Huang; Dan Feng; Jin Liu; ―A Covert<br />

Communication Model Based on Least Significant Bits Steganography in<br />

Voice over IP‖, The 9th International Conference on Young Computer<br />

Scientists, 2008, pp: 647 – 652.<br />

[61] Skopin, D.E.; El-Emary, I.M.M.; Rasras, R.J.; Diab, R.S.; ―Advanced<br />

algorithms in audio steganography for hiding human speech signal‖, 2nd<br />

International Conference on Advanced Computer Control, 2010, vol.3, pp:<br />

29 – 32.<br />

[62] Aoki, N.; ―Potential of Value-Added Speech Communications by Using<br />

Steganography‖, Third International Conference on Intelligent Information<br />

Hiding and Multimedia Signal Processing, 2007, vol.2, pp: 251 – 254.<br />

[63] Sinha, T.S.; Sanyal, G.; ―Neuro-Genetic based Speech Processing for<br />

Promoting Global Cyber Security using Steganography technique‖, Annual<br />

IEEE India Conference, pp: 1 – 6.<br />

First Author– S.Rajanarayanan, CA, MPhil, ME, (Ph.D),<br />

Assistant Professor, Selvam College of Technology, Department<br />

of Computer Science and Engineering, Namakkal, Tamil Nadu,<br />

India.E-mail: srnarayanan_slm@yahoo.co.in<br />

Second Author – Dr. A. Pushparaghavan BE, MBA, M.Tech,<br />

Ph.D is the Principal and Professor of Electronics and<br />

Communication Engineering in Selvam College of Technology,<br />

Namakkal from April 2011. He worked in different capacity<br />

from Lecturer to Professor and Dean in various leading<br />

institutions like Bannari Amman Institute of Technology, PB<br />

College of Engineering and PSR Engineering College. He is<br />

having around 20 Years of experience in teaching including<br />

academic research.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 274<br />

ISSN 2250-3153<br />

Impact of Seasonal and Habitat variation on composition<br />

of Total Lipid content in Muscle and Liver of Labeo<br />

gonius (Ham)<br />

Abstract- Fish lipid is regarded as quality lipid being rich in<br />

cholesterol, triglyceride and essential fatty acids. The changes in<br />

habitat and seasonal variation have a significant impact on the<br />

quality and quantity of different components of lipid profile. The<br />

present paper reports on the seasonal differences in the<br />

quantitative compositions of total lipid of Labeo gonius in lotic<br />

and lentic habitats. These nutrients were determined in muscle<br />

and liver tissues in four different seasons of the year (premonsoon,<br />

monsoon, retreating monsoon and winter). In lotic<br />

habitat the highest amount of total lipid (301.00 ± 2.73mg/g) was<br />

observed in retreating monsoon in the muscle tissue . Similarly<br />

in liver tissue the highest amount of total lipid was observed in<br />

winter (208.50 ± 1.84mg/g). Though apparently similar trend<br />

was observed in lentic habitat, but some amount of differences<br />

with higher values were observed in muscle tissue. The present<br />

study with comparative analysis of total lipid components reveals<br />

a significant impact of habitat and seasonal variation on the<br />

nutritional quality of lipid in Labeo gonius.<br />

F<br />

Index Terms- Labeo gonius, lotic, lentic, nutrients, lipid<br />

I. INTRODUCTION<br />

ish is one of the main sources of protein and fat and has<br />

become a healthier alternative to meat for the last fifty years.<br />

It stores the lipids in various organs particularly in muscle and<br />

liver. The lipids in fish muscle have received much attention as<br />

source of EPA and DHA fatty acids in human diets. Lipid and<br />

fatty acid composition of many marine fish and shell fish as well<br />

as the effect of different diets and factors on lipid compositions<br />

of various species have been investigated (Ackman and<br />

Takeuchi, 1986 ; Viswanathan and Gopakumar, 1984; Halver,<br />

1980); Suzuki et al. (1986); Viola et al. (1988); Bieniarz et al.<br />

(2000) and observed some of the factors causing changes in the<br />

composition of fatty acids in various species.<br />

The lipid in fish muscle can influence product quality through<br />

interaction with other components. Lipid composition of fish is<br />

of practical importance, particularly in relation to the effects of<br />

lipid components on deterioration during frozen storage and<br />

consumer acceptance. Information about lipid components and<br />

their fatty acid constituents is needed to prevent the oxidative or<br />

hydrolytic factors affecting the quality of fish. Buckley et al.,<br />

(1989) also studied the lipid composition of Heterotis niloticus,<br />

Brycenus nurse, Gnathonemus cyprinoids and Sarotherodon<br />

B.K. Deka*, R. Mahanta* and U.C. Goswami**<br />

*Associate Professor, P.G. Dept. Of Zoology, Cotton College,<br />

** Professor, Dept. of Zoology, Gauhati University, India<br />

galilaeus and reported the common neutral fats as cholesterol,<br />

free fatty acids and cholesterol esters and also diphosphatidyl<br />

glycerol, phosphatidyl glycerol and phosphatidyl ethanolamine<br />

as the most predominant phospholipids.<br />

Takama et al. (1985) reported seasonal variation in fat<br />

deposition in Mackeral and Capelin with tissue variation.<br />

Stansby and Hall (1967) reported approximately 70% of fatty<br />

acids with four, five or six double bonds in lipids from<br />

freshwater fishes which is slightly lower than that of the marine<br />

fish (approximately 88%). Fish oils with polyunsaturated fatty<br />

acids are ―essential‖ to prevent skin diseases and have<br />

neurological benefits in growing children. Recently<br />

Eicosapentaenoic acid has shown great importance because of its<br />

preventive role in arteriosclerosis. Simopoulos et al. (1991)<br />

reported that eicosapen-taenoic acid in the blood is an extremely<br />

potent antithrombotic factor. Some researchers reported the role<br />

of n-3 fatty acids in cancer treatment like breast tumours (El-<br />

Sayed et al., 1994). Lack of these essential fatty acids causes<br />

symptoms of slow growth, deformation of tail fin, faded and fatty<br />

liver, skin pigmentation and stress-shocked (Ackman and Eaton,<br />

1976).<br />

The freshwater fishes provide a great amount of nutrient food<br />

source for human. Presently, a large part of these fish species are<br />

in cultivated forms. Therefore, information about the chemical<br />

composition of various species and their nutritional properties,<br />

biochemical structure and habitat condition is greatly needed.<br />

Impact of seasonal variations on the lipids and the lipid amount<br />

of the fish for its economical importance is of utmost necessary.<br />

However, little is known about the variations in the lipid profile<br />

in local fish fauna. Therefore, the present study was aimed to<br />

investigate the impact of both the seasonal and habitat variations<br />

in the amount of total lipid in muscle and liver of Labeo gonius.<br />

II. MATERIALS AND METHODS<br />

The fishes were collected in Guwahati (Assam, India) from<br />

river Brahmaputra and nearby Lentic Habitat in different seasons<br />

of the year and were anaesthetised by applying diethyl-ether and<br />

then dissected to collect the muscle and liver tissue. The tissues<br />

were dried over a filter paper and immediately weighed and<br />

recorded. .<br />

PREPARATION OF TISSUE SAMPLE<br />

Little amount of propanol (0.5 ml) was added to the tissue and<br />

macerated to make the homogenate. The mixture was centrifuged<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 275<br />

ISSN 2250-3153<br />

for 10 minutes. Supernatant was taken and then made the<br />

requisite volume as 10mg/ml.<br />

The total lipid was estimated following the method of Frings and<br />

Dunn‘s modification for determination of tissue-total-lipid based<br />

on sulfophosphovanilline reaction.<br />

TABLE I: Total Lipid (mg/g of tissue) content of Muscle & Liver tissues of Labeo gonius in different seasons under Lotic & Lentic<br />

habitats.<br />

Total<br />

Lipid (mg/g<br />

of tissue)<br />

Premonsoon Monsoon Retreating<br />

Monsoon<br />

Winter<br />

Muscle Lotic Mean 126.77 294.77 301.00 103.17<br />

SD± 20.19 49.69 12.22 5.15<br />

SEM± 4.52 11.12 2.73 1.52<br />

Lentic Mean 97.5 146.3 82.6 43.2<br />

SD± 9.06 20.62 11.04 8.68<br />

SEM± 2.03 4.61 2.47 1.94<br />

Liver Lotic Mean 127.5 74.51 63.23 208.50<br />

SD± 20.12 5.47 13.25 8.21<br />

SEM± 4.50 1.22 2.96 1.84<br />

Lentic Mean 103.01 76.65 81.39 24.82<br />

SD± 11.43 8.10 8.72 3.37<br />

SEM± 2.56 1.81 1.95 0.75<br />

TABLE II: Showing the significance of variation of total lipid in muscle and liver tissues of Labeo gonius in different seasons under<br />

two habitats (Lotic and Lentic).<br />

Significance of<br />

Variation<br />

t-between Premonsoon<br />

and Monsoon<br />

t-between Premonsoon<br />

and Retreating Monsoon<br />

t-between Premonsoon<br />

and Winter<br />

t-between Monsoon and<br />

Retreating Monsoon<br />

t-between Monsoon and<br />

Winter<br />

t-between Retreating<br />

Monsoon and Winter.<br />

TISSUES HABITATS Total Lipid<br />

t p<br />

Muscle Lotic 13.99


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 276<br />

ISSN 2250-3153<br />

Table III: Showing the significance of variation of total lipid between lotic and lentic habitats in muscle and liver tissues of Labeo<br />

gonius in different seasons.<br />

Tissue t<br />

P<br />

df<br />

Premonsoon Monsoon Retreating<br />

monsoon<br />

Winter<br />

Muscle t 5.91 12.34 59.34 24.37<br />

p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 277<br />

ISSN 2250-3153<br />

III. RESULTS AND DISCUSSION<br />

Fishes show a marked seasonal variation in chemical<br />

composition. The lipid fraction is the component showing the<br />

greatest variation. West African shad (Ethmalosa dorsalis) shows<br />

a range in fat content of 2-7% (wet weight) over the year with a<br />

maximum in July (Watts, 1957). Corvina (Micropogon furnieri)<br />

and pescada-foguete (Marodon ancylodon) have a fat content<br />

range of 0.2-8.7% and 0.1-5.4% respectively (Ito and Watanabe,<br />

1968). It has also been reported that the oil content of these<br />

species varies with size. Watanabe (1971) examined freshwater<br />

fish from Zambia and found a variation from 0.1-5.0% in oil<br />

content of four species including both pelagics and demersals.<br />

Two to three folds of higher lipid content was reported in some<br />

cultured marine fishes than wild types (Cakli, 1994; Aoki et al.<br />

1991; Funuyama et al. 1991; Nakagawa et al. 1991; Hatae et al.<br />

1989). Kunisaki et al. (1986) showed 10-12 fold higher fat<br />

content in cultured horse mackerel than wild type. Dikel (1999)<br />

showed higher lipid content in fish grown in salt water (1.45%)<br />

than in freshwater (0.96%).<br />

In the present study the amount of total lipid from Labeo<br />

gonius in four different seasons of the year under two habitat<br />

conditions was investigated and it was observed that the values<br />

of all the three components of lipid profile were significantly<br />

higher in the lotic habitat (p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 278<br />

ISSN 2250-3153<br />

[12] Freeman DW and Heamsberger JO (1993). An instrumental method for<br />

determining rancidity in frozen catfish fillets. J. Aquat. Food Prod.<br />

Technol.2, 35-50.<br />

[13] Funuyama K, Ushio F and Tomomatsu T (1991). Comparison of nutritive<br />

component between cultured and wild striped jack. Ann. Rep. Tokyo Mettr.<br />

Res. Lab. P . H., 42:185-190.<br />

[14] Halver JE (1980). Lipids and FA. In fish Feed Technology United Nation<br />

Development Programs, p41, Food and Agriculture Organisation of the<br />

United Nations, Rome.<br />

[15] Hatae K, Lee KH, Tsuchiya T and Shimada A (1989). Textual properties of<br />

cultured and wild fish meat. Nippon suisan gakk. Published by Japanese<br />

Soc. Fish. Sci., 55 (2): 363-368.<br />

[16] Ito Y and Watanabe K (1968). Variations in chemical composition in fillet<br />

of corvina and ‗pescada-foguete‘. Contrib. Inst. Oceanogr. Univ. Sao Paolo<br />

(Ser. Technol.), 5, 1-6.<br />

[17] Kunisaki N, Takada K. and Matsuura H (1986). On the study of lipid<br />

contents, muscle hardness and fatty acid compositions of wild and cultured<br />

horse mackerel. Bull. Japan. Soci. Sci. Fish., 52 (2): 333-336.<br />

[18] Nakagawa H, Nishino H, Nematipour GH, Ohya S, Sheimizu T, Horikawa<br />

Y and Yamomoto S (1991). Effects of water velocities on lipid rezerves in<br />

ayu. Nippon suisan gakk. Published by Japanese Soc. Fish. Sci., 57 (9):<br />

1737-1741.<br />

[19] Simopoulos AP, Kifer RR, Martin RE and Barlow SW (1991). Health<br />

Effects of w3 polyunsaturatedfatty acids in seafoods. Karger, Basel.<br />

[20] Stansby ME and Hall AS (1967). Chemical composition of commercially<br />

important fish of the USA. Fish. Ind. Res., 3, 29-34.<br />

[21] Suzuki H, Okazaki K, Hayakawa S, Wadw S and Tamura S (1986).<br />

Influence of commercial dietary FA on PUFA of cultured freshwater fish<br />

and comparison with those of wild fish of the same species. J. Agric. Food<br />

Chem 34:58-60.<br />

[22] Takama K, Love RM and Smith GL (1985). Selectivity in mobilisation of<br />

stored fatty acids by maturing cod, Gadus morhua. L. Comp. Biochem.<br />

Physiol. SOB, 713-718.<br />

[23] Viola S, Mokady S, Behar D and Cogan U (1988). Effects of PUFA in feeds<br />

of tilapia and carp I. Body composition and FA profiles at different<br />

environmental temperatures. Aquaculture 75:127-137.<br />

[24] Viswanathan PG and Gopakumar K (1984). Lipid and FA composition of<br />

fish and shell fish. J. Food Sci. Technol. 21:389.<br />

[25] Watanabe KO (1971). Physical characteristics and chemical composition of<br />

fresh bream, mud sucker, tiger fish and barb from Lake Kariba. Fish.<br />

Res.Bull., 5, 153-173.<br />

[26] Watts JCD (1957). The chemical composition of West African fish. 2. The<br />

West African shad (Ethmalosa dorsalis) from the Sierra Leone river<br />

estuary. Bull. Inst. Fondam. Afr. Noire (A Sci. Nat.), 19, 539-547.<br />

AUTHORS<br />

First Author: Binoy Kumar Deka,<br />

Associate Professor, P.G. Dept. Of Zoology,<br />

Cotton College, Guwahati-1<br />

Emai: bk.deka@rediffmail.com<br />

Second Author: Dr. Rita Mahanta<br />

Associate Professor, P.G. Dept. Of Zoology,<br />

Cotton College, Guwahati-1<br />

Email: ritamahanta@yahoo.co.in<br />

Third Author: Umesh C. Goswami<br />

Dept. Of Zoology,<br />

Fish Biology and Fishery Science.<br />

DST-FIST (Govt. of India) & UGC-SAP<br />

Sponsored Department,<br />

Gauhati University,<br />

Assam, India.<br />

Email: ucgoswami@rediffmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 279<br />

ISSN 2250-3153<br />

Retrieving Stream of Video Frames Using Query<br />

Processing<br />

Ramancha Sandhyarani 1 , Shiramshetty Gouthami 2 and Baggani Ratna 3<br />

Abstract- This paper presents a graph transformation and<br />

matching approach to identify the stream of video frames<br />

using query processing. With query processing algorithm to<br />

retrieve similar frames, the mapping relationship between<br />

the query and database video is first represented by a<br />

bipartite graph. The densely matched parts along the long<br />

sequence are then extracted, followed by a filter-andrefine<br />

search strategy to prune some irrelevant subsequences.<br />

During the filtering stage, Maximum Size Matching is<br />

deployed for each sub graph constructed by the query<br />

and candidate subsequence to obtain a smaller set of<br />

candidates. During the refinement stage, Sub-Maximum<br />

Similarity Matching is applied to identify the subsequence<br />

with the highest aggregate score from all candidates,<br />

according to a robust video similarity model that includes<br />

visual content, temporal order, and frame alignment<br />

information. In the filter-and-refine phase, some non similar<br />

segments are first filtered; several relevant segments are then<br />

processed to quickly identify the most suitable segments.<br />

Index Terms- query processing, video frames, network<br />

packets segments.<br />

T<br />

I. INTRODUCTION<br />

he project aims at building an effective video-information<br />

representation and harnessing system. The representation<br />

scheme should be applicable to most videos and be rich<br />

enough to allow for various kind of video information<br />

encoding and access. The system should extract video objects<br />

and other semantic features from video sequences, characterize<br />

object interactions, scene activity and events, with minimum<br />

possible human intervention, using both visual and aural<br />

information. A novel representation modality of the video<br />

sequences in terms of these descriptors will be evolved which<br />

will permit a variety of useful operations like generation of<br />

video summaries, application driven semantic transcoding of<br />

video content and hyper-linking of video segments exhibiting<br />

similarity of content or other semantic relation(s),which are<br />

quintessential to content guided video browsing in a hyperlinked<br />

organization of a video collection. For universal interpretation<br />

and use of the semantic concepts in video information there is a<br />

need for associated domain ontology. This will make possible<br />

integration of the system with the Semantic Web and allow it to<br />

interact with other knowledge based information systems in the<br />

distributed environment. The proposed system will also provide<br />

1 sandhya_guptha_r@yahoo.co.in,<br />

2 gouthami.shiramshetty@gmail.com<br />

3 ratna_075@yahoo.co.in<br />

for ontology driven access mechanism to the video based<br />

information. Many investigations have been made on contentbased<br />

video retrieval. However, despite the importance, video<br />

subsequence identification, which is to find the similar content to<br />

a short query clip from a long video sequence, has not been well<br />

addressed. This paper has presented an effective and efficient<br />

query processing strategy for temporal localization of similar<br />

content from a long un segmented video stream, considering<br />

target subsequence may be approximate occurrence of potentially<br />

different ordering or length with query clip.<br />

II. PREVIOUS WORK<br />

The project aims at building an effective video-information<br />

representation and harnessing system. The representation<br />

scheme should be applicable to most videos and be rich<br />

enough to allow for various kind of video information<br />

encoding and access. The system should extract video objects<br />

and other semantic features from video sequences, characterize<br />

object interactions, scene activity and events, with minimum<br />

possible human intervention, using both visual and aural<br />

information. A novel representation modality of the video<br />

sequences in terms of these descriptors will be evolved which<br />

will permit a variety of useful operations like generation of<br />

video summaries, application driven semantic transcoding of<br />

video content and hyper-linking of video segments exhibiting<br />

similarity of content or other semantic relation(s),which are<br />

quintessential to content guided video browsing in a hyperlinked<br />

organization of a video collection. For universal interpretation<br />

and use of the semantic concepts in video information there is a<br />

need for associated domain ontology. This will make possible<br />

integration of the system with the Semantic Web and allow it to<br />

interact with other knowledge based information systems in the<br />

distributed environment. The proposed system will also provide<br />

for ontology driven access mechanism to the video based<br />

information.<br />

III. PRESENT WORK<br />

With the demand for visual information of rich content,<br />

effective and efficient manipulations of large video databases<br />

are increasingly desired. Many investigations have been made on<br />

content-based video retrieval. However, despite the importance,<br />

video subsequence identification, which is to find the similar<br />

content to a short query clip from a long video sequence, has not<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 280<br />

ISSN 2250-3153<br />

been well addressed. It is often undesirable to manually check<br />

whether a video is part of a long stream by browsing its entire<br />

length.<br />

IV. MODULES<br />

In this application we have mainly two systems they are<br />

Video Copy Detection<br />

Video Similarity Search<br />

The modules in these two systems are explained briefly.<br />

Video Copy Detection<br />

Target system should have servers like FTP,HTTP,SSH<br />

etc.,<br />

This server software should accept incoming connections<br />

from the remote<br />

Detection System design<br />

Detection System module<br />

User Interface module<br />

Detection System modules<br />

i. Packet Capturing Module<br />

ii. Field Extraction Module<br />

iii. Field Information Storing<br />

iv. PCF for SYN-Flood<br />

v. PCF for Port-Scan<br />

Packet Capturing Module<br />

Packet capture is the act of capturing data packets crossing a<br />

network. Deep packet capture (DPC) is the act of capturing<br />

complete network packets crossing a network. In this module we<br />

capture data packets in the scalable network using packet<br />

capturing tools.<br />

Field Extraction Module<br />

Field Extraction Refers both to the process by which fields are<br />

extracted from event data, and the results of that process, also<br />

referred to as extracted fields. Field extraction can take place<br />

either before events are indexed or after event indexing. In this<br />

module we extract all the fields present in the network.<br />

Field Information Storing<br />

In this module we store all the details of the data fields.<br />

PCF for SYN-Flood<br />

Partial Completion Filter (PCF) consists of parallel stages each<br />

containing hash buckets that are incremented for a SYN and<br />

decremented for a FIN. In this module we use PCF for<br />

identifying the SYN packets in the network.<br />

PCF for Port-Scan<br />

A port scan or port-scan is an attack that sends client requests to<br />

a range of server port addresses on a host, with the goal of<br />

finding an active port and exploiting a known vulnerability of<br />

that service. In this module we use PCF for identifying the portscan<br />

in the network<br />

Main objectives of this project were to develop<br />

A scheme for construction and extraction of semantic<br />

features involving video objects and frame based<br />

characteristics for describing content of the video in<br />

terms of both aural and visual features<br />

An ontological specification for video information for<br />

enabling inter-operable conceptual access<br />

A representational scheme for video documents for<br />

efficient video information browsing, semantic<br />

transcoding, querying and semantics driven delivery.<br />

Fig.1. Home Page<br />

V. EXPERIMENTAL INVESTIGATIONS<br />

The above screen page displays the main features of the<br />

project and also browse option. When we click on browse of the<br />

input video we enter into the login page of the project. In this<br />

project we can view the image of the input video and also the<br />

image of the database video one of the main features. The<br />

Subsequence Identification button helps to compare the video of<br />

the input video to the video of the database video and helps in<br />

retrieving the similar frames of both the image<br />

Figure 2: Login Page<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 281<br />

ISSN 2250-3153<br />

The above screen page displays the main features of the<br />

project and also the browse option. After clicking on the browse<br />

option first the image on the database video is displayed. The<br />

data base searching for the retrieval of the similar frames go on<br />

the input video the two videos .After comparing two images it<br />

retrieves the similar subsequent frames of the video<br />

Fig.3 Retrieval of Frames<br />

The above screen page displays the main features of the<br />

project and also the browse option. After clicking on the<br />

browse option first the image on the database video is displayed.<br />

The data base searching for the retrieval of the similar frames go<br />

on the input video the two videos. After comparing two images it<br />

retrieves the similar subsequent frames of the video<br />

Fig.4. Log Viewer<br />

The above screen shows the segments of the video<br />

subsequence frames. The segments of the input video is<br />

compared to the segment of database video for identification<br />

of similar frames. the segments identification is done till the<br />

retrieval other similar frames on both the input video and the<br />

database video.<br />

. Figure 5: Log Viewer<br />

The above screen shows the segments of the video<br />

subsequence frames. The segments of the input video is<br />

compared to the database video with the subsequence<br />

identification the segments are mapped until a match is found<br />

between this two videos and the relevant frames are<br />

displayed. The above screen also displays the final execution of<br />

the project.<br />

VI. CONCLUSIONS AND FUTURE WORK<br />

This paper has presented a query processing method for<br />

retrieving stream of video frames. A video query processor<br />

should support video-based operations for search by content and<br />

streaming, new video query types, and the incorporation of video<br />

methods and operators in generating, optimizing and executing<br />

query plans. In the preliminary phase, the similar frames of query<br />

clip are retrieved by a batch query algorithm. Then, a bipartite<br />

graph is constructed to exploit the opportunity of spatial pruning.<br />

The high-dimensional query and database video sequence can be<br />

transformed to two sides of a bipartite graph. Only the dense<br />

segments are roughly obtained as possibly similar subsequences.<br />

In the filter-and-refine phase, some non similar segments are first<br />

filtered; several relevant segments are then processed. During<br />

the filtering stage, Maximum Size Matching is deployed for<br />

each sub graph constructed by the query and candidate<br />

subsequence to obtain a smaller set of candidates. During<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 282<br />

ISSN 2250-3153<br />

the refinement stage, Sub-Maximum Similarity Matching is<br />

applied to identify the subsequence with the highest aggregate<br />

score from all candidates, according to a robust video<br />

similarity model that includes visual content, temporal order,<br />

and frame alignment information.<br />

ACKNOWLEDGMENT<br />

We extremely thank our Principal and the management for<br />

their continuous support in Research and Development.<br />

We are also very grateful to our faculty members for their<br />

valuable suggestions and their ever ending support.<br />

Especially, we thank our college Principal and management<br />

for their financial support for receiving the sponsorship.<br />

REFERENCES<br />

[1] A.W.M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain,<br />

―Content-Based Image Retrieval at the End of the Early Years, ‖IEEE<br />

Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 12,pp. 1349-<br />

1380, Dec. 1994.<br />

[2] C. Faloutsos, M. Ranganathan, and Y. Manolopoulos, ―Fast Subsequence<br />

Matching in Time-Series Databases,‖ Proc. ACM SIGMOD ‘94, pp. 419-<br />

429, 1995.<br />

[3] H. Wang, A. Divakaran, A. Vetro, S.-F. Chang, and H. Sun, ―Survey of<br />

Compressed-Domain Features Used in Audio-Visual Indexing and<br />

Analysis,‖ J. Visual Comm. and Image Representation, vol. 14, no. 2, pp.<br />

150-183, 1998.<br />

[4] R. Mohan, ―Video Sequence Matching,‖ Proc. IEEE Int‘l Conf. Acoustics,<br />

Speech, and Signal Processing (ICASSP ‘98), pp. 3697-3700, 2000.<br />

[5] C. Kim and B. Vasudev, ―Spatiotemporal Sequence Matching for Efficient<br />

Video Copy Detection,‖ IEEE Trans. Circuits and Systems for Video<br />

Technology, vol. 15, no. 1, pp. 127-132, 2004.<br />

[6] X.-S. Hua, X. Chen, and H. Zhang, ―Robust Video Signature Based on<br />

Ordinal Measure,‖ Proc. IEEE Int‘l Conf. Image Processing (ICIP ‘04), pp.<br />

685-688, 2005.<br />

[7] C.-Y. Chiu, C.-H. Li, H.-A. Wang, C.-S. Chen, and L.-F. Chien, ―A Time<br />

Warping Based Approach for Video Copy Detection,‖ Proc. 18th Int'l Conf.<br />

Pattern Recognition (ICPR '06),vol.3,pp.228-231,2006.<br />

[8] M.R. Naphade, M.M. Yeung, and B.-L. Yeo, ―A Novel Scheme for Fast and<br />

Efficient Video Sequence Matching Using Compact Signatures,‖ Proc.<br />

Storage and Retrieval for Image 2000.<br />

[9] K.M. Pua, J.M. Gauch, S. Gauch, and J.Z. Miadowicz, ―Real Time<br />

Repeated Video Sequence Identification,‖ Computer Vision and Image<br />

Understanding, vol. 93, no. 3, pp. 310-327,2004.<br />

[10] A. Hampapur, K. Hyun, and R. M. Bolle, ―Comparison of sequence<br />

matching techniques for video copy detection,‖ in Storage and Retrieval for<br />

Media Databases, 2002, pp. 194–201.<br />

[11] J. Xu, Z. Zhang, A. K. H. Tung, and G. Yu, ―Efficient and effective<br />

similarity search over probabilistic data based on earth mover‘s<br />

distance,‖PVLDB, vol. 3, no. 1, pp. 758–769, 2010.<br />

[12] A. Joly, O. Buisson, and C. Fr´elicot, ―Statistical similarity search applied<br />

to content-based video copy detection,‖ in BDA, 2005.<br />

AUTHORS<br />

First Author: Ramancha Sandhyarani Worked in Jayamukhi<br />

Institute of Technological Sciences, Warangal as Assistant<br />

Professor for the year 2006-2011.She received her M.Tech<br />

Degree from JNTU Hyderabad,(A.P,India) .<br />

Second Author: Shiramshetty Gouthami is presently working as<br />

Asst.Prof in Computer Science Engineering Department at<br />

Jayamukhi Institute of Technological Sciences; Warangal for the<br />

past 5 years.She received her M.Tech Degree from JNTU<br />

Hyderabad,( A.P, India).<br />

Third Author: Baggani Ratna Worked in DRK Collage of<br />

Engineering and Techonology as Assistant Professor for the year<br />

2008-2011. She received her M.Tech Degree from JNTU<br />

Hyderabad,(A.P,India)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 283<br />

ISSN 2250-3153<br />

Screening of phaseolus vulgaris Cultivars Growing in<br />

Various Areas of Jammu and Kashmir for Anthracnose<br />

Resistance<br />

Balbir Kour, Gurmeet Kour, Sanjana Kaul, Manoj K. Dhar<br />

Abstract- Phaseolus vulgaris is an economically important<br />

crop. The most important disease which hampers its production<br />

is anthracnose which is found in almost every bean growing<br />

region of the world. Anthracnose in beans is caused by a<br />

hemibiotrophic fungus, namely Colletotrichum lindemuthianum.<br />

Use of resistant genotypes will provide a long lasting solution to<br />

the economic losses caused by anthracnose as this method is<br />

biologically safe as well as cost effective. For the present<br />

investigation, nearly ten C. lindemuthianum isolates collected<br />

from Baramulla, Kashmir were used. Inoculum of each isolate<br />

was produced by inoculating bean extract medium with a<br />

monosporic culture of C. lindemuthianum, incubated at 25ºC for<br />

seven days, the spore suspension culture filtered through double<br />

layered muslin cloth and inoculum load was adjusted to 1.2 X<br />

10 6 spores per milliliter with the help of a haemocytometer. Seed<br />

dip method was used for the inoculation of the test plant. The<br />

inoculated seeds were sown in sand and were kept at 25ºC for the<br />

period of one month. The disease reaction was scored after<br />

twelve days of inoculation following 0-5 scale where 0 = no<br />

disease; 1 = pin point lesion; 2 = small lesion; 4 = large deep<br />

lesion and 5 = sunken lesions with rotten apex. Two broad<br />

categories of the accessions emerged; infected (infection rate<br />

high or mild) or non-infected. Based on the presence or absence<br />

of infected plants accessions were labeled as susceptible or<br />

resistant.<br />

A<br />

Plant Genomics Laboratory, School of Biotechnology, University of Jammu,<br />

Jammu (J & K), 180006, India<br />

I. INTRODUCTION<br />

mong grain crops, pulses (food legumes) rank third after<br />

cereals and oilseeds in terms of total world production.<br />

Pulses are rich in proteins and represent an important source of<br />

dietary protein for humans and animals. The proteins are<br />

generally composed of high amount of lysine, while the amount<br />

of methionine and cysteine is less. However, consumption of<br />

legumes and cereals results in a balanced diet of energy and<br />

protein. Legumes are also an important source of some essential<br />

minerals (1) . The legumes have been observed to reduce blood<br />

cholesterol levels (2) . Among major food legumes, common bean<br />

(Phaseolus vulgaris L.) is third in importance, has broadest<br />

genetic base and is grown and consumed in almost every part of<br />

the world (3,4) . Common bean (Phaseolus vulgaris L.) is<br />

important food grain legume crop, cultivated in almost every part<br />

of the world. This species is a diploid with 2n=2X=22, it is<br />

predominantly a self crossing species with only exception of<br />

about 3%. (5)<br />

Although, beans are cultivated throughout India, Himalayas<br />

hold the richest diversity of common bean. Common bean<br />

production is influenced by both biotic and abiotic stresses;<br />

biotic factors are responsible for major losses. Six major diseases<br />

(anthracnose, rust, angular leaf spot, common bacterial blight,<br />

Bean Golden Mosaic Virus and Bean Common Mosaic Virus)<br />

are known to hamper common bean production. However, the<br />

most important among these is anthracnose which is found in<br />

almost every bean growing region of the world (6) . It is<br />

considered as one of the most destructive disease (7) . Anthracnose<br />

is caused by a hemibiotrophic fungus, namely Colletotrichum<br />

lindemuthianum. This disease is known to cause total loss of the<br />

crop. Disease generally occurs by contaminated seeds or infected<br />

plant debris (8) . This disease may lead to major or total crop loss,<br />

particularly in case a susceptible variety is sown (9,10) . The<br />

anthracnose genetics has been studied for a long time (11) . This<br />

host-pathogen interaction was the first report of race-cultivar<br />

specificity (12) . The chemical control method has been used to<br />

check the disease, however, it is very expensive and causes<br />

severe threat to the health and environment. Use of resistant<br />

genotypes will provide a long lasting solution, as this method is<br />

biologically safe as well as cost effective. Therefore the present<br />

study was aimed to characterize the Common bean accessions<br />

growing in J&K state for resistance and susceptibility.<br />

II. METHODOLOGY<br />

For the present study forty four common bean accessions<br />

growing in various areas of Jammu and Kashmir were collected.<br />

Screening for disease resistance in these accessions was achieved<br />

by challenging the plants with the pathogen. The inoculums of<br />

Colletotricum lindemuthianum were applied to all the accessions<br />

and disease incidence and infection rate were determined by<br />

visual rating. The plants were classified as susceptible and<br />

resistant. Infected pods of various accessions of beans were<br />

collected from different areas of Baramulla district in Kashmir<br />

valley at regular time intervals. After collection, the infected<br />

pods were placed in between the folds of newspapers for drying.<br />

Efforts were made to remove as much moisture as possible, in<br />

order to avoid cross contamination by other fungi. The samples<br />

were kept in the paper bags marked with different accession<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 284<br />

ISSN 2250-3153<br />

numbers. The bags were wrapped in polythene and kept at 4ºC to<br />

minimize the degradation and to prevent the contamination.<br />

Potato dextrose agar medium (PDA), the basic medium for<br />

culturing of many fungi, was successfully used for<br />

Colletotrichum isolates collected from various bean accessions.<br />

The antibiotic, chloramphenicol (50μg/ml) was added to the<br />

medium to avoid bacterial contamination. In addition bean pod<br />

extract medium was also used. Infected pods were washed with<br />

distilled water, treated with disinfectant to eliminate the bacterial<br />

and other contaminants from the pod surface. Small pieces of the<br />

infected pods were inoculated on PDA and kept at 25ºC. The<br />

fungus started growing after a week of inoculation and thereafter,<br />

its growth was monitored every week. The fungus isolated from<br />

infected pods was again sub-cultured on PDA to obtain the pure<br />

cultures. For preparing a pure culture, the spores were picked<br />

from the petriplates and sub-cultured on fresh PDA plate until<br />

pure culture was obtained. Using this technique five isolates of<br />

C. lindemuthianum were obtained. Pure cultures of C.<br />

lindemuthianum were stored at 4ºC. These were maintained as<br />

mother cultures for further study. For long term storage, glycerol<br />

cultures were raised. Spores were mixed in 70% glycerol in<br />

storage vials and were stored at -80ºC. In addition to PDA<br />

medium, bean extract medium was also used for the sporulation<br />

of the fungus. For preparation of bean extract medium, young<br />

bean pods were surface sterilized and boiled in water. The extract<br />

was then filtered through double layered muslin cloth, and to the<br />

filtrate 2% dextrose was added. The pH of the medium was<br />

adjusted to 7.0 and 2% agar was added prior to autoclaving. For<br />

the present investigation, three C. lindemuthianum isolates<br />

collected from Baramulla, Kashmir were used. Inoculum of each<br />

isolate was produced by inoculating bean extract medium with a<br />

monosporic culture of C. lindemuthianum. After inoculation, the<br />

plates were incubated at 25ºC for seven days. The surface of the<br />

culture was scraped with a sterilized glass rod, and the spore<br />

suspension was prepared in sterilized water from seven day old<br />

sporulating cultures of all the three isolates. The spore<br />

suspension culture was filtered through double layered muslin<br />

cloth and inoculum load was adjusted to 1.2 X 10 6 spores per<br />

milliliter with the help of a haemocytometer. Seed dip method<br />

was used for the inoculation of the test plant. Five surface<br />

sterilized seeds of each accession were germinated on sterilized<br />

filter paper under aseptic conditions. The seeds were surface<br />

sterilized by dipping in 70% ethanol for 5min, followed by<br />

treatment with 0.1% mercuric chloride for 10min and finally 2X<br />

wash with double distilled water. Five day old germinating seeds<br />

of each accession (5 seeds) were dip inoculated in the spore<br />

suspension for 5min after removal of the seed coat. The<br />

inoculated seeds were sown in sand and were kept at 25ºC for<br />

one month. The disease reaction was scored after twelve days of<br />

inoculation following 0-5 scale (13) , where 0 = no disease; 1 = pin<br />

point lesion; 2 = small lesion; 3 & 4 = large deep lesion and 5 =<br />

sunken lesions with rotten apex.<br />

III. RESULTS AND DISCUSSION<br />

The present study being first of its kind, for the screening of<br />

resistant common bean accessions growing in Jammu and<br />

Kashmir state, is based upon the forty seven common bean<br />

accessions collected from various areas (Table 1). During present<br />

study the common bean accessions were challenged with C.<br />

lindemuthianum cultures to screen the resistant and susceptible<br />

cultivars. The isolates of C. lindemuthianum were collected from<br />

infected pods of different cultivars growing in various areas of<br />

Kashmir valley. A total of ten fungal isolates were cultured and<br />

maintained while in the present study the results with one C.<br />

lindemuthianum isolate on common bean accessions has been<br />

given. Based on the response, the plants were classified as<br />

susceptible and resistant (Table 2). This method of screening the<br />

bean germplasm for disease resistance is an established one and<br />

has been used by many workers including (14) . The latter workers<br />

reported that after one week of treatment, the susceptible<br />

cultivars showed severe infection on the cotyledons and the<br />

hypocotyls resulting in death. Although, slightly susceptible<br />

cultivars survived, however, these developed distinct stem and<br />

leaf necrosis (Fig 1, 2). On the other hand the resistant cultivars<br />

did not show any symptoms of the disease (Fig. 3, 4). Similar<br />

results were obtained in the present investigation. The<br />

susceptible cultivars showed formation of large lesions with<br />

sunken cankers on cotyledons and dead apex, the mild infected<br />

plants showed slight infection on cotyledons, while resistant<br />

plants were healthy and without any disease symptoms. This<br />

method of screening varieties has been used by many other<br />

workers in common bean and found to be the most suitable one<br />

(15-17) . Therefore, the present study, being the first of its kind to<br />

scan the bean germplasm for resistance to anthracnose from<br />

various areas of Kashmir region, these resistant varieties can be<br />

used for the development of better varieties of beans.<br />

IV. CONCLUSION<br />

From the present study we concluded that the beans<br />

germplasm growing in various areas of Jammu and Kashmir hold<br />

the richest repository of anthracnose resistant cultivars. These<br />

cultivars can be studied in detail to isolate the resistant genes<br />

present in them and can be used for the breeding studies so as to<br />

develop a cultivar which can withstand the threat of this deadly<br />

disease.<br />

ACKNOWLEDGMENT<br />

Authors are thankful to the Department of Biotechnology,<br />

Govt. of India for financial support.<br />

REFERENCES<br />

[1] Grusak MA. Enhancing mineral content in plant food products. J Am Coll<br />

Nutr 2002; 21:178S-183S.<br />

[2] Andersen JW, Story L, Sieling B, Chen WJ, Petro MS, Story J.<br />

Hypocholesterolemic effects of oat-bran or bean intake for<br />

hypercholesterolemic men. Am J Clin Nutr 1984; 40:1146-1155.<br />

[3] Singh SP. Integrated genetic improvement. In Common bean improvement<br />

in the twenty-first century. S.P. Singh ed. (Kluwer, Dordrecht, the<br />

Netherlands. 1999 pp. 133-165.<br />

[4] Broughton WI, Hernandez G, Blain M, Beebe S, Gepts P, Vanderleyden J.<br />

Beans (Phaseolus spp.) model food legumes. Plant Soil 2003; 252: 55-128.<br />

[5] Ibarra-Perez F, Ehdaie B, Waines G. Estimation of outcrossing rate in<br />

common bean. Crop Sci 1997; 37:60-65.<br />

[6] [Kelly JD, Afanador L, Cameron LS. New races of Colletotrichum<br />

lindemuthianum in Michigan and implications in dry bean resistance<br />

breeding. Plant Dis 1994; 78:892-894.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 285<br />

ISSN 2250-3153<br />

[7] Pastor-Corrales MA Tu JC. Anthracnose. In Bean production problems in<br />

the tropics. H.F. Schwartz and M.A. Pastor-Corrales eds. (CIAT, Cali,<br />

Colombia), 1989 pp. 77-104.<br />

[8] Dillard HR, Cobb AC. Survival of Colletotrichum lindemuthianum in bean<br />

debris in New York State. Plant Dis 1993; 77:1233-1238.<br />

[9] Fernandez MT, Fernandez M, Centeno ML, Canal MJ, Rodriguez R.<br />

Reaction of common bean callus to culture filtrate of Colletotrichum<br />

lindemuthianum: Differences in the composition and toxic activity of fungal<br />

culture filtrates. Plant Cell Tiss Organ cult 2000; 61:41-49.<br />

[10] Sharma PN, Kaur M,Sharma OP, Sharma P, Pathania A. Morphological,<br />

pathological and molecular variability in Colletotrichum capsici, the cause<br />

of fruit rot of chillies in the subtropical region of north-western India.<br />

Phytopathology 2005; 153:232-237.<br />

[11] McRostie GP. Inheritance of anthracnose resistance as indicated by a cross<br />

between a resistant and a susceptible bean. Phytopathology 1919; 9:141-<br />

148.<br />

[12] Barrus MF. Variation of cultivars of beans in their susceptibility to<br />

anthracnose. Phytopathology 1911; 1:190-195.<br />

[13] Drijfhout E, Davis HJC. Selection of a new set of homogeneously reacting<br />

bean (Phaseolus vulgaris) differential to differentiate races of common<br />

bean. Plant Pathol 1986; 38: 391-396.<br />

[14] Kruger J, Hoffmann GM, Hubbling N. The kappa race of Colletotrichum<br />

lindemuthianum and sources of resistance to anthracnose in Phaseolus<br />

beans. Euphytica 1977; 26:23-25.<br />

[15] Pathania A, Sharma PN, Sharma OP, Chahota RK, Bilal Ahmad Sharma P.<br />

Evaluation of resistance sources and inheritance of resistance in kidney<br />

bean to Indian virulences of Colletotrichum lindemuthianum: Evaluation of<br />

resistance in bean to anthracnose. Euphytica 2006; 149:97-103.<br />

[16] Genchev D, Christova P, Kiryakov I, Beleva M, Batchvarova R Breeding of<br />

common bean for resistance to the physiological races of Anthracnose<br />

identified in Bulgaria. Biotechnol Biotechnol Eq 2010; 24:1814-1823.<br />

AUTHORS<br />

First Author – Balbir Kour, Senoir Research Fellow, Plant<br />

Genomics Laboratory, School of Biotechnology, University of<br />

Jammu, Jammu (J & K), 180006, Email:<br />

balbirbalio2@yahoo.co.in<br />

Second Author – Gurmeet Kour, Research Associate, Plant<br />

Genomics Laboratory, School of Biotechnology, University of<br />

Jammu, Jammu (J & K), 180006<br />

Third Author – Sanjana Kaul, Senoor Assistant Professor, Plant<br />

Genomics Laboratory, School of Biotechnology, University of<br />

Jammu, Jammu (J & K), 180006<br />

Fourth Author – Prof. Manoj K. Dhar, Director & Head , Plant<br />

Genomics Laboratory, School of Biotechnology, University of<br />

Jammu, Jammu (J & K), 180006<br />

Correspondence Author – Balbir Kour, Email:<br />

balbirbalio2@yahoo.co.in<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 286<br />

ISSN 2250-3153<br />

Table 1: Bean germplasm and its characterization<br />

S. No. Accession Number Colour of Seeds Shape of<br />

Seeds<br />

Type of Seeds<br />

1 JUBG50 Pink Small Snap<br />

2 JUBG51 Pink Small Dry<br />

3 JUBG52 Mottled Small Snap<br />

4 JUBG53 Red Small Dry<br />

5 JUBG54 Black Small Dry<br />

6 JUBG55 Mottled Big Dry<br />

7 JUBG56 Brown Big Snap<br />

8 JUBG57 Mottled Big Dry<br />

9 JUBG58 Red Big Snap<br />

10 JUBG59 Brown Small Dry<br />

11 JUBG60 Mottled Small Snap<br />

12 JUBG61 Mottled Small Dry<br />

13 JUBG62 Brown Big Snap<br />

14 JUBG63 Brown Big Snap<br />

15 JUBG64 White Small Snap<br />

16 JUBG65 Light brown Medium Dry<br />

17 JUBG66 White Small Dry<br />

18 JUBG67 Pink Medium Dry<br />

19 JUBG68 Pink Big Snap<br />

20 JUBG69 White Medium Dry<br />

21 JUBG70 Red Small Dry<br />

22 JUBG71 Blackish brown Small Snap<br />

23 JUBG72 Mottled Big Snap<br />

24 JUBG73 Pink Small Dry<br />

25 JUBG74 Pink Small Snap<br />

26 JUBG75 Red Big Dry<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 287<br />

ISSN 2250-3153<br />

S.<br />

No<br />

27 JUBG76 White Small Dry<br />

28 JUBG77 Mottled Medium Dry<br />

29 JUBG78 Mottled Small Dry<br />

30 JUBG79 Pink Big Dry<br />

31 JUBG80 Pink Small Snap<br />

32 JUBG81 Brown Big Dry<br />

33 JUBG49 Mottled Big Dry<br />

34 JUBG82 Red Medium Dry<br />

35 JUBG83 Mottled Medium Dry<br />

36 JUBG18 Red Small Dry<br />

37 JUBG84 Red Small Dry<br />

38 JUBG85 Red Small Snap<br />

39 JUBG86 Brown Big Snap<br />

40 JUBG87 Brown Big Snap<br />

41 JUBG88 Mottled Medium Snap<br />

42 JUBG89 Mottled Big Snap<br />

43 JUBG90 Red Medium Snap<br />

44 JUBG92 Red Medium Snap<br />

Accession Observations after 1 st<br />

Table 2: Response of different bean accessions to C. lindemuthianum<br />

week<br />

1 JUBG18 Infection on cotyledons,<br />

no germination<br />

2 JUBG49 Infection on cotyledons,<br />

very slow germination<br />

3 JUBG50 Infection on cotyledons,<br />

very slow germination<br />

Observations after 2 nd<br />

week<br />

Highly infected<br />

cotyledons, slow growth<br />

rate<br />

Highly infected<br />

cotyledons, slow growth<br />

rate<br />

Highly infected<br />

cotyledons, slow growth<br />

rate<br />

Observations after 3 rd week resistant Susceptible<br />

Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

Infection on stem and lower<br />

sides of leaves<br />

Infection on stem and leaves.<br />

Plants very slow growing<br />

- +<br />

- +<br />

- +<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 288<br />

ISSN 2250-3153<br />

4 JUBG51 Slight infection on<br />

cotyledons, fast<br />

germination<br />

Healthy plants, growth<br />

rate high<br />

Healthy plants + -<br />

5 JUBG52 Highly infected cotyledons No germination No plant formation - +<br />

6 JUBG53 Highly infected cotyledons Germination very slow Shoot apex dead - +<br />

7 JUBG54 Slight infection on<br />

cotyledons, fast<br />

germination<br />

8 JUBG55 No infection on<br />

cotyledons, fast<br />

germination<br />

9 JUBG56 No infection on<br />

cotyledons, fast<br />

germination<br />

10 JUBG57 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

11 JUBG58 Slight infection on<br />

cotyledons germination<br />

rate good<br />

12 JUBG59 No infection on<br />

cotyledons, fast<br />

germination<br />

13 JUBG60 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

14 JUBG61 No infection on<br />

cotyledons, fast<br />

germination<br />

15 JUBG62 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

16 JUBG63 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

16 JUBG63 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Infection on cotyledons,<br />

growth rate moderate<br />

No infection on stem and<br />

leaves<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

+ -<br />

17 JUBG64 Highly infected cotyledons Germination very slow Shoot apex dead - +<br />

18 JUBG65 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

+ -<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 289<br />

ISSN 2250-3153<br />

19 JUBG66 Slight infection on<br />

cotyledons germination<br />

rate good<br />

20 JUBG67 No infection on<br />

cotyledons, fast<br />

germination.<br />

21 JUBG68 Highly infected<br />

cotyledons, no<br />

germination<br />

22 JUBG69 No infection on<br />

cotyledons, fast<br />

germination<br />

23 JUBG70 Slight infection on<br />

cotyledons germination<br />

rate good<br />

24 JUBG71 Highly infected<br />

cotyledons, no<br />

germination<br />

25 JUBG72 No infection on<br />

cotyledons, fast<br />

germination<br />

26 JUBG73 No infection on<br />

cotyledons, fast<br />

germination<br />

27 JUBG74 No infection on<br />

cotyledons, fast<br />

germination<br />

28 JUBG75 Infection on cotyledons,<br />

no germination<br />

Infection on cotyledons,<br />

growth rate moderate<br />

No infection on stem and<br />

leaves, but first two leaves<br />

curled.<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Germination very slow Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Infection on cotyledons,<br />

growth rate moderate<br />

+ -<br />

+ -<br />

- +<br />

+ -<br />

Healthy plants + -<br />

Germination very slow. Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Highly infected<br />

cotyledons, slow growth<br />

rate<br />

Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

29 JUBG76 Highly infected cotyledons Germination very slow Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

30 JUBG77 Slight infection on<br />

cotyledons, seed<br />

germinated<br />

31 JUBG78 Slight infection on<br />

cotyledons germination<br />

rate good<br />

32 JUBG79 No infection on<br />

cotyledons, fast<br />

germination<br />

Infection on cotyledons,<br />

plant formation<br />

Infection on cotyledons,<br />

growth rate moderate<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

- +<br />

+ -<br />

+ -<br />

+ -<br />

- +<br />

- +<br />

Healthy plants. + -<br />

Healthy plants + -<br />

+ -<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 290<br />

ISSN 2250-3153<br />

33 JUBG80 Highly infected cotyledons Germination very slow Shoot apex dead - +<br />

34 JUBG81 No infection on<br />

cotyledons, fast<br />

germination<br />

35 JUBG82 Slight infection on<br />

cotyledons germination<br />

rate good<br />

36 JUBG83 Slight infection on<br />

cotyledons germination<br />

rate good<br />

37 JUBG84 Highly infected<br />

cotyledons, no<br />

germination<br />

38 JUBG85 No infection on<br />

cotyledons, fast<br />

germination<br />

39 JUBG86 Slight infection on<br />

cotyledons, germination<br />

rate moderate<br />

40 JUBG87 Highly infected<br />

cotyledons, no<br />

germination<br />

41 JUBG88 Slight infection on<br />

cotyledons germination<br />

rate good<br />

42 JUBG89 Slight infection on<br />

cotyledons germination<br />

rate good<br />

43 JUBG90 Slight infection on<br />

cotyledons, moderate<br />

germination<br />

44 JUBG92 No infection on<br />

cotyledons, fast<br />

germination<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptom.<br />

Infection on cotyledons,<br />

growth rate moderate<br />

Infection on cotyledons,<br />

growth rate moderate<br />

+ -<br />

Healthy plants + -<br />

Healthy plants + -<br />

Germination very slow Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Cotyledons slightly<br />

infected, growth rate<br />

moderate<br />

Plant healthy with no<br />

symptoms of infection on<br />

leaves and stem<br />

Germination very slow Shoot apex dead, infection on<br />

stem and lower side of leaves<br />

Infection on cotyledons,<br />

growth rate moderate<br />

Infection on cotyledons,<br />

growth rate fast<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

Healthy plant formation Growth rate fast, leaves and<br />

stem devoid of any disease<br />

symptoms<br />

- +<br />

+ -<br />

+ -<br />

- +<br />

Healthy plants - +<br />

Healthy plants + -<br />

+ -<br />

+ -<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 291<br />

ISSN 2250-3153<br />

Love, Desire, and Theological Issues in Indo-Iranian<br />

Myths: A Comparative Introduction<br />

Abbas Saeedipour<br />

Dept. of Persian, Faculty of Humanities& Languages, J.M.I, the Central University, New Delhi, India<br />

The Mythic Drama of Yama and Yami in the Rig Veda<br />

Abstract- In the world of myths anything can happen illogically,<br />

or sometime logically. In the tragedy of Prometheus Bound<br />

written by Aeschylus, the Greek Prometheus there can steal fire<br />

from heavenly gods and give it to the earthly mortal creatures.<br />

Tiresias the blind soothsayer, descended from Oudaeus, in the<br />

Sophocles' tragedy of Oedipus the King, can predict the future<br />

fate of Thebes happening to the people there. Cerci the whore, in<br />

the Homer's, can bewitch the bravest and the most powerful<br />

Greek heroes. One set of potential human couple Mashya and<br />

Mashyana grows like a set of plants out of forty years of<br />

processing being under the air, the sun, and the soil. They are<br />

metamorphosed and clutched together. There is apparently no<br />

specific limit or any fixed and distinguished laws or regulations.<br />

Nonetheless, myths have their own logic, seeds, and cluster. The<br />

personification of things and forces, of phenomena, as well as<br />

abstractions are widely and repeatedly allowed and the<br />

composers have freedom and poetic license to manipulate and<br />

manufacture their imaginatively made- narratives. Myths have<br />

got their own logic, initiation, making process structural<br />

mythemes and those of subjectivists' features space- timelessness<br />

and settingless danglings.<br />

Index Terms- mythic drama, love, sin, tradition. Yama, Yami,<br />

Mashya, Mashyana, metaphorical setting, ethical issue<br />

O<br />

I. INTRODUCTION<br />

ne of the first and also the best dramatic narratives and<br />

representations of the mentality of man in the earliest stages<br />

of his fictive creation that is still remained in the Rig Veda,<br />

Mandala X, hymn 10, is the drama of Yama and Yami: the first<br />

Aryan tribal couple, the first parents of men.<br />

The parallel of the Rig Veda's couple is the Iranian mythic<br />

couple of Mashya and Mashyana. It is more developed and<br />

dramatized( Wendy Doniger,1974,1994 Hindu Myths,p.64)<br />

Nevertheless, the plot and the story in its dramatic context, of<br />

course, more extended and connected to later and the whole<br />

future generations of the races of man in Iranian version of the<br />

Avestan Scriptures..These are the most ancient dramatic mythic<br />

literature of the world.<br />

II. YAMA [MALE] AND YAMI [FEMALE] IN THE RIG VEDA<br />

However, both the interior and exterior formation and<br />

configuration of the two versions of the dramatic myth of the<br />

first Aryan couple from which many future generations bear<br />

different human races on the earth are beautifully and<br />

imaginatively concrete. The credibility of the characters, of<br />

design, and of the plot together make up the process of<br />

development exportable and persuasive. It is like a full and<br />

modern drama. The Iranian version of this dramatic myth of the<br />

earliest literature of man is, particularly, extended and<br />

profounded in length, depth, and horizon. In other word, the<br />

Iranian version of this drama of the first Aryan couple of the<br />

Indo-Aryan genealogy is well designed, structured and processed<br />

horizontally and vertically. The drama tracks and is hunted down<br />

to progenitor: Gaymart and his determination with Ahura Maza,<br />

victory over devils and darkness, and succession .It also gets<br />

going to the future.<br />

III. THE DRAMA OF YAMA AND YAMI: THE DIALOGUE<br />

Yama to Yami: ………….." Surya ………… is our father and<br />

his wife Saranyu is our mother. We are brother and sister." Why<br />

should you desire something deviating?<br />

Yami to Yama: "In this lonely and abandoned Island, I feel<br />

attracted to you ……….. You have been with me since I was in<br />

mother's womb. "<br />

"I seek your companionship ……."……." She has a biological<br />

appetite to physically communicate with a male (his brother)<br />

Yama to Yami: "I, Yama, your brother do not agree with you.<br />

I do not want such companionship. Being my sister, it is not<br />

right for us to have such relation. The deities … who reside in<br />

heaven, are watching us."This is a religious argument and<br />

theological reasoning. This portion of dramatic dialogue<br />

represents a sense of spiritual as well as moral transcendence that<br />

is assumedly lead from certain belief available and held by the<br />

vedic society. It is not ritual, it is the set of codes of behavior<br />

Some scholars and writers who look into Indo-Iranian<br />

mythology, especially those modern Europeans may see this<br />

loving dialogue between the female and the male as a break of<br />

law and tradition. Because the dramatic dialogue does contains<br />

such potentialities in itself. It seems that tradition, responsibility,<br />

and honour resist against desire in the context of the drama at the<br />

time. It appears that ancient Aryans in two – three thousand years<br />

before Jesus Christ had indeed the criteria of behavior and held<br />

conventions of men or God and observed moral regulations.<br />

Yama and Yami, as many researchers emphasized, were not the<br />

ancestors of human race.<br />

The hymn of the tenth Mandala (book) of the Rig Veda is a<br />

sort of dramatic exposition of Yama and Yami. It is a modern<br />

point of view of a dramatic setting as if you were reading one of<br />

those lovely plays of Shakespeare. Nevertheless, in the hymn<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 292<br />

ISSN 2250-3153<br />

there is the self-exposition of siblings with the parents named<br />

Surya as father, and Saranya as mother of the two. The tenth the<br />

hymn of the tenth Mandala of the Rig-Veda represents a desirous<br />

dialogue with romantic tone and sensual appeal contains fourteen<br />

verses of considerable suggestive lines and erotic words but<br />

completely in a metaphoric setting.<br />

It represents a moral discourse with its own philosophical and<br />

ethical standards. Distinguishing between right deed and wrong<br />

act is significantly theological: " we have never done such a thing<br />

before. We should not follow the path dishonor. We should be<br />

truthful and stay away from falsehood … we are brother and<br />

sister."(RV. 10.4) That is not only a self-proclaim criterion. It is<br />

interesting that the suggestion is emphatically from Yami<br />

(female) side and she justifies her lusty desire and sensual<br />

appeal: "such a relationship is banned for mortals, but we are not<br />

mortals." Disallowance is "for mortals" is a self- pronouncement<br />

decree arousing from an emotional trend and biological desire.<br />

On the other hand Yama is well aware and theoretically<br />

confident that this sort of behavior has never been taken place<br />

before.<br />

The issue indeed is something beyond the will and desire of<br />

Yama, the individual persona: "these … deities… neither stop<br />

nor ever close their eyes to anything." Yama not only argues that<br />

the deed itself is not right but also emphasizes that there has been<br />

no any trace of this relationship in his line and stock of ancestors<br />

available. The new reason is an additional prohibiting ban. The<br />

viewers, spies, and live spectators are present and watching us.<br />

"A person who commits intercourse with his own sister is<br />

considered to be a great sinner."<br />

[Note the following text translated by Griffith, Ralph T.H: The<br />

Rig Veda,book X, hymh 10,pp.422-24].<br />

The Dramatic Dialogue of Yama and Yami in the Rig veda<br />

1. FAIN would I win my friend to kindly friendship. So<br />

may the Sage, come through the air's wide ocean,<br />

Remembering the earth and days to follow, obtain a son,<br />

the issue of his father.<br />

2. Thy friend loves not the friendship which considers her<br />

who is near in kindred as stranger. Sons of the mighty<br />

Asura, the Heroes, supporters of the heavens, see far<br />

around them.<br />

3. Yea, this the Immortals seek of thee with longing,<br />

progeny of the sole existing mortal. Then let thy soul<br />

and mine be knit together, and as a loving husband take<br />

thy consort.<br />

4. Shall we do now what we ne'er did aforetime? we who<br />

spake righteously now talk impurely? Gandharva in the<br />

floods, the Dame of Waters-such is our bond, such our<br />

most lofty kinship.<br />

5. Even in the womb God Tvastar, Vivifier, shaping all<br />

forms, Creator, made us consorts. None violates his<br />

holy ordinances: that we are his heavens and earth<br />

acknowledge.<br />

6. Who knows that earliest day whereof thou speakest?<br />

Who hath beheld it? Who can here declare it? Great is<br />

the Law of Varuna and Mitra. What, wanton! Wilt thou<br />

say to men to tempt them?<br />

7. I, Yami, am possessed by love of Yama that I may rest<br />

on the same couch beside him. I as a wife would yield<br />

me to my husband. Like car-wheels let us speed to meet<br />

each other.<br />

8. They stand not still; they never close their eyelids, those<br />

sentinels of Gods who wander round us. Not me-go<br />

quickly, wantons, with another, and hastens like a<br />

chariot wheel to meet him.<br />

9. May Surya's eye with days and nights endow him, and<br />

ever may his light spread out before him. In heaven and<br />

earth the kindred Pair commingle. On Yam! be the<br />

unbrotherly act of Yama.<br />

10. Sure there will come succeeding times when brothers<br />

and sisters will do acts unmeet for kinsfolk. Not me, O<br />

fair one,-seek another husband, and make thine arm a<br />

pillow for thy consort.<br />

11. Is he a brother when no lord is left her? Is she a sister<br />

when Destruction cometh? Forced by my love these<br />

many words I utter. Come near, and hold me in thy<br />

close embraces.<br />

12. I will not fold mine arms about thy body: they call it sin<br />

when one comes near his sister. Not me,-prepare thy<br />

pleasures with another: thy brother seeks not this from<br />

thee, O fair one.<br />

13. Alas! thou art indeed a weakling, Yama we find in thee<br />

no trace of heart or spirit. As round the tree the<br />

woodbine clings, another will cling albout thee girt as<br />

with a girdle.<br />

14. Embrace another, Yami; let another, even as the<br />

woodbine rings the tree, enfold thee. Win thou his heart<br />

and let him win thy fancy, and he shall form with thee a<br />

blest alliance.<br />

IV. MASHYE, MASHYANE, AND THE RACES OF MAN<br />

Mobad Rostam Shahzadi the Iranian writer in his Dictionary<br />

of Pazand (2007) also defines Mashya and Mashyani, or Mashya<br />

and Mashyane as follow: " Mashya is the first Aryan man of the<br />

sperms of Kayomarth (=Gayomart) and Mashyani is the first<br />

Aryan woman from the seed Kayomarth (=Gayomart). These<br />

man and woman are born of a Rivas=Rhubarb" ( See Shahzadi,<br />

Rostam(ed. by Shahzadi, Mehrangiz, published by Farvahar,<br />

Tehran, 2007, P.302)<br />

In the mythic narrative there might be considerable number<br />

of parallel myths of mythical couples in different versions and<br />

transformations. The first human couple in the Avestan tures and<br />

Iranian mythology there are various pair name of the same stock:<br />

Mash-Mashan, Mishi, Mishan, Mishah-Mishani, Mahla-Mahlina,<br />

Meshah-Meshyanah. These variations of the first human pair (the<br />

Aryan pair) are originally from the back bone of Gayomart.<br />

Arthur Emanual Chritensen( 1845-75), one of the youngest<br />

western Iranologists and scholars, and one of the good Danish<br />

friends of Iran, amongst other fair orientalists ,has also spent<br />

several pages of the first volume of his ' the First Man and the<br />

First King' on Mashya and Mashyana, and there he refers to<br />

different concerned sources of classic and original authorities,<br />

such as the Avesta, the Avestan Scriptures, Ibn Athir, Alberuni,<br />

Shahrestani, Tabari, Ferdoussi'Shahnameh and so on.<br />

When the death time of Gayomart approaches he falls down in<br />

his left side and his sperms pour on the earth and the process of<br />

their purification under the sun's warmth take place.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 293<br />

ISSN 2250-3153<br />

It is after forty years of being in the soil of the earth that the<br />

Gayomart's semen bear the pair in the form of Rivas plant<br />

(Rhubarb) with fifteen leaves. They were interwoven together in<br />

such a way that from their shoulders, hands and back were<br />

attached and connected with each on the earth.<br />

This dramatic and the mythical story of Gayomort, Mashya<br />

and Mashyana( Mashyag, Mashyang) has been repeatedly<br />

recorded, narrated, and confirmed. Sometime it is commented by<br />

different Iranian writers both Muslim and Zoaroathurian:<br />

Alberuni in his Remained, Tabari in his History, Bala'ami in his<br />

King and Prophets. Yashts and Persian poetic works, like<br />

Shahnameh are also the most famous.<br />

Gayomart is indeed the first mythical man-like creature<br />

made on earth to assist Ahura Mazda. Gayomart from whom the<br />

Aryan race is developed. He is genuinely and meaningfully is<br />

immortal mortal. This is a paradox that should be explained in<br />

itertainlys own contextual realm.<br />

All Pahlavi documents, relevant texts and the Avestan<br />

scriptures have narrated this mythical narrative of the pair who<br />

are from rhubarb-Rivas-plant. (Christensen, Arthur, Les types du<br />

premier homme et du premier roi dans l'histoir legendaire des<br />

Iraniens 2 vols, Persian trans. P. 67)<br />

Ahura Mazda to this first human couple says: "you are men I<br />

created you. You are the predecessors of the human being of<br />

twor yourselves, I made you complete and the best in the best<br />

way of this king:<br />

Good thought, Good Deed, Good Word: Thou Do Not Pray<br />

Devils [Deevs]:<br />

Note the following scripture about Mashya and Mashyana quoted<br />

from a translation of the Farsi Avestan texts into English:<br />

Bundahishn 23, scriptures of Zoroastrianism , http:/ www. Hindu website. Com /<br />

sacred scripts/ zoroscripts/ Bundahishm. chapter X to XV.[ See also the English<br />

versions of the Sacred Books of the Easthapter,Oxford University Press, chapter<br />

XV.<br />

Mashya and Mashyana in the Bundahishn<br />

1. On the nature of men it says in revelation, that<br />

Gayomard, in passing away, gave forth seed; that seed<br />

was thoroughly purified by the motion of the light of the<br />

sun, and Neryosang kept charge of two portions, and<br />

Spandarmad received one portion.<br />

2. And in forty years, with the shape of a one-stemmed<br />

Rivas-plant, and the fifteen years of its fifteen leaves,<br />

Matro [Mashye] and Matroyao [Mashyane] grew up<br />

from the earth in such a manner that their arms rested,<br />

behind on their shoulders (dosh), and one joined to the<br />

other they were connected together and both alike.<br />

3. And the waists of both of them were brought close and<br />

so connected together that it was not clear which is the<br />

male and which the female, and which is the one whose<br />

living soul (nismo) of Ohrmazd is not away.<br />

4. As it is said thus: Which is created before, the soul<br />

(nismo) or the body? And Ohrmazd said that the soul is<br />

created before, and the body after, for him who was<br />

created; it is given into the body that it may produce<br />

activity, and the body is created only for activity;' hence<br />

the conclusion is this, that the soul (rhubarb) is created<br />

before and the body after.<br />

5. And both of them changed from the shape of a plant<br />

into the shape of man, and the breath (nismo) went<br />

spiritually into them, which is the soul (rhubarb); and<br />

now, moreover, in that similitude a tree had grown up<br />

whose fruit was the ten varieties of man.<br />

6. Orrmazd spoke to Mashye and Mashyane thus: 'You are<br />

man, you are the ancestry of the world, and you are<br />

created perfect in devotion by me; perform devotedly<br />

the duty of the law, think good thoughts, speak good<br />

words, do good deeds, and worship no demons!'<br />

7. Both of them first thought this, that one of them should<br />

please the other, as he is a man for him; and the first<br />

deed done by them was this, when they went out they<br />

washed themselves thoroughly; and the first words<br />

spoken by them were these, that Ormazd created the<br />

water and earth, plants and animals, the stars, moon, and<br />

sun, and all prosperity whose origin and effect are from<br />

the manifestation of righteousness.<br />

8. And, afterwards, antagonism rushed into their minds,<br />

and their minds were thoroughly corrupted, and they<br />

exclaimed that the evil spirit created the water and earth,<br />

plants and animals, and the other things as aforesaid.<br />

9. That false speech was spoken through the will of the<br />

demons, and the evil spirit possessed himself of this first<br />

enjoyment from them; through that false speech they<br />

both became wicked, and their souls are in hell until the<br />

future existence.<br />

10. And they had gone thirty days without food, covered<br />

with clothing of herbage (giyah); and after the thirty<br />

days they went forth into the wilderness, came to a<br />

white-haired goat, and milked the milk from the udder<br />

with their mouths.<br />

11. When they had devoured the milk Mashye said to<br />

Mashyane thus: 'My delight was owing to it when I had<br />

not devoured the milk, and my delight is more delightful<br />

now when it is devoured by my vile body.'<br />

12. That second false speech enhanced the power of the<br />

demons, and the taste of the food was taken away by<br />

them, so that out of a hundred parts one part remained.<br />

13. Afterwards, in another thirty days and nights they came<br />

to a sheep, fat and white-jawed, and they slaughtered it;<br />

and fire was extracted by them out of the wood of the<br />

lote-plum and box-tree, through the guidance of the<br />

heavenly angels, since both woods were most<br />

productive of fire for them; and the fire was stimulated<br />

by their mouths; and the first fuel kindled by them was<br />

dry grass, kendar, lotos, date palm leaves, and myrtle;<br />

and they made a roast of the sheep.<br />

14. And they dropped three handfuls of the meat into the<br />

fire, and said: 'This is the share of the fire.' One piece of<br />

the rest they tossed to the sky, and said: 'This is the<br />

share of the angels.' A bird, the vulture, advanced and<br />

carried some of it away from before them, as a dog ate<br />

the first meat.<br />

15. And, first, a clothing of skins covered them; afterwards,<br />

it is said, woven garments were prepared from a cloth<br />

woven in the wilderness.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 294<br />

ISSN 2250-3153<br />

16. And they dug out a pit in the earth, and iron was<br />

obtained by them and beaten out with a stone, and<br />

without a forge they beat out a cutting edge from it; and<br />

they cut wood with it, and prepared a wooden shelter<br />

from the sun (pesh-khur).<br />

17. Owing to the gracelessness which they practiced, the<br />

demons became more oppressive, and they themselves<br />

carried on unnatural malice between themselves; they<br />

advanced one against the other, and smote and tore their<br />

hair and cheeks.<br />

18. Then the demons shouted out of the darkness thus: 'You<br />

are man; worship the demon! so that your demon of<br />

malice may repose.'<br />

19. Mashye went forth and milked a cow's milk, and poured<br />

it out towards the northern quarter; through that the<br />

demons became more powerful, and owing to them they<br />

both became so dry-backed that in fifty winters they had<br />

no desire for intercourse, and though they had had<br />

intercourse they would have had no children.<br />

20. And on the completion of fifty years the source of desire<br />

arose, first in Mashye and then in Mashyane, for<br />

Mashye said to Mashyane thus: 'When I see thy shame<br />

my desires arise.' Then Mashyane spoke thus: 'Brother<br />

Mashye! when I see thy great desire I am also agitated.'<br />

21. Afterwards, it became their mutual wish that the<br />

satisfaction of their desires should be accomplished, as<br />

they reflected thus: 'Our duty even for those fifty years<br />

was this.'<br />

22. From them was born in nine months a pair, male and<br />

female; and owing to tenderness for offspring the<br />

mother devoured one, and the father one.<br />

23. And, afterwards, Ormazd took tenderness for offspring<br />

away from them, so that one may nourish a child, and<br />

the child may remain.<br />

24. And from them arose seven pairs, male and female, and<br />

each was a brother and sister-wife; and from every one<br />

of them, in fifty years, children were born, and they<br />

themselves died in a hundred years.<br />

25. Of those seven pairs one was Siyamak, the name of the<br />

man, and Nasak of the woman; and from them a pair<br />

was born, whose names were Fravak of the man and<br />

Fravakain of the woman.<br />

26. From them fifteen pairs were born, every single pair of<br />

whom became a race (sardak); and from them the<br />

constant continuance of the generations of the world<br />

arose.<br />

27. Owing to the increase (zayishn) of the whole fifteen<br />

races, nine races proceeded on the back of the ox<br />

Sarsaok, through the wide-formed ocean, to the other<br />

six regions (karshwar), and stayed there; and six races<br />

of men remained in Xwaniratha.<br />

28. went to the plain of the Tazhikan (Arabs); and of one<br />

pair Hooshang was the name of the man and Guzhak of<br />

the woman, and from them arose the Airanakan<br />

(Iranians); and from one pair the Mazendarans have<br />

arisen.<br />

29. Among the number (pavan ae mar) were those who are<br />

in the countries of Surak, those who are in the country<br />

of Aner, those who are in the countries of Tur, those<br />

who are in the country of Salm which is Arum, those<br />

who are in the country of Seni, that which is Chinistan,<br />

those who are in the country of Dai, and those who are<br />

in the country of Sind.<br />

30. Those, indeed, throughout the seven regions are all from<br />

the lineage of Fravak, son of Siyamak, son of Mashye.<br />

31. As there were ten varieties of man, and fifteen races<br />

from Fravak, there were twenty-five races all from the<br />

seed of Gayomard; the varieties are such as those of the<br />

earth, of the water, the breast-eared, the breast-eyed, the<br />

one-legged, those also who have wings like a bat, those<br />

of the forest, with tails, and who have hair on the body.<br />

The Issue of Love Offspring in the Myth of Yama and Yami:<br />

The view of incest in the Mashya and Mashayana dramatic<br />

story of Mashyana and Mashya, in the Avestan scriptures, and in<br />

the dialogue of Yama and Yami, in the Rig Veda, is not fully<br />

enough considered. The cores of the texts do not accept the<br />

incest opinion. That means the myths do not substantiate and do<br />

not furnish the opinions and judgments about themselves the do<br />

not assess and do not see the whole play on the stage.<br />

The direct and clear response of Yama to Yami denies and<br />

refutes the oppinion of incest in the Rig Veda (Appendix, Yama<br />

and Yami). The actual words and statements avoid immorality<br />

and illegitimacy. The complete drama rejects the belief of men<br />

being bastard or love offspring of illegal intercourse. The climax<br />

of the play in its falling action resolves the conflict in the benefit<br />

and the release of man that found not guilty.<br />

The question of the story in the Avestan scriptures is<br />

different. The characters are completely and substantially<br />

metamorphosed. The characters of the drama of the first couple<br />

of the world are metaphorically transformed to something<br />

freakish. It becomes somehow incredible and grotesque. The<br />

contents and elements of the Avestan drama is not like that of the<br />

Rig Veda. (Appendix: Mashya and Mashyana). It does not seem<br />

to be the one that is established. So, the approach and plot<br />

appears to require different touch and criticism.<br />

Characterization, substance, nature and features of all ingredient<br />

mythemes (Strauss‘s terminology) are incompatible with that of<br />

dramatic scene of Yama and Yami in the Rig Veda.<br />

REFERENCES<br />

[1] The Rig Veda<br />

[2] The Avesta<br />

[3] Avestan Scriptures: Yashts, Yasnas,…<br />

[4] Mallory , J. P. and D, Q. Indo-European Culture, An Encyclopedia of; and<br />

The Encyclopedia Iranica under Iran , Indo-Iranian religion.<br />

[5] Bundahihn 23, scriptures of Zoroastrianism , http:/ www. Hindu website.<br />

Com / sacred scripts/ zoroscripts/ Bundahishm. chapter X-XV<br />

[6] Ibid. chapter V.I<br />

[7] Ibid. chap. XIII. 15<br />

[8] Radhakrishna, S., Eastern Religions and Western Thought, OUP.( date?)<br />

[9] Oldenbreg, Hermann, The Religion of the Veda, trans. shotri, Shrlhar, B.,<br />

MBP., New Delhi, 2004<br />

[10] Bibhu and Minakshi Padhi, Indian Philosophy and Religion, <strong>Print</strong>world<br />

(Ltd), New Delhi, 1998,<br />

Also check The Rig Veda. .X.X. 1-16 , and Mandala X, hymn 10, 1-<br />

14,translated by Griffith, Ralph T.H: The Rig Veda,book X, hymh 10,pp.422-24].<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 295<br />

ISSN 2250-3153<br />

[11] The Rig Veda,trans.Dr.Sharma, Ganga Sahai, Vishv Books, New Delhi, 9<br />

dat?)Mandal X, hymn 10.1-14, pp.909-911<br />

[12] Nappert, Jan, Indian Mythology, Indus, New Delhi, 1993<br />

[13] Kumar Dash, Narander, Dict. Of Indian culture, AG kalap. N.Delhi, 1991<br />

[14] Encyclopedia of Rreligion (15 vols.) Vol. 8 , Thomas Gale, U.S.A, 2005<br />

[15] Zend Avesta, Yasht III, 87<br />

[16] Bundahishn, XV, 1.31<br />

[17] Yasnas,,Khorde Avesta<br />

[18] Doniger, Wendy, The Rig Veda: An Anthology<br />

[19] Griswold, H.D., The Religion of the Rig Veda, MBP,Delhi, 1999.<br />

AUTHORS<br />

Abbas Saeedipour, M.A( Kent University, U.K), Scholar and<br />

the Candidate of the PhD in Indo-Iranian Comparative<br />

Mythology at Dept. of Persian, Faculty of Humanities&<br />

Languages, J. M.I, the Central University, New Delhi, India,<br />

Email: asaeedipour@yahoo.ca<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 296<br />

ISSN 2250-3153<br />

Performance Evaluation of DHT Based multi-path<br />

Routing Protocol for MANETs<br />

Abstract- Mobile Adhoc Networks (MANETs) creates a<br />

temporary network of mobile nodes. Routing is a major issue in<br />

MANETs. Distributed Hash Tables (DHTs) has recently proven<br />

to be a novel and efficient way for developing scalable routing<br />

protocols in MANETs. With the increase in applications of<br />

MANETS, the networks have become very complex which leads<br />

to channel impairments. Moreover multipath protocols provide<br />

fault tolerance against node and link failures. In this paper, we<br />

have analyzed the performance of M-DART[4], which is DHT<br />

based Multipath protocol against Ad hoc On-Demand Multipath<br />

Distance Vector Routing Protocol(AOMDV)[7] ,which is a<br />

reactive Multipath protocol. We have conducted various<br />

simulation experiments to evaluate its performance in terms of<br />

throughput, packet delivery ratio, end to end delay and energy<br />

consumption. We have analyzed that M-DART protocol<br />

consumes less energy (8.2% than AOMDV. Simulation results<br />

also show M-DART has better throughput and Packet Delivery<br />

ratio than AOMDV by more than 1.6 times.<br />

Index Terms- AOMDV, M-DART, Multipath Protocols, adhoc<br />

Network, MANET.<br />

M<br />

I. INTRODUCTION<br />

obile Ad hoc network represents complex distributed<br />

systems comprised by wireless nodes which can freely and<br />

dynamically self-organize themselves into temporary (ad hoc)<br />

network topologies. In this way MANETs allow communications<br />

in areas with no pre-existing infrastructure. The ad hoc network<br />

paradigm has been proposed several years ago mainly for tactical<br />

networks. Recently, the introduction of enabling technologies,<br />

such as Bluetooth and Wi-Fi, has led to the deployment of<br />

commercial ad hoc networks outside the military domain,<br />

generating so a new and growing interest in the research and<br />

development of such networks. Researchers visualize MANETs<br />

to be an integral part of 4G architecture and in the next<br />

generation networks [1]. MANETs consist of rapidly changing<br />

network topology as nodes move in a random manner. They can<br />

work either standalone or may be connected to a larger internet.<br />

Because of the absence of fixed infrastructure, nodes setup routes<br />

among themselves autonomously. Nodes in a MANET (laptops,<br />

PDAs, and so on) move arbitrarily and communicate directly<br />

with other nodes sharing the identical media (radio, infrared, etc.)<br />

within their radio transmission range. Outside this range,<br />

message transfer occurs through hop-by-hop communication.<br />

Routing packets between pair of nodes becomes a challenging<br />

task due to random motion of nodes within the network. A route<br />

Gurmukh Singh, Dr. Savita Gupta, Sukhvir Singh<br />

Panjab University, Chandigarh, India<br />

that is believed to be optimal at a given point in time might not<br />

work at all a few moments later.<br />

Table Driven routing protocols [2],[3],[4] as shown in Figure 1<br />

also called proactive protocols maintain table containing routes<br />

to all nodes. They react to any change in the topology even if no<br />

traffic is affected by the change, and they transfer periodic<br />

control messages to maintain routes to every node in the<br />

network. As mobility increases, proactive protocols require more<br />

scarce resources, such as bandwidth and power.<br />

Figure 1: Types of Routing Protocols<br />

Reactive routing protocols [5], [6], [7] determine the route<br />

only when they need to route packets, thus avoiding nodes from<br />

periodical transfer of route update in the network.<br />

The behaviour of routing protocols depends on the link capacity,<br />

network size, and node mobility. The topological instability (link<br />

and node failures) due to node mobility and/or changes in<br />

wireless transmission conditions can frequently give rise to<br />

disconnected routes. An attractive approach to gain tolerance<br />

against unreliable wireless links and node mobility is based on<br />

multi-path routing. Multipath routing protocols [4],[7] discover<br />

multiple routes from source to destination.<br />

The most popular on-demand routing protocol, Ad-hoc Ondemand<br />

Multipath Distance Vector (AOMDV) routing protocol<br />

[7] is an improvement of Ad-hoc On-demand Routing Protocol<br />

(AODV). AOMDV discovers multiple paths between a source<br />

and destination to provide efficient fault tolerance by providing<br />

quicker and more efficient recovery from route failures in a<br />

dynamic network. As AOMDV discovering multiple paths in a<br />

single route discovery attempt, new route needs to be discovered<br />

only when all paths fail. This reduces not merely the route<br />

discovery latency but the routing overheads also.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 297<br />

ISSN 2250-3153<br />

Most of the protocols, regardless of the belonging class (reactive<br />

or proactive, single-path or multi-path), do not have scalability to<br />

work efficiently when the number of nodes grows mainly<br />

because they have been proposed for wired networks and<br />

modified to work in ad hoc scenarios [8]. More specifically, they<br />

use static addressing in which the node identity equals routing<br />

address. Static addressing is not very valid in ad hoc scenarios. In<br />

recent times, some routing protocols [11], [13], [14], [15], [16]<br />

have exploited the idea of decoupling node identification from its<br />

location by using DHT services, which are used to distribute the<br />

location information of node throughout the network. But these<br />

protocols are single path so they are not tolerant against channel<br />

impairments (node and link failures.<br />

A multipath enhancement to DART [11] was proposed in [12]<br />

called Augmented Tree based Routing (ATR), but in ATR the<br />

DHT system is replaced by a global lookup table which is<br />

available to all the nodes, which results in a great impact on the<br />

address discovery, which is a key process of the whole routing<br />

protocol. Among the DHT based Routing Protocols, M-DART is<br />

an enhancement of shortest path routing protocol known as<br />

Dynamic Address Routing (DART) [11]. M-DART discovers<br />

and stores multiple paths to the destination in the routing table.<br />

The remainder of this paper is organized as follows. Section II<br />

discusses Dynamic Addressing and Dynamic Hash Table (DHT).<br />

Section III discusses M-DART and AOMDV routing protocols.<br />

Section IV discusses the simulation results of the two routing<br />

protocols with different parameters. Finally, we summarize and<br />

conclude our paper in section V.<br />

II. DYNAMIC ADDRESSING AND DHT – OVERVIEW<br />

Dynamic Addressing [9] separates the routing address and the<br />

identity of a node. The routing address of a node is dynamic and<br />

changes with movement of the node to reflect the node's location<br />

in the network topology. The identifier is a globally unique<br />

number that stays the same during the lifetime of the node. Now<br />

the problem arises how to provide mapping between node<br />

identity and routing address. In fixed networks, location<br />

information can be easily embedded into the topologicaldependent<br />

node address, which also uniquely identifies the node<br />

in the network. But in self-organizing networks, however, there<br />

is no permanent relationship between the location of the node<br />

and the node‘s identifier as a consequence of the spontaneity and<br />

adaptability of the network. So, this requires a dynamic<br />

association between identification and location of a node, and the<br />

specification of a mechanism to manage this association.<br />

In response to these needs, DHTs [10] have been adopted as a<br />

scalable substrate to provide many functionalities including<br />

distribution of information, location service, and locationindependent<br />

identity upon which a range of self-organizing<br />

systems have been built. The functionality of decoupling<br />

identification from location, and of providing a general mapping<br />

between them, has made the DHT as an interesting principle to<br />

be incorporated in network-level routing protocols. The key idea<br />

of DHT is to use a hash function to distribute Node‘s location<br />

information among rendezvous points throughout the network.<br />

This hash function is also used by a source to identify the point<br />

that stores a destination‘s location information.<br />

III. OVERVIEW OF M-DART AND AOMDV ROUTING<br />

PROTOCOLS<br />

A. M-DART Routing Protocol<br />

M-DART protocol is based upon dynamic addressing paradigm.<br />

By means of dynamic addressing, DHT based algorithm is able<br />

to implement hierarchical routing in a feasible way, reducing so<br />

considerably the routing state information maintained by each<br />

node. Since the whole routing process is based on the transient<br />

network addresses, they have to be efficiently distributed across<br />

the network. The mapping between node identities and network<br />

addresses is provided by a Distributed Hash Table (DHT) [10].<br />

The DHT based multi-path routing protocol proactively<br />

discovers all the available routes between a source and a<br />

destination. Key Features of M-DART are:<br />

1) Address Space: - The network addresses are strings of l<br />

Figure 2: Address Space<br />

bits, thus the address-space structure can be represented as a<br />

complete binary tree of l + 1 levels, that is a binary tree in which<br />

every vertex has zero or two children and all leaves are at the<br />

same level (Figure 2). In the tree structure each leaf is associated<br />

with a network address, and a inner vertex of level k, namely a<br />

level-k subtree, represents a set of leaves (that is a set of network<br />

addresses) sharing an address prefix of l – k bits. For example,<br />

with reference to Figure 2 the vertex with the label 01x is a level-<br />

1 subtree and represents the leaves 010 and 011. Let us define as<br />

level-k sibling of a leaf as the level-k subtree which shares the<br />

same parent with the level-k subtree the leaf belongs to.<br />

Therefore, each address has l siblings at all and each other<br />

address belongs to one and only one of these siblings. Referring<br />

to the previous example, the vertex with the label 1xx is the<br />

level-2 sibling of the address 000, and the address 100 belongs<br />

only to this sibling.<br />

In Fig. 3, the address space is alternatively represented as an<br />

overlay network built upon the underlying physical topology.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 298<br />

ISSN 2250-3153<br />

Figure 3: Relationship between address space and physical<br />

topology<br />

Its tree-based structure offers simple and manageable procedures<br />

for address allocation, avoiding relying on inefficient<br />

mechanisms like flooding.<br />

2) Route Discovery and Packet Forwarding: -Each node<br />

maintains a routing table composed by l sections, one for each<br />

sibling, and the k-th section stores the path toward a node<br />

belonging to the level k sibling. Each section stores five fields:<br />

the sibling to whom the entry refers to, the next hop, the cost<br />

Table 1<br />

Routing table for Node 001<br />

Sibling Next Route cost Net_id Route log<br />

id hop<br />

000 000 C(001,000) MIN_ID(n) 000<br />

n in 001<br />

01x 000<br />

C(001,000)+ MIN_ID(n) 010<br />

MIN_C(000,n) n in 01x<br />

n in 01x<br />

011 C(001,011) MIN_ID(n) 010<br />

n in 01x<br />

1xx 000<br />

C(001,000)+ MIN_ID(n) 100<br />

MIN_C(000,n) n in 1xx<br />

n in 1xx<br />

011<br />

C(001,011)+ MIN_ID(n) 100<br />

MIN_C(011,n) n in 1xx<br />

n in 1xx<br />

needed to reach a node belonging to that sibling using the next<br />

hop as forwarder, the network id used for address validation and<br />

the route log used by the loop avoidance mechanism. Table 1<br />

show the routing table of node 000 for the network depicted in<br />

Fig. 3. The table has three sections: the first stores all the routes<br />

toward the node 000, the second toward a node belonging to the<br />

sibling 01x and the last toward nodes belonging to the sibling<br />

1xx. The routing state information maintained by each node is<br />

kept consistent through the network by means of periodic routing<br />

updates exchanged by neighbor nodes. Each routing update<br />

stores l entry and each entry is composed by four fields: the<br />

sibling id, the cost, the network id and the route log. The packet<br />

forwarding process exploits a hop-by hop routing based on the<br />

network addresses. To route a packet, a node compares its<br />

network address with the destination one, one bit at time starting<br />

with the most significant (left side) bit, say the l-th. If the i-th bit<br />

is different, the node forwards the packet towards one the route<br />

stored in the i-th section. With reference to the previous example,<br />

if the node 001 has to send a packet to the node with the address<br />

101, then it will forward the packet to the next hop stored in the<br />

third section (i.e the node 011).<br />

B. AOMDV Routing Protocol<br />

AOMDV was developed mainly for highly dynamic ad hoc<br />

networks where link failures and route breakages occur very<br />

frequently. It discovers multiple routes to destination in active<br />

communication. AOMDV uses sequence numbers to determine<br />

the freshness of routing information to avoid routing loops. It is a<br />

timer-based protocol and provides a way for mobile nodes to<br />

react to link breaks and topology changes.<br />

Table 2<br />

Routing Table of AOMDV<br />

Destination<br />

Sequence Number<br />

Advertised hop Count<br />

Next hop<br />

{(next hop 1, hop count 1),<br />

(next hop 2, hop count 2),…..}<br />

Expiration time out<br />

AOMDV uses three types of control message: route error<br />

(RRER), route request (RREQ), and route reply (RREP) to<br />

discover routes, that are sent to port 654 using User Datagram<br />

Protocol (UDP). If a node needs a route to send data packets, it<br />

broadcasts RREQ throughout the network. When a node receives<br />

a RREQ packet, then it checks the destination address field of<br />

RREQ. If it has information about a destination or it is<br />

destination itself, it uses RREP packet to unicast to the source<br />

node. If it does not have a route to destination and its multiple<br />

alternative paths are not available, it sends RRER message back<br />

to the upstream node. AOMDV has 5 fields in the routing table<br />

as shown in Table 2.<br />

AOMDV uses the advertised hop count field for multiple route<br />

entries. It uses next hop lists in the routing table, to define<br />

multiple next hops with relevant hop counts A node updates its<br />

advertised hop count for a destination whenever it sends a route<br />

advertisement for the destination [7].<br />

IV. SIMULATION RESULT<br />

We use network simulator ns2 to analyze M-DART and<br />

AOMDV routing protocols. We compare the results of M-DART<br />

routing protocol with AOMDV protocol by using the following<br />

parameters:<br />

Average Throughput:- Average rate of successful packet<br />

delivery. It will be measured in kilo bits per second<br />

(kbps).<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 299<br />

ISSN 2250-3153<br />

Packet Delivery Ratio (PDR):- The ratio of data packets<br />

delivered to the destination to those sent by the sender.<br />

Average End to end delay:- an end-to-end transmission<br />

delay of data packets that are delivered to the intended<br />

destination successfully.<br />

Average energy consumption:- average energy<br />

consumption per node.<br />

We will analyze average throughput, PDR, and Average End to<br />

End delay by varying the number of nodes between 50 to 400.<br />

This is done to show the Scalability of M-DART for large<br />

number of nodes. Average energy consumption will be analyzed<br />

by varying the simulation time between 100 to 800 seconds. This<br />

is done to show the durability of the routing protocols. A 802.11<br />

(IEEE wireless standard) network is used for the simulation of<br />

M-DART and AOMDV protocols. The mobility parameters have<br />

been set to simulate low mobility, because the transmission range<br />

requires lower speed values in order to allow the routing<br />

protocols to build reliable paths. More specifically, the speed is<br />

taken in the [0.5m/s; 1.5m/s] range.<br />

A. Average Throughput<br />

As shown in Figure 4, for small number of nodes ( 300) the<br />

throughput of M-DART becomes about 1.8 times that of<br />

AOMDV.<br />

B. Packet Delivery Ratio (PDR)<br />

Many protocols in MANETs use packet delivery ratio (PDR)<br />

as a metric to select the best route, transmission rate or power. As<br />

shown in Figure 5, at 50 nodes, AOMDV has better PDR than<br />

M-DART.As the number of nodes increases, M-DART shows<br />

better PDR than AOMDV. Same as with throughput, for large<br />

number of nodes (>300) MDART has about 1.8 times PDR than<br />

that of AOMDV.<br />

Figure 5: Packet Delivery Ratio over number of nodes.<br />

C. Average End to end delay<br />

As shown in Figure 6, for small number of nodes, AOMDV and<br />

M-DART shows approximately same End to End Delay. As the<br />

number of nodes increases, End to End Delay of M-DART grows<br />

linearly, whereas AOMDV shows exponential growth. For large<br />

number of nodes, End to End Delay of AOMDV is more than 5<br />

times than that of M-DART. The delay of AOMDV increases<br />

dramatically because, the nodes queue packets while they select a<br />

different route when the primary route fails due to congestion.<br />

Reactive protocols must first determine the route, which may<br />

result in considerable delay if the information is not available in<br />

caches.<br />

Figure 6: Average End to End Delay over number of nodes<br />

D. Average Energy Consumption<br />

Because of DHT paradigm in M-DART energy required is less as<br />

compared to protocols which are based on On-Demand<br />

paradigm. As shown in Figure 7 energy consumed in M-DART<br />

is less as compared to AOMDV especially when the simulation<br />

time is increased beyond 500 seconds.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 300<br />

ISSN 2250-3153<br />

Figure 7: Average energy consumption over simulation time.<br />

V. CONCLUSION<br />

DHT based multipath routing supports scalability in various<br />

wireless networks. M-DART is an efficient protocol which gives<br />

improved performance in large networks. We have analyzed that<br />

the average energy consumption of M-DART is lower than<br />

AOMDV by 8.2%. We have also found that when number of<br />

nodes grows, the performance of other multipath routing<br />

protocols like AOMDV is not appropriate while M-DART is<br />

performing better in terms of Throughput (1.6 times), PDR (1.7<br />

times), End to End Delay (5 times). Because of better routing<br />

paradigm in M-DART scalability is achieved as the number of<br />

entries in DHT are less i.e. log(n).<br />

REFERENCES<br />

1. S. Basagni, ―Mobile ad hoc networking‖ 2004, Hoboken, NJ: John Wiley.<br />

xvi, 461.<br />

2. C.E. Perkins, and T.J. Watson, ―Highly dynamic destination sequenced<br />

distance vector routing (DSDV) for mobile computers,‖ Proc. ACM<br />

Communications, Architectures, Protocols and Applications, vol. 24, pp.<br />

234-244, 1994.<br />

3. T. Clausen and P. Jacquet ―Optimized Link State Routing Protocol<br />

(OLSR).‖ RFC 3626, IETF Network Working Group, October 2003.<br />

4. M. Caleffi and L. Paura, ―M-DART: Multi-path Dynamic Address<br />

RouTing‖ , Wirel. Commun. Mob. Comput. pp: 1–20, 2010.<br />

5. C. E. Perkins, E. M. Royer, and S. Das, "Ad hoc On-Demand Distance<br />

Vector (AODV) Routing,‖ RFC 3561, (2003) IETF.<br />

6. D. Johnson, Y. Hu, and D. Maltz, ―The Dynamic Source Routing Protocol<br />

(DSR) for Mobile Ad Hoc Networks for IPv4,‖ RFC 4728, 2007.<br />

7. M. Z. Oo , M. Othman , ―Performance Comparisons of AOMDV and OLSR<br />

Routing Protocols for Mobile Ad Hoc Network‖, Second International<br />

Conference on Computer Engineering and Applications, 2010.<br />

8. I. Chlamtac, M. Conti, J. Liu, Mobile ad hoc networking: imperatives and<br />

challenges. Ad Hoc Networks July 2003; 1(1):13–64.<br />

9. J. Eriksson, M. Faloutsos, S. V. Krishnamurthy, ―Scalable ad hoc routing:<br />

the case for dynamic addressing‖, IEEE, pp: 1108-1119, 2004.<br />

10. A.C. Viana, M. D. de Amorim, S. Fdida, J.F. de Rezende, ―Self<br />

organization in spontaneous networks: the approach of dht based routing<br />

protocols‖. Ad Hoc Networks, September 2005; 3(5):589–606.<br />

11. J. Eriksson, M. Faloutsos and S. Krishnamurthy. ―DART: Dynamic Address<br />

RouTing for Scalable Ad Hoc and Mesh Networks‖. in IEEE- ACM<br />

Transactions on Networking, vol. 15, no. 1, April 2007, pp. 119-132.<br />

12. Caleffi, M., Ferraiuolo, G., and Paura, L., ―Augmented Tree based Routing<br />

Protocol for Scalable Ad Hoc Networks‖, in MHWMN '07: Proceedings of<br />

the Third IEEE International Workshop on Heterogeneous Multi-Hop<br />

Wireless and Mobile Networks, 2007.<br />

13. M. Caesar, M. Castro, E. B. Nightingale, G. O'Shea and A. Rowstron.<br />

―Virtual ring routing: network routing inspired by DHTs‖. In Proc. Of<br />

SIGCOMM, 2007.<br />

14. C. Marcello, ―Mobile Ad Hoc Networks: the DHT paradigm‖ ,IEEE, 2009.<br />

15. Z. Bo, W. Yingyou, Z. Hong, ―KDSR: An Efficient DHT-based Routing<br />

Protocol for Mobile Ad Hoc Networks‖, Ninth International Conference on<br />

Hybrid Intelligent Systems, 2009.<br />

16. S. Du, A. Khan, C.S. Pal, A. Post, A.K. Saha, P. Druschel, D.B. Johnson, R.<br />

Riedi, ―:Safari: A self-organizing, hierarchical architecture for scalable ad<br />

hoc networking‖. Ad Hoc Network 2008; pp. 485–507.<br />

AUTHORS<br />

First Author – Gurmukh Singh, M.E.(I.T.), Panjab University,<br />

Chandigarh. gurmukh86@gmail.com.<br />

Second Author – Dr. SavitaGupta, PhD, Panjab University,<br />

Chandigarh. savita2k8@yahoo.com.<br />

Third Author – Sukhvir Singh, M.E.(I.T.), Panjab University,<br />

Chandigarh. sukhvirpu@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 301<br />

ISSN 2250-3153<br />

Secure Data Hiding Algorithm Using Encrypted Secret<br />

message<br />

Abstract- In any communication, security is the most<br />

important issue in today‘s world. Lots of data security and data<br />

hiding algorithms have been developed in the last decade, which<br />

worked as motivation for the research. This project is a<br />

combination of steganography and cryptography, which provides<br />

a strong backbone for its security. The scenario of present day of<br />

information security system includes confidentiality,<br />

authenticity, integrity, non-repudiation. This present work focus<br />

is enlightening the technique to secure data or message with<br />

authenticity and integrity.In this project work, the secret message<br />

is encrypted before the actual embedding process starts. The<br />

entire work has done in MATLAB. The hidden message is<br />

encrypted using a simple encryption algorithm using secret key<br />

and hence it will be almost impossible for the intruder to unhide<br />

the actual secret message from the embedded cover file without<br />

knowing secret key.Only receiver and sender know the secret<br />

key.N-bit LSB substitution technique is used as embedding and<br />

extraction method . We propose that this method could be most<br />

appropriate for hiding any secret message (text,image<br />

,audio,video) in any standard cover media such as image, audio,<br />

video files.<br />

S<br />

I. INTRODUCTION<br />

teganography is the art of passing information through<br />

original files in a manner that the existence of the message is<br />

unknown.The term steganography is arrived from Greek word<br />

means, ―Covered Writing‖. The innocent files can be referred to<br />

as cover text, cover image, or cover audio as appropriate. After<br />

embedding the secret message it is referred to as stego-medium.<br />

A stego-key is used to control the hiding process so as to restrict<br />

detection and/or recovery of the embedded data. While<br />

cryptography is about protecting the content of messages (their<br />

meaning), steganography is about hiding the message so that<br />

intermediate persons cannot see the message. Steganography<br />

refers to information or a file that has been concealed inside a<br />

digital Picture, Video or Audio file[1].<br />

II. LITERATURE REVIEW<br />

A. The Scope Of Steganography<br />

With the boost in computer power, the internet and with the<br />

development of digital signal processing (DSP), information<br />

theory and coding theory, steganography has gone ‗‗digital‘‘. In<br />

the realm of this digital world, steganography has created an<br />

atmosphere of corporate vigilance that has spawned various<br />

interesting applications, thus its continuing evolution is<br />

guaranteed.Cyber-crime is believed to benefit from this digital<br />

revolution. Hence an immediate concernis to find out best<br />

possible attacks to carry out steganalysis, and simultaneously,<br />

Harshitha K M, Dr. P. A. Vijaya<br />

finding out techniques to strengthen existing stegnography<br />

techniques against popular attacks like steganalysis[2]<br />

B. Cryptography<br />

Cryptography encodes information in such a way that nobody<br />

can read it, except the person who holds the key. More advanced<br />

cryptotechniques ensure that the information being transmitted<br />

has not been modified in transit.There is some difference in<br />

cryptography and steganography, in cryptography the hidden<br />

message is always visible, because information is in plain text<br />

form but in steganography hidden message is invisible.<br />

III. THE PROPOSED SYSTEM<br />

Data hiding techniques have been widely used to transmission<br />

of hiding secret message for long time. Ensuring data security is<br />

a big challenge for computer users. Businessmen, professionals,<br />

and home users all have some important data that they want to<br />

secure from others. In this proposed system we have the software<br />

for data encryption and then embed the cipher text in an cover<br />

medium.This system combines the effect of these two methods to<br />

enhance the security of the data.<br />

The proposed system encrypts the data with a crypto algorithm<br />

and then embeds the encrypted data in an cover file. This system<br />

improves the security of the data by embedding the encrypted<br />

data and not the plain data in cover file.the block diagram of<br />

proposed system is as shown in fig1<br />

Fig. 1: Block diagram of proposed system<br />

To embed a secret message file in the cover file used two distinct<br />

methods:<br />

(1) encrypt the secret message<br />

(2) The encrypted secret message is embed in the cover media by<br />

using LSB substitution technique.<br />

Let us now describe proposed encryption method and then the<br />

steganography algorithm.<br />

A. Encryption algorithm<br />

In this project the secret message is encrypted before<br />

embedding .the secret message is randomly permuted using the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 302<br />

ISSN 2250-3153<br />

secret key. The random permutation is carried out by using<br />

matlab functions rand and randperm.<br />

rand('twister',key)<br />

p = randperm(length(N))<br />

rand function randomly generates numbers using state ‖twister‖<br />

and key. p stores the randomized positions of the length of the<br />

secret message i.e length(N).then secret message is randomized<br />

accordingly.<br />

This encryptiom method is simple and efficient and is of<br />

symmetric type where only receiver and sender knows secret<br />

key. The Secret key length is variable and is of range double<br />

precision. At the receiver side during extraction process the<br />

decryption ,that is the reverse process of encryption is carried out<br />

using the same key to obtain the secret message from stego<br />

medium. In a nutshell, the reason that we encrypt the message is :<br />

Cryptography + Steganography = Secure Steganography<br />

B. Least Significant Bit (LSB) substitution method<br />

Least Significant Bit (LSB) substitution method is a very<br />

popular way of embedding secret messages with simplicity.The<br />

fundamental idea here is to insert the secret message in the least<br />

significant bits of the images. This actually works because the<br />

human visual system is not sensitive enough to pick out changes<br />

in color where as changes in luminance are much better picked<br />

out. A basic algorithm for LSB substitution is to take the first N<br />

cover pixels where N is the total length of the secret message that<br />

is to be embedded in bits. After that every pixel's last bit will be<br />

replaced by one of the message bits.<br />

Least significant bit (LSB) insertion is a common, simple<br />

approach for embedding information in a cover image. The LSB<br />

or in other words 8-th bit of some or all the bytes inside an image<br />

is changed to a bit of the secret message. Let us consider a cover<br />

image contains the following bit patterns:<br />

Byte-1 Byte-2 Byte-3 Byte-4<br />

00101101 00011100 11011100 10100110<br />

Byte-5 Byte-6 Byte-7 Byte-8<br />

11000100 00001100 11010010 10101101<br />

Suppose a number 200 is to embed in the above bit pattern. Now<br />

the binary representation of 200 is 11001000. To embed this<br />

information at least 8 bytes in cover file is needed. hence taken 8<br />

bytes in the cover file. Now modify the LSB of each byte of the<br />

cover file by each of the bit of embed text 11001000.Now<br />

Table3.2 shows what happens to cover file text after embedding<br />

11001000 in the LSB of all 8 bytes.<br />

Table 3.1 Illustration of LSB technique<br />

Here out of 8 bytes only 3 bytes get changed only at the LSB<br />

position. Since changing the LSB hence either changing the<br />

corresponding character in forward direction or in backward<br />

direction by only one unit and depending on the situation there<br />

may not be any change also as seen in the above example. As our<br />

eye is not very sensitive so therefore after embedding a secret<br />

message in a cover file our eye may not be able to find the<br />

difference between the original message and the message after<br />

inserting some secret text or message on to it.<br />

C. Description of Proposed Work<br />

When the system is executed GUI is displayed for embedding<br />

process. The Embed window provides option for selecting<br />

secret message file.the secret message file may be text,image<br />

,audio,video.there is also provision for choosing cover<br />

medium(video,audio,image). enter the key and press encrypt<br />

button to encrypt the secret message. And choose the no of LSB<br />

bits (1,2,3,4,5,6,7,8) which are replaced by secret message in<br />

cover file.As we go on increasing no of LSB bits the size of<br />

secret message to be hide also increases.press embed message<br />

button to embed the message in cover file to get stegomedium<br />

and the press save button to save the stegomedium.embed<br />

window also displays time taken in embedding ,Utilization factor<br />

and PSNR value.press message extraction button to extract the<br />

secret message from stegomedium or press exit button to get out<br />

of the Embed window.<br />

Fig. 2: Snapshot of Embed Window<br />

In extract window browse any stegomedium file, enter thecorrect<br />

key and then press extract button to extract the secret message<br />

from the stegomedium.if the incorrect key is entered it is not<br />

possible to extract message. The decryption is performed along<br />

with extraction when extract button is pressed. The advantage of<br />

this extract window is that it can extract any kind of<br />

stegomedium(image,audio,video) with secret key known<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 303<br />

ISSN 2250-3153<br />

Fig. 3: Snapshot of Extract Window<br />

IV. RESULTS AND DISCUSSION<br />

In steganography following factor are considerered after<br />

embedding secret message in the cover medium.<br />

A. Utilization factor<br />

The utilization factor denotes the amount of cover image that<br />

has been utilized to embed the secret message into it. And it is<br />

given by<br />

Utilization factor = ecret message size(bits)/ cover medium<br />

size(bits)*100 (1)<br />

B. PSNR value<br />

PSNR is the ratio between the maximum possible power of a<br />

signal and the power of corrupting noise that affects the fidelity<br />

of its representation. Because many signals have a very wide<br />

dynamic range, PSNR is usually expressed in terms of a<br />

logarithmic decibel scale.A higher PSNR value indicates that the<br />

reconstruction is of higher quality..PSNR is most commonly used<br />

as a measure of quality of reconstruction of lossy compression<br />

codes. The signal in this case is the original data, and the noise is<br />

the error due to hiding. The PSNR value is calculated by Eqn. (2)<br />

(2)<br />

Where MSE: Mean-Square error Mean Square Error (MSE): It is<br />

the measure used to quantify the difference between the initial<br />

and the distorted or noisy image.and is given by Eqn.3.<br />

Where x: width of image.<br />

y: height.<br />

x*y: number of pixels<br />

We applied our present method on different cover files and secret<br />

message files and the results are given below:<br />

(3)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 304<br />

ISSN 2250-3153<br />

V. CONCLUSION<br />

Until recently, information hiding techniques received very<br />

much less attention from the research community and from<br />

industry than cryptography.Steganography has its place in<br />

security.It is not intended to replace cryptography but<br />

supplement it. In this paper we give an idea to enhance the<br />

security of system by combining the two techniques. It can<br />

enhance confidentiality of information and provides a means of<br />

communicating privately. Here message is first encrypted and<br />

then embed in cover file with help of steganographic system.<br />

LSB algorithm is applicable for all kind of cover medium(image,<br />

audio,video).LSB algorithm is used for both embedding and<br />

extraction process.the entire work is done in MATLAB There are<br />

infinite number ofsteganography applications for digital image<br />

including copyright protection,feature tagging, and secret<br />

communication. This paper explores a tiny fraction of the art of<br />

steganography. The steganography method may be further<br />

secured if we compress the secret message first and then encrypt<br />

it and then finally embed inside the cover file.<br />

REFERENCES<br />

[1] Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar ―Cryptography of<br />

Video InformationIn Modem communica-tion‖, Electronics And<br />

Energefics, vol. 11, pp. 115-125, 1998<br />

[2] Stinsown,D.―Cryptography:Theory and practice‖<br />

[3] C. Cachin, ―An Information-theoretic Model for steganography‖, in<br />

proceeding 2nd Information Hiding Workshop, vol.1525, pp.306-<br />

318,1998<br />

[4] Neil F. Johnson, Zoran uric,Sushil. Jajodia, ‖ Information Hiding:<br />

steganography and Watermarking – Attacks and Countermeasures‖,<br />

Kluwer Academic Press, Norwrll, MA,New York, 2000<br />

[5] R A Isbell, ―Steganography: Hidden Menace or Hidden Saviour‖,<br />

steganography White Paper,IO May 2002<br />

[6] J. Zollner, H. Federrath, H. Klimant,et al.,―Modeling the Security of<br />

Systems‖, Steganographic in 2 nd Workshop on Informafion Hiding,<br />

Portland, April 1998, pp. 345-355. proceeding of IEEE, pp. 1062-<br />

1078, July1999.<br />

[7] W. Bender, D. Gruhl, N. Morimoto and A.Lu, ―Techniques for Data<br />

Hiding‖, Sysfems Journal, vol. 35, 1996<br />

[8] M. M Amin, M. Salleh, S. Ibrahim, M .R. Katmin, and M. Z. I.<br />

Shamsuddin,― Information Hiding using Steganography‖, IEEE 0-<br />

7803-7773-March 7,2003<br />

[9] N. Provos, P. Honeyman, ―DetectingSteganography Content on the<br />

Internet‖.Transformation‖, ZEICE Tram.<br />

[10] Advanced Steganography Algorithm usingencrypted secret message,<br />

Joyshree Nath and Asoke Nath, International Journal of Advanced<br />

Computer Science and Application (IJACSA) Vol-2 No.3, Page19-<br />

24,March(2011).<br />

AUTHORS<br />

First Author - Harshitha K M, USN:4MC10LDS10,<br />

Mtech(DE&CS), MCE,Hassan-573202<br />

Email id - harshimce022@gmail.com<br />

Second Author - Dr. P. A. VIJAYA BE., M.E., PhD, Professor and<br />

Head, Dept. of E&C Engg. MCE, Hassan-573202<br />

Email id - pavmkv@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 305<br />

ISSN 2250-3153<br />

Biodiesel Production and Process Optimization<br />

Rajarshi Kar, Oindrila Gupta, Mukundu Kumar Das<br />

Chemical Engineering Department, Heritage Institute of Technology, Kolkata, India<br />

Abstract- ―In any case, they make it certain that motor-power<br />

can still be produced from the heat of the sun, which is always<br />

available for agricultural purposes, even when all our natural<br />

stores of solid and liquid fuels are exhausted..‖<br />

Rudolf Diesel.<br />

In this project we have intended to prepare biodiesel from waste<br />

mustard oil. To make it economically feasible, a proper balance<br />

have to be struck between the raw material cost & the selling<br />

price of biodiesel as well as that of the byproduct glycerin. The<br />

variables affecting the yield and characteristics of the biodiesel<br />

produced from used frying oil were studied, the achieved results<br />

were analyzed and a set of recommendations were proposed.<br />

Objective of the work:<br />

To study the production of biodiesel from waste mustard oil and<br />

its process optimization<br />

B<br />

I. INTRODUCTION<br />

iodiesel refers to a vegetable oil- or animal fat-based diesel<br />

fuel consisting of long-chain alkyl (methyl, propyl or ethyl)<br />

esters. Biodiesel is typically made by chemically reacting lipids<br />

(e.g., vegetable oil, animal fat (tallow)) with an alcohol.<br />

Biodiesel is meant to be used in standard diesel engines and<br />

is thus distinct from the vegetable and waste oils used to fuel<br />

converted diesel engines. Biodiesel can be used alone, or blended<br />

with petro-diesel. Biodiesel can also be used as a low carbon<br />

alternative to heating oil.<br />

Biodiesel is liquid which varies in color between golden and<br />

dark brown depending upon the production feedstock. It is<br />

immiscible with water, has a high boiling point and low vapor<br />

pressure. Typical ethyl ester biodiesel has a flash point of about<br />

130ºC, biodiesel has a density of about 0.88 gm/cm^3, less than<br />

that of water. A biodegradable transportation fuel that contributes<br />

no net carbon di oxide or sulfur emission to the atmosphere and<br />

is low in particulate emission. Ultra Low Sulfur Diesel<br />

fuel(ULSD) fuel, which is advantageous because it has virtually<br />

no sulfur content. Biodiesel has very good lubricating properties,<br />

significantly better than standard diesel which can prolong<br />

engine's life. As a result, Biodiesel can now compete with other<br />

alternative fuels and clean-air options for urban transit fleets and<br />

government vehicles across the country. It is safe, biodegradable<br />

and reduces air pollutants such as particulates, carbon monoxide<br />

and hydrocarbon. A variation in biodiesel energy density is more<br />

dependent on feedstock used than the production process.<br />

II. REACTION INVOLVED<br />

Esterification Reaction: The basic process of converting waste<br />

oil to biodiesel is called Esterification. Carboxylic act reacts<br />

readily with alcohols in the presence of catalytic amount of<br />

mineral acids to yield compounds called esters. The process is<br />

called esterification.<br />

The esterification reaction is both slow and reversible. The<br />

equation for the reaction between an acid RCOOH and an<br />

alcohol R'OH (where R and R' can be the same or different) is:<br />

Transesterification<br />

Triglycerides (1) are reacted with an alcohol such as ethanol/<br />

methanol (2) to give ethyl/ methyl esters of fatty acids (3) and<br />

glycerol (4):<br />

Animal and plant fats and oils are typically made of<br />

triglycerides which are esters containing three free fatty acids<br />

and the trihydric alcohol, glycerol. In the transesterification<br />

process, the alcohol is deprotonated with a base to make it a<br />

stronger nucleophile. Commonly, ethanol or methanol is used.<br />

As can be seen, the reaction has no other inputs than the<br />

triglyceride and the alcohol.<br />

Normally, this reaction will precede either exceedingly<br />

slowly or not at all. Heat, as well as an acid or base are used to<br />

help the reaction proceed more quickly. It is important to note<br />

that the acid or base are not consumed by the transesterification<br />

reaction, thus they are not reactants but catalysts.<br />

Almost all biodiesel is produced from virgin vegetable oils<br />

using the base-catalyzed technique as it is the most economical<br />

process for treating virgin vegetable oils, requiring only low<br />

temperatures and pressures and producing over 98% conversion<br />

yield (provided the starting oil is low in moisture and free fatty<br />

acids). However, biodiesel produced from other sources or by<br />

other methods may require acid catalysis which is much slower.<br />

Since it is the predominant method for commercial-scale<br />

production, only the base-catalyzed transesterification process<br />

will be described below.<br />

An example of the transesterification reaction equation,<br />

shown in skeletal formulas:<br />

During the esterification process, the triglyceride is reacted<br />

with alcohol in the presence of a catalyst, usually a strong alkali<br />

(NaOH, KOH, or Alkoxides). The main reason for doing a<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 306<br />

ISSN 2250-3153<br />

titration to produce biodiesel, is to find out how much alkaline is<br />

needed to completely neutralize any free fatty acids present, thus<br />

ensuring a complete transesterification. Empirically 6.25 g / L<br />

NaOH produces a very usable fuel. One uses about 6 g NaOH<br />

when the WVO is light in color and about 7 g NaOH when it is<br />

dark in color.<br />

The alcohol reacts with the fatty acids to form the mono-alkyl<br />

ester (or biodiesel) and crude glycerol. The reaction between the<br />

biolipid (fat or oil) and the alcohol is a reversible reaction so the<br />

alcohol must be added in excess to drive the reaction towards the<br />

right and ensure<br />

Ester Hydrolysis<br />

Soap Forming Reaction<br />

Acid Catalyzed Pretreatment<br />

Special processes are required if the oil or fat contains<br />

significant amounts of FFAs. Used cooking oils typically contain<br />

2-7% FFAs and animal fats contain from 5-30% FFAs. Some<br />

very low quality feedstocks, such as trap grease, can approach<br />

100% FFAs. When an alkali catalyst is added to these feed<br />

stocks, the free fatty acids react with the catalyst to form<br />

Soap and water as shown in the reaction below:<br />

Fatty Acid Potassium Hydroxide Potassium soap Water<br />

Up to about 5% FFAs, the reaction can still be catalyzed<br />

with an alkali catalyst but additional catalyst must be added to<br />

compensate for that lost to soap. The soap created during the<br />

reaction is either removed with the glycerol or is washed out<br />

during the water wash. When the FFA level is above 5%, the<br />

soap inhibits separation of the glycerol from the methyl esters<br />

and contributes to emulsion formation during the water wash. For<br />

these cases, an acid catalyst such as sulfuric acid can be used to<br />

esterify the FFAs to methyl esters as shown in the following<br />

reaction:<br />

Fatty Acid Methanol Methyl ester Water<br />

This process can be used as a pretreatment to convert the<br />

FFAs to methyl esters and thereby reduce the FFA level. Then,<br />

the low FFA pretreated oil can be transesterified with an alkali<br />

catalyst to convert the triglycerides to methyl esters . As shown<br />

in the reaction, water is formed and, if it accumulates, it can stop<br />

the reaction well before completion. Removal of this alcohol also<br />

removes the water formed by the esterification reaction and<br />

allows for a second step of esterification or proceeding directly to<br />

alkali-catalyzed transesterification. Note that the methanol-water<br />

mixture will also contain some dissolved oil and FFAs that<br />

should be recovered and reprocessed.. Soapstock, a mixture of<br />

water, soaps, and oil, is dried, saponified, and then esterified with<br />

methanol or some other simple alcohol using an inorganic acid as<br />

a catalyst. The procedure relies on a large excess of alcohol and<br />

the cost of recovering this alcohol determines the feasibility of<br />

the process.<br />

When oils with free fatty acids are used, free fatty acids will<br />

be turned into soaps by the alkali catalyst. As a result, the yield<br />

of biodiesel is lowered for those oils, and the soap needs to be<br />

removed. The process used cleaning the biodiesel is known as<br />

―washing‖, in particular used for removing soaps. This process<br />

involves either bubbling water up through the biodiesel (after<br />

glycerin separation), or mixing water down on the top and letting<br />

it flow down through the biodiesel. Water pulls the soaps out of<br />

biodiesel as it passes through. The water eventually settles to<br />

bottom, and can be separated readily from the biodiesel.<br />

Process Details<br />

Feedstock: Waste Mustard Oil<br />

Chemicals Required: Sodium hydroxide as a catalyst<br />

for transesterification reaction, Ethanol as a reagent,<br />

distilled water.<br />

Equipments used: A batch reactor with condenser, a<br />

stirrer, clamp, a heater, Digital temperature indicator ( 0<br />

– 250 o C ),Thermometer ( 0 – 250 o C ) x 2 nose, Beaker<br />

( 1 L capacity ) x 2 nos, Cylinder ( 1 L capacity ) x 2<br />

nos, Conical flask ( 100 cm 3 ) x 2 nos, Flash distillation<br />

apparatus with mantel heater for 1 L flask, Separating<br />

funnel Iron stand with ring holder ( 2 nos. ),Rubber tube<br />

( ½ inch dia. ) x 1 roll ( 50m ),measuring cylinder.<br />

Pipette, glass rod, PET bottles for biodiesel storage, a<br />

batch distillation unit, PH strip, filter paper.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 307<br />

ISSN 2250-3153<br />

Making a small batch biodiesel using Waste Mustard<br />

Oil:<br />

Filter and dewater waste mustard oil by using filter<br />

paper since it may contain contaminants which oil<br />

acidic(rancid).<br />

Waste mustard Oil (3L) is heated to 50-60 °C for 10<br />

minutes and then cooled.<br />

Firstly, 30grms of sodium hydroxide is mixed slowly<br />

with alcohol in a three-necked round bottom flask,<br />

stirring continuously.<br />

Oil is poured slowly in the prepared Sodium ethoxide<br />

mixture with continuous stirring and then heated at<br />

50-60 °C for about 90 minutes.<br />

The alkalinity of the oil is measured by using pH strip<br />

during reaction. The color of the Ph strip shows the<br />

mixture is alkaline.<br />

Now the whole system should be cooled and the<br />

mixture allowed settling for at least 12 hours. But we<br />

kept it for three days.<br />

At the end of three days, the mixture separated to<br />

impure Biodiesel (upper layer) and impure Glycerin<br />

(lower layer) using a separating funnel.<br />

The separated layer of Biodiesel is then fed to a batch<br />

distillation unit for the recovery of ethanol and water.<br />

The temperature is maintained around 105 °C.<br />

The residue (biodiesel + soap) collected is taken in a<br />

beaker.<br />

The impure Biodiesel is washed with water. Two layers<br />

are formed, upper layer being Biodiesel and the lower<br />

layer being water.<br />

Now the Biodiesel is separated from the water by a<br />

separating funnel.<br />

This Biodiesel may contain a small percentage of water<br />

and so it is then dried by passing through silica gel.<br />

The impure Glycerin (colored) is treated with activated<br />

carbon and then filtered through a Buchner funnel.<br />

The amount of Biodiesel, Alcohol (recovered) and<br />

Glycerin are measured and noted.<br />

III. BIODIESEL FROM WASTE MUSTARD OIL:<br />

PROCESS STEPS<br />

Heating of Oil<br />

In order to speed up the reaction, the waste mustard must be<br />

heated. The ideal temperature range is 50º C to 60º C. Heating<br />

with electric elements is usually the easiest way to bring the oil<br />

up to temperature. Heat the oil first to remove any water content.<br />

Waste oil will probably contain water, which can slow down the<br />

reaction and cause saponification (soap formation). The less<br />

water in the oil the better. So waste mustard oil is heated to 50-<br />

60ºC for 10 minutes and then cooled.<br />

Proportion of Mustard oil, Sodium Hydroxide (alkali catalyst)<br />

and Ethanol taken are as follows:<br />

Mustard Oil: Volume (3 L) * Density (910 g/L) = 2730 g<br />

Sodium Hydroxide : 1% of Oil = 1% of 2730 g<br />

= 27.3 g<br />

~ 300 g<br />

Ethanol: 3 moles of 100% C2H5OH per mole of oil<br />

= (3 * 138) g<br />

= 414 g<br />

So, for 90% alcohol, amount taken = (414/.90) g<br />

= 460 g<br />

~ 500g<br />

Mixing of ethanol and catalyst<br />

The purpose of mixing ethanol and the catalyst (NaOH) is to<br />

react the two substances to form ethoxide. Firstly, NaOH is<br />

mixed slowly with alcohol in a three-necked round bottom flask,<br />

stirring continuously. NaOH does not readily dissolve into<br />

ethanol. It is best to turn on the mixer to begin agitating the<br />

ethanol and slowly pour the NaOH in. When particles of NaOH<br />

cannot be seen, the ethoxide is ready to be added to the oil. This<br />

can usually be achieved in 20 –30 minutes.<br />

Heating and mixing<br />

Oil is poured slowly in the prepared Sodium ethoxide<br />

mixture with continuous stirring and then heated at 50-60 °C for<br />

about 90 minutes. A full speed propeller coupled to an electric<br />

motor works fine as a mixer. Too much agitation causes<br />

splashing and bubbles through vortexing and reduces mix<br />

efficiency. There should be a vortex just appearing on the<br />

surface. Adjust the speed, or the pitch or size of the stirrer to get<br />

the right effect. The transesterification process separates the ethyl<br />

esters from the glycerin. Now the whole system should be cooled<br />

and the mixture allowed settling for at least 12 hours. But we<br />

kept it for three days.<br />

Settling and separation<br />

The ethyl esters (biodiesel) will be floating on top while the<br />

denser glycerin will have congealed on the bottom of the<br />

container forming a hard gelatinous mass. Then carefully decant<br />

the biodiesel. This can be done by draining the reactants out of<br />

the bottom of the container through a transparent hose. The semiliquid<br />

glycerin has a dark brown color and the biodiesel is honeycolored.<br />

Keep a watch on what flows through the sight tube.<br />

When the lighter-colored biodiesel appears divert it to a separate<br />

container. If any biodiesel stays with the glycerin it is easy to<br />

retrieve it later once the glycerin has solidified. If you left the<br />

mixture in the tank until the glycerin gelled, reheat the tank just<br />

enough to liquify the glycerin again.<br />

The separated layer of Biodiesel is then fed to a batch<br />

distillation unit for the recovery of ethanol and water. The<br />

temperature is maintained around 105 °C. The impure Biodiesel<br />

is washed with water. Two layers are formed, upper layer being<br />

Biodiesel and the lower layer being water.<br />

Now the Biodiesel is separated from the water by a<br />

separating funnel. This Biodiesel may contain a small percentage<br />

of water and so it is then dried by passing through silica gel.<br />

Draining of Glycerol<br />

After the transesterification reaction, one must wait for the<br />

glycerol to settle to the bottom of the container. This happens<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 308<br />

ISSN 2250-3153<br />

because Glycerol is heavier then biodiesel. The settling will<br />

begin immediately, but the mixture should be left a minimum of<br />

eight hours (preferably 12) to make sure all of the Glycerol has<br />

settled out. The Glycerol volume should be approximately 20%<br />

of the original oil volume. The impure Glycerin (colored) is<br />

treated with activated carbon and then filtered through a Buchner<br />

funnel. Volume of glycerin obtained near about 690ml.<br />

Soap residue:<br />

Suspended in the biodiesel will also be some soapy residues.<br />

These are the result of Na + ions from the NaOH reacting with<br />

water created when the ethanol bonds with the ester chains along<br />

with any other water that was suspended in the oil. If the reaction<br />

produces more than the usual amount of soap, this happens when<br />

NaOH comes into contact with water before it has a chance to<br />

react with the oil. In this case the excess water should have been<br />

boiledoff.<br />

The part of the process where it is vital to keep all water out<br />

of the reaction is when making the sodium ethoxide. Keep the<br />

vessels NaOH comes in contact with as dry as possible. The<br />

chances of a good clean splitting of ester from glycerin with little<br />

soap by-product are much better on a warm dry summer day than<br />

on a damp winter day.<br />

Washing Biodiesel<br />

The purpose is to wash out the remnants of the catalyst and<br />

other impurities. There are three main methods:<br />

Water wash only (a misting of water over the fuel,<br />

draining water off the bottom)<br />

Air bubble wash (slow bubbling of air through the<br />

fuel)<br />

Air/water bubble wash (with water in the bottom of<br />

the tank, bubbling air through water and then the<br />

fuel)<br />

Which method works the best is dependent on the quality of<br />

the fuel. Washing Biodiesel with water is the oldest and most<br />

common method of cleaning biodiesel. Raw unwashed biodiesel<br />

is about 3% ethanol. Ethanol is a solvent; it captures soap and<br />

other impurities and holds them dissolved in the biodiesel. Water<br />

soaks up that ethanol, releasing impurities to be washed away<br />

with water. Water washing is the most flexible way to purify<br />

biodiesel.<br />

The process of washing biodiesel involves mixing it with<br />

water. Water is heavier than biodiesel and absorbs the excess<br />

alcohol, sodium hydroxide, and soap suspended in it. After<br />

washing and settling, the water and impurities in the water can be<br />

drained from the bottom of the container. Several water cycles<br />

are generally needed. The first water drained off the bottom of<br />

the biodiesel will be milky, and the final wash water drained off<br />

will be clear. Excess sodium hydroxide in biodiesel will form<br />

soap when mixed with water, and it takes a while for the soap to<br />

settle out.<br />

Depending on the method use, it takes roughly as much as<br />

biodiesel for a wash cycle. Initial washing must involve gently<br />

mixing the formation of soap that will take time to settle out.<br />

However, you want the mixing to be through and for the water to<br />

be dispersed throughout the biodiesel oil. Mustard oil based will<br />

have better cold weather flow characteristics than from coconut<br />

oil or animal fat.<br />

IV. OBSERVATION AND RESULTS<br />

Amount of waste mustard oil taken = 3liter<br />

Mustard oil density = 910g/l=2730g<br />

Amount of catalyst (NaOH) taken = 30g<br />

Amount of ethanol = 500ml<br />

pH of mixture = 7(indicates alkalinity)<br />

Volume of impure biodiesel after reaction (V1) = 2800ml (94%)<br />

Amount of ethanol loss due to vaporization = 20ml<br />

After Flash distillation,<br />

Amount of ethanol recovered (V2) = 30ml<br />

Volume of unwashed biodiesel (V3) = 2800ml<br />

Volume of pure biodiesel = 2750ml<br />

Characteristics<br />

Color<br />

Density, kg/m3<br />

Flash point, ºC<br />

Fire point, ºC<br />

Viscosity,mm^2/s@40ºC<br />

Aniline Point, ºC<br />

Pour point, ºC (summer)<br />

Calorific Value, MJ/L<br />

Boiling Point, ºC<br />

Comparative Study:<br />

Diesel<br />

Biodiesel<br />

Golden Golden and dark<br />

brown<br />

0.84 0.88<br />

60 to 80 130<br />

78 138<br />

1.3-4.1 1.5-4.0<br />

42 54<br />

18 10<br />

38.3 36<br />

180 to 340 315 to 350<br />

Comparative study between diesel and biodiesel<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 309<br />

ISSN 2250-3153<br />

Figure: Process Flow Chart for Production of Biodiesel And<br />

By- product from waste Mustard Oil<br />

Properties<br />

Biodiesel: Physical Characteristics<br />

Values<br />

Color Golden &Dark Brown<br />

Specific Gravity 0.88<br />

Aniline Point ºC 54 ºC<br />

Diesel Index 43<br />

Cetane Number(CN) 40<br />

Flash Point ºC 130 ºC<br />

Fire Point ºC 138 ºC<br />

Kinematic Viscosity @40ºC 1.5 to 4.0<br />

Gross calorific value 10800<br />

American Petroleum Institute (API) gravity<br />

Diesel Index (DI) = (Aniline point ºF*degree API)/100<br />

Cetane Number =Diesel Index-3<br />

Gross Calorific Value=12400-2100* ρ^2<br />

where ρ is the density<br />

Suggestion for future work<br />

Biodiesel is not yet cost competitive with petroleum diesel.<br />

In order to become more competitive, it is crucial to lower the<br />

production costs associated with biodiesel. The cost of raw<br />

material consists of as much as 70-95% of the total production<br />

cost of biodiesel. The raw materials include oil, alcohol and a<br />

catalyst. In order to reduce the production cost, it is most<br />

beneficial to use waste cooking oil, as this is readily available<br />

and at a low price. Waste mustard oil presents problems in the<br />

form of excess water and free fatty acid composition of the oil<br />

The best catalyzed transesterification of waste mustard oil<br />

with ethanol is most economic decision. An alkali catalyzed<br />

reaction allows for a low temperature and pressure with high<br />

conversion. An alkali catalyzed reaction would require an<br />

esterification pretreatment step in order to reduce the<br />

concentration of free fatty acids and dewatering process in order<br />

to create biodiesel suitable for vehicle consumption.<br />

The problem of solidifying the biodiesel from waste<br />

vegetable oil in cold weather conditions should be rectified in<br />

future work by some kind of additives which are cheaply<br />

available in the market<br />

The Future of Biodiesel fuel<br />

BIO-DIESEL is diesel made from animate source (using<br />

plant oil and animal fats). Bio-diesel is basically comprised of<br />

short-alkyl esters, made from animal fats and plant seeds.<br />

With increase in the demand of petroleum products the<br />

prices of petrol & diesel are increasing world wide. This trend is<br />

expected in years to come as the resources are also depleting.<br />

Hence alternative sources of energy for running our generators,<br />

automobiles etc. are being considered world wide.<br />

The possibility of obtaining oil from plant resources has<br />

aroused a great interest and in several countries, vegetable oil<br />

after esterification being used as 'Biodiesel'.<br />

Biodiesel is a nontoxic, biodegradable replacement of the<br />

petroleum diesel. The vegetable oils are treated with alcohol<br />

ethanol or methanol and alkali. The products of the reaction are<br />

Biodiesel and glycerol. Chemically biodiesel is monoalkyl esters<br />

of long chain fatty acid and its properties are similar to petrodiesel.<br />

The biodiesel can be used as 20% blend with petro-diesel<br />

in existing engines without any modification. Both the edible and<br />

non edible vegetable oils can be used as the raw materials for the<br />

biodiesel. Considering the cost and demand of the edible oils the<br />

non edible oils may be preferred for the preparation of biodiesel<br />

in India.<br />

Biodiesel is a substance that preserves air quality. This<br />

type of fuel is designed to enhance the richness of a diesel<br />

automobile. Various organizations are setup to control air<br />

pollution and find new sources of fuels for vehicles. Not only<br />

does biodiesel help the environment, it also assists people is<br />

using a lower cost means of transportation. It is a more harmless<br />

method than the now used petroleum diesel. Biodiesel is created<br />

from nature oils and fats that can be gathered from anyone‘s<br />

gardens.<br />

The future of biodiesel is growing. More companies are<br />

offering this solution to the consumers. At this stage, only diesel<br />

powered automobiles can use the new fuel. This is expected to<br />

change in the upcoming years. The mounting concern of offshore<br />

oil as well as the environmental issues has groups in an<br />

uproar. Already there are several types of companies using<br />

biodiesel as their main source for transportation.<br />

Biodiesel fuel also has its own advantages and<br />

disadvantages. The biggest advantage of biodiesel is that it can<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 310<br />

ISSN 2250-3153<br />

play a significant role in reducing the harmful carbon dioxide<br />

emissions. However, there do exist some drawbacks of biodiesel<br />

which may become a hindrance in the introduction of biodiesel<br />

as an alternative to the harmful carbon emitting fossil fuels.<br />

Biggest advantage of biodiesel fuel is that it is non toxic and<br />

biodegradable, which makes it one of the most environment<br />

friendly alternative of power generation.<br />

After completion of our actual experiment in the biodiesel<br />

production, we have obtained our desired compatibility with<br />

petroleum diesel. The flash point, pour point, calorific value, fire<br />

point, kinematic viscosity, density etc has been satisfactory<br />

taking into consideration the possibility of errors here. So our<br />

observation is compatible within the limits of experimental errors<br />

REFERENCES<br />

[1] Biodiesel processing and production by Jon Van Gerpen.<br />

[2] Small Scale Biodiesel Production by Waste Management & Research<br />

Centre (WMRC)<br />

[3] Triglyceride Based Diesel Fuel by Anjana Srivastava and Ram Prasad<br />

[4] Biodiesel Production and Fuel Quantity J. Van Gerpen<br />

[5] http://en.wikipedia.org/wiki/Biodiesel<br />

[6] Fernando, S., Hal, C. and Jha S., ―NOx Reduction from Biodiesel Fuels‖,<br />

Energy & Fuels 2006, 20, pp. 376-382<br />

[7] Hancock, N., ―Global Biodiesel Market‖, Oilseeds WA, Biodiesel<br />

Workshop, August 2005<br />

[8] Biofuels refining and performance By Ahindra Nag<br />

[9] Dunn, R.O.; ―Cold-Flow Properties of Soybean Oil Fatty Acid Monoalkyl<br />

Ester Admixtures‖; Energy & Fuel; 2009.<br />

[10] Nitschke, W.R., Wilson, C.M.; ―Rudolf Diesel: Pioneer of the Age of<br />

Power‖; University of Oklahoma Press; 1965.<br />

[11] Boocock, D.G.B., Konar, S.K., Mao, V., Lee, C., Buligan, S.; ―Fast<br />

formation of high-purity methyl esters from vegetable oils‖; J. Am. Oil Soc.<br />

Chem.; 1998.<br />

[12] Srivastava, A., Prasad, R.; ―Triglycerides-based diesel fuels‖; Renewable<br />

and Sustainable Energy Reviews, 4th edition; 2000.<br />

[13] National Biodiesel Board www.biodiesl.org<br />

[14] www.eere.energy.gov/biomass/publications.html<br />

[15] www.landinstitute.org-Insights from Sunshine Farm<br />

[16] Performance and Emissions of Single CylinderCI Engine using Kusum<br />

Methyl Ester; International Journal of Computer Information Systems,Vol.<br />

4, No.1, <strong>2012</strong><br />

[17] journeytoforever.org/biodiesel_mike.html<br />

[18] http://www.svlele.com/biodiesel_process.htm<br />

[19] http://www.biotechpark.org.in/html/biodiesel/html/intro1.htm<br />

[20] http://www.biodieselathome.net/The_Future_of_Biodiesel.html<br />

[21] http://haydentech.edublogs.org/wiki/period9_group2/what-is-the-future-ofyour-fuel-source/<br />

AUTHORS<br />

First Author – Rajarshi Kar, Chemical Engineering Department,<br />

Heritage Institute of Technology, Kolkata, India, Email:<br />

rajarshi.kar6@gmail.com<br />

Second Author –Oindrila Gupta, Chemical Engineering<br />

Department, Heritage Institute of Technology, Kolkata, India, Email:<br />

oindrilaa.gupta@gmail.com<br />

Third Author – Mukundu Kumar Das, Chemical Engineering<br />

Department, Heritage Institute of Technology, Kolkata, India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 311<br />

ISSN 2250-3153<br />

A study of Intellectual Property Management in Industries<br />

& Academics & ways for collaboration in India<br />

First Author - Pankaj Prabhakar Borkar<br />

Assistant Controller of Patent & Designs, Patent office, Mumbai, India<br />

Second Author - Dr. Ashutosh A. Paturkar<br />

Professor, Dr Ambedkar Institute of Management & Research, Nagpur, India<br />

Abstract- Intellectual property (IP) has emerged as a key driver<br />

in knowledge economy. Firms view IP as a valuable corporate<br />

asset and a strategic business tool. The future focus of research<br />

will be on mutual relationship with academic<br />

institutions/university & industry cooperation. It will be how to<br />

bring together the disciplines of IP and management & to<br />

identify the communication gaps in academic & industries for<br />

technology sharing / mutual research etc. It will avoid<br />

duplication of research work & will introduce Basic IP<br />

education. In Indian contest, most companies and academic<br />

institutions under-utilize the IP system & its potential benefit due<br />

to lack of awareness of IP system. This is attributed due to<br />

complexity of IP system & lack of easily accessible teaching,<br />

training and/or professional assistance. The proposed Protection<br />

and Utilization of Public funded IP Bill pending before<br />

Parliament will imposes obligations & creates rights to optimize<br />

the potential of public funded R&D. It will further provide<br />

incentive to create IP and mechanism for its protection and<br />

utilization, simultaneously enhancing awareness, greater<br />

interaction among universities, academic and research<br />

institutions & their collaborations. This will pave the way in<br />

India like other developed countries to avoid duplication of<br />

research work & create immense resources through IP for social<br />

development.<br />

Index Terms- Intellectual Property, Universities, Academic,<br />

Education, Industry, research, technology transfer, collaboration,<br />

Protection and Utilization of Public funded IP Bill Intellectual<br />

Property.<br />

I. INTRODUCTION & SIGNIFICANCE OF<br />

INTELLECTUAL PROPERTY (IP)<br />

Intellectual property (IP) has emerged as a key driver<br />

in knowledge economy & the firms view IP as a valuable<br />

corporate asset and a strategic business tool. Recent research<br />

indicates that over 50% of the value of many business<br />

organizations or assets is attributed to IP. The purpose of IP<br />

system mostly, patents are to protect and promote the<br />

development of science & technology (S&T) and to promote the<br />

dissemination & use of S&T. Intellectual Property means the<br />

property represented by the product emanating from creativity of<br />

the human mind, human intellect and creative ideas i.e. creative<br />

ideas and expressions of the human mind (intellect) that creates<br />

commercial value. It can be an invention (Patents), Design,<br />

Trademarks, artistic creation etc. In earlier times, physical or<br />

tangible assets like movable and immovable properties fetched<br />

the maximum value and the owner had an exclusive right over it.<br />

The property right, pertaining to such intangible assets, is called<br />

as Intellectual Property. The IP is an asset and, as such, it can be<br />

bought, sold, mortgaged, licensed, exchanged or gratuitously<br />

given away like any other form of the property. IP facilitates<br />

exclusive right to make, use, exercise, sell or distribute an<br />

invented article or Process in India i.e. these rights can be shared,<br />

licensed or sold. Thus IP serves as an indicator of achievements<br />

in Research & Development institutions and ability of individual<br />

researcher.<br />

II. SIGNIFICANCE OF INTELLECTUAL PROPERTY<br />

MANAGEMENT (IPM) TO INDUSTRIES &<br />

ACADEMICS<br />

Intellectual Property management (IPM) has become as<br />

important as IP managers needs decision support information<br />

related to R&D, innovation technology, finance, industrial<br />

economics, business strategy litigation, technology analysis,<br />

portfolio maintenance, licensing, acquisition analysis, evaluation<br />

etc. For instance, a patent portfolio may contain a large number<br />

of patents of less quality / high quality and on other end, a<br />

smaller number of exceedingly high quality patents, hence IP<br />

evaluation, audit is required. In India, most companies and<br />

academic institutions under-utilize the IP system due to lack of<br />

awareness and its usefulness due to complexity & lack of easily<br />

accessible teaching, training and/or professional assistance.<br />

Modern IPM provides essential tools for managing intangible<br />

assets like Patents, Designs and Trademarks, etc. IPM allows to<br />

handling risks & an uncertainty related to R&D and it facilitates<br />

the interaction between the public & the private sector. Market<br />

value of any enterprise is determined by its portfolio and optimal<br />

use of IP assets. In this competitive world, creating, protecting<br />

and managing IP rights and avoiding infringement of IP rights by<br />

others are crucial task of any firm or organization. Hence the<br />

main goal of patent management is obtaining and maintaining<br />

patents.<br />

2.1 IPM identifies, precautions to be taken after inventing<br />

the technology<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 312<br />

ISSN 2250-3153<br />

not to publish the research work anywhere before filing<br />

of patent application,<br />

file provisional / complete specification in patent<br />

offices,<br />

check for technical/commercial viability of inventions<br />

after complete development of invention file request for<br />

examination (within 48 months),<br />

get patent & maintain the enforcement of patent by<br />

paying the renewal fee,<br />

commercialize the invention (make / sell / license /<br />

assign, etc.),<br />

field watch (regular search of patent / non-patent<br />

documents & watch on technological advancements)<br />

III. COLLABORATION OF INDUSTRIES &<br />

ACADEMICS FOR IP<br />

In competitive world, it is necessary for India to<br />

innovate & promote creativity which needs to protect and utilize<br />

the IP created out of public funded research and development<br />

(R&D), in which Government has invested large funds. The<br />

proposed Protection and Utilization of Public funded IP Bill,<br />

imposes obligations & creates rights to optimize the potential of<br />

public funded R&D & it provides incentive to create IP and<br />

mechanism for its protection and utilization. The above bill<br />

encourages innovation in small and medium enterprises,<br />

promotes collaboration between Government, private enterprises<br />

and non-Government organizations & commercialization of IP<br />

created out of public funded R&D and the culture of innovation<br />

in the country.<br />

At present, government funded Universities &<br />

autonomous research Institutions cannot commercialize the fruits<br />

of their research. However, after the approval of above bill by the<br />

Government would alter the existing IP rules by allowing<br />

academic institutions, rather than the government, to patent<br />

publicly funded research and would reward institutions and<br />

inventors with a share of the royalties i.e. around 30% and<br />

licensing fees generated from the commercial products to the<br />

inventor and commercialization of the invention. This bill will<br />

enhance awareness of IP in universities, academic and research<br />

institutions. It will also increase the responsibility of universities,<br />

academic and research institutions to encourage students, faculty<br />

and scientists to innovate. Such innovations can be utilized for<br />

raising financial resources of these establishments, through<br />

royalties or income. The income from IP will promote selfreliance<br />

and will minimize dependence of universities, academic<br />

and research institutions and other recipient organizations for<br />

Government funding. This bill would allow government funded<br />

academic institutions to patent their inventions & it should result<br />

in greater interaction between Industry, Academia and<br />

Government.<br />

3.1 Significance of proposed Protection and Utilization of<br />

Public funded IP Bill to Industries & Academics<br />

The above bill facilitate commercialization of IP generated<br />

out of Government funded R&D<br />

Innovations in private sector as well as in universities,<br />

academic and research institutions that receive grants from<br />

Government will be encouraged & increase the innovation<br />

culture in the country<br />

Collaboration between Government, non-governmental<br />

organizations and private sector will be promoted.<br />

This bill mandate to constitute an IPM Committee within the<br />

organization within 180 days of the receipt of public fund<br />

This bill give guidelines to share IP of Government<br />

agencies, like Defense, Space etc for civilian application and<br />

such a development could immensely benefit the industry<br />

and the society.<br />

Dependence of universities, academic and research<br />

institutions and other recipient organizations for funding on<br />

the Government will be minimized as the bill provides for<br />

utilization of a portion of royalties or income, generated out<br />

of the public funded IP, for research and educational<br />

purposes. The Bill provides for the utilization of public<br />

funded IP and sharing of income or royalty earned between<br />

the IP Creator and the recipient. Not less than 30% of the<br />

income or royalty has to be given to IP creator due to which<br />

it will give rise to number of IP‟s (patents) & increase the<br />

flow of knowledge to industry.<br />

The bill will also encourage research institutions to<br />

establish their own technology licensing offices and to adopt<br />

their own policies on IPM and technology transfer.<br />

IV. SCOPE OF RESEARCH<br />

The focus of research will be on, academic<br />

institutions/university & industry cooperation such as academic<br />

exchange agreements / joint research work. Also on, to identify<br />

the communication gaps in academic & industries for technology<br />

sharing / mutual research etc. to avoid the duplication of research<br />

work. In India, IP awareness is very less. Many scientists, highly<br />

educated persons don‘t know about patents, hence there is urgent<br />

need to increase the awareness of IP in academic & industries. In<br />

India there are huge research potentials, talented persons but<br />

comparatively Indian patent filing is very less hence there is need<br />

to find out the gaps & to identify the problems in academic &<br />

industries for filing IP‘s / Patents.<br />

V. METHODOLOGY & ANALYSIS OF<br />

COLLABORATION OF INDUSTRIES &<br />

ACADEMICS<br />

The expertise of central originations like<br />

CSIR/NRDC/TIFAC /NIIPM etc. to be made available for<br />

technology transfer to university/ Institutes & Industry for<br />

avoiding the risk of duplication of R&D and providing assistance<br />

during development of new products. Universities/Institutes &<br />

Industries collaborate with each other to promote the use of<br />

university research & sharing the data mutually.<br />

Hence, infrastructure shall be provided to University/<br />

academic Institutes for utilization of Patent Information.<br />

Secondly, link IP cell, technology transfer department, Patent<br />

Information, R&D etc. to academic Institutes & Industry. It is<br />

necessary to provide technical problem & information for<br />

research by industries to University/academic Institutes & carry<br />

out research on that & identifying solutions to technical problem<br />

from the universities / Institutions. Thereafter patenting the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 313<br />

ISSN 2250-3153<br />

inventions & prepare the agreements on technology transfer.<br />

After that, IP enforcement by licensing & publicly disclose will<br />

ideally avoid the duplication of research.<br />

IP is never given much importance in India, but after<br />

1995 i.e. end of GATT & 2005 (India signed international<br />

agreement like TRIPS / WTO, PCT / WIPO etc & allowed<br />

pharma product Patents after 2005, there is need in institutions &<br />

Industries to create an independent ―IP cell‖ to protect their IP‘s<br />

and increase IP awareness culture in organization. Effective IPM<br />

can allow research institutions to use their own research to<br />

benefit the public at large and to enter into public-private<br />

partnerships. With the joint research consignments to work<br />

together the benefits for Industries resulting from the universities<br />

/ academic institute are, availability of the extensive network of<br />

University / Academic Institutes , availability of University/<br />

Academic Institutes officials, network and knowledge for<br />

technological support.<br />

VI. STATISTICS<br />

Table 1: Filing of IP in last 5-6 years* in India:<br />

Patents<br />

applicati<br />

on<br />

received<br />

Designs<br />

applicati<br />

on<br />

received<br />

TM<br />

applicati<br />

on<br />

received<br />

GI<br />

applicati<br />

on<br />

received<br />

2004-05 17466 4017 78996 29<br />

2005-06 24505 4949 85699 16<br />

2006-07 28940 5521 103419 33<br />

2007-08 35218 6402 123514 37<br />

2008-09 36812 6557 140172 44<br />

2009-10 34287 6092 141943 40<br />

Table 2: Comparison of Patent filing in year 2008-09 by<br />

Indian Industries *<br />

Indian Industries No of patent filed<br />

Samsung India 205<br />

Council of scientific & 165<br />

Indusial Research<br />

Dr Reddy‘s Laboratories 147<br />

BHEL 119<br />

Rainbaxy Laboratories 101<br />

Infosys Technologies 81<br />

Avesthagen Ltd. 66<br />

Tata steel 65<br />

Cadila Healthcare Ltd. 57<br />

Matrix Laboratories Ltd. 54<br />

*Source from IPO website<br />

Table 3- Comparison of Patent filing in year 2008-09 by<br />

Indian Academics*<br />

Indian Academic university / No of patent<br />

Institutes<br />

filed<br />

Indian Institute of Technology 91<br />

Amity university 33<br />

Indian Institute of Science 21<br />

Central Institute for Research on<br />

cotton<br />

12<br />

National Institute of 8<br />

Pharmaceutical<br />

Research<br />

Education &<br />

National<br />

Immunology<br />

Institute of 7<br />

University of Delhi 7<br />

Table 4: Comparison of Patent filing in year 2009-10 by<br />

Indian Scientific & Research Development organizations *<br />

Scientific & Research Development No of patent<br />

organizations<br />

filed<br />

CSIR 162<br />

Defense Research & Development<br />

organization<br />

80<br />

ICAR 55<br />

Indian Space Research Origination 17<br />

Central Institute of Fishery 13<br />

Technology<br />

National Institute of Pharmaceutical<br />

Education & research<br />

10<br />

Centre for Development of Advance<br />

computing<br />

07<br />

National Institute of Immunology 07<br />

Indian Council of Medical Research 06<br />

SAMEER 06<br />

Table 5: Comparison of Patent filing in year 2009-10 by<br />

Institutes, Academics/university*<br />

Indian Academic Institutes / No of<br />

university<br />

patent filed<br />

Indian Institute of Technology 109<br />

Amity university 81<br />

Indian Institute of Science 45<br />

Serum Institute of India Limited 12<br />

The Energy & Resource institute 07<br />

Institute of Life Sciences 06<br />

Dalmia Institute of Scientific &<br />

industrial Research<br />

04<br />

Jadavpur University 04<br />

Krishna<br />

Science<br />

Institute of Medical 04<br />

Manipal Institute of Technology 04<br />

From the above tables it is observed that, due to<br />

collaborations between university-PRO there is increase in trend<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 314<br />

ISSN 2250-3153<br />

in obtaining the IP, also there is increase in Patent filing after<br />

2005. It is expected that the joint collaboration programs on IP<br />

amongst PRO & university will not only avoid duplication of<br />

research activities and wastage of time, resources but also will<br />

have a strong & enhanced IP regime. Hence there is need to<br />

manage these IP efficiently, so that technology will be fruitful &<br />

there will be effective use of academic research work for<br />

industries and duplication of research can be avoided. Hence IP<br />

management plays vital role in industries and academics & thus<br />

Collaboration between Government, non-governmental<br />

organizations and private sector, academic institutes, university<br />

shall be promoted.<br />

share<br />

0.04<br />

0.035<br />

0.03<br />

0.025<br />

0.02<br />

0.015<br />

0.01<br />

0.005<br />

0<br />

US research univ. patents % of all domestic-assignee US patents, 1963 - 99<br />

year<br />

Figure 1 - Internationally Patents granted to Research<br />

Institutions<br />

US research university patenting before & after passage of<br />

Bayh-Dole Act in 1980- 1999<br />

Figure 2 -Effects of Japanese Bayh-Dole Act passed in 1999<br />

Patents granted to Research Institutions<br />

As per the Figure 1 & 2 it is observed that in<br />

international scenario like USA, Japan after there is collaboration<br />

between the Academic & industries & Bayh-Dole Act came into<br />

force, and thus Patent filing has sharply increased.<br />

Figure 3- Percentage share of University & PRO Patenting<br />

1980 to 2010<br />

Figure 4- Percentage sharer of University & PRO Patenting<br />

in China & India in 2011<br />

As per figure 3, it is observed that there was increased<br />

in the percentage of share of total PCT application filed by<br />

University & PRO Patenting from 1980 to 2010. Thus<br />

university& PRO collaboration increased the Patent filing.<br />

As per figure 4, there was increase in university and<br />

PRO filings of the total patents obtained by Indian assignees<br />

during 2011, about 22% patents were jointly owned by industry,<br />

university or government sectors. Thus now a day‘s universities<br />

and PROs have also experienced growth in licensing revenue by<br />

way of mutual agreements.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 315<br />

ISSN 2250-3153<br />

VII. FINDINGS & CONCLUSION<br />

This study discusses the opportunities and challenges offered<br />

by IP to foster technology transfer from government funded<br />

research institutions. It is observed that from various originations<br />

that, there are strong scientific capabilities but there is no<br />

adequate Academic/university-Industry collaboration. There is a<br />

weak industry science linkage in the country hence, there is need<br />

to develop internal IP management capabilities, the formulation<br />

of comprehensive national IP policies, strengthening their IP<br />

court systems and IP offices, enforcement mechanisms, etc. The<br />

interactions shall be take place by the licensing of patents, R&D<br />

collaboration, scientific publishing & participation of<br />

conferences etc.<br />

In India, IP awareness is very low hence IP culture is<br />

required to an enabling environment. Many scientists, highly<br />

skilled & technocrats educated persons don‘t know about patents.<br />

Hence there is urgent need to increase the awareness of IP in<br />

academic & industries. Further basic IP education can be<br />

provided at school level and undergraduate level and form<br />

uniform IP course structure in India & increase the IP resources.<br />

Many universities do not having technology transfer policy, IP<br />

cell /department etc., guidelines for managing technology<br />

transfer activities. Hence there is need to allow academic<br />

institutions, rather than the government body, to patent publicly<br />

funded research and would reward institutions and inventors with<br />

a share of the royalties i.e. around 30% and licensing fees<br />

generated from the commercial products to the inventor and<br />

commercialization of the invention. Technology transfer offices<br />

between the university & Industry and mechanisms to enhance<br />

technology commercialization are required with financial support<br />

for which IP bill shall be approved by the Government. Further,<br />

it is highlighted that there may be special fee reduction for the<br />

university or students to boost the research activity.<br />

There are several difficulties the universities face in the<br />

implementation of patenting and patented technology<br />

commercialization. They do not have operative guidelines about<br />

disclosure and patenting. Increasing autonomy of institutions,<br />

decentralizing recruiting, providing performance based<br />

incentives and acknowledging technology transfer activities in<br />

researchers‘ career is essential. There is a need to redraft the<br />

university regulations on IP. Performance incentives for<br />

researches are needed for balancing entrepreneurial activity and<br />

scientific achievements.<br />

Patent plays an important role in fostering technology<br />

transfer as countries develop their research capabilities.<br />

Technology transfer by patent licensing, collaboration can entail<br />

cross-fertilization between academics and industry, synergies in<br />

research and new ideas for science, avoiding wasteful duplication<br />

of efforts, and create employment and new market opportunities<br />

for firms. Hence there is a need to have substantial private<br />

investment in developing such a strategy.<br />

ABBREVIATIONS<br />

IPO Intellectual Property office<br />

IP Intellectual Property<br />

IPM Intellectual Property Management<br />

TM Trademark<br />

GI Geographical Indications<br />

UN United Nation<br />

WIPO World Intellectual Property organization,<br />

WTO World Trade Organization<br />

TRIPS Trade Related Aspect of Intellectual Property Rights<br />

GATT General Agreement on Tariffs and Trade<br />

S&T Science & Technology<br />

NIIPM National Institute for Intellectual Property Management<br />

PRO Public research organizations<br />

PCT Patent Cooperation Treaty<br />

REFERENCE<br />

Internet sites:<br />

1. www.ipidnia.nic.in<br />

2. www.google.com<br />

3. www.indianpatents.org.in<br />

4. http://spicyipindia.blogspot.com<br />

5. www.wipo.int<br />

6. http://www.wipo.int/academy/en/<br />

7. http://en.wikipedia.org/<br />

Books & Publications:<br />

1. Patents, TrdeMarks, Copy Right Designs & Geographical Indications<br />

– B.L.Wadera<br />

2. Intellectual Property Law in India - P.S.Narayana<br />

3. WIPO Guide to Intellectual Property Worldwide<br />

4. WIPO Intellectual Property Handbook<br />

5. Indian patent office - Manual of Patent Practice & procedure<br />

6. NIIPM/ IPO, India training<br />

7. IPO, India - Annual report<br />

8. Original Bayh-Dole Bill<br />

9. Gearing Up For Patents - The Indian Scenario –<br />

Dr Prabuddha Ganguli<br />

10. Proposed Protection and Utilization of Public Funded IP Bill<br />

Presentation<br />

This paper is accepted by World Academic Industry Research<br />

Collaboration Organization (WAIRCO) & it will be presented by<br />

the Author in the International Conference on Engineering,<br />

Technology and Management - ICETM at September <strong>2012</strong> at<br />

Tirupati, India. The details are available at<br />

http://www.worldairco.org/ICETM%20Sep%20<strong>2012</strong>/Manageme<br />

nt.html<br />

AUTHORS<br />

First Author<br />

Pankaj Prabhakar Borkar ,<br />

Assistant Controller of Patent & Designs<br />

Patent Office, Mumbai, India pankajnagpur@rediffmail.com<br />

Second Author<br />

Dr. Ashutosh A. Paturkar ,<br />

Professor, Dr Ambedkar Institute of Management Studies &<br />

Research, Nagpur, India ashutosh_paturkar@rediffmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 316<br />

ISSN 2250-3153<br />

Prequalification Science Practical Activities for the<br />

Production of Effective Science Teachers: a Strategy for<br />

Sustainable National Development<br />

Jamil Mikhail Y.<br />

School of Educational Studies, Universiti Sains Malaysia, 11800 Pulau, Penang, Malaysia.<br />

Abstract- The future of science teaching is a function of the<br />

number of prequalified candidates willing to take science<br />

education at the tertiary level. This research was aimed at finding<br />

science practical activities as a motivating factor in simplifying<br />

science subjects, making the study of science harder as well as<br />

developing prequalified students‘ interest in becoming science<br />

teachers. Out of nearly 800 students in final year in Government<br />

Science Secondary Schools Bama, and Gombe, respectively in<br />

Borno and Gombe States, 400 hundred students were randomly<br />

selected as representative sample. Four research questions were<br />

answered using Prequalified Students Interest Questionnaire<br />

(PSIQ) as an instrument for data collection and simple<br />

percentage in analysis. The results showed that half of the<br />

responded agreed that they have been doing practical from junior<br />

secondary school and most of them agreed to doing it in the<br />

senior class. It was also found out that science practical activities<br />

makes understanding of the science subject simpler and<br />

candidates study harder the subject they prefer its practical most.<br />

Besides, it was discovered among others that practical activities<br />

have motivated one third of the respondents to take science<br />

education at higher institutions and become science teachers.<br />

Hence, it was concluded that the future of science teaching is<br />

bright.<br />

Index Terms- science practical, science teachers<br />

W<br />

I. INTRODUCTION<br />

hat cannot be over emphasised in national development is<br />

the role science can play. Myriad publications and<br />

speeches by distinguished authorities and great personalities<br />

indicated the importance of science in national development. In<br />

fact, no country can record any meaningful development without<br />

science playing the most important role. Therefore, it is not<br />

surprising if the then Head of State, General Gowon, said in an<br />

opening address of STAN conference, as far back as 1968, that<br />

no country can either survive or develop without due emphasis<br />

given to science and technology. Any country and its policy<br />

makers that decide to overlook this significant truism will never<br />

achieve any meaningful development and shall continue to spend<br />

much of its resources in the importation of products from<br />

developed countries (Neil, Adam and John, 2010; Ali, 2009;<br />

Bajah, 1982). To this end Rashidwan, (2009) and Akinmade,<br />

(1985) contended that the emphasis accorded science in the<br />

contemporary world seems very appropriate as ours in an age<br />

where science and technology are part and parcel of the world‘s<br />

culture. It is obvious that nowadays no one doubts the<br />

significance of science and technology for sustainable national<br />

development.<br />

The issue now at stake is how effective is science teaching at<br />

all levels of our education which is the most fundamental aspect<br />

of the future of science in Nigeria. Science, being an activity<br />

based subject, needs practical activities regularly at all level of<br />

education for the effective and efficient achievement of the goals<br />

of science and science education as outlined clearly in the<br />

National Policy on Education (NPE, 2004) in section 7,<br />

subsection 39 (a) and (b) as follows:<br />

a- Emphasis shall be given to the teaching and learning of<br />

science process and principles. This would lead to<br />

fundamental and applied research in the sciences at all<br />

level of Education.<br />

b- The goals of Science education shall be to:<br />

i. Cultivate inquiring, knowing and rational mind<br />

for the conduct of good life and democracy.<br />

ii. Produce scientists for national development.<br />

iii. Service studies in technology and the cause of<br />

technological development.<br />

iv. Provide knowledge and understanding of the<br />

complexity of the physical world, the forms<br />

and the conduct of life.<br />

These are indeed the goals of Science education as far as the<br />

Federal Government of Nigeria is concerned. However, in order<br />

to show that it is not oblivious of the significance of effective<br />

teaching and learning of science, it further stated its position<br />

again in subsection 39 (c) through (d) of the NPE (2004) thus:<br />

c- Special provision and incentives shall be made for the<br />

study of sciences at all levels of the national Education<br />

system. For this purpose, the government shall<br />

adequately support the functions of all agencies<br />

involved in the promotion of the study of sciences.<br />

d- Government shall popularise the study of sciences and<br />

the production of adequate number of scientists to<br />

inspire and support national development.<br />

Therefore, there must be a proper way and techniques for<br />

Science teaching at all levels of the Nigerian Education system in<br />

order to achieve the above stated goals. There is the need for<br />

competent Science Teachers who shall undergo training in<br />

university Faculties of Education, Colleges of Education and<br />

schools of Education in Mono/Polytechnics. These science<br />

teachers are responsible for making the scientists needed in such<br />

disciplines as medical sciences, engineering technology,<br />

communication technology, space sciences, mining technology<br />

and many more but to mention a few. All these are determinants<br />

of national development and the strength of any nation economy.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 317<br />

ISSN 2250-3153<br />

II. STATEMENT OF THE PROBLEM<br />

Nevertheless, science, being an activity based subject,<br />

effective teaching and learning cannot be feasible unless enriched<br />

with practical activities. Practical Activities must occupy greater<br />

part of the time allocated to science subjects than the chalk and<br />

talk method of teaching of the theoretical aspects. However,<br />

some schools and Science Teachers seem to abuse this<br />

fundamental aspect of teaching and learning sciences at our<br />

secondary schools despite the fact that the Science Teachers<br />

themselves know best the significance of practical activities in<br />

effective teaching and learning. To this end, what is the future of<br />

science education in Nigeria? What percentage of Nigerian<br />

prequalified candidates are willing to take science teaching as a<br />

career in future? All these and other unanswered question<br />

informed the need to carry out such a study.<br />

III. PURPOSE OF THE STUDY<br />

This research is purposely aimed at finding out whether the<br />

science practical activities are regularly carried out in Nigerian<br />

secondary schools. Moreover, it is also to find out whether or not<br />

the students have developed interest in studying sciences harder<br />

because of the science practical activities they are involved in<br />

and whether or not the science practical activities have made the<br />

study and understanding of sciences simpler. Finally, it is also to<br />

examine whether the science practical activities have motivated<br />

students to study sciences at tertiary institutions with emphasis to<br />

Science Education so that there is going to be a boost in the<br />

production of highly qualified and competent science teachers<br />

who can help in actualising the goals of the NPE (2004).<br />

IV. RESEARCH QUESTIONS<br />

To guide the conduct of this study with clear direction and or<br />

focus, the following four (4) research questions are going to be<br />

answered:<br />

1. Are science practical activities regularly being carried<br />

out in secondary schools for teaching and learning<br />

sciences?<br />

2. Have the science practical activities developed students‘<br />

willingness to study sciences harder?<br />

3. Have the science practical activities made the study and<br />

understanding of sciences simpler?<br />

4. Have the science practical activities motivated students<br />

to take science education at tertiary institutions and<br />

become qualified Science Teachers?<br />

V. METHODOLOGY<br />

Based on survey research design, the study investigated Senior<br />

Secondary III (SS III) students of Government Science<br />

Secondary schools Gombe and Bama in Gombe and Borno states<br />

respectively. The rationale behind the selection of this category<br />

of students is because at the moment they have undergone<br />

several science practical activities from Junior Secondary classes<br />

in Integrated Science and in SS I-III science classes. Any student<br />

outside this specification is out of the scope of this study. Four<br />

hundred (400) students were randomly selected from the senior<br />

classes (SS III) of the schools totalling close to 800. Due to time<br />

constraints as well as inability to use all the students, this number<br />

of students (50%) was simply selected randomly as<br />

representative sample of the population from which data were<br />

collected. Data were collected in November 2009 at Bama,<br />

Borno state and November 2011 at Gombe, Gombe state.<br />

A Prequalified Students Interest Questionnaire (PSIQ) was<br />

used in data collection which comprises of sections ‗A‘<br />

(Demographic data) and ‗B‘ the ten item questions. The<br />

questionnaire was subjected to experts in educational research:<br />

one Chief Lecturer and one Academic Doctor. All their<br />

observations, corrections and comments were taken into<br />

consideration and corrections made to that effect. The<br />

questionnaire was pilot tested on some 40 students of the target<br />

schools who were not part of the study sample. The questionnaire<br />

administration was successful with the permission of the school<br />

authorities. With the kind assistance of the schools‘ staff, the<br />

questionnaires were distributed to the students and 100%<br />

returned in few hours after responding to the items.<br />

VI. DISCUSSIONS<br />

Demographically, all respondents are males (table 1) and 50%<br />

are from Gombe, Gombe state and the other half from Bama,<br />

Borno state. They are all in SS III and so in their final year. They<br />

are youths in the age range of ≤ 19 years (80%) and ≥ 20 years<br />

(20%).<br />

Figure 1 indicates responses of the students on the<br />

performance of science practical activities in junior and senior<br />

secondary schools. While they positively agreed to doing it in<br />

senior classes (95%), the result proved otherwise in junior classes<br />

because more than half (52%) posted a negative response. This<br />

may not be unconnected with the reluctance of the teachers at the<br />

junior secondary level. In fact some of the teachers teaching<br />

science at such level are not even qualified science teachers<br />

(Abdullahi, 2010; Babatunde & Ali, 2009; Gombe SUBEB<br />

2011). It is just a mere feeling that it is only Integrated Science<br />

and so can be taught by any teacher.<br />

In the second figure, respondents have shown a greater<br />

positive response to interest and enjoyment of practical activities<br />

in sciences (88% and 74% respectively). This is true of scientific<br />

discovery of facts and involvement of learners in teaching and<br />

learning process. At any level of teaching and learning, learners<br />

enjoy all aspects that call for their active participation and also at<br />

the same time arrest their interest and readiness to the activities<br />

making them active rather than passive learners. Active<br />

participation and manipulation of apparatus or instructional<br />

materials help to a greater extent in illustrating and reinforcing a<br />

skill, fact or idea and relieve anxiety, fears or boredom since<br />

many teaching aids are like games (SIL international, 1999).<br />

Practical activities make learning more real than abstract, more<br />

enjoyable than boring and above all skills, ideas, knowledge and<br />

attitudes are easily acquired and readily put into practice. Hence,<br />

it is not surprising if the learners well responded positively to the<br />

questions that seek their opinion on the simplicity of the subject<br />

they enjoy its practical most and the tendency to study that<br />

subject harder. This is because 88% agreed that the subject they<br />

prefer is simpler and similarly 89% agreed that they study that<br />

subject harder (figures 3 and 4). Also on the preference of the<br />

subjects, 42% prefer Biology Practical most, 43% Chemistry<br />

practical and only 10% prefer Physics‘ while only 5% go for<br />

other subjects or are undecided (figure 3). Therefore, according<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 318<br />

ISSN 2250-3153<br />

to the findings of this study, science practical activities<br />

encourages students to study science harder, which translates in<br />

to the simplicity of the subjects to them attesting to the<br />

significance of science practical activities. This is in consistence<br />

with the findings of Shaibu and Usman (2001) who revealed that<br />

high positive relationship existed between students‘ performance<br />

in practical activities and their academic achievement in<br />

integrated science but contrary to what Babayi, (2005) asserted<br />

that most students perceived laboratory activities as compulsory<br />

for passing examination not for effective meaningful learning.<br />

Also in figure 4, 69% of the respondents indicated that they do<br />

not want to study science and become science teachers while<br />

29% agreed to take teaching science as a career with 2%<br />

undecided. Also in figure 5, more than half of the respondents<br />

(63%) agreed that despite the interesting nature of science<br />

practical activities, they do not wish to be science teachers but<br />

one third (33%) positively responded to taking teaching science<br />

as a career because of the practical involved in it. However,<br />

going by professional preference (figure 5), close to one third<br />

(29%) agreed that because of the practical involved, they want to<br />

study science so that they can become Engineers, more than half<br />

(55%) go for medical sciences as Doctors or Nurses (may be<br />

because of the attractive welfare being enjoyed there). Only very<br />

few (4%) prefer to be Laboratory technicians with one tenth<br />

(10%) for Architecture and the least (2%) decided other<br />

professions which were not specified. However, according to the<br />

results, it is encouraging to have one third of the respondents<br />

wishing to be science teachers. This showed that if practical<br />

activities are being carried out regularly in secondary schools,<br />

students‘ interest would be captured, they will study science<br />

harder and science education has a brighter future since a<br />

considerable percentage is willing to take science teaching as<br />

their profession because of the practical involved in it.<br />

VII. CONCLUSION<br />

The research questions that guided the conduct of this study on<br />

prequalified students were fully addressed. Results showed that<br />

teachers in junior secondary schools are not performing science<br />

practical activities as in the senior secondary school classes as<br />

found out from the results. The result showed that learners enjoy<br />

practical activities and as a result found the subject they prefer its<br />

practical most simpler and are at the same time pay more<br />

attention in studying the subject harder. Besides, despite interest<br />

and enjoyment of practical activities, most of the prequalified<br />

students do not aspire to be science teachers although those who<br />

willingly showed interest in science teaching because of the<br />

practical involve therein is encouraging. That is to say that the<br />

future of science teaching is ensured according to the findings.<br />

REFERENCES<br />

[1] Abdullahi, S. D. (2010). Practical activities and learners achievement<br />

in Integrated Science. Multidisciplinary Journal of Education. (10) 2.<br />

[2] Akinmade C.T.O. (1985). The National Policy on Education and the<br />

development of scientific and reflective thinking in primary school.<br />

Journal of Science Teachers Association of Nigeria. (23) 1&2, p 77-<br />

8.<br />

[3] Ali, M. T. (2009). The contribution of science in national<br />

development. Bangalore: Prime Press Ltd.<br />

[4] Babatunde, O. K. & Ali, P. W. (2009). Science practical for students<br />

learning. Accessed on December 20th, 2011, from:<br />

www.educscience_mtx12glm/dfedj<br />

[5] Babayi, A. A. (2005). The relationship between secondary school<br />

students attitudes towards laboratory practical and their academic<br />

achievement in chemistry. The Jos Journal of Education (7) 2: 46-51.<br />

[6] Bajah, S. T. (1982). Two decades of primary science in Nigeria. A<br />

critical evaluation. 23rd annual conference of Science Teachers<br />

Association of Nigeria. Paper presentation. August 22-28, 1982.<br />

[7] Gowon, Y. (1968). Opening address of the Head of State. Annual<br />

conference of Science Teachers Association of Nigeria. Journal of<br />

Science Teachers Association of Nigeria. Vol. 7 (3).<br />

[8] Neil, A. R., Adam, S. John, P. W. (2010). The significance of<br />

science and Technology. Human development perspective. Accessed<br />

on September 28th, 2011, from:<br />

http://www.sc/tech_human_dev_edu.html<br />

[9] Rashidwan, K. (2009). Technology in the contemporary world.<br />

Accessed on<br />

[10] September 28th, 2011, from:<br />

www.worldtechnology/issues.879tptht.htm<br />

[11] Shaibu, A. A. and Usman, I. A. (2001). The relationship between<br />

students‘ performance in practical activities and their academic<br />

achievement in Integrated Science using the Nigeria Integrated<br />

Science Teacher Education Project (NISTEP) mode of teaching. The<br />

Jos Journal of Education. 6 (1) 17-21<br />

[12] SIL International, (1999). The definition of evaluation. Accessed on<br />

October 25th, 2007 From:<br />

www.sil.org/lingualinks/literacy/ReferenceMaterials/GlossaryTerms.<br />

[13] The Federal Government of Nigeria, (2004). The National Policy on<br />

education (2004 edition). Abuja: Federal Government Press.<br />

APPENDICES<br />

Appendix 1 Prequalified Students’ Interest Questionnaire<br />

(PSIQ)<br />

Introduction - Please this questionnaire is designed to seek your<br />

opinion about science practical activities you have been<br />

performing since your JSS classes and in all science subjects you<br />

are currently offering. Your opinion is going to be of great<br />

contribution to the education sector and be sure that it is going to<br />

be used only for this research.<br />

Section A<br />

Personal Data<br />

School……………………………………………………………<br />

………<br />

Sex Male ( ) Female ( )<br />

Class………………………………………………………………<br />

………..<br />

Section B<br />

Instruction: tick as appropriate please after carefully having<br />

read the questions.<br />

(1) Do you performed practical in your Integrated<br />

Science in JSS class? (Yes) (No)<br />

(2) From your SS I to SS III do you perform practical<br />

activities in science subjects? (Yes) (No)<br />

(3) Do you enjoy the practical activities? (Yes)<br />

(No)<br />

(4) Apart from enjoying the practical are you interested<br />

in doing the practical activities regularly? (Yes)<br />

(No)<br />

(5) Which science subject do you enjoy its practical<br />

most?<br />

(Physics) (Chemistry) (Biology) (Others)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 319<br />

ISSN 2250-3153<br />

Appendix 2<br />

(6) Do you study the subject harder? (Yes) (No)<br />

(7) Has the subject proved simpler than other subjects?<br />

(Yes) (No)<br />

(8) Would you like to be a science teacher because you<br />

enjoy practical? (Yes) (No)<br />

(9) I enjoy practical but I do not wish to be a science<br />

teacher? (Yes) (No)<br />

(10) I enjoy practical and wish to be a scientist like:<br />

Table 1: Demographic features of the sample<br />

Figure 1: Performance of Practical Activities in JSS and SSS<br />

Classes (n = 400)<br />

Figure 2: Interest and enjoyment of practical activities (n = 400)<br />

Figure 3: Subject preference and simplicity of the subject<br />

preferred (n = 400)<br />

Figure 4: Harder study of preferred subject and interest in<br />

teaching science (n = 400)<br />

Figure 5: Profession preference (n = 400)<br />

AUTHORS<br />

Jamil Mikhail Y., School of Educational Studies, Universiti<br />

Sains Malaysia, 11800 Pulau, Penang, Malaysia.<br />

Email id - jamilgombe@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 320<br />

ISSN 2250-3153<br />

Education: A Solution to the Contemporary Challenges<br />

of a Common Woman in a typical Hausa-Fulani<br />

Dominated Society in Nigeria<br />

Jamil Mikhail Y<br />

School of Educational Studies, Universiti Sains Malaysia, 11800 Pulau Penang, Malaysia<br />

Abstract- The common woman of a typical Hausa-Fulani<br />

society in Northern Nigeria faces problems similar to what is<br />

obtainable in the dark ages of centuries ago. Many women were<br />

denied some of the legal and political rights accorded men. The<br />

paper review the challenges faced by the women in the said<br />

society namely: maturity, married life and education. A highlight<br />

was made on how these became a challenge to the common<br />

woman and conclusively singled out education which is a right as<br />

the way out.<br />

Index Terms- Education, common woman, Hausa-Fulani<br />

N<br />

I. BACKGROUND<br />

igeria, a multicultural, multi-ethnic and multi-religious most<br />

popular black nation of the world has women in very<br />

significant positions of every body‘s life. Until the end of the<br />

second half of the 20 th century, women in almost all localities of<br />

the nation were denied some of the legal and political rights<br />

accorded men. Throughout much of the history of Nigeria, deepseated<br />

cultural, traditional or religious beliefs allowed women<br />

only limited roles in the society chief among which are child<br />

bearing and homemaking rather than involvement in the public<br />

life of business or politics. Many societies agreed that women are<br />

best suited for the above mentioned. Some even wrongfully<br />

believe in the intellectual inferiority of women to men and thence<br />

women education is limited to domestic skills of homemaking. If<br />

this is not the case, then why men controlled most positions of<br />

employment and power/leadership in the Nigerian Society?<br />

Unfortunately, until the middle of 20 th century, this denial of<br />

equal rights to women met infinitesimal or no protests to draw<br />

the attention of most people. This prompted women, for quite a<br />

very long time, to accept their inferior status as the only option<br />

since they lacked the educational and economic resources that<br />

would enable them opportunity to challenge the prevailing social<br />

order.<br />

Fortunately, towards the end of the 20 th century, there<br />

emerged organized efforts by women to achieve greater rights,<br />

which gave birth to some women organization such as: Women<br />

Rights Advancement and Protection Agency (WRAPA);<br />

National Agency for the Prohibition of Traffic in Persons<br />

(NAPTIP); Women Trafficking and Child Labour Eradication<br />

Fund (WOTCLEF). There is also National Council for Women<br />

Societies (NCWS) and the Federation of Muslim Women<br />

Associations of Nigeria (FOMWAN) etc. The education sector<br />

has not stayed aloof, hence the emergence of Women in Colleges<br />

of Education (WICE) in all the Federal and State Colleges of<br />

Education. One of the activities of such an intellectual women<br />

organization is sensitizing the entire Nigerian Society the value<br />

of women through publications, seminars, and conferences. To<br />

contribute to the success of this noble objective prompted the<br />

need to write this paper to compliment the efforts of all women<br />

in Nigeria by exposing the challenges a common woman in our<br />

society.<br />

II. WHO IS A WOMAN?<br />

Simply put, a woman is a female adult of human being. A<br />

woman can always take the position of a wife, girlfriend, mother<br />

and grandmother. Whichever one is called or referred, what<br />

comes to our mind is certainly a woman must be that wife, must<br />

be that mother and so on. Nevertheless, what does it take to be a<br />

wife? What does it take to be a girlfriend, mother etc? All wives<br />

are women but not all women are wives! All mothers,<br />

grandmother and girlfriends are women but not all women are<br />

mothers and so on. One major aspect worthy of understanding<br />

here is that what are the functions or activities and qualities that<br />

qualify a woman to be referred to as a girlfriend, wife, mother<br />

and grandmother. Certainly, it can be unanimously agreed that<br />

there are certain tedious functions and activities that needs extra<br />

carefulness, cautions, concentration, time, dedication, honesty<br />

and transparency for every woman before she can be qualified as<br />

a girlfriend, wife, mother and so on.<br />

However, common woman in discharging her duties, as a<br />

wife etc is prone to so many challenges because of the current<br />

notion of her status in the society. Despite the fact that there is<br />

need for her exposure to religious and western education for a<br />

more efficient and effective discharge of such duties, concerned<br />

people and societies turned deaf ears and blind eyes to the<br />

challenges facing such a woman today. Although some of the<br />

challenges, as they are made to be believed, has to do with the<br />

protection of the society‘s (or family‘s) integrity and prestige.<br />

III. WHAT ARE THESE CONTEMPORARY CHALLENGES?<br />

Maturity<br />

Maturity is a biological state or quality of being fully-grown<br />

or developed. It is a state of adulthood after attaining the legal<br />

age. This resulted in to some physical changes of the female‘s<br />

body among which are the emergence of pubic and bodily hair,<br />

enlarged breast and broader hips. This stage of woman life is a<br />

very complex one because she faces many problems ranging<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 321<br />

ISSN 2250-3153<br />

from those within her family and other people outside including<br />

her friends, males and elders of the immediate society. However,<br />

her ability to tackle or solve such complex problems is a function<br />

of her accumulated learning and education (Jones and Mayer,<br />

Type of<br />

problem<br />

Family<br />

Her<br />

friends<br />

Boyfriends<br />

Married<br />

life<br />

2006). The problems, their complexity, description and what is<br />

needed to support her in solving them has been tabulated below:<br />

Table 1: showing a common woman’s problem at maturity and solutions<br />

DEGREE<br />

DESCRIPTION<br />

All members of the family superior to her keep<br />

OF<br />

COMPLEX<br />

ITY<br />

SUGGESTED SOLUTION<br />

an eye on her.<br />

Low<br />

She needs proper education to<br />

understand herself and others so<br />

Purpose: To protect her integrity and the<br />

that she can comply with all<br />

family‘s<br />

rules.<br />

Whether good or bad she may adopt some of<br />

their behaviours, activities and they can<br />

influence her much more than any body<br />

Purpose: To suit their friendship.<br />

Befriend her to find love. Some times there may<br />

be threat from some guys if she tries to resist<br />

Purpose: To marry her or to satisfy their lust<br />

Satisfying husband‘s lusts, children upbringing,<br />

domestic chores, husband‘s family interference<br />

etc<br />

From the above table, it is clearly shown that in all the problems<br />

a matured girl is bound to face, education and accumulated<br />

learning are very important for tackling and or solving them.<br />

This means that every woman needs good education and<br />

counselling so that she can better understand the problem and its<br />

degree of complexity, and subsequently design her own measures<br />

to overcome them. Yet, education itself is today a challenge to<br />

common woman, as can be seen shortly, despite the fact that<br />

there are efforts to make it free and compulsory by government<br />

of the federation. Her proximity to university has nothing to do<br />

with her continuing education.<br />

Very high<br />

Extremely<br />

high<br />

Very high<br />

Same as above<br />

Need proper education &<br />

counseling for choosing who to<br />

befriend, indulge in love affairs<br />

or not and subsequently marry to<br />

be husband & wife.<br />

Needs good education, active<br />

employment and good income<br />

here is highly recommended<br />

Education<br />

This is one of the most important challenges of a<br />

common woman today. Although as many girls as possible are<br />

attending school in the society, their parents are not willing to<br />

send them to the University after secondary education. The<br />

following is an extract from the results of face-to-face interview<br />

administered to twenty (20) school attending girls between the<br />

ages 16 and 18 in September 2011 to January <strong>2012</strong> from one<br />

school in Gombe metropolitan:<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 322<br />

ISSN 2250-3153<br />

Table 2: Responses of 20 school attending girls to oral interview in Gombe in September 2011 (n = 20).<br />

S/No<br />

1<br />

2<br />

3<br />

4<br />

5<br />

Questions<br />

Do you wish to gain<br />

admission a university<br />

some day?<br />

Are you sure, your parents<br />

will allow you?<br />

Do you wish to be<br />

employed?<br />

Are you sure of having it<br />

(i.e. the employment)?<br />

Can your parents listen to<br />

your plea?<br />

The above table was extracted from an unpublished<br />

document of a research on women empowerment advocacy. It<br />

indicated that out of the 20 girls playfully interviewed, all of<br />

them wish to continue their education to the University but none<br />

is sure of continuing. Of the reasons given by these girls among<br />

others are: they are going to be given out for marriage; their<br />

families would not allow it for fear of losing the family‘s prestige<br />

in case the girl join bad friends; that girls at such liberty could no<br />

longer be controlled by anybody.<br />

When they were asked whether their parents can listen and<br />

reason with them, only very few (20%) agreed that their parents<br />

can do that and out of these few some confessed that even when<br />

the parents hear their pleas, they would not agree and this is<br />

generally, as confessed, associated to ignorance or religious faith.<br />

However, very little could be done here because there is very<br />

limited or no amount of influence that can convince and change<br />

the minds of such parents especially in this part of Nigeria, the<br />

North.<br />

One important thing that all should remember is we cannot<br />

run away from accepting the fact that education is a right of<br />

every Nigerian child, girls inclusive. However, there is a flagrant<br />

denial of this right as shown in the table above. The main reason<br />

ranges from social to economic. The former has to do with the<br />

fear of the girl‘s interaction with different people who can<br />

influence her to be stubborn and not ready to listen to her elders.<br />

The latter being the economic status of the family where the<br />

males were given much attention in terms of financial assistance<br />

for higher education.<br />

The challenge here to the common woman is how can she<br />

overcome these challenges? Do we still believe that women‘s<br />

%<br />

Yes<br />

100<br />

00<br />

90<br />

NIL<br />

20<br />

%<br />

No<br />

00<br />

100<br />

10<br />

85<br />

80<br />

Remarks<br />

very<br />

encouraging<br />

very<br />

disappointing<br />

very<br />

disappointing<br />

very<br />

disappointing<br />

very<br />

disappointing<br />

Source: Women Empowerment Advocacy -- Provisional Document.<br />

education is a waste of time? In fact time has come when all<br />

should agree to the fact that woman be given the chance to<br />

actively participate in every endeavour of life with education as<br />

the backbone of her success. Credit to the new Zealand‘s labourled<br />

government who in 2004 launched a five year plan of action<br />

to ensure women‘s full participation in the work place and that<br />

their employment opportunity and rewards are not affected by<br />

gender. This was not only to help women get recognition in the<br />

jobs they carry out but will assist in participation in wider range<br />

of higher level jobs. Did a common woman not deserve this? If<br />

given the chance to study further Laban, (2007) contended that it<br />

would mean women have access to a wider range of jobs and are<br />

able to move between compatible positions. Both men and<br />

women will have greater choice around caring and working<br />

responsibilities without gender predetermining their choice. In<br />

her speech in the World Conference of Women in Beijing, 1995,<br />

the then U.S first lady Hillary Clinton delivered that Women‘s<br />

Rights are also Human Rights therefore must be protected at all<br />

cost.<br />

The case of a common woman is not the government, but the<br />

society and the socioeconomic status of the family. The society is<br />

the type in which the majority of members see nothing good in<br />

woman except the barbaric and degrading belief that she should<br />

only be given out for marriage. If married, how many husbands<br />

are willing to allow their wives to continue their education or<br />

actively and profitably gain employment whether in the public or<br />

the private sectors? How many husbands (and parents) are<br />

willing to assist their wives (and daughters) with active self-<br />

employment? Indeed very few, that is the simple answer. To hit<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 323<br />

ISSN 2250-3153<br />

the nail on the head, we shall never progress with this belief in<br />

mind.<br />

Married life<br />

Let us start by quoting Francis Bacon, an English<br />

Philosopher, statesman and a lawyer who lived in 1561–1626,<br />

who once said ‗Wives are young men‘s mistresses, companions<br />

for middle age and old men‘s nurses‘, a practical truth. For a<br />

woman in to act practically, indeed effectively, and efficiently as<br />

young men‘s mistress, companion for middle ages as well as a<br />

nurse for old men is a very challenging task. Once again,<br />

education is a sin-qua-non to successful execution of these tasks.<br />

Yet married life to many women in Nigeria, is a vehicle of<br />

frustrations, uncertainties, harassment and insecurity instead of<br />

happy, secured and life full of hopes, progresses and appreciation<br />

as can be found in some homes.<br />

The common woman is frustrated once if what she was told<br />

or is expecting to find in her home are fairy tales. Moreover, if<br />

the one she trusted betrayed her because she is now his own<br />

―property‖ and would decide to ―operate‖ her the way he likes<br />

regardless of her value and the love she has towards him, resulted<br />

to nothing other than frustration. Besides, if she were married to<br />

somebody who she does not love, her life would be a miserable<br />

one, to cut it short.<br />

Uncertainties happen to every woman‘s married life if she<br />

can no longer trust her husband based on clear and genuine<br />

reasons. That is for instance, his affairs with other women<br />

illegally, his way of income and system of catering for the<br />

family. Failure to reason with her is total rejection of the fact that<br />

all men and women are borne free and equally entitled to certain<br />

inalienable rights among which are life, some liberty and<br />

happiness. However, very little do some husbands realize the<br />

obloquy this cast in their married life. In fact, some husbands‘<br />

grosser insult offered to women is the insinuation that she is<br />

honest and virtuous only because her parents ruled that, or she is<br />

aiming at something lucrative or it is the traditional law.<br />

In such a married life, how can a woman find liberty and<br />

happiness? A question that need to be answered here is can man<br />

live successfully without woman? Can therefore be a<br />

development in a society or a nation at large without women‘s<br />

influence? Definitely the response to these interrogations is NO.<br />

Harper, (2006) helps us with an answer in his speech delivered at<br />

the Columbian Exposition of the 1893 World‘s fair.<br />

If before sin had cast its deepest shadows or sorrow had<br />

distilled its bitterest tears, it was true that it was not good for man<br />

to be alone, it is no less true, since the shadows have deepened<br />

and life‘s sorrows have increased, that the world has need of all<br />

the spiritual aid that a woman can give for the social<br />

advancement and moral development of the human race. The<br />

tendency of the present age with its restlessness, religious<br />

upheavals, failures, blunders, and crimes is towards broader<br />

freedom, an increase of knowledge, the emancipation of thought,<br />

and recognition of the brotherhood of man; in this movement<br />

woman, as the companion of man must be a sharer. So close is<br />

the bond between man and woman that you cannot raise one<br />

without lifting the other. The world cannot move without<br />

woman‘s sharing in the movement, and to help give a right<br />

impetus to that movement is woman‘s highest privilege.<br />

If All Could Understand<br />

If both men and women could understand the value of a<br />

woman, we shall witness tremendous changes in our lives and in<br />

the pace of our national development. What keeps on lingering in<br />

a typical Hausa-Fulani society today is somewhat indifferent<br />

from that of five thousand years ago as far as women‘s value is<br />

concerned, which depended solely on the benefit she could<br />

provide men, either as pleasurable sexual object or as a vehicle<br />

for procreation and servitude. This has put aside the values of her<br />

personhood, talents and unique contribution to humanity and<br />

economic development. Many damages have been done to these<br />

since the belief in her sole value is based on her procreative<br />

abilities and sexual attractiveness; hence, the focus of her life is<br />

inevitably her ability to attract a man. Some questions that need<br />

concrete answers here are critical; when shall the society value<br />

women for their unique contribution to the world‘s economy?<br />

When will men value woman regardless of her attractiveness?<br />

When will woman see herself as incredible human being<br />

regardless of how sexually valuable she is to men? (Jones and<br />

Meyer, 2006)<br />

The way out would be appreciated<br />

Conclusively, to every problem, there is a solution but<br />

sometimes the approach to solving a problem can also be a<br />

problem. However, the following has been suggested as the ways<br />

out of some or all of the contemporary challenges facing the<br />

common woman.<br />

Education: - All members of the society ought to understand<br />

that education is a fundamental girls‘ right and therefore under<br />

no circumstances a girl be denied her right. This will help her<br />

understand her worth, respect her superiors, be actively<br />

employed (self or otherwise) for contribution to the household‘s<br />

economy, create liberty and happy life for herself and her family<br />

but to mention a few. In order to achieve the above stated,<br />

governments at all levels should declare free and compulsory<br />

girl-child education in all categories of learning since doing that<br />

would contribute in no small amount to nation‘s economic<br />

development.<br />

Value Reorientation: - The woman must understand herself and<br />

her importance in the society. She must admit that she is that part<br />

of human life, happiness, and progress without which nothing<br />

could be possible. A lot of work here is needed of women to<br />

sensitize themselves. Men on the other hand, must recognize the<br />

value of woman far beyond lust satisfaction rather, a companion<br />

without whom their existence could not be possible. Many men<br />

suffered the consequence of their deeds and mischief if only they<br />

listen to simple advice of their wives, and many a man rejoices<br />

their successes having listened to some simple advices of their<br />

wives. A good example of this is the success of Patrick J.<br />

O‘Haire, who suffered from inferiority and discouraged as a sales<br />

man received an invitation to attend a course in public speaking.<br />

He did not want to attend but listened to the simple advice of his<br />

wife and attended. The results made him advanced in sales<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 324<br />

ISSN 2250-3153<br />

department and valued and much liked member of his company<br />

(Carnegie, 1981: 297-298). Therefore, men, women, media,<br />

leaders, adults, parents, teachers, community members,<br />

producers and consumers must collectively stop emphasizing the<br />

need for girls and women to be attractive to men in order to feel<br />

valuable. We must stop emphasizing female‘s sexuality above<br />

her unique self.<br />

Girls must be supported at all costs to find their unique<br />

talents, gifts and interests for effective economic development of<br />

the society and the nation at large. If they find ways to express<br />

themselves in positive, up lifting and productive ways, the less<br />

they will feel their value is exclusive to their form. Hence, the<br />

better they feel about their individuality and the less need they<br />

will feel for sexual validation (Jones, 2006).<br />

By so doing, we can bring a new sense of appreciation and<br />

respect for all women and we must all understand that valuing<br />

woman as human beings is essential to making change in our<br />

nation and the world at large.<br />

REFERENCES<br />

[1] Carnegie, D. (1981). How to Win Friends and Influence People. Revised<br />

edition. Benin city: C. C. publication.<br />

[2] Harper, F.E.W. (2006) Woman‘s political future. The Norton Anthology of<br />

African: American literature. Gates, Henry Louis Jr., and Nevie Y. McKay,<br />

Eds. New York. WW. Norton Company.<br />

[3] Jones, F.A & Meyer, W.J. (2006) Adolescence. Microsoft Encarta 2006<br />

(CD). Redmond, WA: Microsoft Corporation.<br />

[4] Jones, J. (2006). The sexual value of women. Retrieved July 20th, 07 From:<br />

www.associatedcontentcom/article/98053/the-sexual-value of-women.html<br />

[5] Laban, L.W. (2007) Woman‘s Rights in Aotearoa and the pacific Speech:<br />

New Zealand Government<br />

AUTHORS<br />

First Author – Jamil Mikhail Y, School of Educational Studies,<br />

Universiti Sains Malaysia, 11800 Pulau Penang, Malaysia,<br />

Email: jamilgombe@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 325<br />

ISSN 2250-3153<br />

Circular Disk Monopole Antenna for Broadband<br />

Applications<br />

B.Saidaiah #1 , A.Sudhakar *2 , K. Padma Raju #3<br />

#1 Professor, Department of ECE, Chebrolu Engineering College, Guntur Dt, AP, India<br />

*2 Professor, Department of ECE,RVR&JC College of Engineering, Guntur Dt, AP, India<br />

#3 Professor, Department of ECE, JNTU Kakinada, East Godavari Dt, AP, India<br />

Abstract- This paper describes design of circular disk<br />

monopole antenna for operating frequency 3.0GHz-20.0GHz.<br />

This proposed antenna giving superior performance over<br />

conventional antennas with high gain 17 dB, high directivity and<br />

symmetrical E-plane and H-plane characteristics which makes<br />

this antenna suitable for ultra wideband (UWB) and broad band<br />

applications. This paper presents the return loss, input<br />

impedance, radiation patterns, VSWR, E-field, H-field and<br />

current distributions using CST software.<br />

Index Terms- UWB, VSWR, CST<br />

M<br />

I. INTRODUCTION<br />

odern and future wireless systems are placing greater<br />

demands on antenna designs. Many systems now<br />

operate in two or more frequency bands, requiring dual or<br />

triple band operation of fundamentally narrow band antennas.<br />

These include, satellite navigation systems, cellular systems,<br />

wireless LAN and combination of these systems. One of the most<br />

popular antennas employed in mobile communication<br />

systems is the Monopole antenna and its family [1]-[3]. The<br />

term broadband refers to a telecommunications signal or device<br />

of greater bandwidth, in some sense, than another standard or<br />

usual signal or device [4].<br />

Some of the Broad Band antennas are much more complex<br />

than other existing single band, dual band and multi band<br />

antennas [5]-[6]. In this paper we investigate Broad Band<br />

antenna, which is basically a printed micro strip antenna with<br />

etched ground plane. The printed circular micro strip antenna is<br />

advanced antennas over conventional rectangular micro strip<br />

antennas in terms of the complexity. This Broad Band antenna<br />

has slightly high BW than previous existed one and also it has<br />

high efficiency and reduced size.<br />

II. SUBSTRATE MATERIAL SELECTION<br />

The choice of dielectric substrate will play an important role in<br />

the design and simulation of the micro strip antennas. The<br />

substrate choice depends upon permittivity, dielectric loss<br />

tangent, thermal expansion and conductivity, cost and<br />

manufacturability. In this present work we used Roger RT-duroid<br />

as substrate material for simulation of micro strip antennas.<br />

III. DESIGN SPECIFICATION<br />

The radiation mechanism of planar circular disc monopoles is<br />

an involved topic and has been investigated by many UWB<br />

antenna researchers [5], [6]. One method for analysing such<br />

structures can be in the frequency domain where wide band<br />

monopole operation is explained by the overlapping of closely<br />

distributed minimums in the reflection coefficient, sometimes<br />

referred to as resonances [7]. The design specifications and<br />

structure of proposed antenna on Rogers RT-6010 substrate<br />

material with relative dielectric constant 10.2, thickness of<br />

0.83mm. The real part of antenna impedance is 50Ω at 9.5GHZ,<br />

10.5GHz, 11.5GHz and 12.5GHz where the imaginary part of the<br />

antenna impedance equals zero, the final dimensions and<br />

structure of Broad Band antenna after doing an extensive<br />

simulation study as shown below table and figures.<br />

Table-1 Dimensions of the Circular Disc Monopole antenna<br />

Dimensions Millimetres [mm]<br />

Width of the Substrate W 30<br />

Length of the Substrate L 35<br />

Width of the 50-Ω Feed line Wf 1.8<br />

Length of the 50-Ω Feed line Lf 8<br />

Width of the First Micro strip Line W1 1.4<br />

Length of the First Micro strip Line L1<br />

Width of the Second Micro strip Line W2 1<br />

Length of the Second Micro strip Line L2 3.5<br />

Radius of the <strong>Print</strong>ed Disc R 7.5<br />

Length of the Partial Ground Plane Lg 15.1<br />

Width of the Partial Ground Plane Wg 30<br />

Substrate Thickness Hsub 0.83<br />

5<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 326<br />

ISSN 2250-3153<br />

Figure 1: Compact Disc Monopole antenna<br />

IV. RESULTS AND DISCUSSION<br />

Figure 1 shows the CST model of Broad Band Compact Disc<br />

Monopole Antenna. Figure 2 shows the return loss of the<br />

proposed antenna.<br />

Figure 2: Frequency vs. Return loss<br />

Figure 3: VSWR curve<br />

Figure 2 shows Frequency Vs. Return loss curve for simulated<br />

values. Return loss of less than -2 dB is obtained in entire<br />

frequency range. Figure 3 shows VSWR curve.<br />

As the antenna gets excited the travelling wave gets travelled and<br />

the radiation pattern is obtained when impedance of the micro<br />

strip gets matched with the free space impedance. Symmetric<br />

radiation is obtained with low side lobes. Figure 4 shows the<br />

radiation pattern for the proposed antenna at different canter<br />

frequencies in between 3GHz to 20GHz.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 327<br />

ISSN 2250-3153<br />

(a)<br />

(b)<br />

(c)<br />

(d)<br />

Figure 4.Circular Disc Monopole antenna:2-D Far field radiation<br />

pattern at (a) 12.5GHz (b) 11.5GHz (c) 10.5GHz (d) 9.5GHz<br />

Figure 4 shows the 2-D radiation patterns at different<br />

frequencies 12.5 GHz, 11.5GHz, 10.5GHz and 9.5GHz .<br />

Maximum Gain of approximately 18 dB occurred at 12.5GHz<br />

and gain margin is 15.65dB is obtained from the simulated<br />

results.<br />

The simulation time and accuracy will be influenced by the<br />

mesh. Fig.5 and Fig.6 shows the E-field, H-field current<br />

distribution generation for the proposed antenna. Average current<br />

distribution of the cross section will give the information about<br />

S-parameters.<br />

Figure 5: E-Field distribution<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 328<br />

ISSN 2250-3153<br />

Figure 6: H-Field distribution<br />

V. CONCLUSION<br />

This paper mainly presents the design and detailed results of<br />

the Compact Disc Monopole Antenna for Broad Band<br />

Applications with Roger RT-6010 substrate material. This<br />

antenna is showing remarkable performance over the entire<br />

frequency range between 3-20GHz with high gain of 18 dB and<br />

high directivity. This proposed model is giving the confidence to<br />

use design of Broad Band antennas for the phased array<br />

applications.<br />

REFERENCES<br />

[1] Naffall Herscovici and Christos Christo-douloc, ―Wideband<br />

monopole antennas for Antennas and Propagation Magazine, Vol.45,<br />

No.2, April 2003.<br />

[2] S. T. Fang and K. L. Wong, ―A dual frequency equilateral-<br />

triangular micro-strip antenna with a pair of narrow slots,‖<br />

Microwave Opt.Tech. Lett.23, 82–84, Oct. 20, 1999.<br />

[3] K. P. Yang, Studies of compact dual frequency micro strip<br />

antennas, Ph.D. dissertation, depart. of Electrical Engineering,<br />

National Sun Yat sen University, Kaohsiung, Taiwan, 1999.<br />

[4] J.H.Lu and K.L.Wong,―Compact dual frequency Circular micro<br />

strip antenna with an offset circular slot,‖ Microwave Opt. Tech.<br />

Lett.22, 254 –256, Aug. 20, 1999.<br />

[5] G.S.Row, S.H.Yeh, and K.L.Wong, ―Compact dual-polarized<br />

microstrip antennas,‖ Microwave Opt. Technol.Lett. 27, 284–287,<br />

Nov. 20, 2000.<br />

[6] T.W.Chiou and K.L.Wong,―Designs of compact micro strip<br />

antennas with a slotted ground plane‖ in 2001IEEE Antennas<br />

Propagate.Soc.Int.Symp Dig., pp. 732–735<br />

[7] Garish Kumar and K.P.Ray, Broadband Micro- strip antennas,<br />

Norwood: Artech House 2003.<br />

AUTHORS<br />

First Author – B.Saidaiah, Professor, Department of ECE,<br />

Chebrolu Engineering College, Guntur Dt, AP, India<br />

Email id - saidaiahbandi@gmail.com<br />

Second Author - A.Sudhakar, Professor, Department of<br />

ECE,RVR&JC College of Engineering, Guntur Dt, AP, India<br />

Email id – alapati_sudhakar@yahoo.com<br />

Third Author - K. Padma Raju, Professor, Department of ECE,<br />

JNTU Kakinada, East Godavari Dt, AP, India<br />

Email id - padmaraju_k@yahoo.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 329<br />

ISSN 2250-3153<br />

Implementation Scheme for <strong>Online</strong> Medical Diagnosis<br />

System Using Multi Agent System with JADE<br />

Mr.Shibakali Gupta, Arindam Sarkar, Indrani Pramanik, Banani Mukherjee<br />

Computer Science & Engg. , University Institute of technology, Burdwan University, Golapbag, Burdwan (W.B)<br />

Abstract- In this proposed methodology we are building agent<br />

based information services for internet users. In our work we are<br />

considering the use of agents that will provide Medical Care<br />

related services. In this paper we report the design and<br />

construction of a Multi-Agent System (MAS) that is composed<br />

of agents that provide medical services. The implemented system<br />

contains agents developed using JADE that allow the user to<br />

search for medical centres satisfying a given set of symptoms, to<br />

access his/her medical record or to make an appointment to be<br />

visited by a particular kind of doctor in his/her location. He/She<br />

can also chat or mail to a doctor. And can get various tips about<br />

health care and diseases.<br />

Index Terms- Multi Agent System, JADE, Health Care, Agents.<br />

A<br />

I. INTRODUCTION<br />

s an initial problem in the domain of Health care service [1]<br />

and diagnosis, we choose online medical service system<br />

.Now a days internet has expanded in everywhere .And this<br />

proposed methodology is concerned about the online treatment<br />

and creating a Medical Diagnosis System [2] consisting of agents<br />

developed using JADE [8][9] constituting a Multi Agent System.<br />

Imagine that a user is going for a tour in an unknown city. It is<br />

the first time that he goes to that city, so he only knows the<br />

location of the airport, the hotel and the tour sites. After visiting a<br />

few sites and having a heavy dinner in the night he doesn't feel<br />

very well, for two hours. The user is a diabetic patient, so he is<br />

quite worried about this condition. Fortunately, the user carries<br />

his laptop with him. He now opens the site <strong>Online</strong>Docs.com. He<br />

enters his symptoms in the site and in a few seconds he have on<br />

the laptop's screen the details of the closest and best hospital,<br />

nursing home, clinics and the doctor‘s details. Then, the site<br />

provides information about the timetables of the doctors of that<br />

medical centre that are diabetic specialists and with a list of three<br />

doctors; one of them performs examinations on the afternoon,<br />

and another one on the evening (the third one is on holidays). He<br />

confirms to book a visit to one of the two available doctors as<br />

soon as possible. <strong>Online</strong>Docs tries to book a visit to the first<br />

doctor by contacting the doctor agent, but he is told that the<br />

doctor has a full schedule. However, it manages to book a visit to<br />

the second doctor at 18:00. Then, he can see in the laptop‘s<br />

screen a confirmation of the booking. At 18:00 he goes to the<br />

hospital .After explaining the problem to the doctor. And then the<br />

doctor logins as an administrator to our site and asks the site to<br />

retrieve his medical record (which can be done with his medical<br />

ID code and a password that he introduce in the computer‘s<br />

keyboard). In a few seconds he can see the previous health<br />

conditions of user, the treatments and operations he might have<br />

had in the past, the medicines to which he is allergic, etc. After a<br />

detailed examination, the doctor concludes that the problem is<br />

very serious, as the user‘s sugar level has increased very much<br />

due to excessive sugar consumption and so he gives the patient<br />

medicines and asks him to take some rest. He also adds the<br />

information gathered in this examination to the user‘s medical<br />

record, so that it can be taken into account in the future. And<br />

after that the site will give him information about where the<br />

prescribed medicines by the doctor are available in that city.<br />

Now after taking medicines for few days he can also report his<br />

progress to the doctor through the chatting and mailing<br />

functionalities of the website.<br />

Now suppose there are a large number of medical records<br />

of users which have cases of malaria then the system will<br />

generate an epidemic alert to the media and government agent.<br />

This scenario is not as far-fetched and futuristic as it may seem at<br />

first glance. If agent technology delivers the results it is<br />

promising, the facts depicted in this example could indeed<br />

happen in a real setting. The challenges involved are many and<br />

come from five main areas:<br />

1. Communication between services - e.g. sharing ontology<br />

and semantics which could be heterogeneous even within the<br />

health care domain.<br />

2. Security/Authorization-accessing/editing sensitive medical<br />

data, such as the medical records of the patients.<br />

3. Creating an environment where agents can discover one<br />

another and access one another's services.<br />

4. Communication between users and agents -e.g. graphical user<br />

interfaces to communicate with personal assistants.<br />

5. Co-ordination between distributed services, i.e. making<br />

complex distributed decisions (for instance, the medical centers<br />

could get in touch with one another so that patients are evenly<br />

distributed between them).<br />

The work reported in this paper is a first step towards these<br />

future scenarios, with contributions to primarily the first four<br />

challenges. The final aim of the project is to design and<br />

implement a system which could be run in an environment such<br />

as the Agent Cities network, which is attempting to create a<br />

technical environment in which some of the above topics may be<br />

studied. In this paper we describe the design and<br />

implementation of a MAS that offers some of the services<br />

which have been requested in the previous paragraph. Main<br />

agent of the system can provide information about the medical<br />

centers that are available in a given city. The MAS also contains<br />

an Doctors agent for each medical centre in town; these agents<br />

may be asked about the doctors working in that hospital, or may<br />

be requested to perform a booking in the schedule of a<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 330<br />

ISSN 2250-3153<br />

specific doctor and can also access a database in which the<br />

medical records of the users are stored. The developed system<br />

also contains Medicine agents for each drug centre in the city<br />

which provides information about the medicines available.<br />

Therefore, when agent (and telecommunication) technology is a<br />

little bit more mature, we will hopefully be able to access much<br />

useful health- related information and facilities all around the<br />

world.<br />

The rest of the paper is organized as follows. First of all, the<br />

Agent Cities project, which is the framework in which this work<br />

has been made, is briefly introduced, and we argue why multiagent<br />

systems offer an appropriate platform for developing<br />

health-related applications. After that, a detailed description of<br />

the MAS that has been designed and implementation scheme is<br />

given. We explain the architecture of the MAS, the services<br />

offered by the different types of agents and the ontology<br />

used in this work. The paper finishes with a discussion of the<br />

work done and an outline of some potential future lines of<br />

research.<br />

II. BACKGROUND<br />

The Foundation for Intelligent Physical Agents (FIPA) [10] is<br />

an organization that defines standards for agent interoperation.<br />

Agent Cities [11] is an ambitious project whose main aim is the<br />

construction of a worldwide, publicly accessible network of<br />

FIPA-based agent platforms. Each platform will support agents<br />

that offer services similar to those that can be found in a real city<br />

(e.g. facilities, amenities, attractions, information and<br />

commercial services). The agents that are planned to be initially<br />

deployed in this network will focus on information and booking<br />

services in domains such as cinemas and theatres, restaurants,<br />

hotels, taxis, magazines, tourist information, weather information<br />

and a meeting scheduling service. It is expected that, once these<br />

initial services have been deployed, it will be possible to<br />

implement intelligent complex compound services (e.g. agents<br />

that are able to help a user to plan a weekend away, including<br />

tasks such as booking air tickets, selecting and booking a room in<br />

an appropriate hotel, buying tickets for the theatre and reserving<br />

a table in a restaurant that is near the theatre and offers the user's<br />

favourite meal). Our group has been working in the last twelve<br />

months in the application of AI techniques (especially agentbased<br />

technology) to the medical domain [5]. When the Agent<br />

Cities initiative was made public, we immediately imagined the<br />

potential development of agents that could offer not the usual<br />

leisure-oriented services but health-care related services.<br />

Therefore, we decided to design and construct a multi-agent<br />

system with the following characteristics:<br />

The user may request information about all the medical<br />

centres available in a particular city by giving his/her<br />

symptoms.<br />

If the user is aware of a specific medical centre in the<br />

area, he/she may request information about the medical<br />

services and doctors in that centre.<br />

It is possible to book a visit to a doctor.<br />

The user may access his/her medical record.<br />

The user can also find medical stores in the city.<br />

The user can chat or mail to the doctors.<br />

Media and Government user will get a possible<br />

epidemic alert.<br />

The decision of using a Multi-Agent System in this medical<br />

setting (and not other more traditional AI techniques such<br />

as an expert system or a decision support system) is motivated by<br />

the following reasons:<br />

• The information that must be dealt with is geographically<br />

distributed, because each hospital or medical centre will keep its<br />

own data, each doctor will have his/her personal information<br />

(e.g. an up-to-date daily schedule) in a personal computer, the<br />

medical records of the potential users of the system may be<br />

located in different databases, etc. Therefore, a distributed AI<br />

approach (such as the one offered by multi-agent systems) seems<br />

suitable in this case.<br />

• There must be a fluent communication between the user and the<br />

medical centres. For instance, the user's agent should be able to<br />

ask for a booking with a certain doctor, and be able to react<br />

quickly if the doctor's schedule is full (so another doctor has to<br />

be chosen). Agents are not only reactive but also<br />

endowed with social abilities, so they are able to communicate<br />

with other agents in order to negotiate and co-ordinate their<br />

activities.<br />

• Existing systems (such as databases containing medical<br />

records) may be easily included in a multi- agent system. The<br />

standard way of agentifying a database is to put a wrapper<br />

around it. A wrapper is an agent that receives the queries to be<br />

made to the database in a standard agent communication<br />

language (such as FIPA-ACL or KQML) and is able to translate<br />

these requests into queries in SQL to the database. After<br />

receiving the reply from the database, the wrapper may translate<br />

the answer to the common agent communication language and<br />

send it to the requesting agent.<br />

• Health-oriented agents could perform pro-active tasks in order<br />

to have ready all the information that the user may need at a<br />

particular time. For instance, the user's agent might keep, in the<br />

user‘s health profile, the information that he/she has had heart<br />

conditions in the past. When the user travels to a foreign city,<br />

the personal assistant could immediately (without an explicit<br />

demand from the user) search all those medical centres in which<br />

there are heart specialists, and have this information ready in<br />

case the user needs it. This property has not been implemented in<br />

the agents described in this paper, though.<br />

• The user should be able to access his/her medical record from<br />

anywhere. For instance, the user may be on holiday in a rural<br />

area, far away from medical centres, and need to be examined by<br />

a local doctor. If the user may access his/her medical record from<br />

a mobile phone or a personal computer connected to the Internet,<br />

the doctor may take it into account in order to make a more<br />

precise diagnosis.<br />

• Finally, perhaps the most important reason for capturing<br />

services as agents in this way is to enable the individual medical<br />

services to interact with each other at a high enough level to<br />

ensure that they can all interoperate. Agent communication<br />

languages (such as FIPA-ACL), content languages (such as SL)<br />

and formal ontologies are very useful in describing<br />

communication between different services at the application<br />

level – i.e. in a way which relates to the domain of discourse<br />

rather than to any single implementation. Without formal<br />

specifications for domain ontologies it would be almost<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 331<br />

ISSN 2250-3153<br />

impossible for diverse medical systems to interact with each<br />

other correctly.<br />

III. ARCHITECTURE OF THE MASS AND IMPLEMENTATION<br />

This section describes the Multi-Agent System [3] [4] which<br />

have been developed. The primary design objectives of the work<br />

were the following:<br />

• To provide a decomposition of the problem that matched<br />

agents to entities which could be realistic players in such a<br />

domain (e.g. Medical centres, personal agents, etc.) And to take<br />

care in who had access to which information.<br />

• To provide an ontology for the domain (a detail often ignored<br />

in demonstrations).<br />

• To make the developed agent services as reusable as possible<br />

by using standard languages- in this case FIPA-ACL for<br />

communication and FIPA-SL for content - and providing<br />

detailed service models to describe the individual functioning<br />

and objective of each agent including descriptions of actions,<br />

protocols used and example messages.<br />

These points are particularly important since the aim is to<br />

make re-usable service components which could be used in many<br />

applications (not all of them necessarily medical). The aim of the<br />

multi-agent system is to provide access to the basic health-care<br />

services in a given city to the users. The basic architecture of the<br />

MAS which has been developed in this work is shown in figure<br />

1.<br />

This multi-agent system contains six different types of agents:<br />

the main agent (MA), the user agent (UA), the medical store<br />

agent (MSA), a database wrapper (DW) and some doctor agents<br />

(DA), media and govt. agent (MGA).<br />

User Agent:<br />

• User agent enters his/her symptoms and gets the list of<br />

available doctors in clinic, hospital, nursing homes in<br />

the city.<br />

• The user agent can chat or mail to the doctors.<br />

• The user agent can view his/her health profile.<br />

Main Agent:<br />

• The main agent searches the best available doctors in<br />

the city.<br />

• The main agent fixes appointment to the doctors.<br />

• The main agent searches the medicines available in the<br />

different medical stores in the city through medical store<br />

agent.<br />

• The main agent send alert about possible epidemic<br />

situation to the media and government agent in the city.<br />

Doctor Agent:<br />

• The doctor agent prescribes the medicine.<br />

• The doctor agent updates the medical records.<br />

Media and Government Agent:<br />

• The media and government agent can view the alert<br />

about the possible epidemic situation in the city.<br />

Database Wrapper:<br />

Database wrapper stores the data and performs analysis on the<br />

data to generate the required result.<br />

Fig.1 Architecture of the MAS<br />

A. FIPA Agent Platform<br />

The standard model of an agent platform, as defined by FIPA,<br />

is represented in the following figure 2,<br />

Agent Management System<br />

The Agent Management System (AMS) is the agent who exerts<br />

supervisory control over access to and use of the Agent Platform.<br />

Only one AMS will exist in a single platform. The AMS provides<br />

white-page and life-cycle service, maintaining a directory of<br />

agent identifiers (AID) and agent state. Each agent must register<br />

with an AMS in order to get a valid AID. The Directory<br />

Facilitator (DF) is the agent who provides the default yellow<br />

page service in the platform.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 332<br />

ISSN 2250-3153<br />

Fig.2 Reference of FIPA Agent Platform.<br />

Agent Communication Channel<br />

The Message Transport System, also called Agent<br />

Communication Channel (ACC), is the software component<br />

controlling all the exchange of messages within the platform,<br />

including messages to/from remote platforms. JADE fully<br />

complies with this reference architecture and when a JADE<br />

platform is launched, the AMS and DF are immediately created<br />

and the ACC module is set to allow message communication.<br />

The agent platform can be split on several hosts. Only one Java<br />

application, and therefore only one Java Virtual Machine (JVM),<br />

is executed on each host. Each JVM is a basic container of agents<br />

that provides a complete run time environment for agent<br />

execution and allows several agents to concurrently execute on<br />

the same host.<br />

The main-container, or front-end, is the agent container<br />

where the AMS and DF lives and where the RMI registry, that is<br />

used internally by JADE, is created. The other agent containers,<br />

instead, connect to the main container and provide a complete<br />

run- time environment for the execution of any set of JADE<br />

agents. According to the FIPA specifications, DF and AMS<br />

agents communicate by using the FIPA-SL content language<br />

and the FIPA-agent-management ontology, and the FIPA-request<br />

interaction protocol. JADE provides compliant implementations<br />

for all these components. The following messages are used by<br />

agents to communicate with other agents:<br />

a. Accept Proposal - One Agent accepts the proposal of another<br />

agent<br />

b. Agree - The process of mutual agreement between agents for<br />

request and response<br />

c. Inform - One agent informs to the agent about the process<br />

d. Failure - The communication failure is send as the response<br />

e. Propose - One agent submits some task to the other agent<br />

f. Refuse - The process of denying some task<br />

g. Request - Request for some action to be performed<br />

B. Experimental Design and Implementation of Software<br />

Architecture<br />

The user is authenticated, and he/she has been taken into<br />

website user part. The user may now give his/her symptoms to<br />

the User agent (UA). After that expert advice i.e., recommended<br />

doctors or appropriate medicine stores are provided of the city by<br />

the Main agent (MA).Once the expert advice has been selected<br />

by the User agent (UA) a XML file through the J2EE parser is<br />

created and is sent to the Main agent (MA).<br />

The specific requirement of XML file is that, in near future<br />

JADE [6] may be moved to some other server. It gives<br />

flexibility to transfer the data from one server to another server.<br />

The XML file is parsed using J2EE Parser and data is transferred<br />

to JADE agents. Intern it is forwarded to Main agent (MA). Main<br />

agent (MA) is connected with Decision Support System and the<br />

MYSQL database. Main agent by communicates with the Doctor<br />

Agent (DA) and make intelligent analysis and returns the best<br />

doctors and best medicine centres available in the city. The<br />

above steps are carried out in backward direction and Media and<br />

Govt. Agents gets a possible alert in case of an outbreak. The<br />

software architecture is shown in figure 3,<br />

Fig.3 Software Architectural design for the System.<br />

C. Experimental Result Screenshots<br />

The different sections of the above proposed system is shown<br />

in the figure below,<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 333<br />

ISSN 2250-3153<br />

Fig. 4 User Interface (Webpage) for the Medical Diagnosis<br />

System developed using JSP and HTML.<br />

Fig. 5 A JADE platform starter Agent System which will start the<br />

Agents on clicking a link on the user homepage.<br />

Fig. 6 A JADE platform containing the Main Agent, User Agent<br />

and Doctor Agent<br />

.<br />

Fig. 7 The User Agent taking the symptoms fever as given by the<br />

user as an input and give it to the Main Agent.<br />

Fig. 8 The Main Agent searching for the symptoms fever given<br />

by the User Agent and fixing the appointment to the best doctor<br />

available in the city.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 334<br />

ISSN 2250-3153<br />

Fig. 9 The Doctor Agent is uploading the User prescription to the<br />

database and then the medicine agent working in the background<br />

find those medicines and give it to the User Agent.<br />

IV. CONCLUSION & FUTURE WORK<br />

The proposed implemented version of Medical Diagnosis<br />

System (MDS) can take care of every stage of patients such as<br />

initial checkup, treatment and report for the patients. We believe<br />

that the implemented scheme can bring a revolution in our<br />

Medical Diagnosis System mainly for Indian environment. In<br />

future correspondence the incorporation of KQML (Knowledge<br />

Query Manipulation Language) [7] can be done to have more<br />

efficient data mining or knowledge mining.<br />

REFERENCES<br />

[1] Pricewater House Coopers, Emerging Market Report: Health in<br />

India 2007,2007<br />

[2] Shibakali Gupta, Shiladitya Pujari, A multi agent system (MAS)<br />

based scheme for health care and medical diagnosis system, IAMA<br />

09, ieeexplore, ISBN 978-1-4244-4710-7,2009<br />

[3] Michael Wooldridge, ‖An Introduction to Multi agent Systems‖,<br />

Department of Computer Science, University of Liverpool, Uk JOHN<br />

WILEY AND SONS, LTD.<br />

[4] Katia P Sycara Multiagent Systems, AI magazine Volume 19,<br />

No.2 Intelligent Agents Summer 1998.<br />

[5] Antonio Moreno, Medical Applications of Multi Agent Systems,<br />

Computer Science and Mathematics Department, Universitat Rovira,<br />

Virgili, ETSE. Campus Sescelades.Av.delsPasosCatalans, 26, 43007-<br />

Tarragona Spain.<br />

[6] Developing Multi-agent Systems with JADE,Fabio Bellifemine1,<br />

Agostino Poggi2, and Giovanni Rimassa21,CSELT S.p.A.,Via G.<br />

Reiss Romoli, 274, 10148, Torino, Italy,Dipartimento di Ingegneria<br />

dell‘Informazione, University of Parma Parco Area delle Scienze,<br />

181A, 43100, Parma, Italy.<br />

[7] KQML as an agent communication language Tim Finin, Yannis<br />

Labrou, and James Mayfield, in Jeff Bradshaw (Ed.), ―Software<br />

Agents‖, MIT Press, Cambridge, to appear, (1997)<br />

[8] JADE:Java FrameWork For Agent Development,<br />

http://sharon.cselt.it/projects/jade<br />

[9] JADE:Java framework for Agent<br />

Development,http://www.jade.tilab.com<br />

[10] FIPA:Foundation for Intelligent Physical Agent,http://www.fipa.org<br />

[11] Agent Cities: http://www.agentcities.org.<br />

AUTHORS<br />

First Author – Mr.Shibakali Gupta,<br />

Computer Science & Engg. ,<br />

University Institute of technology, Burdwan University,<br />

Golapbag, Burdwan (W.B). Email id - skgupta.81@gmail.com<br />

Second Author - Arindam Sarkar, Computer Science & Engg.,<br />

University Institute of technology, Burdwan University,<br />

Golapbag, Burdwan (W.B). Email id – arsoftech@gmail.com<br />

Third Author - Indrani Pramanik, Computer Science & Engg.,<br />

University Institute of technology, Burdwan University,<br />

Golapbag, Burdwan (W.B).<br />

Email id - pramanikindrani@gmail.com<br />

Fourth Author-Banani Mukherjee, Computer Science & Engg.,<br />

University Institute of technology, Burdwan University,<br />

Golapbag, Burdwan (W.B). Email id – rajtukun@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 335<br />

ISSN 2250-3153<br />

Multicarrier modulation with OFDM for 4G networks<br />

Abstract- This paper presents a new approach based on<br />

multicarrier modulation (MCM) with OFDM, to accomplish the<br />

goals of 4G. MCM [1] is a form of multicarrier system and a<br />

derivative of frequency-division multiplexing. MCM is a<br />

baseband process that uses parallel equal bandwidth sub channels<br />

to transmit information. Normally implemented with Fast Fourier<br />

transform (FFT) techniques, MCM's advantages include better<br />

performance in the inter symbol interference (ISI) environment,<br />

and avoidance of single-frequency interferers.<br />

Index Terms- MCM, OFDM, transceiver, ISI.<br />

A<br />

I. INTRODUCTION<br />

third-generation (3G) cellular service provides to different<br />

access technologies. The voice, video, multimedia, and<br />

broadband data services are becoming integrated into the same<br />

network. It is apparent that 3G systems, while maintaining the<br />

possible 2-Mbps data rate in the standard, will realistically<br />

achieve 384-kbps rates. To achieve the goals of true broadband<br />

cellular service, the systems have to make use of fourthgeneration<br />

(4G) network.4G is intended to provide high speed,<br />

high capacity, low cost per bit, IP based services.<br />

A. Multicarrier modulation<br />

The basic idea of multi carrier modulation [2] is to divide the<br />

transmitted bit stream into many different sub streams and send<br />

these over many different sub channels. Typically the sub<br />

channels are orthogonal under ideal propagation conditions. The<br />

data rate on each of the sub channels is much less than the total<br />

data rate, and the corresponding sub channel bandwidth is much<br />

less than the total system bandwidth. The number of sub streams<br />

is chosen to ensure that each sub channel has a bandwidth less<br />

than the coherence bandwidth of the channel, so the sub channels<br />

experience relatively flat fading. Thus, the inter symbol<br />

interference on each sub channel is small. The sub channels in<br />

multicarrier modulation need not be contiguous, so a large<br />

continuous block of spectrum is not needed for high rate<br />

multicarrier communications. Moreover, multicarrier modulation<br />

is efficiently implemented digitally.<br />

B. OFDM<br />

In this discrete implementation, called orthogonal frequency<br />

division multiplexing (OFDM) the ISI can be completely<br />

eliminated through the use of a cyclic prefix. The simplest form<br />

of multicarrier modulation divides the data stream into multiple<br />

sub streams to be transmitted over different orthogonal sub<br />

channels centered at different subcarrier frequencies. The number<br />

of sub streams is chosen to make the symbol time on each Sub<br />

stream much greater than the delay spread of the channel or,<br />

equivalently, to make the sub stream bandwidth less than the<br />

M.Gopu*, Dr. Ritesh Khanna**<br />

*Research scholar, CMJ University, India<br />

**CMJ University, India<br />

channel coherence bandwidth. This ensures that the sub streams<br />

will not experience significant ISI.<br />

The rest of the paper is organized as follows section 2<br />

describes the implementation of 4G using MCM, chapter.<br />

Section 3 explains information processing in 4G. Section 4,<br />

section 5 explains MCM/OFDM transmitter and receiver. Section<br />

6 concludes the paper.<br />

II. IMPLEMENTATION OF MCM FOR 4G<br />

Two different types of MCM are useful for 4G. These include<br />

multicarrier code division multiple access (MC-CDMA) and<br />

orthogonal frequency division multiplexing (OFDM) using time<br />

division multiple access (TDMA). Note: MC-CDMA is actually<br />

OFDM with a CDMA overlay.<br />

Similar to single-carrier CDMA systems, the users are<br />

multiplexed with orthogonal codes to distinguish users in MC-<br />

CDMA [3]. However, in MC-CDMA, each user can be allocated<br />

several codes, where the data is spread in time or frequency.<br />

Either way, multiple users access the system simultaneously.<br />

In OFDM with TDMA, the users are allocated time intervals<br />

to transmit and receive data. As with 3G systems, 4G systems<br />

have to deal with issues of multiple access interference and<br />

timing. Differences between OFDM with TDMA and MC-<br />

CDMA can also be seen in the types of modulation used in each<br />

subcarrier. Typically, MC-CDMA uses quadrature phase-shift<br />

keying (QPSK), while OFDM with TDMA could use more highlevel<br />

modulations (HLM), such as, multilevel quadrature<br />

amplitude modulation (M-QAM) (where M = 4 to 256). However,<br />

to optimize overall system performance, adaptive<br />

modulation can be used; where the level of QAM for all<br />

subcarriers is chosen based on measured parameters.<br />

III. PROCESSING 4G INFORMATION<br />

As 4G is based on a multicarrier technique, key baseband<br />

components for the transmitter and receiver are the FFT and its<br />

inverse (IFFT). In the transmit path the data is generated, coded,<br />

modulated, transformed, cyclically extended, and then passed to<br />

the RF/IF section. In the receive path the cyclic extension is<br />

removed, the data is transformed, detected, and decoded. If the<br />

data is voice, it goes to a vocoder. The baseband subsystem will<br />

be implemented with a number of ICs, including digital signal<br />

processors (DSPs), microcontrollers, and ASICs. Software, an<br />

important part of the transceiver, implements the different<br />

algorithms, coding, and overall state machine of the transceiver.<br />

The base station could have numerous DSPs. For example, if<br />

smart antennas are used, each user needs access to a DSP to<br />

perform the needed adjustments to the antenna beam.<br />

A. 4G Transceiver structure<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 336<br />

ISSN 2250-3153<br />

The structure of a 4G transceiver is similar to any other<br />

wideband wireless transceiver. Variances from a typical<br />

transceiver are mainly in the baseband processing. Base stations<br />

and mobiles are distinguished in that base stations transmit and<br />

receive/ decode more than one mobile, while a mobile is for a<br />

single user. A mobile may be a cell phone, a computer, or other<br />

personal communication device.<br />

The line between RF and baseband will be closer for a 4G<br />

system. Data will be converted from analog to digital or vice<br />

versa at high data rates to increase the flexibility of the system.<br />

Also, typical RF components such as power amplifiers and<br />

antennas will require sophisticated signal processing techniques<br />

Fig 1 gives the transmitter section of MCM/CDMA [4].The<br />

purpose of the transmitter is to generate and send information. As<br />

the data rate for 4G increases, the need for a clean signal also<br />

increases. One way to increase capacity is to increase frequency<br />

reuse. As the cell size gets smaller to accommodate more<br />

frequency reuse, smaller base stations are required. Smaller cell<br />

sizes need less transmit power to reach the edge of the cell,<br />

though better system engineering is required to reduce intra-cell<br />

interference.<br />

One critical issue to consider is spurious noise. The regulatory<br />

agencies have stringent requirements on the amount of unwanted<br />

noise that can be sent out of the range of the spectrum allocated.<br />

In addition, excess noise in the system can seriously diminish the<br />

system's capacity.<br />

With the wider bandwidth system associated with 4G, it will<br />

be difficult to achieve good performance without help of linearity<br />

techniques. To effectively accomplish this task, feedback<br />

between the RF and baseband is required. The algorithm to<br />

perform the feedback is done in the DSP, which is part of the<br />

baseband data processing.<br />

to create the capabilities needed for broadband high data rate<br />

signals.<br />

In the transmit path in phase and quadrature (I&Q) signals are<br />

up converted to an IF, and then converted to RF and amplified<br />

for transmission. In the receive path the data is taken from the<br />

antenna at RF, filtered, amplified, and down converted for<br />

baseband processing. The transceiver provides power control,<br />

timing and synchronization, and frequency information. When<br />

multicarrier modulation is used, frequency information is crucial.<br />

If the data is not synchronized properly the transceiver will not<br />

be able to decode it.<br />

IV. TRANSMITTING SECTION<br />

V. RECEIVER SECTION<br />

Fig 2 shows the receiver model of MCM/CDMA. For 3G,<br />

using the 2-Mbps data rate in a 5-MHz bandwidth, the SNR is<br />

only 1.2 dB. In 4G, approximately 12-dB SNR is required for a<br />

20-Mbps data rate in a 5-MHz bandwidth[5]. This shows that for<br />

the increased data rates of 4G, the transceiver system must<br />

perform significantly better than 3G. With any receiver, the main<br />

issues for efficiency and sensitivity are noise figure, gain, group<br />

delay, bandwidth, sensitivity, spurious rejection, and power<br />

consumption. For a 4G receiver using a 5-MHz RF bandwidth,<br />

16 QAM modulation, the receiver sensitivity is -87 dBm. For 3G,<br />

the receiver sensitivity needs to be -122 dBm; the difference is<br />

due to the modulation.<br />

The other configuration has one down conversion, as in a<br />

homodyne (zero IF or ZIF) receiver, where the data is converted<br />

directly to baseband. The challenge in the receiver design is to<br />

achieve the required sensitivity, inter modulation, and spurious<br />

rejection, while operating at low power.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 337<br />

ISSN 2250-3153<br />

The down converter section of the receiver will have to achieve<br />

good linearity and noise figure while consuming minimal power.<br />

The error correction coding of 4G has not yet been proposed,<br />

however, it is known that 4G will provide different levels of<br />

QoS, including data rates and bit error rates. It is likely that a<br />

form of concatenated coding will also be used, and this could be<br />

a turbo code as used in 3G, or a combination of a block code and<br />

a convolution code. This increases the complexity of the<br />

baseband processing in the receive section.4G baseband signalprocessing<br />

components will include ASICs, DSPs,<br />

microcontrollers, and FPGAs. The receiver will take the data<br />

from the ADC, and then use it to detect the proper signals.<br />

Baseband processing techniques such as smart antennas and<br />

multi-user detection will be required to reduce interference.<br />

The goal is to improve the signal by adjusting the beam pattern<br />

of the antennas. The number of DSPs needed to implement an<br />

smart antenna depends on the type of algorithm used. The two<br />

basic types of smart antenna are switched-beam antennas and<br />

adaptive arrays. The former selects a beam pattern from a set of<br />

predetermined patterns, while the latter dynamically steers<br />

narrow beams toward multiple users. Generally speaking, SA is<br />

more likely be used in a base station than a mobile, due to size<br />

and power restrictions.<br />

B. Multi-user detection (MUD)<br />

Multi-user detection (MUD) is used to eliminate the multiple<br />

access interference (MAI) present in CDMA systems. Based on<br />

the known spreading waveform for each user, MUD determines<br />

the signal from other users and can eliminate this from the<br />

desired signal. Mobile devices do not normally contain the<br />

spreading codes of the other users in the cell, so MUD will likely<br />

be implemented only in base stations, where it can improve the<br />

capacity of the reverse (mobile-to-base) link.<br />

C. Power control<br />

Power control will also be important in 4G to help achieve the<br />

desired performance; this helps in controlling high PAVR -<br />

different services need different levels of power due to the<br />

different rates and QoS [7]levels required. Therefore, power<br />

control needs to be a very tight, closed loop. Baseband<br />

processing is just as critical whether dealing with the receiver or<br />

transmitter sections. As we've seed, RF and baseband work in<br />

tandem to produce 4G signals. The baseband processing of a 4G<br />

transmitter will obviously be more complicated than in a 3G<br />

design. The digital-to-analog converter (DAC) is an important<br />

piece of the transmit chain. It requires a high slew rate to<br />

minimize distortion, especially with the high PAVR of the MCM<br />

signals. Generally, data is oversampled 2.5 to 4 times; by<br />

increasing the oversampling ratio of the DAC, the step size<br />

between samples decreases. This minimizes distortion.<br />

D. Increasing the capacity<br />

In the baseband processing section of the transmit chain, the<br />

signal is encoded, modulated, transformed using an IFFT, and<br />

then a cyclic extension is added. Dynamic packet assignment or<br />

dynamic frequency selection are techniques which can increase<br />

the capacity of the system. Feedback from the mobile is needed<br />

to accomplish these techniques. The baseband processing will<br />

have to be fast to support the high data rates.<br />

VI. CONCLUSION<br />

The proposed MCM and OFDM-based technologies will<br />

provide large amounts of bandwidth for broadcast and broadband<br />

applications. With Higher bandwidth MCM/ OFDM<br />

technologies also offer economic benefits additional features and<br />

wider coverage. In most instances MCM/CDMA will remain the<br />

leading and most economical platform for the delivery of mobile<br />

broadband services. Mass adoption of these wide-bandwidth<br />

OFDM-based solutions will surely cater the needs of 4G<br />

networks.<br />

REFERENCES<br />

[1] R. Ziemer, W. Tranter, ―Principles of Communications: Systems,<br />

Modulation and Noise‖ (5th Edition, John Wiley & Sons, 2002)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 338<br />

ISSN 2250-3153<br />

[2] A. Bahai, B. R. Saltzberg, ―Multi-Carrier Digital Communications – Theory<br />

& Applications of OFDM‖ (Klumer Academic / Plenum Publishers, 1999)<br />

[3] H. Matsutani, M. Nakagawa, ―Multi-Carrier DS-CDMA Using Frequency<br />

Spread Coding‖, IEICE Trans. Fundamentals, vol.E82-A, no.12, pp.2634-<br />

2642, Dec 1999.<br />

[4] C. Y. Li, S. Roy, ―Performance of Frequency-Time MMSE Equalizer for<br />

MC-CDMA over Multi-path Fading Channel‖, Dept. of Elec. Eng., Uni. Of<br />

Washington, USA, April 2002.<br />

[5] S. Abeta, H. Atarashi, M. Sawahashi, F. Adachi, ―Performance of Coherent<br />

Multi-Carrier/DS-CDMA and MC-CDMA for Broadband Packet Wireless<br />

Access‖, ICICE Trans. Comm., vol.E84-B, no.3, pp.406-414, March 2002.<br />

[6] S. Hara, R. Prasad, ―Design and Performance of Multi-carrier CDMA<br />

System in Frequency Selective Rayleigh Fading Channels‖, IEEE Trans on<br />

Vehicular Tech., vol.48, no.5, pp1584-1595, Sep 2002.<br />

[7] A. Harada, S. Abeta, M. Sawahashi, ―Adaptive Radio Parameter Control<br />

Considering QoS for Forward Link OFCDM Wireless Access‖, IEEE VTC<br />

2002, pp.1175-1179.<br />

AUTHORS<br />

First Author – M.Gopu, Research scholar, CMJ University,<br />

India. Email id - gopumano@gmail.com,<br />

Second Author – Dr. Ritesh Khanna, rkhanna23@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 339<br />

ISSN 2250-3153<br />

Study and Comparison Performance of On-demand<br />

AODV and DSR, along with the traditional proactive<br />

DSDV Routing Protocols for MANET<br />

Vijendra Rai*, Jaishree Jain**<br />

Computer Science and Engineering Departments, College of Engineering & Rural Technology, Meerut, UP, India<br />

** Technology Departments, Bharat Institute of Technology, Meerut, UP, India<br />

Abstract- In wireless research area, efficient routing<br />

algorithms can provide remarkable benefits in Ad-hoc networks,<br />

including higher throughput, lower average end-to-end delay,<br />

less number of dropped data packets and generally an<br />

ameliorated network performance. Many routing protocols for<br />

such networks have been proposed so far. My research work, an<br />

attempt has been made to compare the performance of three<br />

prominent on-demand reactive routing protocols for mobile ad<br />

hoc networks: DSR and AODV, along with the traditional<br />

proactive DSDV protocol. A simulation analysis with MAC and<br />

physical layer models is used to study interlayer communication<br />

and their performance implications. Experimental results<br />

obtained, showed that the On-demand protocols, AODV and<br />

DSR perform much better than the table-driven DSDV protocol.<br />

Although DSR and AODV share similar On-demand behavior,<br />

the differences in the protocol mechanics can lead to significant<br />

performance differentials. For a variety of scenarios, as<br />

characterized by mobility, load and size of the ad-hoc network<br />

were simulated. The performance differentials are analyzed using<br />

varying network load, mobility pattern, and Network size.<br />

Index Terms- Ad Hoc Network, AODV, DSDV, DSR, NS2.<br />

I. INTRODUCTION<br />

In ad hoc networks, each mobile node operates not only as a<br />

host but also as a router, forwarding packets for other mobile<br />

nodes in the network that may not be within direct wireless<br />

transmission range of each other. Each node participates in an ad<br />

hoc routing protocol that allows it to discover ―multi-hop‖ paths<br />

through the network to any other node. The idea of ad hoc<br />

networking is sometimes also called infrastructure less<br />

networking, since the mobile nodes in the network dynamically<br />

establish routing among themselves to form their own network<br />

―on the fly.‖<br />

A. Mobile Ad-Hoc Network<br />

An ad-hoc network is a collection of wireless mobile hosts<br />

forming a temporary network without the aid of any standalone<br />

infrastructure or centralized administration [13]. Mobile Ad-hoc<br />

networks are self-organizing and self-configuring multihop<br />

wireless networks where, the structure of the network changes<br />

dynamically. This is mainly due to the mobility of the nodes<br />

[12]. Nodes in these networks utilize the same random access<br />

wireless channel, cooperating in a friendly manner to engaging<br />

themselves in multihop forwarding. The nodes in the network not<br />

only act as hosts but also as routers that route data to/from other<br />

nodes in network [10]. In mobile ad-hoc networks where there is<br />

no infrastructure support as is the case with wireless networks,<br />

and since a destination node might be out of range of a source<br />

node transmitting packets; a routing procedure is always needed<br />

to find a path so as to forward the packets appropriately between<br />

the source and the destination. Within a cell, a base station can<br />

reach all mobile nodes without routing via broadcast in common<br />

wireless networks. In the case of ad-hoc networks, each node<br />

must be able to forward data for other nodes. This creates<br />

additional problems along with the problems of dynamic<br />

topology which is unpredictable connectivity changes [11, 14].<br />

B. Infrastructure Networks<br />

Infrastructure network consists of a network with fixed and<br />

wired gateways. A mobile host communicates with a bridge in<br />

the network (called base station) within its communication<br />

radius. The mobile unit can move geographically while it is<br />

communicating. When it goes out of range of one base station, it<br />

connects with new base station and starts communicating through<br />

it. This is called handoff. In this approach the base stations are<br />

fixed.<br />

C. Infrastructure less (Ad hoc) Networks<br />

In ad-hoc networks [5] all nodes are mobile and can be<br />

connected dynamically in an arbitrary manner. As the range of<br />

each host‘s wireless transmission is limited, so to communicate<br />

with hosts outside its transmission range, a host needs to enlist<br />

the aid of its nearby hosts in forwarding packets to the<br />

destination. So all nodes of these networks behave as routers and<br />

take part in discovery and maintenance of routes to other nodes<br />

in the network. Ad hoc Networks are very useful in emergency<br />

search-and rescue operations, meetings or conventions in which<br />

persons wish to quickly share information, and data acquisition<br />

operations in inhospitable terrain. This ad-hoc routing protocols<br />

can be divided into two categories:<br />

1. Table-Driven Routing Protocols: In table driven routing<br />

protocols, consistent and up-t o-date routing information to all<br />

nodes is maintained at each n ode.<br />

2. On-Demand Routing Protocols: In On-Demand routing<br />

protocols, the routes are created as and when required. When a<br />

source wants to send to a destination, it invokes the route<br />

discovery mechanisms to find the path to the destination.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 340<br />

ISSN 2250-3153<br />

D. Some of the differences between proactive (Tabledriven)<br />

and reactive (On-demand) routing protocols are:<br />

Parameters Proactive-table Reactive-on<br />

driven<br />

demand<br />

Overhead High Low<br />

Memory<br />

requirement<br />

High Low<br />

Delay Low High<br />

Routing<br />

philosophy<br />

Flat Flat<br />

Availability of Always available Available when<br />

routing regardless of need it<br />

information need<br />

Coping with Inform other Use localized<br />

mobility nodes to achieve<br />

a consistent<br />

routing table<br />

route discovery<br />

Quality of Mainly shortest Few can support<br />

service(QoS) path as the QoS QoS, although<br />

support<br />

metric most support<br />

shortest path<br />

Signaling traffic Greater than that Grows with<br />

generated in on-demand increasing<br />

routing mobility of<br />

active routes<br />

E. Destination Sequenced Distance VECTOR (DSDV)<br />

The Destination-Sequenced Distance-Vector (DSDV)<br />

Routing Algorithm is based on the idea of the classical Bellman-<br />

Ford Routing Algorithm with certain improvements. Every<br />

mobile station maintains a routing table that lists all available<br />

destinations, the number of hops to reach the destination and the<br />

sequence number assigned by the destination node. The sequence<br />

number is used to distinguish stale routes from new ones and<br />

thus avoid the formation of loops. The stations periodically<br />

transmit their routing tables to their immediate neighbors. A<br />

station also transmits its routing table if a significant change has<br />

occurred in its table from the last update sent. So, the update is<br />

both time-driven and event-driven.<br />

Advantages of DSDV<br />

a. DSDV protocol guarantees loop free paths [9].<br />

b. Count to infinity problem is reduced in DSDV<br />

[9].<br />

c. We can avoid extra traffic with incremental<br />

updates instead of full dump updates.<br />

d. Path Selection: DSDV maintains only the best<br />

path instead of maintaining multiple paths to<br />

every destination. With this, the amount of<br />

space in routing table is reduced.<br />

Limitations of DSDV<br />

a. Wastage of bandwidth due to unnecessary advertising of<br />

routing information even if there is no change in the<br />

network topology [7].<br />

b. DSDV doesn‘t support Multi path Routing.<br />

c. It is difficult to determine a time delay for the<br />

advertisement of routes [3].<br />

d. It is difficult to maintain the routing table‘s<br />

advertisement for larger network. Each and every host<br />

in the network should maintain a routing table for<br />

advertising. But for larger network this would lead to<br />

overhead, which consumes more bandwidth.<br />

F. Ad Hoc On-Demand Distance Vector Routing (AODV)<br />

Ad-hoc On-demand Distance Vector is essentially a<br />

combination of both DSR and DSDV. It borrows the basic ondemand<br />

mechanism of Route Discovery and Route Maintenance<br />

from DSR, plus the use of hop-by-hop routing, sequence<br />

numbers, and periodic beacons from DSDV. It uses destination<br />

sequence numbers to ensure loop freedom at all times and by<br />

avoiding the Bellman-Ford count-to-infinity problem offers<br />

quick convergence when the ad hoc network topology changes.<br />

In this research paper we attempt to present an overview of two<br />

main categories of mobile ad-hoc routing protocols and<br />

performance comparison of both the protocols by simulation of<br />

two routing protocols(DSDV and AODV) focusing on the<br />

differences in their dynamic behavior that can lead to<br />

performance differences.<br />

Advanced uses of AODV<br />

a. Because of its reactive nature, AODV can handle highly<br />

dynamic behavior of Vehicle Ad-hoc networks [2].<br />

b. Used for both unicasts and multicasts using the ‘J‘ (Join<br />

multicast group) flag in the packets [4].<br />

Limitations/Disadvantages of AODV<br />

a. Requirement on broadcast medium: The algorithm<br />

expects/requires that the nodes in the broadcast medium<br />

can detect each others‘ broadcasts.<br />

b. No reuse of routing info: AODV lacks an efficient route<br />

maintenance technique.<br />

c. The routing info is always obtained on demand,<br />

including for common case traffic [8].<br />

d. It is vulnerable to misuse: The messages can be misused<br />

for insider attacks including route disruption, route<br />

invasion, node isolation, and resource consumption [6].<br />

e. AODV lacks support for high throughput routing<br />

metrics: AODV is designed to support the shortest hop<br />

count metric. This metric favors long, low bandwidth<br />

links over short, high-bandwidth links [8].<br />

f. High route discovery latency: AODV is a reactive<br />

routing protocol. This means that AODV does not<br />

discover a route until a flow is initiated. This route<br />

discovery latency result can be high in large-scale mesh<br />

networks<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 341<br />

ISSN 2250-3153<br />

G. Dynamic Source Routing (DSR)<br />

The key distinguishing feature of DSR is the use of source<br />

routing. Dynamic Source Routing (DSR) is a reactive protocol<br />

i.e. it doesn‘t use periodic advertisements. It computes the routes<br />

when necessary and then maintains them. Source routing is a<br />

routing technique in which the sender of a packet determines the<br />

complete sequence of nodes through which the packet has to<br />

pass; the sender explicitly lists this route in the packet‘s header,<br />

identifying each forwarding hop by the address of the next node<br />

to which to transmit the packet on its way to the destination host.<br />

H. NS2 TOOLS DETAILS:<br />

1. Ns2: Tool for virtual presentation of Network.<br />

2. Simulations: The artificial flow of virtual network<br />

3. Working: Nodes created by coding in TCL and given<br />

motion as in real network.<br />

Ns-2 Simulation Process Flow:<br />

I. EXPERIMENTS AND RESULTS:<br />

1. Throughput: The packet delivered per unit time.<br />

2. Delay: The time of delivery<br />

3. Packet delivery: The volume and information sent<br />

network.<br />

II. PERFORMANCE ANALYSIS<br />

A. Simulation Environment<br />

The simulation experiment is carried out in LINUX (Ubuntu<br />

9.04). The detailed simulation model is based on network<br />

simulator-2 (ver-2.33), is used in the evaluation. The NS<br />

instructions can be used to define the topology structure of the<br />

network and the motion mode of the nodes, to configure the<br />

service source and the receiver, to create the statistical data track<br />

file and so on.<br />

B. Traffic Model<br />

Continuous bit rate (CBR) traffic sources are used. The<br />

source-destination pairs are spread randomly over the network.<br />

Only 512-byte data packets are used. The number of sourcedestination<br />

pairs is varied to change the offered load in the<br />

network. The protocols maintain a send buffer of 64 packets. It<br />

contains all data packets waiting for a route, such as packets for<br />

which route discovery has started, but no reply has arrived yet.<br />

To prevent buffering of packets indefinitely, packets are dropped<br />

if they wait in the send buffer for more than 30 s. All packets<br />

(both data and routing) sent by the routing layer are queued at the<br />

interface queue until the MAC layer can transmit them. The<br />

interface queue has a maximum size of 50 packets and is<br />

maintained as a priority queue with two priorities each served in<br />

FIFO order. Routing packets get higher priority than data<br />

packets.<br />

III. PERFORMANCE METRICS<br />

The performance of the protocols depends on various interrelating<br />

adhered metrics. The most important parameters End to<br />

End Delay, Packet Loss and Throughput have been considered<br />

herein to draw an analytical observation.<br />

A. Average END to End Delay<br />

Average end to end delay includes all possible delays caused<br />

by buffering during route discovery latency, queuing at the<br />

interface queue, retransmission delays at the MAC, and<br />

propagation and transfer times of data packets.<br />

B. Packet Loss<br />

The protocols maintain a send buffer of 64 packets. It<br />

contains all data packets waiting for a route, such as packets for<br />

which route discovery has started, but no reply has arrived yet.<br />

To prevent buffering of packets indefinitely, packets are dropped<br />

if they wait in the send buffer for more than 30 s. All packets<br />

(both data and routing) sent by the routing layer are queued at the<br />

interface queue until the MAC layer can transmit them. The<br />

interface queue has a maximum size of 100 packets and is<br />

maintained as a priority queue with two priorities each served in<br />

FIFO order. Routing packets get higher priority than data<br />

packets.<br />

C. Throughput<br />

Also called packet delivery ratio, this is the ratio of the<br />

number packets received by the CBR sink to the number of<br />

packets sent by the CBR source, both at the application layer.<br />

Packets that are sent but not received are lost in the network due<br />

to malicious drops, route failures, congestion, and wireless<br />

channel losses. A higher throughput will directly impact the<br />

user‘s perception of the quality of service (QOS).<br />

IV. PERFORMANCE RESULTS<br />

A. Throughput vs. Node:<br />

DSR performed poorly in our metrics (PDR and Throughput)<br />

in these ―stressful‖ situations (higher mobility, more network<br />

load). The reason of these phenomena is the aggressive use of<br />

route caching in DSR. In our observation, such caching provides<br />

a significant benefit up to a certain extent. With higher loads the<br />

extent of caching is deemed too large to benefit performance.<br />

Often, stale routes are chosen since route length (and not any<br />

freshness criterion) is the only metric used to pick routes from<br />

the cache when faced with multiple choices. DSDV shows higher<br />

throughput than the DSR and AODV since its routing overhead<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 342<br />

ISSN 2250-3153<br />

is less than others. The rate of packet received for AODV is<br />

better than the DSDV.<br />

Fig. 1: THROUGHPUT Agent 1, Sink 1 DSDV<br />

Fig. 2: THROUGHPUT Agent 1, Sink1 AODV<br />

Fig. 3: THROUGHPUT Agent 1, Sink1 DSR<br />

B. Packet Dropped vs. Nod:<br />

Mainly Packet drop occurs due to the end of TTL (Time to<br />

Live). If a protocol takes much time to decide destination path,<br />

then the packets having short life time, fall into victim to drop.<br />

Efficient protocols can wisely find out routing direction thus<br />

packets dropping rate reduces for them. The dropped packet for<br />

DSR is less than that of DSDV; AODV has no periodic updates<br />

exist in DSR.<br />

Fig. 4: PACKET LOSS Agent 1, Sink 1 DSDV<br />

Fig. 5: PACKET LOSS Agent 1, Sink 1 AODV<br />

Fig. 6: PACKET LOSS Agent 1, Sink 1 DSR<br />

C. END to End Delay<br />

DSDV which is a table driven proactive routing protocol<br />

completely wins over the on demand reactive routing protocols<br />

AODV and DSR .Since DSDV proactively keeps the routes to all<br />

destination in its table it does not have to initiate the route<br />

request process as frequently as in AODV and DSR while<br />

sending packets. Hence on average DSDV clearly has less delay.<br />

Now we can easily observe that DSR is the worst protocol in<br />

terms of delay. At high mobility and more networks load (512<br />

byte packets at 3 packets/sec) aggressive route caching strategy<br />

of DSR fails. In these stressful condition links break very often<br />

leading to invalidation of routes cached.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 343<br />

ISSN 2250-3153<br />

Fig. 7: DELAY Agent 1, Sink 1 DSDV<br />

Fig. 8: DELAY Agent 1, Sink 1 AODV<br />

Fig. 9: DELAY Agent 1, Sink 1 DSR<br />

1. Comparison for 20 and 30 NODES (DSDV):<br />

2. Comparison for 20 and 30 NODES (AODV):<br />

3. Comparison For 20 and 30 NODES (DSR):<br />

4. Comparison based on QOS Parameters 20 nodes:<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 344<br />

ISSN 2250-3153<br />

5. Comparison based on QOS Parameters 30 nodes:<br />

V. CONCLUSION<br />

The study reveals that, DSDV shows higher throughput than<br />

the DSR and AODV since its routing overhead is less than<br />

others. The rate of packet received for AODV is better than the<br />

DSDV. The dropped packet for DSR is less than that of DSDV;<br />

AODV has no periodic updates exist in DSR. DSDV routing<br />

protocol consumes more bandwidth, because of the frequent<br />

broadcasting of routing updates. While the AODV is better than<br />

DSDV as it doesn‘t maintain any routing tables at nodes which<br />

results in less overhead and more bandwidth. It can be assumed<br />

that DSDV routing protocols works better for smaller networks<br />

but not for larger networks. In END to End Delay, DSDV which<br />

is a table driven proactive routing protocol completely wins over<br />

the on demand reactive routing protocols AODV and DSR .Since<br />

DSDV proactively keeps the routes to all destination in its table<br />

it does not have to initiate the route request process as frequently<br />

as in AODV and DSR while sending packets. Hence on average<br />

DSDV clearly has less delay. It can be observed that DSR is the<br />

worst protocol in terms of delay.<br />

So, my conclusion is that, a combination of DSR and DSDV<br />

would result in a protocol with better performance than either of<br />

the two.<br />

VI. FUTURE SCOPE<br />

In the future, extensive complex simulations could be carried<br />

out using the project code, in order to gain a more in-depth<br />

performance analysis of the ad hoc routing protocols. Other new<br />

protocol performance could be studied too.<br />

REFERENCES<br />

1. NS-2, The ns Manual (formally known as NSDocumentation)<br />

available at http: //www. isi.edu/nsnam/ns/doc.<br />

2. Christian Schwingenschlogl and Timo Kosch. “Geocast<br />

enhancements of aodv for vehicular networks.” Technical report,<br />

Institute of Communication Networks, Munich University of<br />

Technology. and BMW Research,Munich, Germany. 12 Nov 2009<br />

3. Guoyou He. “Destination-sequenced distance vector (DSDV)<br />

protocol.” Technical report, Helsinki University of Technology,<br />

Finland. 2 Dec 2003<br />

4. Krishna Ramachandran. “Aodv.” Technical report, University of<br />

California, Santa Barbara, USA. July 2004<br />

5. Magnus Frodigh, Per Johansson and Peter Larsson. Wirelessad hoc<br />

networking—The art of networking without a network.<br />

6. Ning.P. and Sun.K. “How to misuse aodv: a case study of insider<br />

attacks against mobile ad-hoc routing protocols.” Technical report,<br />

Comput. Sci. Dept., North Carolina State Univ., Raleigh, NC, USA,<br />

2003.<br />

7. Danny D. Patel. “Energy in ad-hoc networking for the pico radio.”<br />

Technical report. 15 Jun 2006<br />

8. Krishna Ramachandran. “Aodv-st.” Technical report, University of<br />

California, Santa Barbara, USA. July 2004<br />

9. Dr. Uwe Roth. “Highly dynamic destination-sequenced distancevector<br />

routing.” June 15, 2006<br />

10. Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dutkiewicz. “A<br />

review of routing protocols for mobile ad hoc networks. Technical<br />

report,” Telecommunication and Information Research Institute,<br />

University of Wollongong, Wollongong, NSW 2522; Motorola<br />

Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia,<br />

2003.<br />

11. Laura Marie Feeney. “A taxonomy for routing protocols in mobile ad<br />

hoc networks.” Technical report, Swedish Institute of Computer<br />

Science, Sweden, 1999.<br />

12. Xiaoyan Hong, Kaixin Xu, and Mario Gerla. ―Scalable routing<br />

protocols for mobile ad hoc networks”. 2002.<br />

13. David B. Johnson and David A. Maltz. ―Dynamic source routing in ad<br />

hoc wireless networks.” Technical report, Carnegie Mellon<br />

University, 1996.<br />

14. Jochen Schiller. “Mobile Communications.” Addison- Wesley, 2000.<br />

First Author – Vijendra Rai, M.Tech (Information Technology)<br />

from GGSIPU Delhi INDIA and email address is<br />

vijendrarai1@gmail.com.<br />

Second Author – Jaishree Jain, M.Tech (Software Engineering)<br />

from MNNIT Allahabad and email address is<br />

raijaishree@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 345<br />

ISSN 2250-3153<br />

“Automated Innovation Analysis & Human Resource<br />

Management System”<br />

Prashik Nagkirti, Sagar Kunjir, Ganesh Rajput, Swapnil Patil<br />

Department of Information Technology<br />

Marathwada Mitra Mandal‘s College of Engineering, Pune, Maharashtra, India.<br />

Abstract- ―Automated Innovation Analysis & Human<br />

Resource Management System‖, is a formal mechanism, which<br />

encourages employees of an organisation to contribute<br />

constructive, innovative innovations for improving productivity,<br />

efficiency and effectiveness in an organization. This system will<br />

elicit various innovations from employees, classify them, and<br />

dispatch them to experts for evaluation. After this, the posted<br />

innovation might be adopted, in which case the Originator of that<br />

innovation (i.e. an employee from the organization) may well be<br />

rewarded. With this system all employees are completely aware<br />

of recently posted, awarded, screened, evaluated, rejected<br />

innovations & view statistics with statistic module. Advance<br />

search module helps to search any innovation post & their status<br />

with just putting keyword to module. Authenticate the user with<br />

username (Employee ID/Employee Email ID) and the password<br />

(encrypted password). This system being deployed on the web,<br />

the system automatically reduces the mechanical work involved,<br />

such as manual transmission of innovations and paperwork,<br />

which can impede performance, thus leading to improved<br />

efficiency. Through this system we aim to capture the entire<br />

innovation life cycle and ease the processing of requests. In<br />

IT enterprises, management occupies a central position in the<br />

multiple functional managements of the corporate management.<br />

The key to rise and fall of IT enterprises is how to find out<br />

talents, take in talents, cultivate talents and conserve<br />

talents and how to stimulate enthusiasm, innovation and<br />

cooperative spirit of employees. This article analyzes<br />

characteristics of IT enterprises, and brings the ways to<br />

implement the effective management in IT enterprises. In this<br />

system we use RFID facility to keep track of employees. We<br />

provide the leave management facility using mobile application.<br />

Index Terms- Employee, Human Resource, Innovation, Mobile,<br />

RFID.<br />

T<br />

I. INTRODUCTION<br />

his project is build up for developing online system which<br />

encourages employees of organization to get online any time<br />

and share their ideas or innovations. This system also helps to<br />

improve communication among employees and associates.<br />

Use of RFID Technology:<br />

RFID stands for Radio Frequency Identification. A typical RFID<br />

system consists of a tag, a reader, and some sort of data<br />

processing equipment, such as a computer. The reader sends a<br />

request for identification information to the tag. The tag responds<br />

with the respective information, which the reader then forwards<br />

to the data processing device. The tag and reader communicate<br />

with one another over an RF channel. In some systems, the link<br />

between the reader and the computer is wireless.<br />

Radio frequency identification (RFID) is an emerging technology<br />

and process this can helps to keep track of employee details.<br />

This system is also aimed at developing an online leave<br />

management system that is of importance to the organization.<br />

This system can be used to automate the workflow of leave<br />

applications and their approvals. The periodic crediting of leave<br />

is also automated. There are features like, cancellation of leave,<br />

approval of leave, report generation, email notification etc in this<br />

system.<br />

II. LITERATURE REVIEW<br />

A. Automated Innovation Analysis<br />

Existing System is completely manual having mechanical<br />

works involving manual transmission of innovations and paper<br />

work which can impede performance. System does not let<br />

employees keep track on life cycle of innovations posted.<br />

Employees being unaware of the status of their post.<br />

Existing system does not have notification facility among<br />

employees. As it is manual system it is very tedious job to store,<br />

maintain, retrieve and evaluate huge information related to<br />

employees & their respective inputs. Employees cannot update<br />

their posts any time. Each time for new post one employee has to<br />

undergone whole long procedures and formalities. Existing<br />

System provide less security and also employee cannot<br />

personalize their accounts. Core team & Technical team has<br />

difficulties in co-coordinating & maintaining records of pending,<br />

evaluated, screened innovations in innovation cycle. The world is<br />

facing the next major transition: this will mean opportunity for<br />

some and extinction for other.<br />

B. Human Resource Management System<br />

The current Leave management process of the organization is<br />

very simple. The main processes involved are, registering the<br />

information of any new Employee, Department, and Leave<br />

Policy etc in a Register. Employees apply for leave manually by<br />

filling a leave application form. The superior employees<br />

approve/reject the leave applications of their subordinates by<br />

making such a note on the application. The employees enquire in<br />

the Human Resource Department about their leave balance. The<br />

superior also get information about the employees on leave from<br />

Human Resource Department. Administrator can manage Leave.<br />

Leave allocation to employee.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 346<br />

ISSN 2250-3153<br />

III. NEED FOR PROJECT<br />

System lets employees keep track on life cycle of innovations<br />

posted. Employees being unaware of the status of their post<br />

therefore we provide notification facility among employees.<br />

Through this system it is easy to maintain, retrieve and evaluate<br />

huge information related to employees & their respective inputs.<br />

Employees can update their posts anytime anywhere. This<br />

System provides more security and also employee can<br />

personalize their account. It is easy for Core team & Technical<br />

team members for co-coordinating & maintaining records of<br />

pending, evaluated, screened innovations in innovation cycle.<br />

This system is concerned with saving, editing, deleting the<br />

master information about the employee, department, designation,<br />

leave policy and leave allotment per designation.<br />

This management system allows the employees to apply for<br />

leave online. The employees can select the leave type they want<br />

to apply for. Accordingly they will get the information about the<br />

total number of that specific leave types allotted to them and how<br />

many leaves they have used, and how many are remaining.<br />

Accordingly the employee can decide for number of days leaves<br />

he requires and then proceed further. Also the employee can state<br />

the reason for applying for leave. The superior employee i.e. the<br />

head can view all the leave applications he has received from his<br />

subordinates. Also the head can see the leave details about the<br />

subordinate employees and accordingly accept/reject the<br />

applications. He can also state the reason for approval/rejection<br />

of application. In this system the employee can get the reply<br />

details of the specific leave application he has applied for. This<br />

will contain the information about who accepted rejected the<br />

application, for what reason and when. In this system, the<br />

employee can withdraw the leave application which has not been<br />

yet sanctioned by the head, without disturbing the head.<br />

IV. CONCEPT<br />

―Automated Innovation Analysis & Human Resource<br />

Management System‖ is build up for developing online system in<br />

which encourages employees of organization to get online any<br />

time and share their ideas or innovations. This system also helps<br />

to improve communication among employees from various areas<br />

with help notification module integrated in the system.<br />

―Automated Innovation Analysis & Human Resource<br />

Management System‖ is web application which provides<br />

multiuser environment. ―Automated Innovation Analysis &<br />

Human Resource Management System‖ is client-server<br />

architecture which is deployed in LAN (Local Area Network) of<br />

organization where multiple clients PCs connected to one server<br />

for accessing system.<br />

―Automated Innovation Analysis & Human Resource<br />

Management System‖ provides database which is relevant to<br />

store & maintain updated information. Database management<br />

helps to work many users at a time.<br />

With this system all employees are completely aware of<br />

recently posted, awarded, screened, evaluated, rejected<br />

innovations & view statistics with statistic module. Advance<br />

search module helps to search any innovation post & their status<br />

with just putting keyword to module. Authenticate the user with<br />

username (Employee ID) and the password (encrypted<br />

password).<br />

In Human Resource management system leave management<br />

facility helps employees to apply for leaves and keep track of all<br />

their leaves. Also employees can apply and manage their leaves<br />

at anytime anywhere using mobile application created for<br />

particular system.<br />

V. IMPLEMETATION<br />

User requirement is the first and fore most important for<br />

starting the development of the system software. A system is<br />

known as functionally correct if all the user requirements are<br />

fulfilled.<br />

For the ―Leave Management system‖ following are the user<br />

requirements:<br />

1) An employee should be able to:<br />

Login to the system through the first page of the application.<br />

Change the password after logging into the system. See his/her<br />

eligibility details (like how many days of leave he/she is eligible<br />

for etc). Query the leave balance. See his/her leave history since<br />

the time he/she joined the company.<br />

Apply for leave, specifying the form and to dates, reason for<br />

taking leave. See his/her current leave applications and the leave<br />

applications that are submitted to him/her for approval or<br />

cancellation. Approve/reject the leave applications that are<br />

submitted to him/her. Withdraw his/her leave application (which<br />

has not been approved yet). Cancel his/her leave (which has been<br />

already approved). This will need to be approved by his/her<br />

Superior. Get help about the leave system on how to use the<br />

different features of the system. The number of days of leave (as<br />

per the assumed leave policy) should be automatically credited to<br />

everybody and a notification regarding the same be sent to them<br />

automatically<br />

A summary report of the leave application details should be<br />

generated.<br />

System Requirement and Specification:-<br />

Description of Technology:<br />

Front End: ASP.NET, C#.NET,<br />

Back End: MS-SQL Server 2005<br />

VI. FEATURES<br />

Give rise to fully automated system for improving<br />

productivity, efficiency and effectiveness in an<br />

organization.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 347<br />

ISSN 2250-3153<br />

―Automated Innovation Analysis & Human Resource<br />

Management System‖ allows users to update their information or<br />

post any time.<br />

To provide automated notification employed with<br />

mailing so as to improve communication among<br />

employees & keep them updated.<br />

Proper life cycle of innovations is maintained like<br />

originator-technical team-core team-acceptance or<br />

rejection-awards that‘s why there is no confusion &<br />

conflicts among employees & teams.<br />

The proposed system is online so work can be done<br />

faster. Employee can apply for leave through internet<br />

even if he is at home.<br />

Since the system is online there is facility for login and<br />

password. Only authorized employees can use the<br />

system.<br />

System gives all the detailed leave information about<br />

subordinate employee.<br />

VII. CONCLUSION<br />

Project build on ―Automated Innovation Analysis & Human<br />

Resource Management System‖ is relevant and very useful to<br />

organization wherein it provides platform for employees to share<br />

their innovative ideas in different eras like technical,<br />

infrastructure, facilities, demands, business etc. Technically<br />

database management system becomes useful to manage huge<br />

data & maintaining records. Notifications also raise<br />

communication between employees which may clear doubts<br />

coordinating them in certain work. This helps organization to<br />

improve their productivity, efficiency and efficacy. This system<br />

is generally helpful for newly established companies which are<br />

on their way to grow and develop. This system also helps to keep<br />

information about employees in Human Resource management<br />

by using RFID and mobile application facility.<br />

REFERENCES<br />

[1] Ali Mostafavi, Student Member, IEEE, Dulcy M. Abraham, Daniel<br />

DeLaurentis, Member, IEEE, and Joseph Sinfield, ―A System of Systems<br />

Framework‖. <strong>JUNE</strong> 2011<br />

[2] RFID Essentials - by Bill Glover, Himanshu Bhatt.<br />

[3] http://www.rediff.com/money/2007/feb/14guest.htm.(literature survey).<br />

AUTHORS<br />

Prashik Nagkirti, Sagar Kunjir, Ganesh Rajput, Swapnil Patil are<br />

pursuing their Bachelor of Engineering Degree in Information<br />

Technology from Marathwada Mitra Mandal‘s College of<br />

Engineering, Pune, Maharashtra, India.<br />

They are implementing project based on this idea.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 348<br />

ISSN 2250-3153<br />

X-Ray Satellites in the Lα1 Region of 4d Transition<br />

Element<br />

Dr. Sameer Sinha *, Ajay Vikram Singh**, Kedar Nath Singh***<br />

*Reader, Ganpat Sahai Post Graduate College, Sultanpur, U.P. India<br />

**Associate Professor, Rajarshi Rananjay Sinh Institute of Management &Technology, Amethi , CSJ Nagar, U.P. , India<br />

***Lecturer, S.B.I.C., Badlapur , Jaunpur<br />

Abstract- We have used Plasmon theory [13,14] to explain<br />

Energy Satellites and relative intensity of high energy X-ray<br />

satellites Lα3 , Lα4 & Lα5 with respect to Lα1 parent line in 4d<br />

Transition Metal ( Zr , Nb , Mo , Ru , Rh , Pd , Ag and Cd) and<br />

estimated values are in agreement with the calculated values of<br />

Surendra Poornia and S.N.Soni[15].<br />

Index Terms- Surface Plasmon Satellites , Relative Intensity<br />

& Energy Sepration<br />

I<br />

I. INTRODUCTION<br />

n the characteristic X-ray Spectra, Diagram as well as non<br />

Diagram lines are present. Those lines which fit in the<br />

conventional energy level diagram are called Diagram lines. &<br />

those lines which do not fit in the conventional energy level<br />

diagram are called non diagram lines. It is also known as<br />

―Satellites or Second order lines‖. Satellites are generally of<br />

weak intensity lines & are found close to more intense parent<br />

line. The satellites which are observed on higher energy side are<br />

called high energy satellites (HES) whereas those are observed<br />

on lower energy side are called lower energy satellites (LES).<br />

First Siegbahn & Stenstroem observed these satellites in the K-<br />

Spectra of element from Cr to Ge while coster theraeus &<br />

Richtmyer in the L-Spectra of element from Cu to Sb & Hajlmar,<br />

Hindberg & Hirsch in the M-Spectra of elements from Yb to U.<br />

Several theories were proposed from time to time to explain the<br />

origin of these satellites. Out of these theories the plasmon theory<br />

is found to be the most suitable theory especially for those<br />

satellites.<br />

Plasmon theory was first proposed by Bohm & pines which<br />

are extended by Housten, Ferrel, Noziers & Pines. According to<br />

this theory the low energy plasmon satellites are emitted when<br />

valence electron excites a plasmon during the annihilation of<br />

core hole conversely if Plasmon pre exists, its energy add up to<br />

the energy of diagram line.<br />

The radiation less reorganization of electronic shell of an<br />

atom is known as Auger effect. Auger satellites have also been<br />

observed by Korbar and Mehlhorn [1] Haynes et at. [2] Edward<br />

and Rudd [3]. Theoretical explanation for K series Auger<br />

spectrum was given by Burhop and Asaad [4] using intermediate<br />

coupling. Later on more refined theory, using relativistic and<br />

configuration interaction has been used by Listengarter [5] and<br />

Asaad [6]<br />

In Auger primary spectra, one can also observe secondary<br />

electron peaks close to the primary peaks are produced by<br />

incident electrons which have undergone well energy losses. The<br />

most common source of such energy loss in the excitation of<br />

collective plasma oscillations of the electrons in the solid. This<br />

gives rise to a series of plasma peaks of decreasing magnitude<br />

spaced by energy ħp where p is the frequency of plasma<br />

oscillation.<br />

Auger peaks are also broadened by small energy losses<br />

suffered by the escaping electrons. This gives rise to a satellite on<br />

the low energy of the Auger peak. Energy loss peaks have well<br />

defined energy with to primary energy.<br />

The involvement of Plasmon oscillation in the X-ray emission<br />

or absorption spectra of solids has been widely studied during the<br />

last few decades and has been recognized that the electron –<br />

electron interaction has played an important role.<br />

This Paper is devoted to Plasmon theory [13,14] to explain<br />

the Energy Satellites and relative intensity of high energy X-ray<br />

satellites Lα3 , Lα4 & Lα5 with respect to Lα1 parent line in<br />

4d Transition Metal ( Zr , Nb , Mo , Ru , Rh , Pd , Ag and<br />

Cd) and estimated values are in agreement with the calculated<br />

values of Surendra Poornia and S.N.Soni[15].<br />

According to Plasmon theory, if the valence electron, before<br />

filling the core vacancy, also excites a Plasmon, then the energy<br />

ħωp needed for the excitation of Plasmon oscillation is taken<br />

from the transiting valence electron so that the emitted radiation<br />

will be derived off an energy ħωp and a low energy satellites will<br />

emitted whose sepration from the main X-ray line will<br />

correspond to ħωp . On the other hand if the Plasmon pre exists,<br />

during the X-ray emission process, then, on its decay it can give<br />

its energy to the transiting valence electron before it annihilates<br />

the core vacancy. Thus the energy of emitted X-ray photon will<br />

be higher than the main emission line and by an amount ħωp<br />

giving rise to high energy satellite.<br />

Surendra Poornia and S.N.Soni have observed low and high<br />

energy satellite peaks in 4d Transition Metal ( Zr , Nb , Mo , Ru<br />

, Rh , Pd , Ag and Cd ) A close approximation of their tables<br />

shows that some satellites are at a distance of ħωp (Plasmon<br />

energy ) from the main emission line . This observation forced<br />

us to think that these might be due to Plasmons emission and<br />

absorption.<br />

II. MATHEMATICAL CALCULATION<br />

In order to confirm the involvement of Plasmon in the<br />

emission of X-ray satellites the relative intensity of single<br />

Plasmon satellites must be calculated. In this process first we<br />

deal with mathematical details of canonical transformation<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 349<br />

ISSN 2250-3153<br />

carried out over the model Hamiltonian of the system . Thus the<br />

energy separation ∆E of the low and high energy Plasmon<br />

satellite from the corresponding main line should be equal to the<br />

quantum of Plasmon energy ħωp which is given by [13]<br />

ev 1<br />

Where Z = No.of unpaired electrons taking part in plasma<br />

oscillation<br />

= Specific gravity<br />

= Molecular Weight<br />

This equation can be derived as given below.<br />

From the classical consideration, we get the frequency of<br />

Plasmon oscillation as<br />

Hence the amount of energy given to Plasmon becomes<br />

Ep = ħωp = ħ<br />

In this equation we can write n =<br />

, Z and W are defined above and L is the Avogadro number .By<br />

putting the numerical value of constant, we get the Plasmon<br />

energy as<br />

2<br />

ev 3<br />

Our calculated values of ∆E have been compared with the<br />

Scrocco‘s experimental value. And We have also calculated the<br />

relative intensity of plasmon satellites, which is different in<br />

different processes. If the excitation of plasmon occurs during the<br />

transport of the electron through the solid, it is known as<br />

extrinsic process of plasmon excitation. The plasmon can also be<br />

excited by another method known as intrinsic process. In this<br />

process, excitation of plasmon takes place simultaneously with<br />

creation of a hole. Bradshaw et al have further divided core hole<br />

excitation into two classes<br />

1. Where the number of slow electrons are conserved.<br />

2. Where the number of slow electrons are not conserved<br />

The Author has calculated relative intensity in both the cases<br />

with new modification in the light of Bradshaw [12] and<br />

Lengreth [13] work, which explains that not only intrinsic<br />

process but extrinsic process and their relative contribution may<br />

also contribute in relative intensities. The combined effect of<br />

intrinsic and extrinsic plasmon excitation intensity variation was<br />

suggested by Lengreth as:<br />

I= Is / Im = α n 4<br />

The value of β is taken as β = 0.12rs which is purely intrinsic,<br />

rs = (47.11/ ħws) 2/3 is dimensionless parameter and α = 0.47 rs 1/2<br />

in the place of α = (1+l/L) -1 used by Pardee et. al.(14) . The<br />

equation (3) contains a series of terms. The first term of the<br />

equation is purely extrinsic, while second term is purely intrinsic.<br />

The other terms are containing the relative contributions of both<br />

extrinsic and intrinsic. The specialty of this formula is that each<br />

term alone or simultaneously with other terms is able to give the<br />

relative intensity. This formula also includes both the categories<br />

mentioned by Bradshaw and gives better results as compared<br />

than traditional methods for calculation of the relative intensity.<br />

Using the values of α, β and rs in equation (4)<br />

Using the equation (4), the author has for the first time,<br />

calculated the relative intensity of high energy X-ray satellites<br />

Lα3 , Lα4 & Lα5 with respect to Lα1 parent line in 4d<br />

Transition Metal ( Zr , Nb , Mo , Ru , Rh , Pd , Ag and Cd)<br />

metals. Our calculated and estimated values are in agreement<br />

with the calculated values of Surendra Poonia and S.N.Soni(11).<br />

REFERENCES<br />

[1] Haynes S.K. & Velinsky, M & Velinsky L.J. ; Nucl. Phys. A99 (1967), 537.<br />

[2] Rudd M.E. & Edward & Volz, D.J. ; Phys Rev. 151, (1966), 28.<br />

[3] Asaad, W.N. & Burhop E.H.S. ; Proc. Phys. Soc., London 71, (1958), 369.<br />

[4] Listengarten, M.A. ; Bull Acad. Sci. U.S.S.R., Phys. Ser. 26 (1962), 182.<br />

[5] Asaad, W.N. ; Nucl. Phy. 66, (1965b), 494.<br />

[6] M.Scrocco in photoemission spectra of Pb.(II) halide; Phys. Rev. B25<br />

(1982) 1535-1540 .<br />

[7] M.Scrocco , Satellites in X-ray Photo electron spectroscopy of insulator I 32<br />

(1985) 1301-1306<br />

[8] M.Scrocco , Satellite in X-ray Photo electron spectroscopy of insulators II<br />

32 (1985) 1307-1310<br />

[9] L.Marton , L.B.Lader and H. Mendlowitz; Adv. Electronic and Electro<br />

Physics; edited by L.M arton Academic , New York 7 (1955) , 225 .<br />

[10] Surendra poonia and S.N.Soni , Indian journal of pure and applied physics ,<br />

vol.45, feb.2007 pp-119-126<br />

[11] A. M. Bradshaw, Cederbaurn S.L, Domeke W. & Krause Jour. Phys C:<br />

Solid StatePhys. 7, 4503, 1974<br />

[12] D. C. Lengreth, Phys. Rev. Letter, 26, 1229, 1971<br />

[13] K. S. Srivastava , S. P. Singh and R.L. Srivastava ; Phys. Rev. B13 ( 1976 )<br />

, 3213<br />

[14] W. J. Pardee, G.D. Mahan, D. E. Eastman R.A. Pollak, L. Ley, F.R.<br />

McFeely, S.P.Kowalczky and D.A. Shirely, Phys. Rev. B, 11, 3614, 1975.<br />

[15] Surendra poonia and S.N.Soni , Indian J. Phys. 83 (3), 325-337 (2009)<br />

AUTHORS<br />

First Author – Dr. Sameer Sinha, Reader , Ganpat Sahai Post<br />

Graduate College , Sultanpur ,U.P. India<br />

Second Author – Ajay Vikram Singh, Associate Professor,<br />

Rajarshi Rananjay Sinh Institute of Management &Technology,<br />

Amethi , CSJ Nagar, U.P. , India<br />

Third Author – Kedar Nath Singh, Lecturer , S.B.I.C. ,<br />

Badlapur , Jaunpur<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 350<br />

ISSN 2250-3153<br />

Correspondence Author – Ajay Vikram Singh, Associate<br />

Professor, Rajarshi Rananjay Sinh Institute of Management<br />

&Technology, Amethi , CSJ Nagar, U.P. , India, Email:<br />

ajay_gspgcs@rediffmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 351<br />

ISSN 2250-3153<br />

Energy sepration ΔE at Lα1 satellite of 4-d Transistion element<br />

S.No. SYMBOL Z W Sp.Gravity<br />

Exper. Value<br />

[Ref. 15]<br />

Author Value<br />

Satell.<br />

Name<br />

1<br />

6.54 5.44 Lα3<br />

Zr(40) 1 91.224 6.51<br />

2 10.64 10.88 Lα5<br />

3<br />

6.51 6.19 Lα3<br />

Nb(41) 1 92.906 8.58<br />

4 10.61 12.38 Lα5<br />

5<br />

6.54 6.67 Lα4<br />

Mo(42) 1 95.94 10.28<br />

6 8.84<br />

9.43<br />

Lα5<br />

7<br />

6.85 7.15 Lα3<br />

8 Ru(44) 1 101.07 12.45<br />

9.55 10.11 Lα4<br />

9 11.95 14.30 Lα5<br />

10<br />

7.36 7.07 Lα3<br />

11 Rh(45) 1 102.91 12.41<br />

9.96 10.00 Lα4<br />

12 12.66 14.14 Lα5<br />

13<br />

7.59 6.84 Lα3<br />

14 Pd(46) 1 106.42 12.02<br />

10.39 9.68 Lα4<br />

15 13.49 13.68 Lα5<br />

16<br />

17<br />

Ag(47)<br />

2 107.87 10.5 8.09 8.99 Lα3<br />

10.69 12.71 Lα4<br />

18 13.99 17.98 Lα5<br />

19<br />

8.77 7.98 Lα3<br />

20 Cd(48) 2 112.41 8.64<br />

11.47 11.29 Lα4<br />

21 14.77 15.96 Lα5<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 352<br />

ISSN 2250-3153<br />

S.No. SYMBOL<br />

Relative Intensity of Lα1 satellite of 4-d Transition element<br />

Surface<br />

Energy<br />

Bulk<br />

Energy<br />

Rs Alpha beta<br />

Author<br />

intensity<br />

Exp.<br />

Intensity<br />

[Ref.15]<br />

Satell.<br />

Name<br />

1<br />

0.76180 0.7840591 Lα3<br />

Zr(40) 5.44 7.69 4.22 0.97 0.5060<br />

2 0.50600 0.4177052 Lα5<br />

3<br />

0.70000 0.7780185 Lα3<br />

Nb(41) 6.19 8.75 3.87 0.92 0.4644<br />

4 0.46440 0.4153178 Lα5<br />

5<br />

0.66780 0.7214661 Lα4<br />

Mo(42) 6.67 9.43 3.68 0.90 0.4419<br />

7 0.44190 0.4019253 Lα5<br />

9<br />

0.84370 0.7837573 Lα3<br />

10 Ru(44) 7.15 10.11 3.52 0.88 0.4218 0.63890 0.6746709 Lα4<br />

11 0.42180 0.3891727 Lα5<br />

13<br />

0.84970 0.8655837 Lα3<br />

14 Rh(45) 7.07 10.00 3.54 0.88 0.4248 0.64320 0.7143737 Lα4<br />

15 0.42480 0.3976648 Lα5<br />

17<br />

0.86844 0.8624479 Lα3<br />

18 Pd(46) 6.84 9.68 3.62 0.89 0.4342 0.65670 0.6916922 Lα4<br />

19 0.43420 0.4220774 Lα5<br />

21<br />

0.88480 0.8580864 Lα3<br />

22 Ag(47) 8.99 12.71 3.02 0.82 0.3622 0.72432 0.6724729 Lα4<br />

23 0.44240 0.4252396 Lα5<br />

25<br />

0.78365 0.8258238 Lα3<br />

26 Cd(48) 7.98 11.29 3.27 0.85 0.3918 0.59610 0.6572864 Lα4<br />

27 0.39180 0.4305464 Lα5<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 353<br />

ISSN 2250-3153<br />

Characterization of Sulphamic Acid Single Crystal by<br />

Optical Techniques<br />

Dr. Rita A. Gharde, Divakar T. Chunarkar<br />

* Department of Physics, Mumbai University, Kalina (Santacruz), Mumbai – 400 008 India<br />

Abstract- The formation of crystal in nature, like snowflakes<br />

and minerals, as well as the preparation of the crystal in<br />

laboratories and factories made for technical application is called<br />

crystal growth. The most frequently used and most important<br />

method of producing single crystals of a given material is by<br />

solidification of its own melt called ‗crystal growth from the<br />

melt‘ or just ‗melt growth‘. Its technical and economic<br />

importance is due to the fact that large single crystals can be<br />

grown very effectively and with a high yield at a relatively high<br />

growth rate. This growth rate is not limited by the transport of<br />

crystal species but only by the removal of the heat of<br />

crystallization. In the last decade single crystalline subject of<br />

increasing interest, because of their remarkable characteristics.<br />

Due to the large length-to-diameter ratio composed with perfect<br />

single crystal structure and chemical homogeneity, the<br />

mechanical properties approach theoretical value.<br />

In this work we are interested in growing single crystal for<br />

nonlinear optical applications. Beside this, we are trying to<br />

develop new materials that have specific thermo-mechanical<br />

properties to be used as a suspension for the mirror in advance<br />

gravitational waves detector in order to decrease low thermal<br />

noise.<br />

A monocrystal known as single crystal of sulphamic acid<br />

(H2NSO3H) is an inorganic nonlinear optical material was<br />

grown by slow evaporation solution growth technique. We have<br />

performed studies characterization of Sulphamic acid single<br />

crystal by X-ray diffraction and FTIR studies. The crystals are<br />

extremely good of the orthorhombic structure. We also study the<br />

other properties like viscosity, dielectric constant, melting point,<br />

PH scale and surface tension etc.<br />

Index Terms- Growth from solution, coefficient of viscosity,<br />

dielectric constant, melting point, PH scale and surface tension,<br />

inorganic compound.<br />

I. INTRODUCTION<br />

.<br />

ulphamic acid (H2NSO3H) is an important Industrial<br />

S<br />

chemical compound, which is strongly soluble in water. The<br />

molecular weight of this compound is 97.09. The growth of the<br />

single crystal in both science and technology important<br />

application of such crystal. The growth and size of any crystal<br />

depends on the condition of its formation. Temperature,<br />

pressure, presence of impurities etc will affect the size perfection<br />

of crystal.. In the recent years, several studies dealing with<br />

organic, inorganic and semi organic molecules and materials for<br />

non linear optics (NLO) reported, due to the increasing need for<br />

cheap and easily process able material. Crystals take variety of<br />

shapes, depending on the internal factors. Both internal and<br />

external factors influence the growth rates, and therefore, they<br />

modified the crystal morphology. Crystal grown from<br />

conventional solution growth method was used as a seed. The<br />

plane which has fast growth rate has chosen for this study. The<br />

growth of the face depends on the external factors such as<br />

temperature and pressure. The concentration of solution<br />

increases. In crystal growth literature, the recently discovered<br />

uniaxially solutions – crystallization method of Shankar Narayan<br />

– Ramasamy (SR) is a suitable method. To effectively control the<br />

orientation of molecule during the bulk crystal growth from<br />

solution at room temperature with 100% solute – crystal<br />

conversion efficiency. Non-linear optical (NLO) single crystal<br />

are used in the area of fiber optics, communication, optical<br />

frequency conversion, optical data storage etc. In the present<br />

investigation sulphamic acid single crystal or monocrystal grown<br />

by three distinct methods are as follows:<br />

1. Growth from solution<br />

2. Growth from melt<br />

3. Growth from vapor<br />

II. EXPERIMENTAL DETAILS<br />

We are using the growth from solution method to grow the<br />

crystal .We prepared 26 % solution of sulphamic acid at about<br />

30 0 to 45 0 temperature. Growth of sulphamic acid crystal was<br />

carried out by S. R. method by slow evaporation. In this method<br />

of growth assembly used ‗L‘ bend ampoule made by borosilicate<br />

glass with seed mounting pad which is parallel to that used by S.<br />

R. method. The selection of the solvent is an important step in<br />

the bulk growth of crystal from solution by slow evaporation<br />

method. The size of the crystal depends on the amount of<br />

material available in the solution, which in turn is decided by the<br />

solubility of the material in that solvent. Seed crystal were<br />

harvested within 2 to 4 days.<br />

As shown in fig. 1 consist of glass ampoule with seed<br />

mounting pad. A resistive ring heater (80W) of diameter 10 mm<br />

provides the necessary temperature around the growth ampoule<br />

for solvent evaporation. A ring heater positioned at the top of the<br />

growth ampoule was connected to the solvent of evaporation. In<br />

this experiment, the temperature around the growth region is<br />

mentioned at 65 0 C with ± 0.05 0 C accuracy depending on the<br />

evaporation rate of the growth crystal. The most important<br />

requirement for the growth of crystal from the vapor is<br />

sufficiently high saturated pressure P of the source to obtained an<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 354<br />

ISSN 2250-3153<br />

acceptable growth rate. The rate of the crystal growth from the<br />

vapor method is 1 mm per day = 1.16 X 10ˉ 6<br />

D = Glass Ampoule<br />

T = Sulphamic Acid Saturated<br />

Solution<br />

C = Water Bath<br />

E = Thermometer<br />

F = Seed Crystal of S.A.<br />

G = Fixed Stand<br />

L = L bend tube<br />

Fig.1: Schematic Diagram of the experimental setup S. A. Crystal<br />

Viscosity:-We used Ostwald Viscometer. The viscosities of<br />

two liquid, or the same liquid a different temperature, may be<br />

compared with the help of simple apparatus known as Ostwald<br />

Viscometer. As shown in fig.2 viscometer consists of U shape<br />

tube with two bulb A & B. A capillary position CDE a side tube<br />

T, fitted with a Tap S, & with three marks engraved on it, at M,<br />

N, & Q respectively. Prepare the saturated solution at a normal<br />

temperature of 1% sample in 100 ml distilled water.<br />

This solution has been taken in four different concentration i<br />

e 0.4%, 0.6%, 0.8% & 1.0%. From this solution fill 10 ml in<br />

Ostwald Viscometer apparatus and measure time in different<br />

position of the liquid. If the flow of liquid increase to increase<br />

the specific coefficient of viscosity. The temperature of liquid<br />

increases to decrease the viscosity of the given liquid.<br />

Fig. 2: Ostwal Viscometer Apparatus Fig. 3: Coefficient of Viscosity Graph<br />

Dielectric constant:- To study the dielectric constant we<br />

made a very simple technique in the laboratory. The single<br />

crystal of Sulphamic Acid crushed into powder form. In this<br />

method the capacitance of a capacitor increases when it is filled<br />

with an insulating medium. The increasing capacitance depends<br />

on the property of the medium, called dielectric constant.<br />

Dielectric constant method which we set up in the lab as shown<br />

in fig 4 .Both stripping copper plate varnished. Fine powder of<br />

this sample kept between two plate & packed with the rubber<br />

band.. At that time do not pass the air into the plate through the<br />

rubber band. After that to measure the capacitance of this sample<br />

with the help of millimeter & calculate the dielectric constant..<br />

The maximum dielectric constant response revealed may be of<br />

great interest in application. The sulphamic acid (H2NSO3H)<br />

Material with high dielectric constant values are quite good.<br />

Which can be used in the thin film transistor tunneling devices,<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 355<br />

ISSN 2250-3153<br />

insulator, fabricating capacitors and other electric field devices.<br />

Sulphamic acid crystal is an insulating material it gets higher<br />

Melting Point:- We study the capillary melting method by<br />

using the one side open capillary tube and to measure the melting<br />

point of the sample by using least capillary melting method.<br />

Crushed the SA crystal sample and fill the capillary tube and<br />

used the melting point instrument by measuring the melting point<br />

with the help of thermometer. The melting point of the crystal<br />

growth of sulphamic acid is 206˚C. The high melting point of the<br />

material contains strong bond and get the more energy of heat.<br />

Such type of material are used in the fire retardants for paper &<br />

other cellulosic‘s, stabilizing agent, for chlorine and<br />

hypochloride in swimming pool closed hydrogen system,<br />

bleaching paper pulp and textile catalyst for urea formaldehyde –<br />

resins.<br />

PH Meter:- PH Scale should be clear that every acquire<br />

solution whether acidic, alkaline & neutral contain both<br />

hydrogen (H + ) and hydroxyl (OH - ) ions. There product always<br />

constant and equal to 1 x 10 -14 at normal temperature at about<br />

25˚C. The solution are acidic or alkaline depends upon the two<br />

ions is present in greater concentration then the other. The<br />

sulphamic acid growth crystal is an acidic medium and its PH<br />

value of preparing 1% of solution is 1.14 by using model CL-46,<br />

Sr. No.4944, Power 230 v ac PH meter about 25˚C normal<br />

temperature This sulphamic acid are used in the operation of to<br />

remove the excess nitrus Acid from the preparing diazo in the<br />

dyes plant. The sulphamic acid is less PH i.e. more acidic than<br />

the formic and phosphoric acid and acitic acid. Such type of<br />

material are used in metal and ceramic cleaning and nitrite<br />

removal in azodize operation.<br />

Surface Tension :- To determine the surface tension ,we<br />

use capillary rise method. This method is based on the rise of<br />

liquid in a capillary tube. Consider a capillary tube lowered in a<br />

liquid that wets its surface. The contact angle between the glass<br />

& liquid is now‖ 0‖ the rising position of the liquid high depends<br />

upon the surface tension and density. The column of the liquid in<br />

the capillary is evidently being by the supported by the force<br />

acting along the surface of water, is known as force of surface<br />

tension. Measure the height through which the liquid rise and<br />

radius of capillary tube in centimeter. The height is measure by<br />

0.25<br />

0.2<br />

0.15<br />

0.1<br />

0.05<br />

energy and higher dielectric constant.<br />

y<br />

0<br />

0 0.5 1 1.5<br />

cathetometer and radius of the capillary tube measure by the<br />

traveling microscope. The rise or fall of a liquid in a capillary<br />

can be better understood by involving the concept of cohesion<br />

and adhesion position. In this method the liquid solution is<br />

depressed in the capillary tube. We found surface tension of the<br />

growth crystal of sulphamic acid is 116.41d cm-1.<br />

III. RESULT & DISCUSSION<br />

From study of study FTIR and X-ray diffraction it is<br />

confirmed that vibration frequency of sulphamic acid. We found<br />

the dielectric constant value much higher, those reported by<br />

earlier workers. It is observed sulphamic acid is more acidic. The<br />

coefficient of viscosity is found to be 0.022dyne.sec.cm -2 . which<br />

is very less .and the Surface tension of sulphamic acid is more.<br />

We have observed that crystals are extremely good of<br />

orthorhombic structure. We introduced a new method to study<br />

dielectric constant. Further study on the crystal growth shows<br />

that it is more acidic, and coefficient of viscosity is found to be<br />

0.022 d sec /cm which is very less.<br />

IV. ACKNOWLEDGEMENT<br />

I am thankful to Dr. A. D. Yadav Head of the Department of<br />

Physics, University of Mumbai. I am indebted to Dr. Rewatkar<br />

(Lecturer in Physics Dr. Ambedkar M. dikshabhumi Nagpur). I<br />

am also grateful to thanks all the staff members of R & D,<br />

mechanical, production, QC Dept. of Formokem India<br />

Corporation Kashigaon (Bhayandar). I am extremely grateful to<br />

Dr. S. B. Singh (Principal) of S. N. College Bhayandar (East).<br />

REFERENCES<br />

[1] K. Nassu, J Nassu, Bell Laboratories, Murray Hill, N. J. 079074 U.S.A.<br />

(Berlin Heidelberg New York)<br />

[2] E. Schonherr, Bernardsville N. J. 07924, U.S.A.<br />

(Berlin Heidelberg New York)<br />

[3] D. E. Ovsienko, G. A. Alfintsev, Bernardsville N. J. 07924, U.S.A.<br />

Series 1<br />

x<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 356<br />

ISSN 2250-3153<br />

(Berlin Heidelberg New York)<br />

[4] A. H. Monish, Bernardsville N. J. 07924, U.S.A.<br />

(Berlin Heidelberg New York)<br />

[5] Dr. Puri, Physical Chemistry, 2005<br />

(Punjab University Chandigarh)<br />

[6] Dr. Sharma, Physical Chemistry, 2005<br />

(Punjab University Chandigarh)<br />

[7] Dr. Pathania, Physical Chemistry, 2005<br />

(Punjab University Chandigarh)<br />

[8] Dr. D. S. Mathur, 2006<br />

(S. & Chand Co.)<br />

[9] R. Ueda,<br />

Waseda universita, Tokyo, Japan (1992- 93)<br />

[10] J. B. Mullin<br />

(Royal Radar Establishment, great Malvern, England May, 1996)<br />

[11] Arthur Beiser<br />

(Tata MC Graw – Hill Publishing Co. Ltd. New Dehli Fifth Edition, 1953)<br />

[12] E. H. Lewit<br />

(Imperical Science & Technology College, South Kensington, 4th & 5th<br />

Edition, 1973)<br />

[13] K. Shankar Narayan, P. Ramasamy, J. Crystal Growth (2005)<br />

(Imperical Science & Technology College, South Kensington, 4th & 5th<br />

Edition, 1973)<br />

AUTHORS<br />

First Author – Dr. Rita A. Gharde, Divakar, Department of<br />

Physics, Mumbai University, Kalina (Santacruz), Mumbai – 400<br />

008 India, Email: gharde .rita@gmail.com<br />

Second Author – Divakar T. Chunarkar, Department of Physics,<br />

Mumbai University, Kalina (Santacruz), Mumbai – 400 008<br />

India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 357<br />

ISSN 2250-3153<br />

Design of a 32 DOF Andro Humanoid Robot using<br />

Cascaded Computational Intelligence<br />

Abstract- This paper focuses on the design of a 32 DOF andro<br />

humanoid robot using cascaded computational intelligence. The<br />

robot consists of hip, neck, Lip, shoulder, elbow, and wrist and<br />

finger joints. The robot secures itself from hacking and power<br />

problems. The intelligence of the robot is a combination of<br />

human intelligence, computational intelligence and sensor fusion<br />

unit data.<br />

Index Terms- Robot, Kinematics, Inverse kinematics, Andro<br />

Humanoid, DOF, Cascaded computational intelligence, sensor<br />

fusion unit.<br />

R<br />

I. INTRODUCTION<br />

obot is a machine to execute different task repeatedly with<br />

high precision. Thereby many functions like collecting<br />

information and studies about the hazardous sites which is too<br />

risky to send human inside. Robots are used to reduce the human<br />

interference nearly 50 percent. Robots are used in different types<br />

like fire fighting robot, metal detecting robot, etc. Humanoids are<br />

robots which resembles human joints. Humanoids are nowadays<br />

used in industrial purpose, military, research etc.<br />

This paper focuses on designing a 32 DOF andro humanoid<br />

robot. The robot uses cascaded computational intelligence and<br />

hence it has a self securing feature. The robot is controlled by a<br />

human master and a local master controller which is connected to<br />

a sensor fusion network.<br />

II. HARDWARE CONCEPT<br />

A. Mechanical Part<br />

The humanoid consists of a hip, neck, Lip, shoulder, elbow,<br />

and wrist and finger joints. The humanoid has 32 degrees of<br />

freedom.<br />

The humanoid has a platform on which it is mounted. The<br />

platform helps the humanoid to move around in a plane surface.<br />

The platform consists of four wheels each of which is connected<br />

to dc geared motors. The hip joint of the humanoid has one<br />

degree of freedom and allows the upper body of the humanoid to<br />

rotate in horizontal direction. The neck joint helps to rotate the<br />

head in horizontal direction. A web camera is mounted in the<br />

eyes of the humanoid.<br />

S Shyam.R.Nair, Prof. Manjula Pramod<br />

Dept. of EIE, Hindustan University, Chennai<br />

The humanoid has shoulder, elbow, wrist and finger joints on<br />

both hands. The shoulder has 2 DOF, elbow has 3DOF, wrist has<br />

4 DOF and the finger unit has 5 DOF. The hip and neck has one<br />

DOF and the lip has 2 DOF. All these togather makes 32 DOF<br />

andro humanoid.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 358<br />

ISSN 2250-3153<br />

Figure 2. Schematic of motor arrangement<br />

B. Torque Calculations<br />

There are 14 motors with 10 rpm each including the four in the<br />

platform which are connected to the wheels.<br />

Neck motor:<br />

The motor is placed at neck which will make the head rotate in<br />

the horizontal plane.<br />

Weight of the head including the web camera is 0.5 Kg.<br />

The distance from the shaft of the motor is 25 cm.<br />

Hence torque required to make proper movement is 0.5*6 = 3<br />

Kgcm<br />

Required power = 2*π*N*T/60<br />

= 3.12 Watts<br />

Where N is rpm of the motor and T is torque<br />

Hip motor:<br />

The motor is placed at hip which will make the upper body rotate<br />

in the horizontal plane.<br />

Weight of the upper body is 5.5 Kg.<br />

The distance from the shaft of the motor is 30 cm.<br />

Hence torque required to make proper movement is 5.5*30 = 165<br />

Kgcm<br />

the required torque is 50% of the calculated torque due to the<br />

symmetry of the upper body.<br />

Hence actual torque = 82.5 Kgcm.<br />

Required power = 2*π*N*T/60<br />

= 85.8 Watts.<br />

Shoulder motor:<br />

The motor is placed at the shoulder which will make the hand<br />

rotate in the vertical plane.<br />

Weight of the hand is 1.5 Kg.<br />

The distance from the shaft of the motor is 70 cm.<br />

Hence torque required to make proper movement is<br />

1.5*70 = 105 Kgcm<br />

the required torque is 50% of the calculated torque as one of the<br />

end is hinged which supports the rotation.<br />

Hence actual torque = 52.5 Kgcm.<br />

Required power = 2*π*N*T/60<br />

= 54.95 Watts.<br />

Elbow motor:<br />

The motor is placed at elbow which will make the arm rotate in<br />

the horizontal plane.<br />

Weight of the arm is 0.6 Kg.<br />

The distance from the shaft of the motor is 20 cm.<br />

Hence torque required to make proper movement is<br />

0.6*20 = 12 Kgcm<br />

the required torque is 50% of the calculated torque as one of the<br />

end is hinged which supports the rotation.<br />

Hence actual torque = 6 Kgcm.<br />

Required power = 2*π*N*T/60<br />

= 6.24 Watts.<br />

Wrist motor:<br />

The motor is placed at the wrist which will make the palm yoke.<br />

Weight of the palm is 0.3Kg.<br />

The distance from the shaft of the motor is 20 cm.<br />

Hence torque required to make proper movement is<br />

0.3*20 = 6 Kgcm<br />

Required power = 2*π*N*T/60<br />

= 6.24 Watts.<br />

Finger motor:<br />

The motor is placed at the finger which will make the finger<br />

grasp.<br />

Weight of the finger unit is 0.05Kg.<br />

The distance from the shaft of the motor is 10 cm.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 359<br />

ISSN 2250-3153<br />

Hence torque required to make proper movement is<br />

0.05*10 = 0.5 Kgcm<br />

Required power = 2*π*N*T/60<br />

= 0.52 Watts.<br />

Wheels motor:<br />

The motors are coupled to the wheels of the platform for free<br />

movement in a plane surface.<br />

The weight of the body is equally distributed to four wheels.<br />

Thus each wheel will bear a load of 10Kg.<br />

Distance of the wheel from axis of the motor= 2cm.<br />

Hence torque required for 1 wheel is 10*2 = 20Kgcm.<br />

Required power = 2*π*N*T/60<br />

= 20.8 Watts.<br />

C. Inverse Kinematics<br />

Figure 3. Arm Schematic<br />

O is the point to be reached.<br />

‗c‘ and ‗a‘ are lengths of first and second link respectively.<br />

From figure3 and figure 4;<br />

θ1 = θ<br />

θ2 = A<br />

θ3 = B<br />

By Pythagoras theorem,<br />

b² = x²+y²+ z² (1)<br />

θ = tan‾¹(y/x) (2)<br />

Ø = tan‾¹(z/ x²+y²) (3)<br />

We know that area of a triangle is given by;<br />

Area = (s*(s-a)*(s-b)*(s-c))½ (4)<br />

Where, s = (a+b+c)/2 (5)<br />

Here, c and a are arm length of link one and two respectively.<br />

We also know that the area of a triangle is given by;<br />

Area = ½*base*altitude (6)<br />

From figure (4);<br />

Area = ½*b*h (7)<br />

But h = c*sinA (8)<br />

Now, by substituting (8) in (7), we get;<br />

Area = ½*b*c*sinA (9)<br />

As we know values of a, b and c, the area is calculated as per<br />

equations (4) and (5)<br />

Hence, from equation (9);<br />

sinA = 2*Area/ (b*c)<br />

Or<br />

A = sin‾¹ (2*Area/(b*c)) (10)<br />

Similarly,<br />

B = sin‾¹ (2*Area/ (a*c)) (11)<br />

Figure 4. Schematic of working environment<br />

D. Kinematics<br />

From figure (4),<br />

X coordinates are decided by the arm lengths c, a, angles A, C, θ,<br />

Ø.<br />

As the effective length decreases with increase in angles, A and<br />

C, it has a cosine relationship with the x coordinate.<br />

The effective length decreases with increase in the values of θ<br />

and Ø.<br />

Hence, the x coordinate can be written as;<br />

X = (cCosA+aCosC) Cos θ Cos Ø<br />

Similarly,<br />

Y coordinates are decided by the arm lengths c, a, angles A, C, θ,<br />

Ø.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 360<br />

ISSN 2250-3153<br />

As the effective length increases with increase in angles, A and<br />

C, it has a sine relationship with the y coordinate.<br />

The effective length decreases with increase in the values of θ<br />

and Ø.<br />

Hence, the y coordinate can be written as;<br />

Y = (cCosA+aCosC) Sin θ Cos Ø<br />

Similarly,<br />

Z coordinates are decided by the arm lengths c, a, angles A, C, θ,<br />

Ø.<br />

As the effective length increases with increase in angles, A and<br />

C, it has a sine relationship with the z coordinate.<br />

The effective length increases with increase in the value of Ø.<br />

There is no relation for z with respect to θ.<br />

Hence, the z coordinate can be written as;<br />

Z = (cSinA+aSinB) Sin Ø<br />

Hence the kinematic equations for the robotic arm are;<br />

X = (cCosA+aCosC) Cos θ Cos Ø<br />

Y = (cCosA+aCosC) Sin θ Cos Ø<br />

Z = (cSinA+aSinC) Sin Ø<br />

Matrix Transformation;<br />

* =<br />

E. Motor Rotation<br />

From equations (2), (9) and (10), the values of θ, A and B are<br />

obtained.<br />

Θ is the angle of rotation for the base motor. A is the angle of<br />

rotation for the motor connecting the first link and B is the angle<br />

of rotation for the motor connecting the second link.<br />

Here, we consider that all motors are of 10rpm. And hence, all<br />

the motors cover 60° in one second.<br />

To improve accuracy, the motor is turned on only for 1ms in one<br />

on loop in the program.<br />

Hence the motor covers an angle of 0.06° in one on loop.<br />

Once the angles are calculated by using the inverse kinematics,<br />

the PIC microcontroller decides the number of on loops to be<br />

executed for each motor.<br />

For example, if the angle to be covered by the base motor is 24°,<br />

then the PIC microcontroller will execute the on loop 400 times.<br />

F. Transformation from initial to final point<br />

Once the robot gets the coordinate values, it computes the<br />

angles using the inverse kinematics and proper rotations are<br />

made by the motors. These angle values are stored in eeprom of<br />

the controller.<br />

When the next coordinates are obtained, again the robot<br />

calculates the angles, but this time it looks back to the values<br />

stored in eeprom and compares it with the newly computed angle<br />

values. Then the robot rotates the motors in such a way that the<br />

new angles are achieved. And the newly computed angles are<br />

overwritten on the previously stored values.<br />

For example;<br />

If the robot has rotated the motors in the following sequence;<br />

A with 15°<br />

B with 20°<br />

Θ with 10°<br />

Ø with 25°<br />

And if the newly calculated angles are<br />

A with 17°<br />

B with 19°<br />

Θ with 10°<br />

Ø with 27°<br />

Then the robot will make the following rotations;<br />

A with 2° positive rotation<br />

B with 1° negative rotation<br />

Θ with 0°<br />

Ø with 2° positive rotation<br />

Thus transformation is done from initial point to the final point.<br />

III. MODES OF OPERATION<br />

Manual<br />

In manual mode, the robot is controlled by the human master.<br />

The task that is to be executed is instructed by the human master<br />

as voice, finger gesture, eye ball movement, brain cap etc.<br />

The instruction is fed to the client PC as characters using<br />

appropriate human machine interface. These characters are fed<br />

serially to the server laptop using high speed internet. The server<br />

laptop receives these instructions through high speed internet and<br />

feeds it to the master PIC microcontroller.<br />

The visuals are obtained through the camera in the robot by<br />

using the Gmail video chat or Skype software. This also<br />

introduces a dual channel communication, ie, the instructions are<br />

given through one channel and the visuals are obtained through<br />

other channel. So if one of the channels is hacked we get access<br />

to the robot using the other channel.<br />

Suppose we lose the video signals, we can command the robot<br />

to come back to the source point. Otherwise if we lose the<br />

instruction channel, the video chat helps us to locate the robot.<br />

In this mode, the sensor fusion unit is not activated. This mode<br />

is usually used for training purpose.<br />

Automated<br />

In this mode, the robot does not get the instructions from the<br />

human master. Instead, it will use the data in eeprom to execute<br />

task or it will use neural scheme for executing task.<br />

In this mode, the sensor fusion unit is activated and it is used<br />

to analyze the environmental conditions.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 361<br />

ISSN 2250-3153<br />

Cascaded<br />

In certain places, we cannot expect the robot to execute task by<br />

itself and neither can we expect human commands enough to<br />

execute the task like surveying of an unknown area or in warfare.<br />

In such area, we use both human intelligence and sensors for<br />

executing a task. In such situations the cascaded mode will be of<br />

great use.<br />

In this mode the instructions from master is received in the<br />

client node as explained in manual mode.<br />

Once the instruction is received at the master controller it<br />

verifies the environmental conditions. This master controller is<br />

connected to sensor fusion unit which is used to observe the<br />

environmental conditions. The sensor fusion unit consists of ultra<br />

sonic sensors for identifying and locating obstacles, temperature<br />

sensor for analyzing the surrounding temperature, etc. The<br />

master controller verifies the environmental conditions and<br />

executes the task if and only if the conditions are ideal to be<br />

executed.<br />

In this mode the robot continuously verifies the<br />

communication system security. This is done by transmitting and<br />

receiving a peculiar code in a definite interval of time. If the code<br />

is not received in either of the ends at proper time then the robot<br />

disconnects all the communication channels and returns back to<br />

the source point by using the data stored in eeprom of the<br />

controller.<br />

In this mode the robot also verifies the battery level using a<br />

battery monitoring circuit. If the robot identifies a drain in<br />

battery charge, it automatically switches to the secondary power<br />

source. Once the robot switches to the last battery, it will stop all<br />

the task and returns back to the source point using the data in<br />

eeprom.<br />

IV. ELECTRONICS<br />

The platform is designed to fit a laptop, sensors, and four 12V<br />

7aH lead acid batteries. The platform also contains the<br />

electronics hardware including a relay based circuit for driving<br />

the dc geared motors, a pic microcontroller circuits, and<br />

ultrasonic sensors.<br />

The task to be executed is given as voice commands[14] by<br />

the human master at the client pc. A serial code is generated for<br />

each word and is transmitted to the laptop on the robot platform.<br />

For generating, transmitting and receiving the code software‘s<br />

known as Roboclient and Roboserver is used. Both these<br />

software‘s are developed in Microsoft Visual Studio. The client<br />

pc and the server laptop is connected to internet using high speed<br />

3G network. The serial code is transmitted from the laptop to the<br />

microcontroller circuit by a RS-232 cable. When the<br />

microcontroller receives this signal, it checks for the<br />

environmental conditions using the ultrasonic sensors. The<br />

environmental condition, here, refers to any obstacle for the task<br />

execution. Now if there are no obstacles, then, the robot executes<br />

the task. But if there is any obstacle, it sends the human master a<br />

serial code indicating its problem and waits for further<br />

instruction from human master. The human master can view the<br />

area under survey with the help of the camera mounted on the<br />

robot platform. This is made possible by using the Gmail video<br />

chat or the Skype software.<br />

The robot platform also contains a battery monitoring circuit.<br />

If this circuit identifies a power crisis, then, the circuit switches<br />

to the next power source. The number of power sources can be<br />

fixed according to the need and availability. If the last battery is<br />

switched, then, the robot closes all its applications and comes<br />

back to the source point by using the data in the eeprom. The<br />

robot also returns to the source point if it identifies a security<br />

issue in the communication link.<br />

A. Identification of a security issue in communication link<br />

The client pc and the server laptop continuously exchange a<br />

serial code. If the pic microcontroller does not receive this code<br />

in a specified delay, it comes to a conclusion that the<br />

communication link is lost or hacked. In that case, the robot<br />

closes all its communication links and other activities and returns<br />

back to the source point. By using the data stored in eeprom.<br />

B. Returning of robot to the source point using the data in<br />

eeprom<br />

The robot stores all the movement codes in the internal eeprom<br />

of the pic microcontroller. The first location contains the<br />

movement code and the next location contains the time delay for<br />

the code. This continues for all the movement codes. When the<br />

robot faces a security or power problem, the robot executes the<br />

data in eeprom in last in first out method. The controller swaps<br />

the forward and backward instructions. That is if there is a<br />

forward movement in the eeprom location, the robot moves<br />

backward and vice versa. The rest of the instructions remain the<br />

same. This helps robot from protecting itself from exploitation<br />

from unauthorized access.<br />

Figure 5. Block Schematic<br />

C. Visual sensor<br />

This part is the place to install sensors which are used for<br />

searching vital sign of the victims like camera [11]. The camera<br />

can be made to continuously rotate as per the command from<br />

human master. The visuals obtained by the camera are<br />

transmitted through the Gmail video chat or the Skype software.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 362<br />

ISSN 2250-3153<br />

D. Monitoring and navigation of robot<br />

The robot is monitored using the camera in the robot platform.<br />

The robot uses ultrasonic sensors for identifying any obstacle in<br />

the path of its motion. The sensors are connected to the controller<br />

circuit for making appropriate decision. When the robot<br />

navigates automatically, it uses the data in eeprom. For the<br />

patrol robot navigation several methods are used like sensing the<br />

paths, graphical user interface, map following algorithms and<br />

compass, other Kalman filtering methods[6][5][7][8][9]. All<br />

these approaches are somehow complex. This can be overcome<br />

by using the EEPROM of the microcontroller. PIC16F877A has<br />

256 bytes of EEPROM inside it. So memory can use it to store<br />

data that need on a permanent basis and we can read it back from<br />

it. There are two functions to accomplish the task. Eeprom_Read<br />

and Eeprom_Write.<br />

Eeprom_Read function returns an integer and takes a<br />

parameter of the address from which the data has to be fetched.<br />

Eeprom_Write takes two parameters the first one is the address<br />

and the second one is the data.<br />

unsigned short Eeprom_Read(unsigned int address);<br />

void Eeprom_Write(unsigned int address, unsigned short data);<br />

Most of the robot will navigate with different<br />

algorithm.[10][11][12][13] The robot will navigate with respect<br />

to the commands from the user (initially from A to B) as shown<br />

in fig.7. All the running commands are stored in the memory and<br />

also a counter is set to determine how long the commands are<br />

executed. Now the current position of the robot is at B.<br />

Whenever it needs to return, the last stored command will<br />

execute first (LIFO). If the last executed command is forward,<br />

that swaps it into backward command.<br />

Similarly,<br />

Backward ≈ Forward<br />

Figure 6. Path Schematic<br />

V. SOFTWARE<br />

Onboard software is mainly developed with micro C. This<br />

software interfaces between the operator station software and the<br />

robot by receiving operator‘s command to control all robot<br />

functions. Simulations have been executed both in Mat lab and<br />

PIC simulator. In Mat lab the approaches were implemented<br />

under ideal hypothesis, more realistic settings. The commands<br />

are send through serial communication with the help the software<br />

Roboclient developed in Microsoft Visual studio. The data is<br />

received using the software Roboserver developed in Microsoft<br />

Visual studio. Real time visuals can be captured and displayed on<br />

the window with the help of Gmail video chat or Skype software.<br />

Figure 7. Voice Control Panel<br />

VI. SAMPLE WORKING<br />

The required action is commanded by the human master as a<br />

specific word which is picked by the microphone and converted<br />

to a code alphabet by the client PC using Roboclient software.<br />

This alphabet is transmitted to the server laptop at the robot<br />

platform through high speed internet. At the reception end the<br />

alphabet is transmitted to the master controller from the server<br />

laptop through RS-232 cable. Now the master controller controls<br />

the slaves according to the program for the particular alphabet.<br />

For example, when a command ‗move‘ is said by the human<br />

master, a code alphabet ‗m‘ is transmitted and the<br />

microcontroller on receiving this ‗m‘, executes the internal loop<br />

program and waits for the next instruction.<br />

VII. CONCLUSION<br />

The 32 DOF andro humanoid robot was designed successfully<br />

and was found to have advantages of unbounded control with the<br />

use of high speed internet. The humanoid also has the advantage<br />

of self securing ability.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 363<br />

ISSN 2250-3153<br />

In future the humanoid can be made to walk by designing the<br />

legs for the robot. Additional sensors can be fused to improve<br />

efficiency of the humanoid.<br />

ACKNOWLEDGEMENT<br />

The research in this paper was carried out at Hindustan<br />

Institute of Technology and science, Chennai. This work was<br />

supported by the e-MEN Robotic Research Centre Palakkad.<br />

REFERENCES<br />

[1] Kenji KANEKO, Fumio KANCHIRO, Shuuji KAJITA, Hirohisa<br />

HIRUKAWA, Toshikazu KAWASAKI, Masaro HIRATA, Kazuhako<br />

AKACHI and Takakatsu ISOZUMI ―Humanoid robot HRP-2‖, proceedings<br />

of the 2004 IEEE International Conference on Robotics and Automation.<br />

[2] Kenji KANEKO, Fumio KANCHIRO, Shuuji KAJITA, Hirohisa<br />

HIRUKAWA, Toshikazu KAWASAKI, Kensuke HARADA, Kazuhako<br />

AKACHI and Takakatsu ISOZUMI ―First Humanoid Robot that has the<br />

Same Size as a Human and that can Lie Down and Get Up‖, proceedings of<br />

the 2003 IEEE International Conference on Robotics and Automation.<br />

[3] T.Asfour and R.Dillmann ―Human-Like Motion of a Humanoid Robot Arm<br />

based on a Closed-Form Solution of the Inverse Kinematics Problem‖,<br />

IEEE International Conference on Intelligent Robots and Systems.<br />

[4] Amon Tunwannarux and Supanunt Tunwannarux ―The CEO Mission II,<br />

Rescue Robot with Multi-Joint Mechanical Arm‖, Proceedings of World<br />

Academy of Science, Engineering and Technology 2007.<br />

[5] Mbaitiga Zacharie ―Intelligent OkiKOSenPBX Security Patrol Robot via<br />

Network and Map-Based Route Planning‖, Journal of Computer Science<br />

5(1);79-85,2009.<br />

[6] Fen Xu, Zheng Xi Li, Kui Yuan ―The design and implementation of an<br />

autonomous campus patrol robot‖ Proceedings of the 2008 IEEE<br />

International Conference on Robotics and Biomimetics.M. Young, The<br />

Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.<br />

[7] S. Ali A. Moosavian, Hesam Semsarilar, Arash Kalantari ―Design and<br />

manufacturing of a mobile rescue robot‖ international conference on<br />

intelligent robots and system oct 9-15-2006 IEEE<br />

[8] Robert W. Hogg, Arturo L. Rankin, Stergios I. Roumeliotis ―Algorithms<br />

and Sensors for Small Robot Path Following‖<br />

[9] Sebastian Thrun1, Maren Bennewitz2, Wolfram Burgard2‖MINERVA: A<br />

Second Generation Museum Tour-Guide Robot‖ Carnegie Mellon<br />

University.<br />

[10] Stephen J. Tobias, A. Antonio Arroyo ―Autonomous Path finding‖ 2000<br />

Florida Conference on Recent Advances in Robotics May 4-5, 2000,<br />

Florida Atlantic University.<br />

[11] Ali Sekmen, Sheldon Greene ―Vision-based Mobile Robot Learning and<br />

Navigation‖2005 IEEE International Workshop on Robots and Human<br />

Interactive Communication<br />

[12] Yongxing Hao, Benjamin Laxton ,Sunil K. Agrawal, Edward Lee , Eric<br />

Benson ―Planning and Control of UGV Formations in a Dynamic<br />

Environment: A Practical Framework with Experiments‖ Proceedings of the<br />

2003 IEEE International Conference on Robotics & Automation Taipei,<br />

Taiwan, September 14-19, 2003<br />

[13] Johann Borenstein+ and Yoram Koren ―MOTION CONTROL ANALYSIS<br />

OF A MOBILE ROBOT‖ Transactions of ASME, Journal of Dynamics,<br />

Measurement and Control, Vol. 109, No. 2, pp. 73-79. [20]<br />

[14] Brandi House, Jonathan Malkin, Jeff Bilmes ―The VoiceBot: A Voice<br />

Controlled Robot Arm‖ CHI 2009, April 4-9, 2009, Boston, Massachusetts,<br />

USA.<br />

[15] Shyam.R.Nair, ―Cascaded Computational Intelligence for Robotics‖,<br />

ICCVR <strong>2012</strong>.<br />

[16] Shyam.R.Nair, ―Design of a Robotic Arm for Picking and Placing an Object<br />

Controlled using LABView‖, <strong>IJSRP</strong>, May <strong>2012</strong>.<br />

First Author –<br />

AUTHORS<br />

Shyam.R.Nair, PG Scholar, Hindustan University, Chennai,<br />

shyamieee@gmail.com<br />

Second Author - Prof. Manjula Pramod, MS, HOD, Dept. of<br />

EIE, Hindustan University, Chennai.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 364<br />

ISSN 2250-3153<br />

Image Processing Operations for 3d Image<br />

Mrs. A. Padmapriya, S.Vigneshnarthi<br />

Department of Computer Science & Engineering, Alagappa University, Karaikudi – 630 003, India<br />

Abstract- Image processing and pattern recognition has<br />

become a powerful technique in many areas. This includes<br />

Engineering, Computer Science, Statistics, Information Science,<br />

Physics, Chemistry and Medicine. Anyone who wants to extract<br />

data from image or visual project, image processing is required.<br />

Most of the image processing software‘s are able to process two<br />

dimensional images alone. This paper implements three basic<br />

image processing operations namely enhancement, blur and<br />

segmentation. Each of the operation can be implemented using<br />

a variety of algorithms. The algorithms are implemented using<br />

and their performance are compared in this paper. The proposed<br />

work produces better result of 3D images also.<br />

Index Terms- Image processing, Enhancement, Blur,<br />

Segmentation, 3D Image<br />

I. INTRODUCTION<br />

Image Processing<br />

mage processing [3] is a form of signal processing for which<br />

I<br />

the input is an image, such as photographs; the output of image<br />

processing can be either an image or a set of characteristics or<br />

parameters related to the image. Most image-processing<br />

techniques involve treating the image as a two-dimensional<br />

signal and applying standard signal-processing techniques to it.<br />

This is done through the development and implementation of<br />

processing means necessary to operate on the image. Processing<br />

image using a digital computer provides the greatest flexibility<br />

and power for general image processing application, since the<br />

programming of a computer can be changed easily which allows<br />

operation to be modified quickly. Interest in image processing<br />

technique dates back to early 1920‘s when digitized pictures of<br />

world news events were first transmitted by submarine cable<br />

between New York and London.[4]. However, application of<br />

digital image processing concepts did not become widespread<br />

until the middle 1960‘s, when third-generation digital computers<br />

began to offer the speed and storage capabilities required for<br />

practical implementation of image processing algorithms. Since<br />

then, this area has experienced vigorous growth and has been<br />

subjected of study and research in various fields. Image<br />

processing and computer vision practitioners tend to concentrate<br />

on a particular area of specialization [5] research interests as<br />

―texture‖, ―surface mapping‖, ―video tracking‖, anthe like.<br />

Nevertheless, there is a strong need to appreciate the spectrum<br />

and hierarchy of processing levels.<br />

The paper is organised as follows: Section II briefly review<br />

the literature behind the proposed work. Section III elaborates the<br />

proposed work .Section IV discusses the implemented of the<br />

proposed work. Section V concludes the findings.<br />

II. LITERATURE SURVEY<br />

Motivation for a digital image processing course [1] arises<br />

mainly from two areas of applications, namely, a) an increase in<br />

the pictorial information available for human interpretation, and<br />

b) image processing for automatic and autonomous machine<br />

control. This is because vision is the most important human sense<br />

in terms of the amount of information it conveys and because of<br />

a good visualization is very important for the correct information<br />

converged in an image. Many image processing circuits require<br />

dedicated software to perform their tasks. These packages<br />

usually are highly priced and are not easily modified by the final<br />

user. In this paper the basis for the image processing is<br />

MATLAB [3], a software package now available almost<br />

anywhere for other uses and that is used as the engine for the<br />

image processing experiments. The software written for the<br />

image processing experiments is available from the users at no<br />

cost to interested users and instructors. Image processing<br />

applications include many topics, among which we can mention<br />

remote sensing, ultrasound images, meteorology, astronomy,<br />

inspection, radar, seismology, radiology, autonomous navigation,<br />

recognition, etc.<br />

III. PROPOSED WORK<br />

This paper deals with the implementation of three basic<br />

image processing operations namely image enhancement,<br />

segmentation and blur.<br />

A. Image Enhancement<br />

Image Enhancement of image means processing an image so<br />

that the results are more suitable for a particular application.<br />

Processing an image so that the result is more suitable for a<br />

particular application. (sharpening or deblurring an out of focus<br />

image, highlighting edges, improving image contrast, or<br />

brightening an image, removing noise)<br />

Enhancing Multispectral Color Composite Images<br />

Enhance multispectral radiance or reflectance data to create<br />

an image that is suitable for visual interpretation. Another way to<br />

enhance the true color composite is to use a decorrelation stretch,<br />

which enhances color separation across highly correlated<br />

channels. Use decorrstretch[6] to perform the decorrelation<br />

stretch. Again, surface features have become much more clearly<br />

visible, but in a different way. The spectral differences across the<br />

scene have been exaggerated.<br />

Enhance Color Images<br />

Contrast enhancement of color images is typically done by<br />

transforming an image to a color space that has image intensity<br />

as one of its components. One such color space is L*a*b*. Use<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 365<br />

ISSN 2250-3153<br />

color transform functions to convert the image from RGB to<br />

L*a*b* color space, and then work on the luminosity layer 'L*'<br />

of the image. Manipulating luminosity affects the intensity of the<br />

pixels, while preserving the original colors. Using the default<br />

settings, compare the effectiveness of the following three<br />

techniques:<br />

a) Imadjust<br />

b) Histeq<br />

c) Adaphisteq<br />

Imadjust<br />

It increases the contrast of the image by mapping the values<br />

of the input intensity image to new values such that, by default,<br />

1% of the data is saturated at low and high intensities of the input<br />

data.<br />

Histeq<br />

It performs histogram [8] equalization. It enhances the<br />

contrast of images by transforming the values in an intensity<br />

image so that the histogram of the output image approximately<br />

matches a specified histogram (uniform distribution by default).<br />

Adapthisteq<br />

It performs contrast-limited adaptive histogram equalization.<br />

Unlike histeq, it operates on small data regions (tiles) rather than<br />

the entire image. Each tile's contrast is enhanced so that the<br />

histogram of each output region approximately matches the<br />

specified histogram (uniform distribution by default). The<br />

contrast enhancement [7] can be limited in order to avoid<br />

amplifying the noise which might be present in the image. Notice<br />

that imadjust had little effect on the image of the tire, but it<br />

caused a drastic change in the case of pout. Plotting the<br />

histograms of pout.tif and tire.tif reveals that most of the pixels<br />

in the first image are concentrated in the center of the histogram,<br />

while in the case of tire.tif, the values are already spread out<br />

between the minimum of 0 and maximum of 255 thus preventing<br />

imadjust from being effective in adjusting the contrast of the<br />

image.<br />

Histogram equalization, on the other hand, substantially<br />

changes both images. Many of the previously hidden features are<br />

exposed, especially the debris particles on the tire. Unfortunately,<br />

at the same time, the enhancement over-saturates several areas of<br />

both images. Notice how the center of the tire, part of the child's<br />

face, and the jacket became washed out. Concentrating on the<br />

image of the tire, it would be preferable for the center of the<br />

wheel to stay at about the same brightness while enhancing the<br />

contrast in other areas of the image. In order for that to happen, a<br />

different transformation would have to be applied to different<br />

portions of the image. The Contrast-Limited Adaptive Histogram<br />

Equalization technique, implemented in adapthisteq, can<br />

accomplish this. The algorithm analyzes portions of the image<br />

and computes the appropriate transformations. A limit on the<br />

level of contrast enhancement can also be set, thus preventing the<br />

over-saturation caused by the basic histogram equalization<br />

method of histeq. This is the most sophisticated technique in this<br />

demonstration.<br />

B. Segmentation<br />

Segmentation is the process of partitioning a digital image into<br />

multiple segments. The goal of segmentation is to simplify<br />

and/or change the representation of an image into something that<br />

is more meaningful and easier to analyze. Image segmentation is<br />

typically used to locate objects and boundaries (lines, curves,<br />

etc.) in images. More precisely, image segmentation is the<br />

process of assigning a label to every pixel in an image such that<br />

pixels with the same label share certain visual characteristics.<br />

An object can be easily detected in an image if the object<br />

has sufficient contrast from the background. We use edge<br />

detection and basic morphology tools to detect a prostate cancer<br />

cell.<br />

The steps involves are below:<br />

Step 1: Detect Entire Cell<br />

Step 2: Fill Gaps<br />

Step 3: Dilate the Image<br />

Step 4: Fill Interior Gaps<br />

Step 5: Remove Connected Objects on Border<br />

Step 6: Smooth the Object<br />

Step 1: Detect Entire Cell<br />

Two cells are present in this image, but only one cell can be<br />

seen in its entirety. We will detect this cell. Another word for<br />

object detection is segmentation. The object to be segmented<br />

differs greatly in contrast from the background image. Changes<br />

in contrast can be detected by operators that calculate the<br />

gradient of an image. One way to calculate the gradient of an<br />

image is the Sobel operator, which creates a binary mask using a<br />

user-specified threshold value. We determine a threshold value<br />

using the graythresh function. To create the binary gradient<br />

mask, we use the edge function.<br />

Step 2: Fill Gaps<br />

The binary gradient mask shows lines of high contrast in the<br />

image. These lines do not quite delineate the outline of the object<br />

of interest. Compared to the original image, you can see gaps in<br />

the lines surrounding the object in the gradient mask. These<br />

linear gaps will disappear if the Sobel image is dilated using<br />

linear structuring elements.<br />

Step 3: Dilate the Image<br />

The binary gradient mask is dilated using the vertical<br />

structuring element followed by the horizontal structuring<br />

element.<br />

Step 4: Fill Interior Gaps<br />

The dilated gradient mask shows the outline of the cell<br />

quite nicely, but there are still holes in the interior of the cell.<br />

Step 5: Remove Connected Objects on Border<br />

The cell of interest has been successfully segmented, but it<br />

is not the only object that has been found. Any objects that are<br />

connected to the border of the image can be removed.<br />

Step 6: Smooth the Object<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 366<br />

ISSN 2250-3153<br />

Finally, in order to make the segmented object look<br />

natural, we smooth the object by eroding the image twice with<br />

a diamond structuring element. An alternate method for<br />

displaying the segmented object would be to place an outline<br />

around the segmented cell.<br />

C . Blur<br />

Blurring an image usually makes the image unfocused. It<br />

increased by increasing the pixel radius<br />

Blur Deconvolution<br />

The Blur Deconvolution Algorithm can be used effectively<br />

when no information about the distortion (blurring and noise) is<br />

known. The algorithm restores the image and the point-spread<br />

function (PSF) [9] simultaneously. What happens is that what<br />

should be seen as a sharp point gets smeared out, usually<br />

into a disc shape. In image terms this means that each pixel in<br />

the source image gets spread over and mixed into surrounding<br />

pixels. Another way to look at this is that each pixel in the<br />

destination image is made up out of a mixture of surrounding<br />

pixels from the source image<br />

IV. EXPERIMENT STUDY<br />

Image can be processed using any software programming<br />

language such as C language Matrix-X. Visual Basic. Java<br />

program and MATLAB program. Image applications frequently<br />

need to interactively manipulate an image by continuously<br />

changing a single parameter and multi-parameter. This paper<br />

briefly elaborates the image process operations for 3D images.<br />

Three major operation selected for implementation are<br />

enhancement, segmentation and blur.<br />

A. Enhancement<br />

In the papers [2,6], the Enhancement technique is used for<br />

2D colour images. Enhance multispectral radiance or reflectance<br />

data to create an image that is suitable for visual interpretation.<br />

Another way to enhance the true color composite is to use a<br />

decorrelation stretch, which enhances color separation across<br />

highly correlated channeonls. Use decorrstretch to perform the<br />

decorrelation stretch. Again, surface features have become much<br />

more clearly visible, but in a different way. The spectral<br />

differences across the scene have been exaggerated.<br />

In this paper, 3D images are used for Enhancement<br />

technique and three functions imadjust, histeq, and adapthisteq<br />

are used for contrast enhancement.<br />

ORIGINAL IMAGE<br />

IMADJUST<br />

HISTEQ<br />

IMADJUST<br />

ADAPTHISTEQ<br />

Image Composite after Decorrelation Stretch<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 367<br />

ISSN 2250-3153<br />

B.Segmentation<br />

In the papers [1-4] segmentation can be implemented for 2D<br />

method.<br />

In this proposed work, segmentation implemented for<br />

3Dmethod.<br />

BINARY GRADIENT MASK<br />

BINARY IMAGE FILLED WITH HOLES<br />

CLEARED BODER IMAGE<br />

ORIGINAL IMAGE<br />

SEGMENTED IMAGE<br />

B. Blur<br />

In the paper [9] Blind Blur Deconvolution Algorithm for 2D<br />

method can be used effectively when no information about the<br />

distortion (blurring and noise) is known. The algorithm restores<br />

the image and the simple blur algorithm simultaneously. What<br />

happens is that what should be seen as a sharp point gets smeared<br />

out, usually into a disc shape. In image terms this means that each<br />

pixel in the source image gets spread over and mixed into<br />

surrounding pixels. Another way to look at this is that each pixel<br />

in the destination image is made up out of a mixture of<br />

surrounding pixels from the source image.<br />

In this paper, Blur Deconvolution Algorithm for 3D method<br />

can be used effectively when no information about the distortion<br />

(blurring and noise) is known. The algorithm restoresthe image<br />

and the point-spread function (PSF) simultaneously. In image<br />

terms this means that each pixel in the source image gets spread<br />

over and mixed into surrounding pixels. Another way to look at<br />

this is that each pixel in the destination image is made up out of a<br />

mixture of surrounding pixels from the source image.<br />

BLURRED AND NOISY IMAGE<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 368<br />

ISSN 2250-3153<br />

Comparison histogram for enhancement for 2d and 3d<br />

images:<br />

Comparison histogram for segmentation for 2d and 3d<br />

images:<br />

Comparison histogram for segmentation for 2d and 3d<br />

images:<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 369<br />

ISSN 2250-3153<br />

Comparison histogram for blur for 2d and 3d images:<br />

V. CONCLUSION<br />

This paper briefly elaborates the image process operations for<br />

3D images. The three major operations selected for<br />

implementation are enhancement segmentation and blur. This<br />

paper briefly the software used for implementation is matlab. The<br />

outputs of the algorithms are compared. Previously there<br />

operations are done used 2D images only. The proposed work<br />

processes 3D images.<br />

REFERENCES<br />

[1] ABDUL HALIM BIN BABA. image processing learning tool-edge<br />

detection bachelor degree. university of technology malaysia 1996.<br />

[2] FIONN MURTAGH. Image Processing data analysis. The multi-scale<br />

approach. University of Ulster.<br />

[3] Fundamentals of image processing, hany.farid@dartmouth.edu<br />

.(http://www.cs.dartmouth.edu/~farid)<br />

[4] JEAN-LUC STARCK, centre d‘ etudes de Saclay, Fionn Murtagh. Image<br />

processing and data analysis the multiscale approach. University of<br />

Ulster.<br />

[5] LOUIS J.GALBIATI, JR. machine vision and digital image processing<br />

fundamentals. Prentice-Hall International Editions.<br />

[6] S. K. MITRA AND H. LI, ―a new class of nonlinear filters for image<br />

enhancement, ‖in Proc. IEEE int. Conf. Acoustics, Speech, Signal<br />

Processing, Toronto, Ont., Canada, may 14–17, 1991, pp. 2525–2528.<br />

[7] G. RAMPONI, N. STROBEL, S. K.<br />

MITRA, AND T. YU, ―nonlinear unsharp masking methods for image<br />

contrast enhancement,‖ J. Electron. Image, vol. 5, pp. 353–366, July 1996.<br />

[8] G. RAMPONI, ―A cubic unsharp masking technique for contrast<br />

enhancement,‖ Signal Process., vol. 67, pp. 211–222,June 1998.<br />

[9] Y. H. LEE AND S. Y. PARK, ―A study of convex/concave edges and edge<br />

enhancing operators based on the laplacian,‖ IEEE Trans. Circuits Syst.,<br />

vol. 37, pp. 940–946, July 1990.<br />

AUTHORS<br />

First Author – Mrs. A. Padmapriya, Assistant Professor,<br />

Department of Computer Science & Engineering, Alagappa<br />

University, Karaikudi – 630 003, Email :<br />

mailtopadhu@yahoo.co.in<br />

Mrs.A. Padmapriya is with Department of Computer Science and<br />

Engineering, Alagappa University, Karaikudi as Assistant<br />

professor. She is having 9 years of teaching experience and 5<br />

years of research experience. She has published 5 research<br />

Papers in National/International Journals and presented 9 papers<br />

in International/National Conferences. She research area includes<br />

Computer Networks and Data Mining. She is a reviewer for<br />

IEEE Conferences and Symposion and various International<br />

Jourals.<br />

Second Author – S.Vigneshnarthi, M. Phil Scholar, Department<br />

of Computer Science & Engineering, Alagappa University,<br />

Karaikudi – 630 003, Email : narthi86@gmail.com<br />

S.Vigneshnarthi received her B.sc degree in Computer Science<br />

from Alagappa University, Karaikudi, B.Ed degree Computer<br />

Science from Tamilnadu Teacher Education University, Chennai<br />

and M.sc in Computer Science from Alagappa University,<br />

Karaikudi. Currently she is pursuing her M.Phil in Computer<br />

Science under Alagappa University, Karaikudi.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 370<br />

ISSN 2250-3153<br />

Transient Analysis of Mac Protocol in Sensor Networks<br />

Mada Amarnadh, M. Venkata Dasu<br />

Abstract- In a Wireless Sensor network, whose node accesses<br />

the medium by using the unslotted MAC protocol and in our case<br />

we are not able to increase the packet delivery ratio when<br />

compared with others MAC protocols. In order to improve that<br />

we are going to compare the two different MAC protocols (like<br />

CSMA and advanced MAC scheduling) for the IEEE 802.15.4<br />

and IEEE 802.16 and for the high data rate apply the WIMAX<br />

technology. Which focus on the average throughput and delay<br />

analysis.<br />

Index Terms- IEEE 802.16 MAC; Single-hop; Multi-hop;<br />

WIMAX technology; Wireless sensor network<br />

W<br />

I. INTRODUCTION<br />

ireless Sensor Networks (WSNs) are one of the most<br />

promising solutions in the field of communication. A<br />

WSN consists of a number of tiny sensor nodes deployed over a<br />

sensing field. Each node is a low power device capable of<br />

sensing physical information from the surrounding environment<br />

(e.g., temperature, pressure and vibrations), processing the<br />

acquired data locally, and sending them to one or more collection<br />

points, referred to as sinks or base stations [1]. Hence, a WSN<br />

can be regarded as a distributed sensing system that may be<br />

adequate for many monitoring and control applications.<br />

In this paper, we focus on IEEE 802.15.4 WSNs [2] and<br />

show that they provide a very low reliability in terms of packet<br />

delivery ratio (i.e., the percentage of data packets correctly<br />

delivered to the sink node) when power management is enabled.<br />

We found that this behavior is caused by the 802.15.4 MAC<br />

protocol and therefore, throughout we will refer to it as the<br />

802.15.4 MAC [3] unreliability problem. Specifically, we found<br />

that this problem – which is originated by the CSMA/CA<br />

(Carrier Sense Multiple Access with Collision Avoidance)<br />

algorithm used for channel access – becomes critical when power<br />

management is enabled due to the default MAC parameters<br />

setting suggested by the standard.<br />

Indeed, the IEEE 802.16 standard allows some flexibility<br />

in choosing CSMA/CA parameters, as it defines a range of<br />

allowed values for each of them. Our results show that, with an<br />

appropriate parameters setting, it is possible to mitigate the MAC<br />

unreliability problem and increase the delivery ratio, up to 100%,<br />

at least in the scenarios considered in this paper. However, this is<br />

achieved at the cost of a significantly higher latency, which<br />

might not be acceptable for industrial applications with stringent<br />

timing requirements. In addition, in some scenarios, a high<br />

Department of ECE<br />

A.I.T.S Rajampet, A.P, India<br />

delivery ratio can only be obtained by using CSMA/CA [4]<br />

parameter values which are not compliant with the standard.<br />

We validated our simulation results through an extended<br />

experimental analysis carried out on a real WSN. The<br />

experimental measurements confirm the simulation results and<br />

show that the solution envisaged to mitigate the MAC<br />

unreliability problem is viable, at least in some application<br />

scenarios. To the best of our knowledge, this is the first paper<br />

investigating the sensitiveness of the 802.16 performance to the<br />

CSMA/CA parameters setting, by using both simulation and<br />

measurements on a real WSN.<br />

IEEE 802.16 is a standard for low-rate, low-power, and<br />

low-cost Personal Area Networks (PANs)[5]. A PAN is formed<br />

by one PAN coordinator which is in charge of managing the<br />

whole network, and, optionally, by one or more coordinators<br />

which are responsible for a subset of nodes in the network.<br />

Ordinary nodes must associate with a (PAN) coordinator in order<br />

to communicate. The supported network topologies are star<br />

(single-hop), cluster-tree and mesh (multi-hop).<br />

WiMAX is based on IEEE 802.16 specification and it is<br />

expected to deliver high quality broadband services.<br />

II. MODULE DESCRIPTION<br />

A. Design of Wireless Sensor Network<br />

The MAC layer provides an interface between the application<br />

layer and the PHY layer. The MAC layer provides services to the<br />

application layer through two groups: the MAC Management<br />

Service (called the MAC Layer Management Entity, or MLME)<br />

and the MAC Data Service [6] (called the MAC Common Part<br />

Layer, or MCPS). The MCPS provides data transport services<br />

between peer MACs. The MLME provides the service interfaces<br />

through which layer management functions may be invoked. The<br />

MLME is also responsible for maintaining a database of<br />

managed objects pertaining to the MAC layer. This database is<br />

referred to as the MAC layer PAN information base (PIB). The<br />

MLME also has access to MCPS services for data transport.<br />

B. Multiple sink with PAN coordinator<br />

(i) Generating network beacons if the device is a coordinator: A<br />

coordinator can determine whether to work in a beacon enabled<br />

mode, in which a superframe structure is used. The superframe<br />

is bounded by network beacons and divided into<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 371<br />

ISSN 2250-3153<br />

aNumSuperframeSlots (default value 16) equally sized slots. A<br />

coordinator sends out beacons periodically to synchronize the<br />

attached devices and for other purposes.<br />

(ii) Synchronizing to the beacons: A device attached to a<br />

coordinator operating in a beacon enabled mode can track the<br />

beacons to synchronize with the coordinator.<br />

(iii) Supporting personal area network (PAN) association and<br />

disassociation: To support selfconfiguration, 802.15.4 embeds<br />

association and disassociation functions in its MAC sublayer.<br />

This not only enables a star to be setup automatically, but also<br />

allows for the creation of a selfconfiguring, peer-to-peer<br />

network [7].<br />

(iv) Employing the carrier sense multiple access with collision<br />

avoidance (CSMA-CA) mechanism for channel access: Like<br />

most other protocols designed for wireless networks, 802.15.4<br />

uses CSMA-CA mechanism for channel access.<br />

C. Estimation of packet loss rate in IEEE 802.16<br />

The estimation of packet loss rate in IEEE 802.16 is as shown<br />

in Fig.1. Where two function call for the estimation of the packet<br />

loss rate [8].<br />

Function calls MAC functions have to be called from the<br />

application in order to initiate an action in the communication<br />

stack at the MAC level. MAC functions are prefixed with wpan_<br />

and suffixed with either _request or _response. A sample<br />

construct of a call to a MAC function is:<br />

wpan_mlme_associate_request.<br />

Callback functions When the MAC needs to invoke a function<br />

in the application, it calls a callback function. If the callback<br />

function is not implemented by the application, it will be<br />

replaced by an empty function from the library. Callback<br />

functions are prefixed with usr_ and suffixed with either<br />

_confirm or _indication. A sample construct of a callback to an<br />

application function is: usr_mlme_associate_indication.<br />

Fig1: Data Flow Diagram of communication stack at the MAC<br />

level<br />

III. USE CASE DIAGRAM<br />

The model representing the message transfer is shows in<br />

Fig.2. A network site is wireless sensor network; by using<br />

routing protocol wireless sensor node will select and get a signal<br />

from a PAN. PAN is device who will give the signal as well as<br />

there is any overlapping signals are there that can be reduced.<br />

Congestion occurs means according to the time it will select<br />

routing calls and event it will be calculating by using IEEE<br />

802.16. Radio propagation model is nothing but according to the<br />

radio signals ranges, what is the spreading from that will be<br />

select the destination. Each and every time it will check the radio<br />

propagation mode and justify the PAN.<br />

Fig.2: The model representating the message transfer from a<br />

sensor to central controller and destination<br />

IV. SIMULATION ENVIRONMENT<br />

It is assumed that 50 mobile nodes move over a square area of<br />

300 × 1500m2. Each simulation has been run for 900 seconds of<br />

simulation time. The propagation channel of two-ray ground<br />

reflection model is assumed with a data rate of 2 Mbps. The<br />

environment noise level of -83 or -90 dBm is modeled as a<br />

Gaussian random variable with the standard deviation of 1 dB.<br />

Noise level of -90 dBm is considered ignorable and interference<br />

from other transmitters dominates. On the other hand, noise level<br />

of -83 dBm is used to simulate a harsh communication<br />

environment.<br />

V. SIMULATION RESULTS<br />

In this section, we show and analyze the simulation results of<br />

Packet delivery ration, Average throughput [10], Traffic<br />

comparison, Packet transmission and Performance analysis of<br />

our system. Fig.3 shows the comparison of packet delivery ratio<br />

between first sink and second sink (i.e. between two<br />

destinations), at the first sink of 50 th node packet delivery ratio<br />

[9] can be 81 percent and the same time and node the second sink<br />

packet delivery ratio is 94 percent. Here packet delivery ratio can<br />

be increase from sink1 to sink 2. Fig.4 represents the data sent<br />

with average neighbor, this can be calculating between average<br />

neighbor and data (bytes per second). Here neighboring nodes<br />

can be improved from 2 to 10 corresponding data can transferred<br />

be increased from 10 to 23.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 372<br />

ISSN 2250-3153<br />

Fig.3: Comparison of packet delivary ratio<br />

Fig.4: Data sent with average neighbour<br />

Fig.5 gives mobility of the continuous packet transmission,<br />

where goes on increasing data with speed and it give the better<br />

mobility. Fig.6 gives the performance analysis [1] between<br />

packets, here analysis can done between received packets and<br />

dropped packets. In this analysis at one point only dropped<br />

packets are high (i.e.2ms) and average performance of received<br />

packets be high.<br />

Fig.5: continuous packet transmission<br />

Fig 6: Performance analysis<br />

Fig.7 shows the traffic comparison, in our case considered the<br />

three traffics like CBR, TCP and POISSION. This traffic can<br />

calculate by the number of packets transmission (throughput) per<br />

second. While in TCP the traffic is very high when compared to<br />

other types and the CBR traffic is very low compared other<br />

traffics. So the best type of traffic is CBR for our consideration<br />

network.<br />

Fig 7: Traffic comparison<br />

VI. CONCLUSION<br />

The Wireless PAN is an air interface specified in IEEE<br />

Standard 802.16 provides a platform for the development and<br />

deployment of standards based personal area networks providing<br />

broadband wireless access in many regulatory environments. The<br />

standard is intended to allow for multiple vendors to produce<br />

interoperable equipment. However, it also allows for extensive<br />

sink differentiation. For instance, the standard provides the base<br />

station with a set of tools to implement efficient scheduling.<br />

However, the scheduling algorithms that determine the overall<br />

efficiency will differ from sink to sink and may be optimized for<br />

specific traffic patterns. Likewise, the adaptive burst profile<br />

feature allows great control to optimize the efficiency of the PHY<br />

transport.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 373<br />

ISSN 2250-3153<br />

The publication of IEEE Standard 802.16 is a defining<br />

moment in which broadband wireless access moves to its second<br />

generation and begins its establishment as a mainstream<br />

alternative for broadband access. Through the dedicated service<br />

of many volunteers, the IEEE 802.16 Working Group succeeded<br />

in quickly designing and forging a standard based on forwardlooking<br />

technology. IEEE Standard 802.16 is the foundation of<br />

the wireless metropolitan area networks of the next few decades.<br />

REFERENCES<br />

[1] J. Zhang, G. Zhou, S. Son, J. Stankovic, and K. Whitehouse, ―Performance<br />

analysis of group based detection for sparse wireless sensor networks,"<br />

IEEE ICDCS, Beijing, China, 2008<br />

[2] J. Misiˇc, S. Shafi, and V. B. Misiˇc, ―Performance of a beacon enabled<br />

IEEE 802.15.4 cluster with downlink and uplink traffic," IEEE Trans.<br />

Parallel Distributed Syst., vol. 17, no. 4, pp. 367-376, 2006.<br />

[3] I. Ramachandran, A. K. Das, and S. Roy, ―Analysis of the contention access<br />

period of IEEE 802.15.4 MAC," ACM Trans. Sensor Netw., vol. 3, no. 1,<br />

2007.<br />

[4] C. Buratti and R. Verdone, ―Performance analysis of IEEE 802.15.4 non<br />

beacon-enabled mode," IEEE Trans. Veh. Technol., vol. 58, no. 7, pp.<br />

3480-3493, 2009.<br />

[5] L. Gu, et al., ―Lightweight detection and classification for wireless sensor<br />

networks in realistic environments," ACM Sensys, 2005<br />

[6] G. Bianchi, ―Performance analysis of the IEEE 802.11 distributed<br />

coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp.<br />

535-547, 2000.<br />

[7] T. A. Henzinger, ―The theory of hybrid automata," Verification Digital<br />

Hybrid Syst., vol. 170, pp. 265-292, 2000.<br />

[8] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava,<br />

―Coverage problems in wireless ad-hoc sensor networks," IEEE Infocom,<br />

Anchorage, AK, 2001.<br />

[9] M. Hefeeda and M. Bagheri, ―Randomized k-coverage algorithms for dense<br />

sensor networks," IEEE Infocom, Anchorage, AK, 2007.<br />

[10] O. Dousse, C. Tavoularis, and P. Thiran, ―Delay of intrusion detection in<br />

wireless sensor networks," ACM MobiHoc, Florence, Italy, 2006.<br />

First Author – Mr. Mada Amarnadh, M.Tech, AITS, Rajampet<br />

Email Id: amarnadh.ece@gmail.com.<br />

Second Author – Mr. M. Venkata Dasu, Assistant Professor,<br />

AITS, Rajampet . Email Id: dass_marri@yahoo.co.in.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 374<br />

ISSN 2250-3153<br />

Measures to combat tuberculosis in colonial Mysore<br />

Dr. Thriveni<br />

Abstract- The research article has made an attempt to focus on<br />

the challenges pertaining to the TB one of the prominent<br />

epidemic disease which bothered Princely mysore. There was a<br />

serious shortage of medical personal and facilities in the state, to<br />

provide more medical aid certain efforts were made for<br />

minimizing the spread of TB. The rulers of mysore had modern<br />

views in redressing public grievances and determined to protect<br />

their subjects.<br />

T<br />

I. INTRODUCTION<br />

he epidemic disease became frequent and widespread during<br />

the 19 th century in India as well in the Princely Mysore.<br />

Tuberculosis has killed more people than any disease in the<br />

history of the world and this became one of the greatest scourage<br />

of the early 20 th century. TB is a chronic bacterial infectious<br />

disease caused by mycobacterium tuberculosis, spread from<br />

person to person through airborne droplets. Both humans and<br />

cattle can transmit it and it can affect almost any tissue or organ<br />

of the human body. In 1993 the world health organization<br />

declared that TB a global emergency.<br />

There was widespread distress as well as loss of life<br />

throughout the State due to the disease of tuberculosis. A special<br />

hospital was constructed in the year 1907 & 08 as Tuberculosis<br />

Sanatorium. His Highness Nalwadi Krishnaraja Wodeyar III<br />

considered it necessary to organize an efficient Tuberculosis<br />

service in the State as it was causing considerable loss of life.<br />

II. ANTI TUBERCULOSIS MEASURES<br />

A. Special hospitals and clinics<br />

Princess Krishnajammanni Sanatorium, which was called<br />

after His Highness late sister at Mysore, who fell a victim of the<br />

disease along with her 3 daughters. A special building was<br />

constructed in 94 acres to combat tuberculosis in the state at<br />

mysore in this regard Princely State invited Mr. E. W. Frichley,<br />

Architect from Bombay visited Mysore for 5 days and prepared<br />

hospital design with approximate estimation of Rs.92, 599/ on<br />

2 nd June 1917. 22 In the year 1919, Rs.25, 370/ was sanctioned to<br />

built a big ward in the PKTB hospital at Mysore. 23 It was opened<br />

in the year 1921. The accommodation available in 1921 was for<br />

eight paying patients and 20 poor patients. As a memorial to the<br />

Golden Jubilee of his rule Nalwadi, a new 22 bedded emergency<br />

ward was constructed.<br />

In the year 1930 a Tuberculosis Sanatorium was established<br />

at Bangalore, similar to those at Mysore. To provide facilities for<br />

treatment of Bangalore patients those who were admitted to<br />

Epidemic diseases hospital for treatment so, the government<br />

22 Palace Maramath file no B-60 of 1917, p.242 Divisional Archives Mysore.<br />

23 Palace Maramath file no B-24 of 1920 p.349 Divisional Archives Mysore.<br />

Maharajas College, University of Mysore, Mysore, India<br />

decided to provide separate Tuberculosis sanatorium, a new<br />

building was constructed costing Rs. 3, 35000 at Bangalore. It<br />

also established dispensaries and clinics for the treatment of<br />

Tuberculosis for early detection of cases. 24 Tuberculosis<br />

dispensary was constructed in Bangalore city with generous<br />

contribution of Rs. 25000/ from Indian Red Cross society. 25<br />

The lady Willingdon anti Tuberculosis clinic was<br />

established in Bangalore in 1938 was an out-patient clinic where<br />

provision also made for six beds. A specialist was placed incharge<br />

of this clinic and arrangements were made for home visits<br />

of patient for diagnosis and both in-door and out-door patient<br />

were treated in the Tuberculosis Dispensary. 26 A tuberculosis<br />

Hospital was established at Davanagere, on 2 nd April 1939<br />

with generous contribution by Mr. Hanagavadi Murigappaiya. A<br />

specially trained Sub-Assistant Surgeon was in-charge of the<br />

Dispensary. E.T.C.M. Hospital Kolar and St. Theresa’s<br />

Sanatorium, Yeswanthpur also received grants. His Highness,<br />

generously donated Rs.10.-000 from his privy purse to the ―Anti-<br />

Tuberculosis Fund‖ which was started by Her Excellency Lady<br />

Linlithgow. 27 Steps were taken to establish Tuberculosis Clinics<br />

at the head Quarters of all districts. 28<br />

B. Investigation committee<br />

Princely State appointed Dr. P.S.Chandra Shekar., M.D.<br />

Madras, to conduct investigation of the conditions prevalent in<br />

the state regarding to Tuberculosis and survey of the state. Dr.<br />

P.S.Chandra Shekar, who toured all over the State and visited all<br />

districts, Municipal and epidemic hospitals to examine the<br />

conditions of the people and he considered that disease was not<br />

frequently occurring in the State, and the disease was fairly<br />

prevalent in towns and cities more frequently than rural parts.<br />

He collected 146 reports from medical officers of the state, most<br />

of them considered that the disease in towns and cities are more<br />

frequent than rural parts. 29<br />

C. Special Campaign<br />

A committee was constituted with 16 members for the<br />

campaign, they took steps in different methods of propaganda in<br />

bringing knowledge and creating awareness about the disease<br />

and its proper treatment to the notice of the public. Special<br />

Lectures were delivered on T B, Practical demonstration of case<br />

being conducted every year, popular instructions were given by<br />

means of colour posters, lantern slides and issued pamphlets. 30<br />

24 Letter no G C 158, Public Work Department files no 123 of 1945.<br />

25 Administration Report of Mysore, 1932, p. 51. Divisional Archives<br />

Mysore.<br />

26 Administration Report of Mysore, 1938, p. 151, Divisional Archives<br />

Mysore.<br />

27<br />

August, 1939, Mysore Information Bulletin.<br />

28<br />

Administration Report of Mysore, 1945, p. 151.<br />

29<br />

Mysore Health department Bulletin, no.2.1927. Karnataka State Archives<br />

Bangalore.<br />

30<br />

Palace Maramath file no B-138 of 1920 p.1-14, Divisional Archives Mysore<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 375<br />

ISSN 2250-3153<br />

D. Special Course<br />

Medical Department started a post graduation training course<br />

for medical officers in the treatment of T B for selected four<br />

assistant surgeons every year for a period of 3 months at Princess<br />

Krishnajammanni Tuberculosis Sanatorium Mysore with<br />

special allowance of Rs.20. 31 Special Lectures were also<br />

conducted at Bangalore for a week in every year to the MBBS<br />

students. 32<br />

E. Special Training<br />

A medical officer from the Gunamba maternity and child<br />

welfare trust Mysore was sent as the recipient of the Carlo<br />

Forlanini Institute scholarship of Rome for a course of study in<br />

the treatment and care of Tuberculosis. Princely mysore adopted<br />

Methods for organizing the Tuberculosis Services in the State,<br />

and Constituted an Anti – Tuberculosis Association at Mysore<br />

in the year 1927. 33<br />

F. Bureau of Health Education<br />

The bureau educates the public on health matters through<br />

propaganda, publicity and exhibitions. The Government Policy<br />

towards expansion of medical relief in the State, particularly in<br />

rural areas had led to a steady increase in the number of medical<br />

institutions in the State. In the year 1936, a Health trainingcum-Demonstration<br />

Centre was established in Ramanagaram<br />

near Bangalore with the financial and technical assistance of the<br />

Rockefeller Foundation. 34 The arrangement was made to the<br />

Public health department to have a motor vehicle Van<br />

working to create awareness among public and it covered 714<br />

miles in the year1940, by screening special cinema shows on<br />

health education. 35<br />

III. CONCLUSION<br />

The mortality rate was considerably reduced with the rapid<br />

implementation of welfare services in the state.<br />

AUTHORS<br />

Dr.Thriveni, Maharajas College, University of Mysore, Mysore,<br />

India. Email id - thriveniurs@gmail.com<br />

31 Mysore Health Department Bulletin, no.2.1927.<br />

32 Government order no G- 9151-68, 1929.<br />

12 Medical Department files no 43 of 1927 p. I-5, Karnataka State Archives,<br />

Bangalore.<br />

34 Kamath U Suryanatha Karnataka State Gazetteer Vol-II p.675<br />

35 Mysore Information Bulletin July 1940<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 376<br />

ISSN 2250-3153<br />

To study the prevalence of overweight and obesity<br />

among school children (13-17yrs) in relation to their<br />

socioeconomic status and Eating habits<br />

Garvita Jain 1 , Dr (smt) S.K Bharadwaj 2 , Dr (smt) Abhaya R. Joglekar 3<br />

1 Research scholar, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh<br />

2 Principal, Govt. D.T College, Utai, Durg, Chhattisgarh<br />

3 Professor, Department of Home science, Dr.R.B Govt Navin Kanya College, Raipur, Chhattisgarh<br />

Abstract- Overweight and obesity are important determinants<br />

of health leading to adverse metabolic change and increase the<br />

risk of non communicable diseases. The objective of this study<br />

was to assess the prevalence of overweight and obesity as<br />

defined by the CDC growth chart among school going children in<br />

Bhilai Nagar, Chhattisgarh correlated with their socioeconomic<br />

status and eating habits. The study was carried out in 500<br />

students of 13-17yrs of age having different SES. The obesity<br />

and overweight were considered using an updated BMI<br />

reference. SES and eating habits were determined using pretested<br />

questionnaire. The prevalence of overweight/obesity is a<br />

problem of affluent children going to various schools in Bhilai<br />

city. In the present study it is found that the magnitude of<br />

overweight (23.8%) and obesity (8.4%) is very high and<br />

alarming for both the sex. eating habits like junk food, chocolate,<br />

eating in front of TV etc remarkable effect on prevalence on<br />

overweight and obesity among low to high SES group. The study<br />

also suggested that under nutrition rates remain high (10.2%) in<br />

children. Therefore Special attention has to given for their overall<br />

nutrition.<br />

T<br />

I. INTRODUCTION<br />

hirty years ago, fundamental changes in social and economic<br />

situation occurred all over the world, thus leading to the<br />

presence of modern conveniences in homes as well as in the<br />

work place. These changes have shifted societies from<br />

communicable to non-communicable diseases (NCD) 1,2,3 .<br />

Overweight and obesity are a serious health problem, since they<br />

are associated with other diseases, and they contribute to ill<br />

health 4 .The world Health Organization (WHO) describes<br />

overweight and obesity as one of today‘s most important public<br />

health problems, which is escalating as a global epidemic 5 . It is<br />

also increasingly recognized as a significant problem in<br />

developing countries and countries undergoing economic<br />

transition 6 . The problem of overweight and obesity is confined<br />

not only to adults but also being reported among the children and<br />

adolescents of developed as well as developing countries. Since,<br />

adolescence is a period of transition from childhood to<br />

adulthood; it assumed critical position in the life cycle of human<br />

beings, characterized by an exceptionally rapid rate of growth 7 .<br />

The prevalence of overweight and obesity among children and<br />

adolescents has increased significantly in the developed countries<br />

during the past two decades 8,9 and similar trends are being<br />

observed even in the developing world 10 .In India the problem of<br />

obesity has been scantily explored even in the affluent population<br />

groups. Studies from metropolitan cities in India have reported a<br />

high prevalence of obesity among affluent school children 11,12 .<br />

On the other hand some studies reported a high prevalence of<br />

under nutrition among rural school children and children in urban<br />

slums 13,14,15,16 . 50-80% of obese children will grow up to become<br />

obese adults 17 and it is harder to treat obesity in adults than in<br />

children18 In children, the development of obesity is associated<br />

with the simultaneous deterioration in chronic diseases risk<br />

profiles. 19,20 . Excess weight in this age is the leading cause of<br />

pediatric hypertension, and overweight children are at a high risk<br />

for developing long-term chronic conditions, including adultonset<br />

diabetes mellitus, coronary heart disease, orthopedic<br />

disorders and respiratory diseases 19,21 .Therefore, it was proposed<br />

to carry out a study to asses and identify the prevalence and<br />

determinants of overweight and obesity among urban school<br />

going children covering statistically adequate sample in<br />

Chhattisgarh, Bhilai city which is one of the economically,<br />

industrially and culturally fast growing state. Obesity prevalence<br />

depended on many factors. During the scanning of relevant<br />

literature not a single study was found in impact of obesity in<br />

school children has been examined in Chhattisgarh.<br />

Our main objective was to examine the prevalence of<br />

overweight and obesity in school children using internationally<br />

based cutoff points and compare the relationship between SES<br />

factors and eating habits.<br />

II. MATERIALS AND METHODS<br />

This study was conducted from April 2009 to December 2010.<br />

From a list of all public and BSP schools in Bhilai Nagar were<br />

selected randomly using a random table. Permission of the school<br />

Principals was taken before conducting the study. Total of about<br />

500 children‘s, i.e. 100 children‘s each of 13-17 yr, about 125<br />

from each of the four selected schools studying in class standards<br />

7th to12th were included in the study. Classes were selected<br />

randomly from each of the four schools and all the children‘s<br />

present in the selected classes were asked to take part in the<br />

study. Their informed and written consent to the study was taken.<br />

Their exact ages were as ascertained from the school register.<br />

Data was collected in the form of general information. Semi<br />

non quantitative food frequency questions were asked in simple<br />

language to facilitate better results. Total 31 items were recorded<br />

as daily/more than once, once/day, 2-3 times /week, seldom and<br />

never; scoring was done accordingly as per the responses. Sociodemographic<br />

data were collected in the form of family income,<br />

parents‘ educational status, number of family members and<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 377<br />

ISSN 2250-3153<br />

working status of the parents. All the anthropometric<br />

measurement was taken in school premises with standard<br />

procedure. We have recorded body weight to the nearest 0.1 kg<br />

using a standard balance scale with subjects barefoot and<br />

wearing light indoor clothing. Body Height was measured by<br />

scale was used up to an accuracy of 1mm. Body mass index<br />

(BMI) was defined as the ratio of body weight to body height<br />

squared, expressed as kg/m 2 . Overweight and obesity was<br />

assessed by BMI for age (6). Student who had BMI for age >85th<br />

and < 95 th percentile of reference population were classified as<br />

overweight. Students who had BMI for age > 95 th percentile of<br />

reference population were classified as obese. We examined the<br />

prevalence of overweight and underweight in each gender by age<br />

group, sex and SES. Group comparisons were performed using<br />

ANOVA as appropriate.. A p value below or equal to 0.01 was<br />

considered to be statistically significant. Influence of various<br />

factors on prevalence of underweight, normal, overweight and<br />

obesity were expressed in form of percentage. The collected data<br />

was entered into the computer using software program MS Excel.<br />

III. RESULT<br />

A total number of 500 with age group between 13-17 years<br />

from different school were screened for their height, weight and<br />

body mass index. Out of 500 children 273 (%) were boys and<br />

227 (%) were girls. The BMI were little higher in girls than boys<br />

(table1). However, these differences were not significantly<br />

different with respect to gender. Among the 500 subjects,<br />

23.44% of the males were overweight, and 8.02% were obese,<br />

55.67% normal and 12.82% were underweight. While 24.22% of<br />

the female were overweight and 8.81% were obese, 59.91%<br />

normal and 7.04% were under weight (table1; figure1).<br />

The prevalence of overweight and obesity and its relationships<br />

with socioeconomic status are present in table2. The subjects<br />

belonging to high socioeconomic status would score significantly<br />

higher on body mass index than the subjects from low<br />

socioeconomic status group (figure2). The BMI of subjects<br />

consuming excessive food is significantly higher than the<br />

subjects who consume low calorie food beyond .01 level of<br />

significance (table 2). Vegetarian diet or non-vegetarian diet did<br />

not have any effect on prevalence of underweight, overweight<br />

and obesity, but junk food , beverages and eating meal pattern in<br />

front of T.V have more prevalence of obesity and overweight<br />

than underweight indicates that caloric intake is associated with<br />

increase in BMI.<br />

Table 1: Overweight /obesity of Subjects on the Basis of Gender and BMI Categories<br />

BMI Categories<br />

Gender<br />

Male<br />

(N=273)<br />

Female<br />

(N=227)<br />

Total<br />

(N=500)<br />

Underweight Normal Over Weight Obese<br />

N % N % N % N %<br />

35 12.82 152 55.67 64 23.44 22 8.02<br />

16 7.04 136 59.91 55 24.22 20 8.81<br />

51 10.2 288 57.6 119 23.8 42 8.4<br />

Figure1: Relationship of sex of school children with BMI<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

378<br />

ISSN 2250-3153<br />

Figure 2: Mean and SD of BMI (Kg/m 2 ) of subjects at their Socio-Economic Status Levels<br />

IV. DISCUSSION<br />

The present study showed that the prevalence of overweight<br />

was high among children, 23.44% boys, and 24.22% in girls. The<br />

relatively high prevalence of overweight (23.8%) is alarming.<br />

Overweight children often become overweight adult and<br />

overweight in adulthood is a health risk. The obesity was seen in<br />

8.05% of boys and 8.81% of girls. An important finding of this<br />

study is an ever burgeoning prevalence of obesity among the<br />

school going children when compared to previous survey in<br />

India. This study has shown higher figures which is suggestive of<br />

the obesity epidemic in 21 st century. The reason for higher<br />

prevalence of obesity among children‘s due to selection of the<br />

subjects from very affluent societies and few schools. The<br />

prevalence of overweight and obesity was significantly higher<br />

among girls in the present study, which is comparable with<br />

figures reported for other developing countries 22,23 .<br />

A clear socioeconomic gradient in the prevalence of<br />

overweight and obesity was observed in the present study, which<br />

is consistent with those earlier studies who reported that BMI is<br />

influenced by different SES backgrounds 22 . The finding of<br />

present study showed significantly positive correlation between<br />

BMI and excessive food consumption. This agrees with a study<br />

done by Thompson et al; 24 where they reported that the<br />

frequency of eating quick food was positively associated with<br />

BMI z-score in their longitudinal study among girls at<br />

Massachusetts institute of technology. Present study focused<br />

their analysis on type of diet (vegetarian, eggetarian and<br />

nonvegetarian), junk food, frequency of eating pattern and eating<br />

behavior in front of TV etc because that they have special role in<br />

obesity. The dietary indulgence in high fatty foods intake and<br />

sedentary life styles in the higher socioeconomic group are well<br />

known causes for overweight and obesity. This study has thus<br />

highlighted the need to not only improve the awareness on<br />

prevention of obesity among children but a need to motivate and<br />

reinforce them to practice healthy lifestyle is utmost essential<br />

V. CONCLUSION<br />

Overweight (23.8%) and obesity (8.4%) is very high and<br />

alarming for both the sex. The prevalence is comparable to other<br />

national studies; again there is paucity of data. The study also<br />

suggested that under nutrition rates remain high in children.<br />

Therefore Special attention has to given for their overall<br />

nutrition.<br />

REFERENCES<br />

[1] Ulijaszek S.J. a disorder of convenience. Obesity Reviews; (2007) 8(S1):<br />

183-187.<br />

[2] Farooqi IS, O‘Rahilly S. Genetic factors in human obesity. Obesity Review;<br />

(2007) 8(s1): 37-40.<br />

[3] Abdul-Rahim Hf, Abu-Rmeileh NME, Husseine A, Homloe-ottesen G,<br />

Jervell j, Bjertness E Obesity and selected co-morbidities in an urban<br />

Palestinian population. International Journal of Obesity; (2001) 25: 1736-<br />

174<br />

[4] Kopelman P. Health risks associated with overweight and obesity. Obesity<br />

Reviews; (2007) 8(s1): 13-17.<br />

[5] WHO Nutrition http: www.who.int/nut/obs/ht, accessed in 2003.<br />

[6] Popkin BM. the nutrition transition and obesity in the developing world.<br />

Nutritional Journal; (2001) 131: 871 s- 873.<br />

[7] Tanner JM. Fetus into man: Physical growth from conception to maturity.<br />

New York wells, open book publishing limited, 1978: pp 22-36.<br />

[8] Chinn S, Rona RJ. Prevalence and trends in overweight and obesity in three<br />

cross-sectional studies of British children, Br Med J; (2001) 197-494; 322:<br />

24-26.<br />

[9] Louis A Baur. Child and adolescent obesity in 21 st century: an Australian<br />

perspective, Asia pacific Journal of clinical nutrition; (2002) 11(suppl): (s<br />

524- s 528).<br />

[10] Martorell R, Kettel Khan L, Hugher ML, Grummer Strawn LM.<br />

Overweight and obesity in preschool children from developing countries,<br />

Int J Obes Relat Metab Disord; (2000) 24: 959-967.<br />

[11] Sundaram KR, Ahuja RK andRamachandran K. Indices of physicalbuild<br />

nutrition and obesity in schoolgoing children. Indian J Pediatr. 1988; 55:<br />

889-898<br />

[12] Gupta AK. and Ahmad AJ. Childhood obesity and hypertension. Indian<br />

Pediatr.1990; 27: 333-337. Kapil U, Singh P, Pathak P, Dwivedi SN. and<br />

Bhasin S. Prevalence of obesity amongst affluent adolescent school children<br />

in Delhi. Indian Pediatr. 2002; 39: 449-452.<br />

[13] Sachdev HPS. Recent transitions in anthropometric profile of Indian<br />

children: clinical and public health implications. F.I. Bull. 2003; 2 4: 6-8.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 379<br />

ISSN 2250-3153<br />

[14] Bhargava SK, Sachdev HPS, Fall CHD, Osmond C, Lakshmy R, Barker<br />

DJP, Biswas, SKD, Ramji S, Prabhakaran D and Reddy KS. Relation of<br />

serial changes in childhood body-mass index to impaired glucose tolerance<br />

in young adulthood. N. Engl. J. Med.2004; 350: 865-875.<br />

[15] Vedavathi S, Jayashree R, RafiM. Prevalence of Overweight & Obesity in<br />

Affluent adolescent school girls in Chennai in 1981 & 1998. Indian<br />

Pediatrics, 2003; 40; 775-779.<br />

[16] Kapil U et al. Prevalence of obesity among Affluent adolescent school<br />

children in Delhi. Indian Pediatrics.2002; Vol 39: 449- 452.<br />

[17] Styne DM. Childhood obesity and adolescent obesity: PCNA. 2001; 48:<br />

823-847.<br />

[18] Park K. Park‘s textbook of Preventive and Social Medicine: Banarsidas<br />

Bhanot Publishers, 18th Edition. 2005; 316- 319.<br />

[19] Dietz WHJ. Obesity in infants, children, and adolescents in the United<br />

States. Identification, natural history, and aftereffects. Nutr Res. 1981; 1:<br />

117-137.<br />

[20] Aristimuno GG, Foster TA, Voors AW, Srinivasan SR, Berenson GS.<br />

Influence of persistent obesity in children on cardiovascular risk factors: the<br />

Bogalusa Heart Study. Circulation 1984; 69: 895- 904<br />

[21] Dietz WH. Childhood weight affects adult morbidity and mortality. J Nutr<br />

1998; 128: (Suppl 2) 411S-414S.<br />

[22] Kaur S, Kapil U, Singh P. Pattern of chronic diseases amongst adolescent<br />

obese. Children in developing countries cur Sci.; (2005) 88: 1052-6.<br />

[23] Sakmota N, Wansorns S, Tantrisirink, Marni E. A social epidemiological<br />

study of obesity among preschool children in Thailand. Int J Obes Relat<br />

Metab Disord; (2001) 25: 389-94.<br />

[24] Thompson OM, Ballew C, Resnicow K, Must A, Bandini LG, Dietz WH.<br />

Food purchased away from home as a predictor of change in BMI z-score<br />

among girls. International Journal of obesity and Relate Metabolic<br />

Disorder; (2004) 28(2):282-9.<br />

AUTHORS<br />

First Author – Garvita Jain Research scholar, Pt. Ravishankar<br />

shukla university, Raipur, Chhattisgarh.<br />

Email id - garvita_jain24@rediffmail.com<br />

Second Author – Dr (smt) S.K Bharadwaj Principal, Govt. D.T<br />

College, Utai, Durg, Chhattisgarh.<br />

Third Author – Dr (smt) Abhaya R. Joglekar Professor,<br />

Department of Home science, Dr.R.B Govt Navin Kanya<br />

College, Raipur, Chhattisgarh.<br />

Email id - abha_abhaya@yahoo.co.in<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 380<br />

ISSN 2250-3153<br />

Condition based reporting of multi-machine monitoring<br />

system using GSM<br />

Jinia Datta(Das), Soumyajit Datta, Sumana Chowdhuri and Jitendranath Bera<br />

Abstract- This work describes a condition based reporting<br />

technique of a multi-machine System using GSM technology. In<br />

this present approach, a dedicated microcontroller based<br />

hardware unit (DHU) has been developed to continuously<br />

measure the parameters of the motors viz. voltage, current, speed<br />

etc. to monitor the running condition of each motor in a plant. In<br />

a multi-machine monitoring system each motor is connected with<br />

one such DHU, which are also connected to a Global System for<br />

Mobile Communication (GSM) modem. The preliminary level of<br />

fault or abnormality in operation of each machine is diagnosed<br />

by the respective DHU and the fault or abnormalities details are<br />

reported to the pre-assigned operator through an SMS service. In<br />

extreme case, the provision of machine shut down by a return<br />

SMS is also provided. A proto-type lab model is set up and is<br />

working satisfactorily.<br />

Index Terms- GSM Modem, Machine Fault Reporting, Multi-<br />

Machine Monitoring, SMS Service.<br />

E<br />

I. INTRODUCTION<br />

lectrical machines, installed in different locations in a plant,<br />

are needed to be monitoring and control for their healthy<br />

operation and smooth running of the plant. It is not always<br />

possible, rather difficult, to keep track of all the machines at a<br />

time simply by days long manual observation. On the other side,<br />

modern civilization is advancing at very faster pace with the<br />

adoption of wireless technology. The convergence of wireless<br />

technology and the embedded technology with the different<br />

transducers makes these supervisory systems more reliable, much<br />

efficient as well as cost effective one. Keeping this in mind, the<br />

present approach has been made to apply the advantages of<br />

wireless communication and embedded technology towards<br />

electrical machines condition monitoring and automation. This<br />

work describes the development of a supervisory automated<br />

reporting system for remote condition based monitoring,<br />

analyzing and control of electrical parameters of different<br />

machines of a plant or in power station, sub-station etc so as to<br />

enhance the overall system performance using GSM (The Global<br />

System for Mobile Communication) communication.<br />

A detailed discussion [1] on electrical drive condition based<br />

monitoring, diagnostic research and development is made for the<br />

smooth running of the machines. In Ref. [1] the authors dealt<br />

with a state-of-the-art discussion of the electrical drive condition<br />

monitoring, diagnosis, research and development, highlighting<br />

analytical and technical considerations as well as various issues<br />

related to different failures.<br />

Among different parameters of induction machine monitoring<br />

of stator voltage, stator current, rotor speed are most important<br />

for early detection of fault in the machine. Speed and winding<br />

current estimation is helpful to determine the mechanical stresses<br />

like bearing failure or shaft failure, turn to turn short circuit,<br />

cracked/broken rotor [2]-[4],[8]-[10]. Continuous current<br />

monitoring to obtain the running condition of an induction<br />

machine is important and has been discussed in [5]-[7].<br />

Now-a-days wireless and mobile communication is the major<br />

tool that can be used to provide the information to the operator or<br />

concerned authority for their supervisory control. These issues of<br />

mobile communication technology in the recent years have been<br />

extensively used in different form in different application areas<br />

[18], [19], [21]-[23].<br />

The application of less expensive but more powerful<br />

microcontroller will lead this data acquisition system more<br />

simple. The convergence of microcontroller based hardware with<br />

the wireless communication system (like GSM, GPRS) is<br />

becoming very popular choice to the researchers and scientists<br />

for such type of fault detecting, reporting, diagnosis and control<br />

applications.<br />

In this scheme, a state-of-the-art stand alone Dedicated<br />

Hardware Unit (DHU) is developed using microcontroller for<br />

monitoring the machine parameters like instantaneous voltage,<br />

current and speed of a machine in a typical plant. The DHU is<br />

responsible for measuring the machine basic parameters and<br />

controlling the supply to the motor and hence DHU is located at<br />

the machine site with one card per machine basis. The card is<br />

also interfaced with GSM modem for GSM based wireless<br />

accessing. There will be multiple cards for multiple machines<br />

system. Each DHU compares the measured value with pre-set or<br />

limiting values of the above mentioned parameters and if any<br />

abnormalities are detected an SMS is generated and is sent to the<br />

pre-located mobile or central station. The receiver may then send<br />

a return SMS requesting the details of the abnormalities. Upon<br />

receiving this request the details of the fault are then sent through<br />

another SMS by the DHU and it will take the appropriate action<br />

as per the content of the return message.<br />

I. MATERIALS AND METHODS<br />

The developed GSM based remote fault reporting system<br />

consists of three main blocks viz. DHU, GSM Modem, Mobile<br />

unit or central control Station as shown in Fig 1. In a plant with<br />

multi-machine operating, each machine is associated with a DHU<br />

for data acquisition to measure different parameters. All such<br />

units in this multi-machine system are interfaced with any remote<br />

mobile station through GSM technology. A preliminary level of<br />

abnormal running condition is detected by the DHU when the<br />

measured parameter exceeds beyond their set or limiting values.<br />

At this situation /stage, the DHU generates a message and sends<br />

it to the pre-assigned operator in form of SMS through GSM<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 381<br />

ISSN 2250-3153<br />

modem. Realising the criticalness of the SMS or in case of an<br />

emergency situation the operator/the receiver of this SMS will be<br />

able to turn off this particular machine by sending another SMS<br />

from his/her mobile to that DHU. Hence the total work can be<br />

divided into two parts –where the development of<br />

microcontroller based DHU for different parameters<br />

measurement with some emergency control as first part and the<br />

development of GSM modem based SMS service system as<br />

second part.<br />

Fig. 1 Block diagram of PC based wireless monitoring of multimachine<br />

system<br />

A. Dedicated Hardware Unit for Data Acquisition<br />

The DHU is designed around an 8 bit microcontroller along<br />

with different transducers for parameters measurements, as<br />

shown in Fig 2.<br />

Fig. 2 Schematic diagram of a particular DHU<br />

In each DHU, the microcontroller is interfaced with different<br />

sensors like potential transformer (PT), current transformer (CT)<br />

or hall sensor (HS), proximity sensor (PS) through proper<br />

hardware circuitry in order to measure the applied voltage,<br />

inflowing current and speed of the motor. The firmware is<br />

designed in such a way that it is able to detect preliminary<br />

abnormal situations like over voltage, under voltage, over<br />

current, over load, short circuit current, over speed, single<br />

phasing etc. The fault or abnormal conditions are also classified<br />

into different levels or priorities. Depending upon the priority of<br />

the type of abnormal conditions the DHU decides its action. In<br />

case of highest priority abnormal conditions the machine will be<br />

isolated from supply. Once a fault of such kind is initiated, other<br />

than taking the preliminary action the DHU also dictates the<br />

GSM modem to communicate the abnormality along with its<br />

type, as occurred in the system, by generating a fault respective<br />

SMS.<br />

On receiving the SMS, the person or the operator at Mobile<br />

unit and/or central control Station may have some details query<br />

and accordingly a message requesting the details of the abnormal<br />

situation(s) can be sent to that DHU. On its reply, the DHU will<br />

send some details of voltage, current, speed etc. at the time of<br />

abnormal situation(s) through another message.<br />

B. GSM Modem Interfacing with DHU<br />

The GSM modem (i-300 GSM Modem. It supports GSM<br />

07.07, 07.05 and SIMCOM enhanced AT commands) is built<br />

with a COM port with RS232 protocol based interfacing facility.<br />

Hence the microcontroller is connected with the modem using<br />

9600, N, 8, 1 protocol after the necessary hardware interfacing<br />

for proper TTL to RS 232 level conversion. As the modem works<br />

on AT command sets, following AT commands are to be sent to<br />

the modem in order to execute the SMS services.<br />

[25] First the microcontroller has to send ―AT‖ command word.<br />

A response ―ok‖ is returned from the GSM modem. The<br />

microcontroller sends another query by sending<br />

―AT+CPIN?‖ to get the PIN (Personal Identification<br />

Number).If the SIM card is ready for the use, the response<br />

―+CPIN: READY‖ is returned. After this, following AT<br />

commands are to be sent for the required SMS services.<br />

[26] For the configuration of the GSM modem in text mode of<br />

SMS the AT Command AT+CMGF = 1 is to be sent.<br />

[27] In order to send the SMS, the desired mobile number is to be<br />

sent with ―AT+CMGS=+91xxxxxxxxxx‖AT Command.<br />

[28] The desired message, containing a maximum of 160<br />

characters, is to be constructed and to be sent to the modem.<br />

After then the ASCII code for ‗CTRL+Z‘ character is also to<br />

be sent to the modem in order to transmit the message to<br />

mobile phone +91xxxxxxxxxx.<br />

In a similar way, any message received by the GSM modem<br />

will be sent to the microcontroller for its decoding and<br />

proper action.<br />

C. Hand held Mobile unit or GSM Modem at the central<br />

control station<br />

The Hand held Mobile station may be of any mobile unit who<br />

can roam around but still have the facility to monitor the status of<br />

the motor through SMS services with the corresponding DHU. In<br />

extreme case or for any emergency situations this station can stop<br />

the motor from its running through a return SMS. At the same<br />

time the operator at the central control station can be instructed<br />

for the due course of action based on the SMS from the DHU.<br />

The DHU can also send the same SMS to the central control<br />

station where a PC based monitoring, and reporting system is<br />

installed. On receiving the SMS from DHU or getting instruction<br />

from the hand held station the operator at the central control<br />

station performs the required task through a return SMS to the<br />

DHU. The PC software has the capability to store this<br />

communications for future analysis.<br />

A GSM modem is thus installed at the central control station<br />

in order to have the SMS communication with the DHU and it is<br />

connected with the PC through its COM port.<br />

The SIM numbers of the hand held station as well as the<br />

central station must be pre-loaded to the DHU.<br />

II. PARAMETERS MEASUREMENT TECHNIQUE<br />

A. Voltage and Current Measurement<br />

Input voltage to the drive is reduced for the measurement<br />

purpose to a level, by Potential Transformer (PT) and Potential<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 382<br />

ISSN 2250-3153<br />

Divider (PD), compatible to ADC of DHU. The transformation<br />

ratio from input to DHU end will enable to find out the actual<br />

voltage. The transformation ratio and the gain of the PD are<br />

adjusted so that +5V and 0 V at the ADC input corresponds to +<br />

360.6 V and -360.6 V peak value of supply voltage.<br />

The measurement of current is accomplished by Hall Sensor<br />

(HS), with sensitivity (S). The sensor‘s output is current which is<br />

converted to voltage by passing this output current through the<br />

series resistor, Rm as an ohmic drop. Here also this output voltage<br />

across the series measuring resistance Rm (100Ω-320 Ω) of HS,<br />

is reduced by Potential divider (PD) accordingly to make it<br />

compatible to ADC. The current is calibrated as,<br />

V<br />

i <br />

SR m<br />

B. Speed Measurement<br />

Shaft speed information is provided by using one Proximity<br />

Sensor (PS) mounted on the stator housing along with one<br />

metallic screw connected to the rotor shaft. This arrangement<br />

generates pulsed output, the frequency of which depends on<br />

speed of the motor. This signal is fed to the interrupt pin of the<br />

microcontroller of DHU for its measurement, where it interrupts<br />

the microcontroller at its every falling edge. The interval between<br />

successive interrupts i.e. the pulse period is measured with a 16<br />

bit counter where the counter increases its count value at the<br />

clock frequency fclk which is generated by the over flow rate of<br />

timer 0 of microcontroller. If Nsp be the count value of the<br />

counter for the pulse period, which is actually the counts between<br />

successive edges, the speed in rpm (ω) can be calculated by the<br />

equation as,<br />

fclk<br />

60<br />

<br />

N<br />

SP<br />

The timing diagram of the reference clock frequency and<br />

different count values for the measurement of speed, frequency<br />

and power factor is shown if Fig.3.<br />

(2)<br />

(1)<br />

Fig. 3 Timing diagram to measure speed<br />

C. Abnormality detection state Chart Diagram with DHU<br />

An elegant way to depict a real time system is to use state<br />

Chart Diagram [22].In this work the abnormality detection and<br />

GSM activation by DHU is represented by state chart (Fig 4).<br />

Here different states are represented by rectangular boxes. For<br />

example, Voltage, current and speed are measured continuously.<br />

If any abnormality appears the DHU sends warning to the GSM<br />

modem or otherwise if any request comes from the remote<br />

station then DHU also sends the requested information. Depths<br />

of different states are indicated by drawing small boxes within<br />

the large box. The state transitions are indicated by the arcs<br />

joining the boxes. Concurrencies of different states are indicated<br />

by dotted lines.<br />

Fig. 4 State Chart diagram of DHU algorithm<br />

III. GSM BASED SMS REPORTING STRUCTURE<br />

In case of an emergency situation or faulty condition the DHU<br />

generates the SMS and sends it to the pre-assigned node number<br />

/operator through GSM Modem. Then the operator gets<br />

notification about the type of fault, caution level and details of<br />

the fault through this message.<br />

SMS structure generated by the microcontroller will be as<br />

follows<br />

Where represents the blank space, Machine (M/C) number<br />

(NO) is represented by a three digit number (nnn), running<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 383<br />

ISSN 2250-3153<br />

Voltage (V) is three digit value (mmm) V, current (A) is two<br />

digit value (qq), speed (N) is four digit (pppp) RPM. This is a 40<br />

digit message structure.<br />

If abnormal condition occurs or if request comes from central<br />

station then the message structure will be as below followed by<br />

the type of abnormality.<br />

DHU generates SMS to indicate the cause of abnormality. There<br />

are different levels of fault detection (UV) and over voltage (OV)<br />

detection is made. But in case of current there are three levels of<br />

abnormal condition. Like up to a certain percentage of rated<br />

current the system will show over current (OC), then above this<br />

value up to another level the system shows over load condition<br />

(OL) and beyond another level of current the system gives short<br />

circuit (SC) condition ( Table 2). In speed messaging only one<br />

level (OS) is detected. Among all these abnormal conditions,<br />

DHU may be then dictated for shut down in some of the extreme<br />

cases.<br />

Table 7: Different levels of fault conditions<br />

[1] Conditions [2] Message<br />

indication<br />

[3] Over Voltage [4] OV<br />

[5] Under voltage [6] UV<br />

[7] Over Current [8] OC<br />

[9] Over Load [10] OL<br />

[11] Short<br />

Current<br />

Circuit [12] SC<br />

[13] Over Speed [14] OS<br />

IV. RESULTS<br />

The experimental setup of multi-machine system from remote<br />

mobile station is shown below<br />

Fig. 5 Experimental Set-up<br />

The SMS format for reporting of a particular type fault of<br />

multi-machine system from remote mobile station is shown<br />

below<br />

[15] Rated<br />

Curr<br />

ent<br />

Table 2: Current based SMS level status<br />

[16] Current<br />

Drawn<br />

[17] Report<br />

Status<br />

[18] Probable<br />

action<br />

from<br />

operator<br />

via<br />

replay<br />

[19] 1<br />

Amp<br />

[23] 1<br />

Amp<br />

[27] 1<br />

Amp<br />

[31] 1<br />

Amp<br />

message<br />

[20] < 1Amp [21] Nil [22] Allow<br />

[24] 1.1 Amp [25] Over<br />

Current<br />

[28] 1.5 Amp [29] Over<br />

Load<br />

[32] Above 2<br />

Amp<br />

[33] Short<br />

Circuit<br />

Conditi<br />

on<br />

V. DISCUSSION AND FUTURE SCOPE<br />

[26] Allow<br />

[30] Take<br />

necessary<br />

action<br />

[34] Shut<br />

down<br />

The uniqueness of the proposed system is that the abnormal<br />

running conditions of electric machines installed at different<br />

geographical locations in a plant are detected, diagnosed and<br />

reported to any mobile and /or central control station.<br />

The self developed DHU, other than sending the SMS to any<br />

desired SIM of mobile unit or central control station, can also<br />

take the preliminary action to stop the motor either of its own or<br />

by an instruction received from a return SMS.<br />

The desired SIM numbers are pre-loaded within the memory<br />

of each DHU and the same message is sent to all of them one by<br />

one.<br />

In the central control station, a PC is interfaced with the GSM<br />

modem which will store the messages for any future analysis of<br />

the faults. Simple VB based software is developed to capture the<br />

SMSs through its serial port and to store them in a DOC file.<br />

The prototype system is tested with one Induction machine<br />

and it can easily be extended to any number of machines by<br />

connecting the DHU and the GSM modem.<br />

The GPRS technology can also be incorporated for details<br />

diagnosis of the system monitoring continuous data of the<br />

machine from the central control station.<br />

ACKNOWLEDGEMENT<br />

This work is under the auspices of UGC –SAP-DRS-I Project<br />

Authors Acknowledge Mr. Ranjit K. Paul for his untiring help in<br />

technical development of this work.<br />

REFERENCES<br />

[1] K. Singh, Sa‘ad Ahmed Saleh Al Kazzaz, ―Induction machine drive<br />

condition monitoring and diagnostic research-/a survey,‖ Electric Power<br />

Systems Research Vol. 64 No. , Elsevier Science, pp. 145-158, 2003.<br />

[2] Der Minassians, H. MeshginKeik, H.A. Toliat, Milimonfared,and Subhasis<br />

Nandi, ―A Novel Approach for Broken Rotor Bar Detection in Cage<br />

Induction Motors,‖ IEEE Transactions on Industry Applications vol.35,<br />

no.5, pp.1000-1006,Sept./Oct 1999.<br />

[3] Neelam Mehla, Ratna Dahiya, ―An Approach of Condition Monitoring of<br />

Induction motor Using MCSA‖ International Journal of Systems<br />

Applications, Engineering & Development vol 1. Issue1, pp 13-17, 2007.<br />

[4] Gerhard P. Hancke, Chris F.T. Viljoen, ―The Microprocessor Measurement<br />

of Low Values of Rotational Speed and Acceleration‖, IEEE Transactions<br />

on Instrumentation and Measurement, Vol. 39, No. 6, pp. 1014-1017,<br />

December 1990.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 384<br />

ISSN 2250-3153<br />

[5] C.M. Riley, ―Stator current harmonics and their causal vibrations: a<br />

preliminary investigation of sensorless vibration monitoring applications,‖<br />

IEEE Trans. Ind. Appl., Vol. 35 (1), pp 94-99, 1999.<br />

[6] C.M. Riley, B.K. Lin, T.G. Habetter, R.R. Schoen, ―A method for sensorless<br />

on-line vibration monitoring of induction machines,‖ IEEE Trans. Ind.<br />

Appl. , Vol. 34 (6), pp 1240-1245,1998.<br />

[7] F.J. Watson, G.D. Dorrell, ―The use of finite element methods of improve<br />

techniques for the early detection of faults in three-phase induction motors,‖<br />

IEEE Trans. Energy Conversation, Vol.14 (3), pp 655- 660, 1999.<br />

[8] Randy R. Schoen and et.al, ―An Unsupervised, On-Line System for<br />

Induction Motor Fault Detection Using Stator Current Monitoring,‖ IEEE<br />

Transactions on Industry Applications, vol.31, no.6, pp1280-1286,<br />

Nov./Dec.1995.<br />

[9] G.B. Kliman, J. Stein, ―Methods of motor current signature analysis‖,<br />

Electric Power Systems and Components, Taylor and Francis Publ., Vol. 20<br />

(5), pp 463-473, 1992.<br />

[10] K.R. Cho, J.H. Lang, S.D. Umans, ―Detection of broken rotor bars in<br />

induction motors using state parameter estimation‖ IEEE Trans. Ind. Appl.<br />

,Vol. 28 (3), pp. 702-708.,1992.<br />

[11] S. Vitturi, ―PC-based automation systems: an example of application for<br />

the real-time control of blowing machines,‖ Computer Standards &<br />

Interfaces, Vol. 26, Elsevier Publication, pp. 145–155, 2004.<br />

[12] Min-Chun Pan, Po-Ching Li, Yong-Ren Cheng, ―Remote online machine<br />

condition monitoring system,‖ Measurement, Elsevier Publication, Vol. 41,<br />

pp 912–921, 2008.<br />

[13] Kin Yeung, Jie Huang, ―Development of a remote-access laboratory: a dc<br />

motor control experiment‖, Computers in Industry, vol.52, Elsevier<br />

Publication, pp. 305–311, 2003.<br />

[14] W. Wang, P.W. Tse, J. Lee, ―Remote machine maintenance system<br />

through Internet and mobile communication,‖ International Journal of<br />

Advanced Manufacturing Technology ,vol. 31, pp. 783–789, 2007,<br />

[15] B. Wu, B.-H. Zhou, L.-F. Xi, ―Remote multirobot monitoring and control<br />

system based on MMS and web services,‖ Industrial Robot, Emerald, vol.<br />

34 (3), pp. 225–239., 2007.<br />

[16] L. Peretto, S. Rapuano, M. Riccio, D. Bonatti, ―Distance learning of<br />

electronic measurements by means of measurement set-up models‖,<br />

Measurement, Elsevier Publication, Vol. 41, pp 274–283,2008.<br />

[17] Kostas Kalaitzakis*, Eftichios Koutroulis, Vassilios Vlachos<br />

―Development of a data acquisition system for remote monitoring of<br />

renewable energy systems‖, Measurement, Elsevier Publication, Vol. 34,pp<br />

75–83,2003.<br />

[18] Jinia Datta (Das)*, Sumana Chowdhuri, Jitendranath Bera, Gautam Sarkar<br />

―Remote monitoring of different electrical parametersof multi-machine<br />

System using PC‖ Measurement, Elsevier Publication, Vol. 45, pp 118–<br />

125, <strong>2012</strong>.<br />

[19] L.Boquete*, I.Bravo, R.Barea, M.A.Garcia,―Telemetry and control system<br />

with GSM communication‖, Microprocessor and Microsystems, Elsevier<br />

Publication, Vol. 27, pp 1–8, 2003.<br />

[20] Joe-Air Jianga, Chwan-Lu Tsengb, Fu-Ming Lua, En-Cheng Yangc, Zong-<br />

Siou Wua, Chia-Pang Chena, Shih-Hsiang Lina, Kuang-Chang Linb,<br />

Chih-Sheng Liaob‖ A GSM-based remote wireless automatic monitoring<br />

system for field information: A case study for ecological monitoring of the<br />

oriental fruit fly, Bactrocera dorsalis (Hendel)‖ Computer and Electronics<br />

in Agriculture, Elsevier Publication, Vol. 62, pp 243–259, 2008.<br />

[21] Chawn-Lu Tsenga, Joe-Air Jianga ,Ren-Guey Lee,Fu-Ming Lu,Cheng-<br />

Shiou Ouyang,Yih-Shaing Chen,Chin-hsiang Chang―Feasibility study on<br />

application of GSM-SMS technology to field data acquisition‖ Computers<br />

and electronics in agriculture, Elsevier Publication,Vol.53, pp 45-59,<br />

2006.<br />

[22] David Harel, ― Statecharts: A Visual Formalism for Complex Syatems‖,<br />

Elsevier Publication, Science of Computer Programming Vol.8, pp 231-<br />

274, 1987.<br />

AUTHORS<br />

First Author - J. Datta(Das) is with the Birbhum Institute of<br />

Engineering and Technology, Suri (corresponding author)<br />

Email id - dattajinia@gmail.com<br />

Second Author – S. Datta is now with the Department of<br />

Applied Physics, Junior Research Fellow, University of Calcutta.<br />

Email id - sjit.cordite@gmail.com<br />

Third Author – Dr. S. Chowdhuri is with the Applied Physics<br />

Department, University of Calcutta, Kolkata<br />

Email id - sumana_cu05@rediffmail.com<br />

Fourth author: Dr. J. N. Bera is with the Applied Physics<br />

Department, University of Calcutta, Kolkata<br />

Email id - jitendrabera@rediffmail.com)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 385<br />

ISSN 2250-3153<br />

Income Elasticities of Demand for major consumption<br />

items.<br />

Case study of Kashmir University Teachers<br />

Abstract- Kashmir University teachers belong to upper<br />

sedentary and rich class is not a fact as the consumption behavior<br />

shown by them is similar to middle class society. The sample<br />

under examination differ in size of the family, age, designation,<br />

property ownership and other characteristics; in general we<br />

expect the household with above given different characteristics to<br />

have different expenditure plans but the analysis shows same<br />

expenditure by every income bracket which confirms<br />

Duessenbary‘s relative income hypothesis. While analyzing the<br />

income pattern of Kashmir university teachers we find that all<br />

observations do not lie on the straight line because in addition to<br />

the income other variables also affect consumption pattern.<br />

Direct taxes have more immediate effect on Consumption and<br />

Kashmir university teachers being healthy payer of taxes thereby<br />

their consumption pattern also shows a different behavior.<br />

Index Terms- consumption, disposable income,<br />

Duessenbary‘s relative income hypothesis, income elasticity of<br />

demand, consumer durables<br />

N<br />

I. INTRODUCTION<br />

o body denies the importance of consumers in the economy<br />

or ignores the momentous results that may flow from their<br />

decisions.<br />

The most appealing feature of economic research into<br />

consumer behavior is the close relationship between theoretical<br />

specification and appropriate estimation technique. There are two<br />

major approaches to the estimation of income elasticity, as they<br />

are usually derived from budget surveys, used by national and<br />

international agencies for the purpose of commodity projection.<br />

This is most apparent when empirical analysis and testing takes<br />

place at micro level.<br />

Attempts to discover consumer habits and preferences now<br />

depend not only on intuitive theories but also on objective<br />

research. Psychologists and economists make survey, often by a<br />

sampling process, to learn how, when, and if possible, why<br />

consumer at various incomes levels and in various places spend<br />

their money. Economists accumulate and interpret statistical<br />

information about consumer‘s habits in the past and their<br />

intentions to buy or not to buy various classifications of goods in<br />

future. Most certainly, any theory of consumer behavior must<br />

recognize the importance of social forces to shape consumer<br />

behavior.<br />

Samira Khan<br />

Department of Economics, University of Kashmir, India<br />

The idea that consumers are the supreme arbiters of what is<br />

produced under a system of free enterprises has a long and<br />

central place in the history of economic thought. It has to be<br />

sharply distinguished from the teleological version, that the<br />

consumer should be sovereign, which has an even older origin in<br />

Adam Smith without whose dictum ―Consumption is the true end<br />

and purpose of all production‖ no book on the political economy<br />

of consumers would be complete.<br />

The traditional relationship between the amount of family<br />

income and the pattern of family expenditure was discovered in<br />

1857 by the German Civil Servant Ernst Engel, in the<br />

examination of an extensive collection of family budgets .It is<br />

known as Engel‘s Law. In present context Engel‘s great<br />

contribution is the clarification and elaboration of the concept of<br />

the income elasticity of demand, which a frame work within<br />

which numerical measurement of consumer behavior could be<br />

affected. Prior to 1936 economists would believe that interest<br />

determines the level of consumption.<br />

According to Keynes consumption spending and saving are<br />

explained by the level of income; the relationships between<br />

spending, saving and the level of income are shown by the<br />

consumption function and the saving function. In the elementary<br />

Keynesian model, the rise in real income of households will lead<br />

households to increase the amount of goods purchased and viceversa.<br />

To consider how consumption expenditures are related to<br />

disposable income we may begin by posting that consumption<br />

expenditures, vary directly with disposable income. Second we<br />

can quantify i.e. saying how much consumption increases with a<br />

specific increase in disposable income. Keynes did this in his<br />

―fundamental psychological Law‖ which states that ―men are<br />

disposed, as a rule and on the average, to increase their<br />

consumption as their income increases but not as much as the<br />

increase in their income‖. Four general theories currently exist on<br />

the determinants of total consumer spending: the absolute income<br />

hypothesis, the relative income hypothesis; the permanent<br />

income hypothesis and life cycle income hypothesis. Each<br />

hypothesis postulates a relationship between consumption and<br />

income though the concepts underlying these terms may vary<br />

substantially.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 386<br />

ISSN 2250-3153<br />

II. OBJECTIVES:<br />

The present investigation has been carried out to study the<br />

Income Elasticities of academia. The investigation is taken with<br />

the following objectives:-<br />

1. To know the consumption preferences of academia.<br />

2. To study whether the consumption preferences of university<br />

teachers are different from accepted consumption<br />

hypothesis.<br />

3. To study the asset preference in university teachers.<br />

III. LITERATURE REVIEW<br />

Realizing the importance of consumer in the economic aspect<br />

many scholars and researchers from various disciples ranging<br />

from commerce, management etc intervene in the study of<br />

consumer behavior. Among a few studies directly or indirectly<br />

dealing with the similar prospective have been under taken by<br />

Stone – Geary; Cable and Godge 1994; E.M.Ojala 1952; Lewis<br />

Scheppar;A.S.Oswald; Paris Quirino 1970;Muelbaures and<br />

Deapon 1980; Richard Blundell 1954 have done comprehensive<br />

work in this field. In a study The impact of food price on<br />

consumption,feb2010 a systematic review of research on price<br />

elasticity of demand for food, by Tatiana Andreyeva ,Michael<br />

W.Long and Kelly D.Brownell lights the proposals to improve<br />

diets by shifting food prices ,results potray percentage wise<br />

increase in price and its impact on consumption.<br />

Ethiopian development research institute (EDRI) in a research<br />

note 90,FOOD DEMAND ELASTICITIES IN ETHIOPIA 2011,<br />

By Kibrom Tafere,Alemayehu seyoum Taffesse,S<br />

Tamiru,Nigussie Tafera and Zelekawork Paulos ;investigates<br />

howhouseholds have adjusted their demand for various food and<br />

non food items to change in price and income. The results<br />

suggest that ETHIOPIAN households display significant<br />

responses to change in price and income. In both rural and urban<br />

areas consumption increases of teff, animal products, and non<br />

food items exceeds the proportional income increase. The price<br />

elasticity of demand for cereals are roughly same throughout the<br />

country.<br />

The present study will be an improvement over the existing<br />

knowledge. This analysis is carried out with the objectives to<br />

capture behavioral parameters of University teachers a white<br />

collar group and measuring Income Elasticities of academia and<br />

shall study the consumption preferences.<br />

I. It is believed that consumption preference in case of<br />

high income brackets are oriented to consumer durables<br />

than necessities.<br />

II. University teachers though falling in high income<br />

brackets have not high disposable income, however<br />

their consumption preference need to be investigated,<br />

whether they are oriented to durables or basic consumer<br />

items.<br />

IV. RESEARCH METHODOLOGY<br />

Methodology of the present study proceeds along the<br />

following lines<br />

1. Statement of the problem<br />

2. Specification of econometric model<br />

3. Obtaining the data<br />

4. estimating the Engel Elasticities and behavioral parameters<br />

of econometric model<br />

5. Testing hypothesis.<br />

The present study uses linear regression economic model.<br />

X= a+bY +U<br />

Where X is consumption, Y is income, a is autonomous<br />

consumption/ intercept and b is the slope coefficient or marginal<br />

propensity to consume. U is known as the disturbance or error<br />

term in a random variable (stochastic variable) that has well<br />

defined probabilistic properties. The term U may well represent<br />

all those factors that affect consumption but are not taken into<br />

account explicitly.<br />

To estimate the Income Elasticities and the behavioral<br />

parameters of the econometric model the primary data required is<br />

collected by questionnaires.<br />

The data for the study is outcome of a series of<br />

questionnaires collected from a random sample of the Kashmir<br />

University Teachers. The series consisted of the 110 waves of<br />

questionnaires taken from Kashmir University teachers. The data<br />

under investigation is fragmented into 5 income brackets The<br />

size of the first bracket is 7. Teachers falling under second<br />

bracket is equal to 26, in the third bracket we have 29 teachers<br />

while in the 4 th there are 18 teachers, in the last group i.e is the<br />

highest income bracket the number of respondents is 9.<br />

V. RESEARCH FINDINGS AND INTERPRETATION<br />

To analyze the consumption expenditure of Kashmir<br />

University Teachers in general we first estimate the income<br />

Elasticities of various items separately e.g. food, non-food<br />

consumer durables etc. This could be done in;<br />

a) The consumption –income relationship has to be<br />

analyzed with the help of Engel Functions<br />

b) An income distribution has to be compared with<br />

Consumption distribution.<br />

The important economic determinants usually considered are<br />

income, price, level of assets held. Prices are kept constant and<br />

only income is allowed to vary among household. Our main<br />

objective is to compare the consumption income behavior of<br />

Teachers within Kashmir University. For this we derive Income<br />

Elasticities by fitting various types of functional forms.<br />

With a view to assess, the impact of higher income on<br />

standard of living, we use suitable econometric and statistical<br />

techniques<br />

An attempt has been made in this regard<br />

(I) To assess the differences in consumption pattern of<br />

University teachers.<br />

(II) To work out the distribution of consumption<br />

expenditure. The proposed analysis will proceed as,<br />

first; the consumption pattern of Kashmir University<br />

Teachers will be examined. This will be followed by the<br />

analysis of the composition of the consumption<br />

expenditure taking into account, the consumer durable<br />

etc. as part of consumption. Side by side we analyze the<br />

income data and take into consideration the total<br />

disposable income. Viewing the complex of ceaseless<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 387<br />

ISSN 2250-3153<br />

change to which the human affairs are subject; the<br />

economist could claim the end of human development is<br />

the increase in income, giving ―Income‖. A definition<br />

broad enough to include those elements of well being<br />

that can be measured in terms of money. In the present<br />

area of research the income of Kashmir University<br />

Teachers includes their own salaries, earning of their<br />

spouse, income of their parents, income from primary or<br />

tertiary sector. All when added gives as a gross figure<br />

from which direct and indirect taxes are deducted to get<br />

the disposable income.<br />

It needs to be mentioned here that there is slight difference in<br />

consumption level of Kashmir University Teachers although<br />

there is a attributable difference in income levels.<br />

Table: 1 Mean Values and APC<br />

Status according to Income<br />

Level<br />

Mean value of<br />

income<br />

The mean values for expenditure on individual components<br />

has been given in increasing order according to income levels in<br />

below mentioned table 1.<br />

Salaries are very much age related; thus age factor of a<br />

teacher become major factor determining his appropriate salary<br />

Non-academic out side earnings are obtained by a small<br />

proportion of teachers. Kashmir University teachers all form a<br />

same income group have never about same life style will<br />

manifest a wide range of difference in their choice and decision<br />

behavior.<br />

NSS data do not give figures of income by categories but only<br />

total consumption expenditure .All these consumption<br />

expenditures figures exclude saving, and as savings are likely to<br />

go up.<br />

Mean value of<br />

expenditure on<br />

food items<br />

Average Propensity to consume<br />

1 st Bracket 5.24 4.6 0.87<br />

2 nd Bracket 5.80 4.8 0.82<br />

3 rd Bracket 5.9 5.01 0.84<br />

4 th Bracket 5.2 4.05 0.79<br />

High Income Bracket 5.01 3.02 0.6<br />

www.ijsrp.org


Income Brackets<br />

International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 388<br />

ISSN 2250-3153<br />

Table: 2 Value of Income Elasticities of Demand for major consumption items.<br />

Income elasticity of expenditure on<br />

food items<br />

Income elasticity of expenditure on<br />

non- food items<br />

1 st Bracket 0.5 0.46<br />

At 1% ‗level of significance‘ at 5% ‗level of significance‘, that is<br />

under confidence limit 99% and 95% the above data is relevant.<br />

Among various forms the double log form is best fit on each item<br />

VI. CONCLUSION<br />

Income elasticity of expenditure on<br />

consumer durables.<br />

The study of Income elasticity and consumption parameters of<br />

Kashmir University Teachers is of inestimable importance for the<br />

help in understanding an estimating Engel elasticities and<br />

consumption parameters .The present study of academia has<br />

yielded an interesting and fascinating information regarding the<br />

preference of academia for food items, non-food items and<br />

consumer durables. The prosperity of academia is attributed to<br />

higher and better education as well as the better quality<br />

evocations.<br />

Empirical application express that consumption expenditure is<br />

function of income as well other variables. Saving rate does not<br />

depend upon income but on the relative position of income scale.<br />

Major part of the effort in the research has been on consumption<br />

and consumption expenditure on particular commodities which<br />

direct to determine the regression of consumption on income.<br />

The study shows strong tendency among teachers to emulate<br />

other colleagues and at the same time strive constantly for higher<br />

standard of living. Pigouian Real Balance Effect is absent<br />

because there is negligible impact of wealth on consumption<br />

shown by Kashmir university teachers.<br />

It is believed that consumption preference in case of high<br />

Standard deviation<br />

0.68 0.15 0.06<br />

Standard error<br />

Value of T<br />

T- test<br />

2 nd Bracket 0.4 0.5 0.7 0.15 0.19 -2.36 0.67<br />

3 rd Bracket 0.37 0.3 0.8 0.09 0.01 1.00 0.54<br />

4 th Bracket 0.2 0.38 0.87 0.15 0.09 1.11 0.62<br />

High Income<br />

Bracket<br />

-2.5<br />

of expenditure .In each case we test for the statistical significance<br />

of the elasticity coefficients at 5% level and 1% level.<br />

income groups are oriented to consumer durables than<br />

necessities, though University Teacher belong to the middle<br />

class, still the preference for consumer durable, is very high.<br />

Their consumption preference when investigated shows their<br />

orientation to durables not to basic consumer items. An important<br />

factor of consumer economics that direct access shows<br />

immediate effect on consumption, mainly when taxation is<br />

progressive in nature. Since whole University teacher staff are<br />

tax payers therefore, their consumption is also effected by tax<br />

system.<br />

REFERENCES<br />

[1] Ando,A & Modigliant (1963), The life cycle hypothesis Volume No.53 An<br />

American Economic review.<br />

[2] Blundell Richard (1954) , Consumer behaviour theory and empirical<br />

evidence a Survey.<br />

[3] Deaton and Muellbaures, 1980 Cambridge University Press,Economics and<br />

Consumer Behaviour.<br />

[4] Feguson Goulds (1988), Micro Economic theory, Princeton University<br />

press.<br />

[5] Friedman Milton (1956), Consumer Behaviour ,Oxford & IBH, publishing.<br />

[6] F.Knox (1969) , Consumers and Economy ,By George G.Harrap& Co.Ltd<br />

[7] Intriligator D.M.(1978), Econometric models techniques and applications<br />

Prentice Hall, Inc.<br />

[8] John .D.Hey (1979), Stastistics in Economics Martin Robert son.<br />

Coefficient of determination R 2<br />

0.80<br />

0.018 0.2 0.9 0.11 0.037 2.43 0.63<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 389<br />

ISSN 2250-3153<br />

[9] Kelejian , Introduction to Econometrics.<br />

[10] Kothari C.S.(1985), Research methodology, Whishwa Parakashan<br />

[11] Koutsoyiannis.A (1973), Theory of Econometrics, Palgrave publishers Ltd<br />

[12] Marquez Jaine, Economic theory and Econometrics.<br />

[13] Meghnad Dessi (1976),Applied Economics,Tata McGREW- HILL<br />

Publishing company.<br />

[14] Ojala E.M.(1952), Agriculture Economic progress, Oxford University<br />

Press.<br />

[15] Oswald A.S.( Vol II), Survey in Economics.<br />

[16] Quirino Paris(1970), An appraisal of income Elasticities for total food<br />

consumption in developing countries.<br />

[17] Richard Hevin (1991), Statistics for management studies, Pre<br />

[18] The Royal Economic society(1973), Surveys of applied economics.Volume<br />

II Macmillan Press Ltd<br />

[19] Royal economic society (1966) ,Surveys of economic theory,Volume III<br />

Macmillan Press Ltd<br />

[20] American journal of public health, VOL 100 NO 2.<br />

[21] Journalof International food policy research institute IFPRI<br />

AUTHORS<br />

First Author – Samira Khan, PhD. Scholar PG Department of<br />

Economics. University of Kashmir, India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 390<br />

ISSN 2250-3153<br />

Enhancing a Future version of the Nigerian SME<br />

Technology Incubation Model: Lessons for other<br />

developing countries<br />

Nkem Okpa Obaji 1 , Aslan Amat Senin 2 , Cameron Keith Richards 3<br />

1, 2<br />

Department of Management and Human Resources Development Universiti Teknologi Malaysia<br />

Perdana School of Science, Technology and Innovation Policy, Universiti Teknologi Malaysia 3<br />

Abstract- The Nigerian government‘s implementation of an<br />

SME incubation model has not been particularly successful. The<br />

challenges faced in Nigeria perhaps reflect how policies or<br />

models taken from elsewhere need to be adapted to local contexts<br />

for better chances of success. This is especially policies or<br />

models borrowed from developed countries and implemented in<br />

developing country contexts. Therefore this paper will focus on<br />

the case study implications for other developing countries of an<br />

inquiry into the requirements for enhancing a future version of<br />

the Nigerian SME incubation model.<br />

Keywords: Business incubator, Developing countries, SMEs,<br />

Technology Incubation Model<br />

T<br />

I. INTRODUCTION<br />

his research aims to improve on the existing business<br />

incubation model in Nigeria and developing countries<br />

generally which has been marred with series of flaws and<br />

weakness which have resulted into failure of the program. The<br />

rationale is to institute best practices that will move the program<br />

at par with related schemes in other countries especially USA<br />

and other Organization for Economic Co-operation and<br />

Development (OECD) countries.<br />

The entrepreneurs who are formally described as SMEs are<br />

usually recognized as the foundation for the urban and economic<br />

growth of many nations. Globally, SMEs are noted for their<br />

massive assistance to the advancement procedure as well as<br />

engine for economic growth (Obitayo, 2001). The main benefit<br />

of this segment according to Aremu and Adeyemi (2011) is its<br />

job creation prospect at modest investment outlay. Kumar and<br />

Ravindran, (<strong>2012</strong>) also concur on this as they declare that<br />

entrepreneurship is vital to the growth of a country through<br />

employment generation, innovative products development as<br />

well as methods through modernization. Libecap, (2011) also<br />

declares that when policymakers as well as macroeconomists are<br />

anxiously looking for measures that could drive economic<br />

development, spurn inactivity as well as promote employment<br />

formation, private enterprise is usually the spotlight for<br />

consideration. Technology business incubation scheme is the<br />

particular mechanism that will actualize the above mentioned<br />

macroeconomic strategies. In citing NBIA, (2010), Al-Mubaraki,<br />

(<strong>2012</strong>) declares that business incubators assist business<br />

enterprises to transform their thoughts into practicable as well as<br />

strengthening their ventures by assisting them from<br />

commencement to when they will be able to survive on their<br />

own. Business incubators are mechanism for value addition to<br />

firms and incubatees. Incubation program is aimed at achieving<br />

three main macroeconomic objectives of job creation, economic<br />

development and international Networking.<br />

Most industrialized and developing nations have implemented<br />

TBI scheme to accelerate the establishment of innovative<br />

knowledge-related businesses because of its above eighty percent<br />

success level of innovative business enterprise formation, as well<br />

as its support arising from its spinoff effects such as Technology<br />

transfer, job creation as well as capital.<br />

II. LITERATURE REVIEW<br />

The Technology Business Incubation (TBI) in Nigeria was put<br />

into practice in 1993 when the first Center was set up in Agege,<br />

Lagos (FMST, 2005). Ihenacho, (2005) pinpoints that there is<br />

proliferation of TBIs in Nigeria, but the performances of almost<br />

all of them are below expectation due to inadequate task<br />

execution and abysmal administrations. A crucial evaluation<br />

according, to Adegbite, (2001) shows that TBIs have failed to<br />

accomplish the basic purpose of developing sustained successful<br />

ventures. The growth of the initiative has been hindered by<br />

adaptation problem, incoherent financial support, structural<br />

difficulties in administrative dealings as well as ineffectively<br />

construed relationships with appropriate establishments as well<br />

as inconsistent government policies as they relate to Science,<br />

technology and innovation (STI) and Technology Incubation in<br />

particular. Other Achilles‘ heel to the Nigerian model which is<br />

similar to other developing countries include heavy reliance on<br />

government patronage as well as paying particular attention to<br />

physical amenities instead of services of intangible value.<br />

Business incubation initiatives have really thrived seriously in<br />

places like Western Europe and North America where the idea of<br />

business incubation program was conceived, nursed and brought<br />

to the fore.<br />

Most developing countries just like Nigeria aspire to institute<br />

best practices that will move the program at par with related<br />

schemes in other countries with success stories on incubation<br />

program particularly USA and other OECD countries but the<br />

dilemma faced by Nigeria as a developing country also affect<br />

majority of the developing countries in their path to a better<br />

incubation model. Since the initiative was a borrowed technology<br />

from the OECD Countries to developing countries the issue of<br />

adaptability has been a major predicament for some of the<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 391<br />

ISSN 2250-3153<br />

emerging countries, for instance, Nigeria which adapted the<br />

scheme from the USA with recommendation and design from the<br />

United Nations Development Programme (UNDP) has social<br />

infrastructural problems, therefore how is the initiative going to<br />

succeed without the country first tackle the infrastructural<br />

problem.<br />

III. DEVELOPING COUNTRIES CONTEXT – CHINA AND BRAZIL<br />

China and Brazil are chosen as country cases because these<br />

two nations combined together host over 1000 incubators and are<br />

ranked third and fourth respectively in numerical terms. The<br />

choice of Brazil as a country of comparison in this study is based<br />

on the fact that as the entrepreneurship movement in Brazil has<br />

grown rapidly in recent years, the Business Incubators also<br />

follow this trend of rapid growth. Therefore this trend is ripe for<br />

detailed analysis of both movements given the fact that Brazil<br />

was being listed among the countries with highest entrepreneurial<br />

activity worldwide with comparable indices including USA.<br />

Government participation in incubation programme in most<br />

developing countries is still very high in terms of establishment<br />

and funding. There is also lack of public – private partnership,<br />

hence the for-profit notion is not yet established (Akcomak 2009:<br />

Adegbite 2001). In terms of funding, there is lack of information<br />

on how much governments spend on the incubators as most<br />

funding for incubator promotion is integrated to other major<br />

funding programmes. For instance, most incubators in<br />

developing countries are supported by international financial<br />

institutions like the World Bank and UNDP, as the World Bank<br />

does not have a precise programme initiative for incubators but<br />

always fund particular projects (Scaramuzzi 2002). This will<br />

make incubator performance and evaluation not to be accurate as<br />

there is no clear cut information on the funding of the incubators.<br />

In most developing countries, incubator establishment and<br />

funding is always the prerogative of the governments, hence,<br />

governments attitudes towards the program will dictate the<br />

achievement or failure of the initiative (Stefanovic et al., 2008).<br />

IV. BUSINESS INCUBATION IN CHINA<br />

Business incubation initiative is an important strategy to help<br />

entrepreneurship and innovation in both developed and<br />

industrializing nations (OECD, 1999; UN, 2000). Scaraborough<br />

and Zimmerman (2002) suggest that the reason for business<br />

incubation lies on two facts. The first being the small business is<br />

an important constituent of economic growth and social<br />

development. The second fact is that the failure rate of small<br />

business is high, especially at the start-up stage. In view of these<br />

high failure rates of small and new businesses vis-a-vis the<br />

important help they render to government and society, various<br />

ideas and plans have been invented to help these enterprises.<br />

Such strategies relate to the establishment, development and<br />

survival of new and small businesses (Cromie 1991; Xu 2010).<br />

One of the existing concepts and strategies adopted was the<br />

business incubation which began in China since 1987. The<br />

Chinese Business Incubators are funded by government. They<br />

use Business Incubators as a strategic mechanism for market<br />

creation by providing financial funding for both construction and<br />

operations of the business incubator. This, the government<br />

accomplish through the TORCH Program of the Ministry of<br />

Science and Technology (MOST) which was set up in the 1990s<br />

by the central government to support the creation and growth of<br />

incubators in China. The government provides various lines of<br />

dedicated Funds to support incubation programs, for example,<br />

‗Construction‘ Funds for incubators, ‗Seed Capital‘ Funds for<br />

start-ups and ‗Innovation‘ Funds for SMEs that are in the growth<br />

stage of their life cycle. The Torch Program has made huge<br />

success in China. It was reported that as of 2003, fifty-three<br />

national Science & Technology Industrial Parks (STIPS) created<br />

over 3.5 Million jobs and $200 Billion which translated to18% of<br />

China GDP for that year. Also, 465 technology incubators are<br />

dynamically operational for sustainable advancement.<br />

NBIA in 2007 estimated that about 5000 business incubators<br />

exist worldwide. The Chinese business incubation industry is<br />

generally accepted as the largest in developing countries and the<br />

second largest worldwide after USA.<br />

V. BUSINESS INCUBATION IN BRAZIL<br />

Brazilian incubation development started in the 1980s. The<br />

first incubator was set up in 1986 and by 1996, there were<br />

already forty incubators. Most incubators there were located in a<br />

university or a research institute and more than eighty percent of<br />

the tenants were spin-offs from the academia and other firms<br />

(Lalkaka and Bishop, 1996). At the start of the incubator<br />

movement, the chief impotence was lack of good relations with<br />

the university personnel and inadequate business support services<br />

(Akcomak 2009). The Brazilian Incubators exhibit the triple<br />

helix of the university, industry and government which enhances<br />

a synergy (Etzkowitz et al. 2005). Incubation models of different<br />

incubators in Brazil are based on the local needs which include<br />

easing of poverty, employment creation, economic development<br />

and technology commercialization (Lalkaka and Schaffer, 1999).<br />

Another fascinating feature of the Brazilian incubators is where<br />

already existing and reliable incubators are asked to develop<br />

newer incubators (Chandra 2007).<br />

Scaramuzzi (2002) explains that micro and Small enterprises<br />

account for 98 percent of the existing firms in Brazil employ<br />

about 60 percent of the active population and contribute to 21<br />

percent of its GDP. Although, according to him, 80 percent of<br />

such firms tend to fail before the expiration of their first year as a<br />

result of bureaucratic barriers, administrative barriers and lack of<br />

core management skills. Almeida (2005) in his study explains<br />

that in 2003 there were over 1000 incubatee firms with more than<br />

15000 employees.<br />

VI. FINDINGS<br />

From the foregoing study, it has been shown that technology<br />

business incubation program is a good scheme for the survival<br />

and promotion of the Small and Medium businesses as well as an<br />

economic development strategy for countries especially the<br />

developing countries. The developing countries approaches to the<br />

scheme have been almost the same, especially in the areas of<br />

depending solely on government for financial support and other<br />

assistance. This is the case with Nigerian model, however, the<br />

Chinese model of business incubation have shown that despite<br />

government patronage, the incubation program in China has<br />

grown to be a major factor in contributing to both job creation as<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 392<br />

ISSN 2250-3153<br />

well as huge contributor to the GDP of the country. The same is<br />

obtainable for Brazil; therefore some developing countries are on<br />

the right path to achieving the best practices of the incubation<br />

model.<br />

VII. CONCLUSION<br />

This paper has presented a general idea on business incubation<br />

especially as it relates to technological firms in developing<br />

countries with particular reference to Nigeria. There is need for<br />

stakeholders especially the policy makers to find a lasting<br />

solution to the problems facing the initiative as well as making<br />

the program to reflect the public-private partnership whereby<br />

government will reduce its stake on the program and concentrate<br />

on providing a conducive business environment in the area of<br />

infrastructural development which ought to be a prerequisite to<br />

the smooth running of the initiative. There is need for<br />

government policies especially as they relate to Technology<br />

Incubation to be properly and effectively implemented so as to<br />

achieve the objectives of the policy documents which are always<br />

extraordinary on paper but implementation always fall short of<br />

the expectations of the final beneficiaries.<br />

REFERENCES<br />

[1] Adegbite, Oyeyemi, ― Business Incubators and Small Enterprise<br />

Development: The Nigerian Experience‖. Small Business Economics 17:<br />

157-166, 2001.<br />

[2] Akcomak, I.S. (2009). Incubators as Tools for Entrepreneurship Promotion<br />

in Developing Countries: World Institute for Development Economics<br />

Research. Research Paper No. 2009/52<br />

[3] Chandra, A. (2007). Approaches to Business Incubation: A Comparative<br />

Study of the United States, China and Brazil. Working paper 2007–WP–29.<br />

Indianapolis: Network Financial Institute.<br />

[4] Cromie, S. (1991). The problems experienced by young firms. International<br />

Small Business Journal, Vol. 9, No.3, pp.51-69.<br />

[5] FMST, (2005). Federal Ministry of Science and Technology Quarterly,<br />

vol.2, 2005, Abuja, Nigeria.<br />

[6] Gary D. Libecap. ―Advances in the Study of Entrepreneurship, Innovation<br />

& Economic Growth‖ Advances in the Study of Entrepreneurship,<br />

Innovation & Economic Growth, Volume 22), Emerald Group Publishing<br />

Limited, pp. ix – xii.<br />

[7] H.M. Al-Mubaraki and M. Busler. ― Incubators economic Indicators:<br />

Mixed Approach‖ Journal of Case Research in Business and Economics,<br />

<strong>2012</strong>.<br />

[8] Ihenacho, R.N., (2005). A study of the Dynamics of institutional support<br />

Measures to SMEs in Nigeria. A Ph.D Dissertation in Management. St<br />

Clements University, USA.<br />

[9] K.M. Obitayo. ― Creating an enabling environment for Small and Medium<br />

Industries, CBN 25(3).<br />

[10] K.S. Kumar and D.S.R. Ravindran. ―A Study on Elements of Key Success<br />

Factors Determining the Performance of Incubators‖ European Journal of<br />

Social Sciences ISSN 1450-2267 Vol.28 No.1 (<strong>2012</strong>), pp. 13-23.<br />

[11] Lalkaka, R. and Bishop, J. (1996). Business Incubator in Economic<br />

Development: An initial Assessment in Industrialized Countries. New York,<br />

UNDP/UNIDO/OAS.<br />

[12] Lalkaka, R. and Shaffer, D.(1999). Nurturing Entrepreneurs, Creating<br />

Enterprises: Technology Incubation in Brazil. International Conference<br />

on Effective Business Development Services. Rio de Janeiro, Brazil.<br />

[13] M.A. Aremu and S.L. Adeyemi. ― Small and Medium scale Enterprises as a<br />

survival strategy for employment generation in Nigeria. Journal of<br />

Sustainable Development 2011. 4(1), 200-206,<br />

[14] OECD,(1999). Small Business, Job creation and Growth: Facts, Obstacles<br />

and Best Practices. OECD, Paris.<br />

[15] Scaramuzzi, E. (2002). Incubators in developing countries: Status and<br />

Development Perspectives. InfoDev programme. The World Bank,<br />

Washington DC.<br />

[16] Scarborough, N.M. and Zimmerer, T.W. (2002). Effective Small Business<br />

Management: An entrepreneurial Approach, 4th edition, Prentice Hall,<br />

Upper Saddle River, NJ.<br />

[17] Stefanovic, M., Devedzic, G. and Eric, M (2008). Incubators in Developing<br />

Countries: Development Perspectives. International Journal for Quality<br />

Research, Volume2, No.3. 2008.<br />

[18] United Nations (2000). Best Practice in Business Incubation. United<br />

Nations, New York and Geneva.<br />

[19] Xu, Lilai. (2010). Business incubation in China: Effectiveness and<br />

Perceived Contributions to Tenant Enterprises. Management Research<br />

Review. Vol.33 No.1. 2010 Pg 90 – 97. Emerald Group Publish Limited.<br />

[20] Verma, S. (2004). Success factors for business incubators: An empirical<br />

study of Canadian Business Incubators. A Masters of Management Thesis<br />

submitted To the Faculty of Graduate Studies and Research, Eric Sprott<br />

School of Business, Carleton University, Ottawa, Ontario.<br />

AUTHORS<br />

First Author - Nkem Okpa Obaji Ph.D Candidate, Department<br />

of Management and Human Resources Development, Universiti<br />

Teknologi Malaysia<br />

Email id - amazonsng@yahoo.com<br />

Second Author - Aslan Amat Senin, Department of<br />

Management and Human Resources Development Universiti<br />

Teknologi Malaysia<br />

Third Author - Cameron Keith Richards, Perdana School of<br />

Science, Technology and Innovation Policy Universiti Teknologi<br />

Malaysia<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 393<br />

ISSN 2250-3153<br />

The Effect of Ionic Composition on Structural and<br />

Optical Properties of CdxZn1-xS Thin films Grown by<br />

Spray pyrolysis<br />

Ravangave L. S. 1 , Biradar U. V. 2 , Misal S. D. 3<br />

1 Department of physics, Shri Sant Gadge Maharaj College,Loha.(M.S.) India.<br />

2 Department of physics, Mahatma Basweshwar College, Latur. (M.S.) India.<br />

3 Department of physics, Kumar Swami College,Ausa. (M.S.) India.<br />

Paper Received: May 15, <strong>2012</strong>, Paper Accepted: May 21, <strong>2012</strong>, Paper Published: June 04, <strong>2012</strong><br />

Abstract- In this work we prepared cadmium zinc sulphide<br />

(CdxZn1-xS) thin films on glass substrate using spray pyrolysis<br />

chemical deposition technique. The effect of Cd composition on<br />

structural and optical was studied. The XRD pattern of CdxZn1-xS<br />

films shows hexagonal wartzite symmetry of CdZnS material.<br />

The XRD data confirmed that the crystallites were increased with<br />

composition of Cd 2+ content. The intensity of (002) peak is<br />

increased for x= 0.6 and 0.8. The variation of grain size with<br />

composition was investigated from XRD data. The optical<br />

energy band gap obtained from data of the absorption spectra<br />

confirmed that the band gap is increased with Zn content in<br />

CdxZn1-xS thin films. The transmittance spectra reaveled the %<br />

transmittance was increased with increase of Zn content in<br />

CdxZn1-xS thin films.<br />

Keywords: - Spray Pyrolysis, CdxZn1-xS thin film, Optical<br />

energy Band gap, Solar cells.<br />

C<br />

I. INTRODUCTION<br />

dS thin film absorbs the light energy in the blue region of<br />

the solar spectrum and have smaller optical band gap of 2.42<br />

eV (1). For high performance of solar cell devices an appropriate<br />

window material should be necessary. CdZnS has larger band<br />

gap and convenient to made as window layer instead of CdS. The<br />

CdxZn1-xS films would advantages for application in solar cell<br />

because they also offer a wider band gap (larger than 2.5 eV) as<br />

compared to the CdS films (2). There have been many report on<br />

the deposition of CdZnS thin films with different concentration<br />

of Zn +2 using different methods of depositions (3,4,5). It is of<br />

great technological interest that the cadmium zinc sulphide<br />

(CdZnS) thin film have been widely used as a wide band gap<br />

window material in hetrojunction solar cells and in<br />

photoconductive devices. The synthesis and characterization of<br />

nanoparticle thin films of cadmium and zinc chalcogenides have<br />

became an area of great interest over last few years. The thin<br />

films of CdZnS have extensive applications in various optical,<br />

electronic and optoelectronic devices and especially in wide<br />

band gap photovoltaic solar cells with different polycrystalline<br />

absorber materials like CdTe (6),.<br />

Keeping in view, more attention is being made in fabricating<br />

good quality CdxZn1-xS thin films and study the structural and<br />

optical properties of the prepared thin films.<br />

A number of thin film deposition techniques are used for<br />

deposition of the thin films. Of the most spray pyrolysis is the<br />

practically attractive because of its simplicity in comparison with<br />

methods requiring vacuum conditions on complex equipments.<br />

It is fast, inexpensive vaccuumeless and suitable for mass<br />

production. It is basically a chemical deposition technique in<br />

which solutions of desired material are sprayed onto a preheated<br />

substrate. Continuous films are deposited onto substrate by<br />

thermal decomposition of reactants(7).<br />

In the present investigations the spray pyrolysis technique was<br />

used for deposition of CdxZn1-xS thin films. Prepared CdxZn1xS<br />

films are characterized with XRD, and UV-Visible<br />

spectroscopic technique for structural and optical study.<br />

II. MATERIALS AND METHODS<br />

Aqueous solutions of CdCl2, ZnCl2 and (NH2)2CS were used<br />

as sources of cd 2+ , Zn 2+ and S 2- ions respectively. The entire<br />

chemical used in the present study and reagent used were of<br />

analytical reagent grade. For the preparation of good quality<br />

films concentration of CdCl2 (0.1M), ZnCl2 (0.05M) and (0.1M)<br />

NH2-CS-NH2 were previously optimized and used as stock<br />

solutions. To obtain homogeneity of uniform deposition each<br />

solution was stirred for 5 minute before the film deposition.<br />

Deionised water was used as a solvent.<br />

CdxZn1-xS films were deposited on ultrasonically precleaned<br />

microscopic glass substrates. With different Cd 2+ concentrations<br />

(for x= 00, 0.2, 0.4, 0.6, 0.8, 1) using chemical spray pyrolysis<br />

technique. Here x represents the concentration in the spraying<br />

solution. The solution was spray at the rate of 1 ml per minute at<br />

optimized temperature of 573 0 K, at 1 Kg/m 2 pressure. Prepared<br />

CdxZn1-xS films were characterized by XRD and UV Visible<br />

spectroscopic techniques. The structural and optical properties of<br />

the deposited films were studied using data obtained from XRD<br />

and UV-Visible technique.<br />

III. RESULTS AND DISCUSSION<br />

i. Structural properties<br />

The XRD spectra of prepared CdxZn1-xS thin films are<br />

recorded using Regacu Miniflex II diffractometer and displayed<br />

in Fig. 1 a to f. All the peaks assigned to (100), (002) , (101),<br />

(102) (110), (103), and (200) orientations of hexagonal phase of<br />

CdxZn1-xS The intensity of (002) of XRD patterns for<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 394<br />

ISSN 2250-3153<br />

composition x=0.6 and x=0.8 was significantly increased as<br />

compared to intensity of (002) peak for other compositions. Y.<br />

Raviprakash et al.(2009) were reported earlier the hexagonal<br />

plane symmetry of CdxZn1-xS for CdCl2 and ZnCl2 based<br />

CdxZn1-xS thin films (8). The observed diffraction patterns are<br />

in good agreement with the standard crystallographic data for the<br />

CdS and ZnS metals of JCPDS card 02-0549 and 80-0007. The<br />

(002) diffraction peak gives the lattice matching to the<br />

chalcogenide semiconductor such as CuInxGa1-xSe2 and CuIn(S1-x<br />

Sex)2 ,which are used in photovoltaic solar cells (9). The lattice<br />

constant a and c for hexagonal planes of the CdxZn1-xS thin<br />

films are calculated from XRD data using the following equation.<br />

1/d 2 =4/3 (h 2 +hk+k 2 )/a 2 + l 2 /c 2 …… (1)<br />

The values of lattice constant observed to vary as composition<br />

of cadimium( from x=0 to1). The variation of lattice parameters<br />

versus temperature is given in table 1, and displayed in fig. 2.<br />

The value of lattice constant ‗a‘ and ‗c‘ varies with composition<br />

from 0.377 to 0.4037 nm and 0.652 to 0.688 nm respectively.<br />

The increase in values of lattice parameters with composition of<br />

Cd confirmed the increase of uite cell size.<br />

The grain size was calculated from XRD data using Sherrie‘s<br />

formula (10).<br />

D=0.94 λ/βCosθ ----- (2)<br />

Where λ is the wave length of X-ray used (1.54 nm Cukα line),<br />

β is the broadening of the diffraction peak measured at half of its<br />

maximum intensity (FWHM) and θ is the Braggs angle. Table 1<br />

shows the variation of grain size with Cd composition and<br />

presented in fig 3. It is observed that the grain size of the<br />

CdxZn1-xS increased with increase in Cd composition. The<br />

average grain size is observed increased from 3.4 to 14 nm.<br />

ii. Optical Characterization<br />

The optical absorption of the CdxZn1-xS films for x=0.0, .2,<br />

0.4, 0.6, 0.8, and 1 were recorded using Systronic Ddouble beam<br />

UV-Visible spectrophotometer 2201 in the wavelength range 350<br />

to 900 nm. The absorption spectra are presented in fig. 4. The<br />

spectra have been used to evaluate the absorption coefficient (α),<br />

energy band gap (Eg ) and nature of transition involved. Optical<br />

energy band gap (Eg) can be calculated using absorption<br />

coefficient (11).<br />

α=A (һυ-Eg) 1/2 -------------3<br />

һυ<br />

A is constant, һν is photon energy. Thickness of the CdS films<br />

was estimated by weight difference method using<br />

t = m/ρA --------------------- (4)<br />

Where m is the mass of the film deposited on the substrate, A<br />

is area of the deposited film on the substrate and ρ the density of<br />

the bulk material. The variation of film thickness with<br />

concentration was shown in Table 1.<br />

The spectra shows that the absorption edges are blue shifted.<br />

Blue shifting of the absorption edge confirmed that the<br />

crystallites in the films decreased with composition of Zn. The<br />

experimental values of (αһν) 2 plotted against һν for different<br />

composition is shown in Fig. 5. All the films show high<br />

absorption coefficient (α=10 12 cm -1 ). The linear portion of the<br />

curve extrapolated to (αһν) 2 =0 gives the value of optical energy<br />

band gap (Eg). The optical band gap Eg obtained at (αһν) 2 = 0<br />

was vary from 2.42 to 3.49 eV. (121). The 3.49 eV maximum<br />

energy band gap is observed Cd0.0Zn1.0S. The increase of band<br />

gap can prevent the window absorption losses. The variation of<br />

optical band gap with composition is shown in Table 1. and<br />

displayed in Fig.6.<br />

The variation of % transmittance against wavelength for<br />

different composition x is presented in Fig. 7. It is observed that<br />

% transmittance increased with increase the Zn content in the<br />

CdxZn1-xS thin films. The % transmittance varied from 10 to 53<br />

as x varies from 1 to 0.0.<br />

IV. CONCLUSION<br />

CdxZn1-xS thin film was successfully synthesized using<br />

aqueous solutions of CdCl2, ZnCl2 and (NH2)2CS by spray<br />

pyrolysis technique. The XRD study revealed the hexagonal<br />

phase of the CdxZn1-xS thin films. The intensity of the (002)<br />

peak was improved for x=.06 and 0.8. The grain size is observed<br />

increased with Cd incorporation study confirmed that the CdZns<br />

compound has hexagonal phase. The (002) diffraction peak was<br />

dominant for CdxZn1-xS thin films gives the lattice matching to<br />

the Cu Inx Ga1-xSe2 and CuIn(S1-x Sex)2 chalcogenised<br />

semiconductors which are used in photovoltaic solar cells. The<br />

change of lattice parameters was observed with Cd composition.<br />

Optical study confirmed that energy band gap of CdS, (direct<br />

band gap semiconductor), is increased with incorporation of Zn<br />

content. The % transmittance was observed increased with<br />

increase of Zn content of CdxZn1-xS thin films.<br />

Table 1. The Lattice parameters, Grain size (XRD), Energy band<br />

gap, Film Thickness.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 395<br />

ISSN 2250-3153<br />

Fig. 1: XRD spectra of CdxZn1-xS for (a) x=00, (b) x=0.2, (c)<br />

x=0.4 (d) x=0.6, (e0 x=0.8 and (f) x=1<br />

Fig. 2: The varation of lattice parameters with composition x 1.<br />

Lattice constant ‗a‘, 2 lattice constant ‗c‘.<br />

Fig. 3: Variation of grain size with composition of CdxZn1-xS<br />

Fig.4: The absorption spectra of Cdx Zn1-x S for (a) x=1.0, (b)<br />

x=0.8 (c) x=0.6 (d) x=0.4 (e) x=0.2 (f) x=0.0<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 396<br />

ISSN 2250-3153<br />

Fig.5: The plot of (αһυ) 2 versus һυ of CdxZn1-xS films with (a)<br />

x=1, (b) x=0.8 (c) x=0.6 (d) X=0.4 (e) x=0.2 (f) x=00<br />

Fig. 6: Dependence of optical band gap of Cdx Zn1-x Sfilms on<br />

composition parameter x.<br />

Fig.7: % transmittance is plotted against wavelength for Cdx Zn1x<br />

S for (a) x=1.0, (b) x=0.0.8 (c) x=0.6 (d) x=0.4 (e) x=0.2 (f)<br />

x=0.0<br />

REFERENCES<br />

[1] Chang Y.J. Munsee C. L., Herman G. S. Wager J. F. Mugdur P., Lee D. H.,<br />

Chang C. H., ―Growth, Characterization and application of CdS thin films<br />

deposited by chemical Bath Deposition‖, Surface and Interface Analysis<br />

Vol.37 (4), 2005, 398-405<br />

[2] Lee Jae-Hyeong, Song Woo-Chang, Yi Jun-Sin , Yoo Yeong-Sik,<br />

―Characteristics of the CdZnS thin Film Doped by ThermalDiffusion of<br />

Vacuum Evaporated Indium Films‖, Solar Energy Materials & Solar Cells<br />

,759, 2003, 227-234.<br />

[3] Zhou J., Wu X., Teeter G., To B., Dhere R. G. and Gessert T. A., ―CBD<br />

Deposited CdxZn1-xS Thin Films and Their Application in CdTe‖, Solar<br />

Cell. Phy. Stat. Sol., 24 (13), 2004, 775-778.<br />

[4] Burton L.C. , Hetch T.L., ZnxCd1-x S Films for use in Hetrojunction Solar<br />

Cells.Appl.phys,Lett . 29, 1976, 612.<br />

[5] Valkonen M. P., Kanniainen T., Lindroos S., Leskela M. and Rauhala E.,<br />

‗‘growth of Zns, CdS and multilayer ZnS/CdS Thin Films by Silar<br />

Technique‘, Applied Surface Science, 115, 1997, 386-392.<br />

[6] Oladeji I., Chow L., Ferekdes C., viswanathan V.. and Zhao Z., Metal/<br />

CdTe/ CdS /Cd1-ZnxS/TiO/glass, A New Cdte Thin Film Solar Cell<br />

Structure‖, Sol. Ener. Matter.sola.Cells, 61(2), 2000, 203-211.<br />

[7] Y. Raviprakash, V. Kasturi , Bangera G., K. Shivakumar,‘ ―Growth,<br />

Structural and Optocal Properties of CdxZn1-x S thin films deposited using<br />

Spray Pyrolysis Technique‖ , Current Applied Physics 10, 2010, 193-198.<br />

[8] Y. Raviprakash, V. Kasturi , Bangera G., K. Shivakumar,‘ ―Preparation and<br />

Chacractrization of CdxZn1-x S thin films by Spray Pyrolysis Tec‖,<br />

Applications.Sola Technique for Photovoltaic r Energy 83, 2009, 1645-<br />

1651<br />

[9] Borse S.V.,Chavhan S.D., Sharma,Ramphal, ―Growth structural and optical<br />

properties of Cd1-xZnxS alloy thin films grown by Solution Growth<br />

technique(SGT)‖.Alloy.Cmopd.436, 2007, 407.<br />

[10] Azaroff L. V., Elements of X-ray Crystallography, McGraw –Hill<br />

Company (1968), pp 485.<br />

[11] Moss, T.S., Optical properties of semiconductors, 1961, Butterworth and Co<br />

Pub. Ltd London 2<br />

[12] Pentia, E., V. Draghici, G. Sarua, B. Mereu, L. Pintilie, F. Sava and M.<br />

Popescu structural electrical and photoelectrical properties of CdxPb1-xS<br />

thin film prepared by chemical bath deposition, J. Electrochem. Soc. Vol.<br />

151 (11), 2004, 729-733<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 397<br />

ISSN 2250-3153<br />

AUTHORS<br />

First Author - Ravangave L. S, M. Sc. M.Phil. Ph. D. Shri Sant<br />

Gadge Maharaj College loha dist Nanded (M. S.) India PIN<br />

431708<br />

Email id - lsravangave@gmail.com<br />

Second Author - Birajdar U. V. M. Sc. M. Phil. Department of<br />

physics, Mahatma Basweshwar College, Latur. (M.S.) India<br />

Email id - umakantvbiradar60@gmail.com<br />

Third Author - Misal S. D., M. Sc., Department of physics<br />

,Kumar Swami College,Ausa. (M.S.) India.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 398<br />

ISSN 2250-3153<br />

Hybrid Algorithm for Segmentation of Left Ventricle in<br />

Cardiac MRI<br />

Abstract- According to estimates from the American Heart<br />

Association, each year 17 million people die of cardiovascular<br />

disease (CVD). More than 30% of all deaths in world are due to<br />

cardiovascular disease. Hybrid algorithm using k-means<br />

clustering and level- set is proposed in this paper in order to<br />

improve the efficiency of segmentation. K-means algorithm is<br />

used to initially locate the position of left ventricle and the<br />

accurate segmentation has been achieved with the help of level<br />

set algorithm. Preprocessing has been carried out with the help of<br />

5*5 kernel median filter and speckles inside the heart region are<br />

faded. The preprocessing has sufficiently reduced speckle noise<br />

and preserved the LV edges.<br />

Index Terms- K-means clustering, speckle noise, level set,<br />

CVD<br />

G<br />

I. INTRODUCTION<br />

enerally cardiac examination involves assessing a<br />

combination of the four following physiological measures:<br />

cardiac structure, function, perfusion and myocardial viability.<br />

Different imaging modalities, including Ultrasound (US), singlephoton<br />

emission computer tomography (SPECT), computed<br />

tomography (CT), and magnetic resonance imaging (MRI) are<br />

used in performing cardiac examinations. Among existing<br />

methods, cardiac MRI [7](CMR) has attracted significant interest<br />

in the research community, as a single imaging technique capable<br />

of retrieving all cardiac measures appropriately.<br />

More specifically the aim for this work is to segment the left<br />

ventricle in the heart using cardiac MRI and to find out various<br />

clinical parameters. Currently, medical practitioners are using<br />

manual segmentation which is very tedious task. This automated<br />

segmentation will reduce the burden on medical practitioners.<br />

Automated segmentation is important for assessment of LV<br />

filling because cavity volumes must be measured on hundreds of<br />

short-axis cine images, making manual tracing impractical for<br />

widespread clinical application [3]. Figure 1 shows that the left<br />

ventricle shape and its endo-cardial and epi-cardial contours. We<br />

can note that the shape of heart changes from apex to bottom and<br />

each heart is having slightly different position. So to detect the<br />

exact location of left ventricle in individual person is a dynamic<br />

process.<br />

So it is very difficult to have a global algorithm which can be<br />

able to detect left ventricle.<br />

We need to address the following challenges to develop an<br />

automatic LV detection system.<br />

R.Sreemathy 1 , Rekha S. Patil 2 , Priyanka Shirude 3<br />

Pune Institute of Computer Technology, Pune, India 1,3<br />

Dr. D. Y. Patil Technical Campus,Talsande, Kolhapur 2<br />

1. The position and orientation of the LV is unconstrained in an<br />

image.<br />

2. A 2D image loses a lot of useful information about a 3D<br />

object.<br />

3. The LV shape changes significantly in a cardiac cycle.<br />

4. There are large variations in the image intensity.<br />

Figure 1 includes various levels approximately 8-10 levels for<br />

patients and each level consist of approximately 20 frames.<br />

Figure 1: (a) LV endocardial contours (b) LV epicardial contours,<br />

Data from MRI is more accurate than that derived from LV<br />

angiocardiography, where the calculation is based on the<br />

assumption that the LV is ellipsoidal in shape. Volume<br />

measurements by MRI are independent of cavity shape, with the<br />

area from contiguous slices integrated over the chamber of<br />

interest.<br />

Here in this paper an attempt has been made to identify left<br />

ventricle by using k-means clustering algorithm [2] and a more<br />

precise segmentation of endocardium has been carried out with<br />

level set[5]. The area measured with this hybrid algorithm has<br />

been compared with the ground truth which is marked by experts<br />

in this field.<br />

II. METHODOLOGY<br />

Small variations in the magnetic field introduced by the<br />

radiofrequency (RF) system (the B1 field introduce slowly<br />

undulating (low frequency) in homogeneities in the image which<br />

can be visually distracting), can impact the textural significance<br />

of an area, and because they can substantially reduce the contrast<br />

in different image regions, is a barrier to using any kind of<br />

segmentation or region delineation tool which is based on<br />

thresholding.<br />

Thresholding techniques produce segments having pixels<br />

with similar intensities. They can handle any underlying image<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 399<br />

ISSN 2250-3153<br />

model as long as each intensity is associated with the only one<br />

segment. [1]<br />

The following steps are used in order to achieve the final<br />

segmentation<br />

1). Median filtering<br />

2) K-means clustering<br />

3) Connected components finding<br />

4) Centroid detection<br />

5) Levelset algorithm<br />

Figure 2 shows the methodology used for the implementation of<br />

hybrid algorithm for detection of left ventricle.<br />

Input<br />

Image<br />

Levelset<br />

Segmentation<br />

Median<br />

Filtering<br />

Centroid<br />

Detection<br />

A. Median filtering<br />

Median filter of size 5*5 kernel has been used on original image<br />

in order to reduce the noise and to sharpen the edges. The<br />

original input image is shown in Figure3 and the final median<br />

filtered image is shown in Figure4.<br />

Figure 3: Original Image<br />

Figure 4: Filtered Image<br />

K-means<br />

clustering<br />

Connected<br />

Component<br />

Finding<br />

Figure 2: Block Diagram for automated segmentation<br />

B. K-means clustering<br />

K-means clustering [7] is an algorithm to classify or to group<br />

objects based on attributes/features into K number of group. K is<br />

positive integer number. The grouping is done by minimizing the<br />

sum of squares of distances between data and the corresponding<br />

cluster centroid. Thus, the purpose of K-mean clustering is to<br />

classify the data.<br />

K-means algorithm is summarized as follow:<br />

1. Choose k initial class means.<br />

2. Assign each pixel to the class with the closest mean.<br />

3. Reassign one pixel to a new class such that the move best<br />

reduces the overall sum of square distances criterion.<br />

4. Recompute the class means using the new assignments.<br />

5. If the criterion was improved, go to Step 3.<br />

Figure5 shows the K-means clustered output on the filtered<br />

image.<br />

Figure 5: Clustered Image with 3 regions<br />

C. Connected components labeling<br />

Next step is to find the connected components in the clustered<br />

image and to select proper component containing left ventricle.<br />

Results of it are shown over Figure6.<br />

Figure 6: connected components finding<br />

D. Centroid detection<br />

After rigorous study, it is found that the label of the left ventricle<br />

is found to be one. Now the centroid of this label is found. Thus<br />

we are able to locate a central point on left ventricle.<br />

E. Levelset segmentation<br />

Figure 7: Centroid Detected<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 400<br />

ISSN 2250-3153<br />

The level-set method is one computational technique for<br />

tracking a propagating interface over time, which in many<br />

problems has proven more accurate in handling topological<br />

complexities such as corners and cusps, and in handling<br />

complexities in the evolving interface such as entropy conditions<br />

and weak solutions. It is a robust scheme that is relatively easy<br />

to implement.<br />

The general idea behind the level-set method is to apply a<br />

function Φ (t) to the space the interface inhabits, where Φ is a<br />

point in that space, t a point in time. The function is initialized at<br />

t = 0, and then a scheme is used to approximate the value of Φ (t)<br />

over small time increments.<br />

Levelset algorithm can be summarized as follows:<br />

1. Introduce a co-ordinate system<br />

2. Embed the interface in the x-y plane.<br />

3. Invent the function z = Φ (x, y, t). This is level set function.<br />

Using the centroid located in section D and with minimum<br />

radius of the left ventricle initial contour of the level set<br />

algorithm is drawn automatically with the centroid as center.<br />

Thus by detecting the centroid, the change in location of left<br />

ventricle is found easily. And hence the final segmentation is<br />

more accurate as we are able to change the position of the initial<br />

contour automatically and easily. Hence tracking the left<br />

ventricle with respect to various levels has become simplified.<br />

Figure 8 shows final segmented left ventricle for one image of<br />

level1.<br />

Figure 8: Level set segmented contour<br />

III. RESULTS<br />

The database used [8] has about 33 patients. The algorithm is<br />

tested by using above database. Accuracy of algorithm has been<br />

tested on sufficient number of images. The above mentioned<br />

algorithm has worked successfully on all levels starting from<br />

base to apex. The algorithm is working successfully in the base,<br />

middle and apical slices and the algorithm is able to locate a<br />

point successfully on the left ventricle which made the job of<br />

drawing initial contour simple.<br />

A. Result Analysis of k-means clustering<br />

While performing k-means clustering, endo-cardium and<br />

epicardium are merged with each other.<br />

B. Result analysis of centroid detection<br />

The centroid of first 5 levels is located exactly in left ventricle.<br />

But in apical levels centroid of left ventricle is getting shifted<br />

slightly. And because of the same reason for those levels we are<br />

facing problems in initializing the contour for level set. Here<br />

Figure 9 shows the bar chart for centroid detection against<br />

different levels, which shows that for 1 st five levels, we are<br />

having 100% success rate and from 6 th to 8 th level we are having<br />

80%-85% success rate.<br />

Figure 10 shows the area segmented using the above proposed<br />

algorithm on one of the levels. The x-axis represents the frame<br />

number and y-axis represents the corresponding area of left<br />

ventricle<br />

100<br />

80<br />

60<br />

40<br />

20<br />

0<br />

1st<br />

level<br />

4th<br />

level<br />

7th<br />

level<br />

success rate%<br />

Figure 9: Bar chart for success rate on different levels<br />

Figure 10: Graph of segmented area of left ventricle using hybrid<br />

algorithm<br />

The mean area error between ground truth and the above<br />

algorithm is 0.5%.<br />

IV. CONCLUSION<br />

A new hybrid algorithm using k-means and level set algorithm<br />

has been proposed in this paper. K-means algorithm has been<br />

used as an initial tool to locate the left ventricular region. The kmeans<br />

algorithm has made the segmentation task automatic as<br />

we are able to easily locate a point on the left ventricle. This<br />

point is used as initial seed for the final level set segmentation.<br />

REFERENCES<br />

[1] Salem Saleh Al-amri, N.V. Kalyankar and Khamitkar S.D ―Image<br />

Segmentation by Using Thershold Techniques‖, journal of computing,<br />

volume 2, issue 5, May 2010, issn 2151-9617<br />

[2] M. Lynch, O. Ghita, P.F.Whelan, ‖Automatic segmentation of the left<br />

ventricle cavity and myocardium in MRI data‖, Computers in Biology<br />

and Medicine 36 (2006) 389–407<br />

[3] Si Yong Yeo, Liang Zhong, Yi Su, Ru San Tan, Dhanjoo N. Ghista,<br />

―Analysis of Left Ventricular Surface Deformation during Isovolumic<br />

Contraction”, Proceedings of the 29th Annual International Conference of<br />

the IEEE EMBS Cite International, France, 2007<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 401<br />

ISSN 2250-3153<br />

[4] Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D.<br />

Piatko, Ruth Silverman, and Angela Y. Wu, ―An Efficient k-Means<br />

Clustering Algorithm: Analysis and Implementation‖, IEEE transactions on<br />

pattern analysis and machine intelligence, vol. 24, no. 7, July 2002.<br />

[5] Sethian, J. A., ―Level Set Mehods: Evolving interfaces in geometry, fluid<br />

mechanics, computer vision, and material science‖, Cambridge University<br />

Press, 1996.<br />

[6] M Puvaneswary, ‖Cardiac MR Imaging‖, JP brothers Medical Publishers(P)<br />

Ltd, 2005<br />

[7] Kanungo, T.; Mount, D. M.; Netanyahu, N. S.; Piatko, C. D.;<br />

Silverman, R.; Wu, A. Y. 2002. "An efficient k-means clustering<br />

algorithm: Analysis and implementation". IEEE Trans. Pattern<br />

Analysis and Machine Intelligence 24, p. 881–892.<br />

[8] Alexander Andreopoulos, John K. Tsotsos, ―Efficient and Generalizable<br />

Statistical Models of Shape and Appearance for Analysis of Cardiac MRI‖,<br />

Medical Image Analysis, Volume 12, Issue 3, June 2008, Pages 335-357.<br />

First Author – R. Sreemathy, ME(Electronics) and<br />

MS(Electronics and control), Pune Institute of Computer<br />

Technology. Email id - sreemathyr@yahoo.com.<br />

Second Author – Rekha S. Patil, PhD (Electronics), Dr. D. Y.<br />

Patil Technical Campus. Email id - prekha46@yahoo.com.<br />

Third Author – Priyanka B. Shirude, BE(E&TC), Pune Institute<br />

of Computer Technology. Email id - p.shirude2@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 402<br />

ISSN 2250-3153<br />

Effect of in-plane forces on frequency parameters<br />

Abstract- Vibration and buckling characteristics of stiffened<br />

plates subjected to in-plane uniform and non-uniform edge<br />

loading at the plate boundaries are investigated using the finite<br />

element method. Rectangular stiffened plates possessing<br />

different boundary conditions, aspect ratios, varying mass and<br />

stiffness properties and varying number of stiffeners have been<br />

analyzed for buckling and vibration studies. The characteristic<br />

equations for the natural frequencies, buckling loads and their<br />

corresponding mode shapes are obtained from the equation of<br />

motion. The effects of the position of stiffeners and number of<br />

stiffeners, aspect ratios, boundary conditions, stiffeners<br />

parameters upon the buckling load parameter and fundamental<br />

frequency of the stiffened plates are investigated. The results are<br />

obtained considering the bending displacements of the plate and<br />

the stiffener. Eccentricity of the stiffeners gives rise to axial and<br />

bending displacement in the middle plane of the plate.<br />

Comparison with published results indicates good agreement. In<br />

the structure modelling, the plate and the stiffeners are treated as<br />

separate elements where the compatibility between these two<br />

types of elements is maintained.<br />

Index Terms- Finite element method, Stiffened plate,<br />

Buckling and frequency parameter, Stiffeners parameters<br />

Notations<br />

a - Plate dimension in longitudinal direction<br />

b - Plate dimension in the transverse direction<br />

t - Plate thickness<br />

E, G - Young‘s and shear moduli for the plate material<br />

b s , d s - web thickness and depth of a x-stiffener<br />

, - Non –dimensional element coordinate<br />

A S - Cross sectional area of the stiffener<br />

I S - Moment of inertia of the stiffener cross-section about<br />

reference axis<br />

{q} r - Vector of nodal displacement a r th node<br />

[D P ] - Rigidity matrix of plate<br />

[D S ] - Rigidity matrix of stiffener<br />

[K e ] - Elastic stiffness matrix of plate<br />

[K S ] - Elastic stiffness matrix of stiffener<br />

M<br />

M , - Consistent mass matrix of plate, stiffener<br />

p<br />

S<br />

[K G ] - Geometric stiffness matrix<br />

A.K.L. Srivastava, S.R.Pandey<br />

* Department of Civil Engineering, N. I. T. Jamshedpur- 831014, India<br />

[N] r - Matrix of a shape function of a node r<br />

P cr - Critical buckling load<br />

P (t) - In plane load<br />

T - Torsional constant<br />

S<br />

P - Polar moment of inertia of the stiffener element<br />

S<br />

T<br />

I. INTRODUCTION<br />

he dynamic behaviour of stiffened plates has been the<br />

subject of intensive study for many years. For aerodynamic<br />

considerations, stiffener will be provided inside the hull of<br />

aircraft and for space structures the stringer can be provided<br />

outside if that is more structurally efficient. Stiffened plates are<br />

structural components consisting of plates reinforced by a system<br />

of ribs to enhance their load carrying capacities. These structures<br />

are widely used in aircraft, ship, bridge, building, and some other<br />

engineering activities. In many circumstances these structures are<br />

found to be exposed to in-plane loading.<br />

The buckling and vibration characteristics of stiffened plates<br />

subjected to uniform and non-uniform in-plane edge loading are<br />

of considerable importance to aerospace, naval, mechanical and<br />

structural engineers. Aircraft wing skin panels, which are made<br />

of thin sheets are usually subjected to non-uniform in-plane<br />

stresses caused by concentrated or partial edge loading at the<br />

edges, and due to panel stiffener support conditions<br />

Diez et al. [1] studied the effect of combined normal and<br />

shear in-plane loads by the Galerkin method. Transverse<br />

vibration of rectangular plates subjected to in-plane forces under<br />

various combinations has been studied by Singh and Dey [2] by a<br />

difference based variational approach.<br />

The vibration and buckling of partially loaded simply<br />

supported plates were studied by Deolasi et al. [3]. Recently<br />

Sundersan et al. [4] have studied the influence of partial edge<br />

compression on buckling behaviour of angle ply plates for a few<br />

orientations.<br />

A brief literature survey reveals that a variety of methods<br />

have been proposed to study the vibration of stiffened plates. The<br />

most common method used in early literature was to approximate<br />

the stiffened plate as equivalent orthotropic plates, using the<br />

smeared stiffener approach. In more recent literature, with the<br />

help of high-speed computers, the plate and stiffeners were<br />

treated separately. Such numerical methods as the finite element<br />

method and finite difference method are widely used.<br />

Aksu [5] has presented a variational principle in conjunction<br />

with the finite difference method for analysis of free vibration of<br />

uni-directionally and cross-stiffened plates considering in-plane<br />

inertia and in plane displacements in both directions.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 403<br />

ISSN 2250-3153<br />

Shastry and Rao [6] have used the 3 noded conforming<br />

element and refined beam-bending element for arbitrary oriented<br />

stiffeners.<br />

Olson and Hazell [7] have presented a critical study on<br />

clamped integrally stiffened plate by the finite element method.<br />

The mode shapes and frequencies have been determined<br />

experimentally using the real time holographic technique. The<br />

effect of change in rib stiffness on various modes has been<br />

studied.<br />

Bapu Rao et al. [8] have also reported their work on<br />

experimental determination of frequencies with real time<br />

holographic technique for skew stiffened cantilever plates.<br />

Mukhopadhyay [9] has applied the semi-analytic finite difference<br />

method to the stability analysis of rectangular stiffened plates<br />

based on the plate beam idealization.<br />

Sheikh and Mukhopadhyay [10] applied the spline finite strip<br />

method to the free vibration analysis of stiffened plates of<br />

arbitrary shapes. They analyzed the plate of rectangular, skew<br />

and annular shapes with concentric as well as eccentric stiffeners.<br />

Large amplitude, free flexural vibration of stiffened plates has<br />

been investigated by the spline finite strip method by Sheikh and<br />

Mukhopadhyay [11]. The stiffener has been elegantly modelled<br />

so that it can be placed anywhere within the plate strip.<br />

Harik and Guo [12] have developed a compound finite<br />

element model to investigate the stiffened plates in free vibration<br />

where they have treated the beam and plate element as the<br />

integral part of a compound section, and not as independent<br />

bending components.<br />

Bedair [13] has studied the free vibration characteristics of<br />

stiffened plates due to plate/stiffener proportions. He has<br />

considered the plate and the stiffener as the discrete elements<br />

rigidly connected at their junctions and the nonlinear strain<br />

energy function of the assembled structure has been transformed<br />

into an unconstrained optimization problem to which Sequential<br />

quadratic programming has been applied to determine the<br />

magnitudes of the lowest natural frequency and the associated<br />

mode shape<br />

Allman [14] has carried out the analysis of buckling loads of<br />

square and rectangular stiffened plates using triangular element.<br />

He has presented the results both by including and neglecting the<br />

torsional stiffness of the stiffeners. Vibration of stiffened plates<br />

with elastically restrained edges has been analyzed by Wu and<br />

Liu [15] using Rayleigh-Ritz method. The first four lower<br />

frequencies for restrained plates up to six intermediate stiffeners<br />

are calculated.<br />

Mukhopadhyay [16] has extended the static and vibration<br />

analysis of plates to analyse the stability of ship plating and<br />

allied plated structures using the semi-analytic method.<br />

An isoparametric stiffened plate bending element for the<br />

buckling analysis of stiffened plate has been presented by<br />

Mukherjee and Mukhopadhyay [17]. Here the stiffener can be<br />

positioned anywhere within the plate element and need not<br />

necessarily be placed on the nodal lines.The general spline finite<br />

strip method has been extended by Sheikh and Mukhopadhyay<br />

[18] to analyse stiffened plate of arbitrary shape. Stiffened plates<br />

having various shapes, boundary conditions and also possessing<br />

various dispositions of stiffeners have been analyzed by the<br />

proposed method. The stability of partially stiffened, simply<br />

supported and clamped square plates is studied by Roy et al.<br />

[19]. A high precision triangular finite element and a compatible<br />

stiffener element are used in the finite element analysis. Buckling<br />

of stiffened plates has been studied by Bedair [20]. An<br />

investigation on stiffened plates has been conducted to determine<br />

the elastic parameters as well as the cross-sectional dimensions<br />

of rectangular stiffeners from experimental modal data and finite<br />

element prediction, using model-updating technique by<br />

Chakraborty and Mukhopadhyay [21].<br />

A differential quadrature analysis for the free vibration of<br />

eccentrically stiffened plates is studied by Zeng and Bert [22].<br />

The plate and the stiffeners are separated at the interface with<br />

equilibrium and continuity condition satisfied. Vibration and<br />

dynamic stability of stiffened plates subjected to in-plane<br />

uniform harmonic edge loading is studied using finite element<br />

analysis by Srivastava et al. [23] considering and neglecting inplane<br />

displacements. Further Srivastava et al [24] extended their<br />

work to study the principal dynamic instability behaviour of<br />

stiffened plates subjected to non-uniform harmonic in-plane edge<br />

loading. Various methods used for vibration analysis such as Ritz<br />

technique, Levy‘s solution, finite difference method, finite<br />

element method, Galerkin method, differential quadrature<br />

method and method using boundary characteristics orthogonal<br />

polynomials (BCOP) have been reviewed extensively by Leissa<br />

[25]. The effect of the gap between the stiffener tip and the<br />

supporting edge on the natural frequencies has been investigated<br />

by Nair and Rao [26]. The panel is represented by triangular<br />

plate bending elements and the stiffener by beam elements.<br />

The applied load is seldom uniform and the boundary<br />

conditions may be completely arbitrary in practice. The problem<br />

becomes complicated when the numbers of stiffeners are<br />

increasing regardless of the position of stiffeners not necessary<br />

along the nodal lines. Loading is non-uniformly distributed over<br />

the edges and along the stiffeners thus affecting the boundary<br />

conditions. Analysis of stiffened plate is carried out normally by<br />

energy method by adding energies due to plate and stiffener. The<br />

energy stored in the stiffener will depend on its cross section and<br />

if a thin walled open section, the effect of twisting as well as<br />

warping have to be included. These studies for most part being<br />

concerned with the numerical analysis of the theoretical buckling<br />

load and also mostly related to unstiffened plates.<br />

The present paper deals with the problem of vibration and<br />

buckling of rectangular stiffened plates subjected to in-plane<br />

uniform and non-uniform edge loading. Finite element<br />

formulation is applied for obtaining the non-uniform stress<br />

distribution in the plate and also to solve the buckling load and<br />

frequency parameters in various modes with different boundary<br />

conditions, aspect ratios and various parameters of stiffened<br />

plates. The analysis presented determines the stresses all over the<br />

region. In the present analysis, the plate is modeled with the nine<br />

nodded isoperimetric quadratic element where the contributions<br />

of bending and membrane actions are taken into account. Thus<br />

the analysis can be carried out for both thin and thick plates.<br />

Moreover it can be applied to a structure having irregular<br />

boundaries. The formulation of the stiffener is done in such a<br />

manner so that it may lie anywhere within a plate element. In<br />

order to maintain compatibility between plate and stiffener, the<br />

interpolation functions used for the plate are used for the<br />

stiffeners also.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 404<br />

ISSN 2250-3153<br />

II. MATHEMATICAL FORMULATION<br />

The governing equations for the buckling and vibration of<br />

stiffened plates subjected to in-plane harmonic edge loading are<br />

developed. The presence of uniform and non-uniform external<br />

in-plane loads, boundary conditions, stiffeners locations and<br />

cutouts if any in the plate induce a non-uniform stress field in the<br />

structures. This necessitates the determination of the stress field<br />

as a prerequisite to the solution of the problems like vibration,<br />

buckling and vibration behaviour of stiffened plates. As the<br />

thickness of the structure is relatively smaller, the determination<br />

of stress field reduces to the solution of a plane stress problem in<br />

the plate skin and stiffeners (where the thickness and breath are<br />

small compared to length). The stiffened plates are modeled and<br />

the governing equations are solved by finite element method. In<br />

the present analysis, the plate is modelled with nine noded<br />

isoparametric quadratic elements where the contributions of<br />

bending and membrane actions are taken into account. One of the<br />

advantages of the element is that it includes the effect of shear<br />

deformation and rotary inertia in its formulation. Thus the<br />

analysis can be carried out for both thin and thick plates.<br />

Moreover it can be applied to a structure having irregular<br />

boundaries. Also it can handle any position of cutout, different<br />

boundary and position of in-plane concentrated loads or loading<br />

conditions. In order to maintain compatibility between plate and<br />

stiffener, the interrelation functions used for the plate are used<br />

for the stiffeners also. Numerical methods like finite element<br />

method (FEM) are preferred for problems involving complex in<br />

plane loading and boundary conditions as analytical methods are<br />

not easily adaptable. The formulation is based on Mindlin's plate<br />

theory, which will allow for the incorporation of shear<br />

deformation. The plate skin and the stiffeners/composite are<br />

modelled as separate elements but the compatibility between<br />

them is maintained. The nine noded isoparametric quadratic<br />

elements with five degrees of freedom (u, v, w, X and y ) per<br />

node have been employed in the present analysis.<br />

The in-plane displacements u and v need to be considered<br />

only when the stiffeners are connected eccentrically to the plate.<br />

If the plate and stiffeners are connected concentrically, no in<br />

plane stresses develop The effect of in-plane deformations is<br />

taken into account in addition to the deformations due to<br />

bending, which will help to model the stiffener eccentricity<br />

conveniently. The element matrices of the stiffened plate element<br />

consist of the contribution of the plate and that of the stiffener.<br />

in the power of the thickness co-ordinate as:<br />

The explicit evaluation of integrals involved in the evaluation<br />

of element stiffness and mass matrices of the plate is tedious and<br />

as such is not attempted. A Gaussian integration technique has<br />

been adopted for this purpose for its high accuracy and also it can<br />

be implemented easily. A exact integration needs an order of 3 x<br />

3. However, a reduced integration proves to be more effective<br />

and cheaper. To integrate the element matrices a 2 x 2 Gaussian<br />

integration has been adopted, however, the order of integration<br />

has been mentioned.<br />

To integrate the element matrices a 2 x 2 Gaussian integration has been adopted, however, the order of integration has been<br />

mentioned.<br />

The displacement at any point within the element can be expressed as:<br />

u<br />

<br />

<br />

v<br />

<br />

<br />

w<br />

<br />

<br />

<br />

x <br />

<br />

y <br />

=<br />

r<br />

Strain displacement relation can be written as:<br />

9<br />

<br />

<br />

1<br />

N r<br />

I <br />

5<br />

u<br />

<br />

r<br />

<br />

vr<br />

<br />

<br />

w<br />

r<br />

<br />

<br />

xr <br />

<br />

<br />

yr <br />

B p r q r B p q <br />

(1)<br />

(2)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 405<br />

ISSN 2250-3153<br />

and<br />

B <br />

P<br />

r<br />

N<br />

r<br />

<br />

x<br />

<br />

0<br />

<br />

N<br />

r<br />

<br />

y<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

The generalized stress-strain relationship for a plate element is<br />

where the stress resultant vector is<br />

<br />

<br />

p Dp p<br />

p<br />

T<br />

<br />

<br />

N<br />

x<br />

N<br />

y<br />

N<br />

x<br />

0<br />

N<br />

y<br />

N<br />

x<br />

y<br />

0<br />

0<br />

0<br />

0<br />

0<br />

r<br />

r<br />

M<br />

x<br />

0<br />

0<br />

0<br />

0<br />

0<br />

0<br />

N<br />

x<br />

N<br />

y<br />

r<br />

r<br />

M<br />

y<br />

0<br />

0<br />

0<br />

N<br />

<br />

x<br />

0<br />

N<br />

<br />

y<br />

Using the isoparametric coordinates, the element stiffness matrix is expressed as:<br />

1<br />

1<br />

T<br />

b B p D p B p <br />

p<br />

K J p<br />

1<br />

1<br />

The element mass matrix can be expressed in iso parametric coordinate as:<br />

1 1<br />

M J p<br />

1 1<br />

T<br />

p e N<br />

m p N<br />

Geometric stiffness matrix expressed in isoparametric coordinates as:<br />

1<br />

1<br />

T<br />

B B <br />

<br />

KG P<br />

G p P G p p<br />

1<br />

1<br />

N<br />

0<br />

d<br />

d<br />

r<br />

r<br />

r<br />

M<br />

x<br />

d<br />

d<br />

J d<br />

d<br />

0<br />

0<br />

0<br />

0<br />

N<br />

<br />

y<br />

N<br />

<br />

x<br />

0<br />

N<br />

<br />

y <br />

<br />

r<br />

r<br />

r<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

(4)<br />

(5)<br />

(6)<br />

(7)<br />

(8)<br />

(3)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 406<br />

ISSN 2250-3153<br />

<br />

Geometric stiffness of stiffener<br />

P<br />

<br />

x t<br />

<br />

<br />

xy t<br />

<br />

0<br />

<br />

<br />

<br />

0<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

The strain matrix can be expressed as<br />

and<br />

where<br />

<br />

xy<br />

t<br />

y<br />

0<br />

0<br />

0<br />

0<br />

t<br />

0<br />

0<br />

t<br />

<br />

x<br />

12<br />

0<br />

xy<br />

12<br />

0<br />

t<br />

3<br />

3<br />

0<br />

0<br />

0<br />

t<br />

<br />

y<br />

12<br />

0<br />

xy<br />

t<br />

12<br />

3<br />

3<br />

0<br />

0<br />

t<br />

xy<br />

12<br />

0<br />

t<br />

x<br />

12<br />

0<br />

3<br />

3<br />

<br />

0<br />

0<br />

0<br />

xy<br />

12<br />

0<br />

t<br />

t<br />

y<br />

12<br />

9<br />

<br />

r 1<br />

3<br />

3<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

q B q <br />

S<br />

G<br />

<br />

B GS<br />

<br />

0<br />

<br />

r<br />

<br />

<br />

0<br />

<br />

BGS GS<br />

0<br />

0<br />

N<br />

r<br />

x<br />

0<br />

<br />

A<br />

0<br />

N<br />

r<br />

x<br />

r<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

0<br />

x S<br />

S <br />

<br />

0 X S S <br />

where AS is the area, FS the first moment of area about reference plane, SS the second moment of area about reference plane, TS the<br />

torsional constant and PS the polar moment of area of the stiffener cross-section.<br />

The expression for the geometric stiffness matrix can be formed by equating the internal work done by the stresses to the external<br />

work done by the nodal forces.<br />

The geometric stiffness of the stiffener element can be expressed in iso-parametric co- ordinate as:<br />

The derivatives of x and y with respect to x / are given by<br />

x<br />

cos<br />

/<br />

x<br />

KG S<br />

1<br />

G S S GS S<br />

1<br />

(13)<br />

T<br />

B B J d<br />

y<br />

/<br />

x<br />

sin <br />

The components of generalized strain vectors are obtained as follows:<br />

/ /<br />

u<br />

u<br />

<br />

/<br />

x x<br />

x<br />

/<br />

x<br />

/<br />

u<br />

<br />

y<br />

y<br />

/<br />

x<br />

/<br />

x<br />

/<br />

/<br />

x<br />

<br />

x <br />

<br />

<br />

/<br />

x x x y<br />

/<br />

x<br />

y<br />

x<br />

/<br />

<br />

r<br />

(14)<br />

(15)<br />

(16)<br />

(10)<br />

(11)<br />

(12)<br />

(9)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 407<br />

ISSN 2250-3153<br />

We can substitute the values and finally we get as:<br />

/ x <br />

/ /<br />

/<br />

y<br />

<br />

y x <br />

y<br />

<br />

<br />

/<br />

/<br />

x x x y<br />

y<br />

/<br />

x<br />

(17)<br />

u<br />

2 1 u<br />

v<br />

v<br />

2 <br />

<br />

cos ( ) sin 2<br />

sin <br />

x<br />

2 y<br />

x<br />

y<br />

<br />

<br />

<br />

<br />

2 1 <br />

<br />

x<br />

x y<br />

y 2<br />

cos ( ) sin 2<br />

sin <br />

<br />

x<br />

2 y<br />

x<br />

y<br />

<br />

<br />

w<br />

w<br />

<br />

<br />

( <br />

x ) cos<br />

( <br />

y ) sin<br />

<br />

<br />

x<br />

y<br />

<br />

1 <br />

<br />

<br />

<br />

2 <br />

x y<br />

x<br />

y 2<br />

(<br />

( ) sin 2<br />

sin cos ) <br />

<br />

2 x<br />

y<br />

y<br />

x<br />

<br />

The generalized strain components in the stiffeners in x / and y / coordinates are given by<br />

/ x<br />

x T <br />

Where [T] is the transformation matrix and is given by<br />

<br />

x<br />

where<br />

T <br />

2<br />

cos <br />

2<br />

sin <br />

0.<br />

5sin<br />

2<br />

<br />

0<br />

<br />

<br />

0<br />

0<br />

<br />

0<br />

0<br />

<br />

<br />

0<br />

0<br />

0<br />

0<br />

2<br />

cos <br />

2<br />

sin <br />

0.<br />

5sin<br />

0.<br />

5sin<br />

0<br />

0<br />

2<br />

2<br />

0<br />

0<br />

0<br />

0<br />

0<br />

0<br />

0<br />

cos<br />

sin<br />

0 <br />

<br />

0 <br />

0 <br />

<br />

0.<br />

5sin<br />

2<br />

<br />

<br />

0.<br />

5sin<br />

2<br />

<br />

2<br />

cos <br />

2 <br />

sin <br />

0 <br />

<br />

0 <br />

<br />

u v u<br />

v <br />

<br />

y <br />

x<br />

y <br />

x w w <br />

, , ( ), , , , , ( <br />

x ), ( <br />

y ) <br />

<br />

x y y x x y x y x y <br />

9<br />

x<br />

BS r r BS <br />

r 1<br />

B B B B B <br />

S<br />

S<br />

1 S 2 S r S<br />

9<br />

(19)<br />

(20)<br />

(18)<br />

(22)<br />

(23)<br />

(21)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 408<br />

ISSN 2250-3153<br />

and<br />

B <br />

<br />

B S<br />

D S <br />

/<br />

x r<br />

The equivalent nodal forces are given by<br />

S<br />

<br />

Nr<br />

<br />

<br />

x<br />

<br />

<br />

0<br />

r<br />

<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

'<br />

x<br />

<br />

EA<br />

<br />

<br />

EF<br />

0<br />

<br />

0<br />

S<br />

S<br />

<br />

<br />

<br />

0<br />

<br />

<br />

<br />

<br />

N<br />

r<br />

cos<br />

x<br />

<br />

<br />

N<br />

r<br />

<br />

sin<br />

x<br />

<br />

<br />

<br />

<br />

0<br />

<br />

<br />

<br />

0<br />

0<br />

0<br />

0<br />

EF<br />

ES<br />

0<br />

0<br />

0<br />

0<br />

Nr<br />

x<br />

S<br />

S<br />

<br />

<br />

0<br />

0<br />

0<br />

GT<br />

0<br />

Nr<br />

2<br />

cos<br />

x<br />

N<br />

<br />

r<br />

x<br />

S<br />

<br />

Nr<br />

sin 2<br />

x<br />

2<br />

Nr<br />

cos<br />

Nr<br />

sin 2<br />

x 2<br />

Nr<br />

2<br />

cos<br />

x<br />

T<br />

F N P t J d<br />

d<br />

e <br />

o<br />

<br />

<br />

0<br />

Nr<br />

0<br />

<br />

0 <br />

0<br />

<br />

<br />

0 <br />

<br />

GAS<br />

/ 1.<br />

2<br />

<br />

0 <br />

<br />

<br />

0<br />

<br />

<br />

0<br />

<br />

<br />

N<br />

<br />

r <br />

x <br />

<br />

Nr<br />

2<br />

sin <br />

x<br />

<br />

<br />

<br />

Nr<br />

sin 2<br />

<br />

x<br />

2<br />

<br />

<br />

<br />

<br />

N <br />

r sin<br />

<br />

<br />

<br />

<br />

N<br />

<br />

<br />

r sin 2 <br />

x 2 <br />

<br />

<br />

N<br />

2 <br />

r<br />

sin <br />

x <br />

The intensity of loading within the patch is assumed to be uniform. In such situations it becomes necessary to obtain the equivalent<br />

nodal forces when a concentrated load is acting within the element. Again, the equivalent nodal forces are expressed as:<br />

2.1 Governing Equations<br />

P<br />

r <br />

P<br />

o<br />

T N J<br />

The governing equations for specified problems like vibration, static and dynamic stability are as:.<br />

Free vibration:<br />

2 M <br />

q 0<br />

K b<br />

(28)<br />

(29)<br />

(27)<br />

(24)<br />

(25)<br />

(26)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 409<br />

ISSN 2250-3153<br />

Vibration without in-plane load:<br />

Vibration with in-plane load:<br />

Static stability or buckling<br />

Or<br />

0 q K q<br />

<br />

M b<br />

<br />

0 <br />

q K P K q M <br />

b<br />

G<br />

2<br />

P K M q <br />

0<br />

Kb c r G<br />

PK<br />

<br />

q 0 <br />

K G<br />

(30)<br />

(31)<br />

(32)<br />

b (33)<br />

where K b ,<br />

K G ,<br />

M are overall elastic stiffness, geometric stiffness, and mass matrices respectively, <br />

vector. To evaluate the overall elastic stiffness, geometric stiffness, and mass matrices K b ,<br />

K G ,<br />

<br />

q is the displacement<br />

M respectively, it is<br />

necessary to use the same shape functions for both plate and stiffener elements The element matrices for the plate and stiffener are<br />

generated separately and then added up to form overall matrices.<br />

The equations are solved using the technique proposed by Corr<br />

and Jennings [28 ] where the matrices [K], [M] and [KG] are<br />

stored in single array according to skyline storage algorithm. In<br />

all the cases, the stiffness matrix [K] is factorized according to<br />

Cholesky‘s decomposition technique. With this, the solution for<br />

displacement is simply obtained by its forward elimination and<br />

backward substitution techniques. These displacements<br />

components are used to find out the stress field. These stresses<br />

are used to calculate the geometric stiffness matrices. The<br />

solutions of equations go through a number of operations.<br />

Moreover it requires a number of iterations to get the solution<br />

since these equations come under the category of eigenvalue<br />

problem. In such cases, the solution of eigen vector and eigen<br />

Frequencies of vibration ( ) b t D<br />

2<br />

value is more than one where the different solutions correspond<br />

to different modes of vibration or different modes of buckling.<br />

The mode which gives lowest value of the eigen value is quite<br />

important and it is known as fundamental mode.<br />

2.3 Non-dimensionalisation of Parameters<br />

Majority of the model parameters and results are presented in<br />

non-dimensional form to make them independent of the plate<br />

size, thickness, material properties, etc for the convenience of the<br />

analysis. The non-dimensionalisation of different parameters like<br />

vibration, buckling and excitation frequency for dynamic<br />

stability analysis is taken as given below:<br />

2 2<br />

Buckling load ( ) (1) Distributed load b D<br />

3<br />

2<br />

N X<br />

(2) Concentrated load b D<br />

Where D is the plate flexural rigidity, D = E t 12(<br />

1<br />

) , P is the applied load, Pc r is the buckling load, is the density of the<br />

plate material and t is the plate thickness. In addition, certain quantities are expressed as the ratio of that quantity to some reference<br />

quantity. Assuming a general case of several longitudinal ribs and denoting<br />

EI S the flexural rigidity of a stiffener at a distance (Dx) from the edge y = 0, the stiffener parameter terms<br />

and are defined as: AS bt<br />

= Ratio of cross-sectional area of the stiffener to the plate, where A S is the<br />

area of the stiffener.<br />

I bD<br />

E S = Ratio of bending stiffness rigidity of stiffener to the plate, where S<br />

the stiffener cross-section about reference axis.<br />

Pc r<br />

I is the moment of inertia of<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 410<br />

ISSN 2250-3153<br />

2.4 Problem Identification<br />

The basic configuration of the problem considered here is a unstiffened and stiffened plate subjected to various uniform and nonuniform<br />

edge loadings as shown in figures 1 (a-d). The cross-section of the stiffened plate is shown in figure 4.2 for rectangular crosssection<br />

and figure 4.3 for Skew rectangular plate cross section under uniaxially loading.<br />

(a) Uni-axial loading (b) Bi-axial loading<br />

(c) In-plane shear loading (d) In-plane Shear loading<br />

The problem considered here consists of a rectangular plate (a x<br />

b) with stiffener subjected to various types of loading. In Figures<br />

1 (a-d), the plates are subjected to uniformly distributed in plane<br />

uniaxial, biaxial, shear edge loading. The length (a) of the<br />

stiffened plate considered above is varied keeping its other<br />

A<br />

A<br />

A<br />

b<br />

a<br />

Figure 1 (a-d): Plate subjected to inplane uniform edge loading<br />

1 in<br />

Figure 2: Stiffened plate cross section<br />

t<br />

b<br />

a S b<br />

c<br />

parameters unchanged. The cross-section of the stiffener is<br />

shown in figure 2 and 3. Rectangular skew plates under general<br />

uniformly distributed in-plane edge loading are considered also<br />

as shown in figure 4.3 to study the vibration and dynamic<br />

stability behaviour of skew stiffened plates.<br />

S d<br />

Figure 3: Skew rectangular plate under uniaxially loading<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 411<br />

ISSN 2250-3153<br />

A parametric study is carried out here for the plates to present<br />

some new results in the present studies.on the topic using the<br />

present finite element approach. Different kind of loading cases<br />

as written below are applied for buckling, vibration of stiffened<br />

plates.<br />

III. RESULT AND DISCUSSION<br />

3.1 Convergence and validation studies with previous results<br />

In a finite element analysis, it is desired to have the convergence<br />

studies to estimate the order of mesh size to be necessary for the<br />

numerical solution. The problem of isotropic rectangular<br />

a/b<br />

1<br />

0.5<br />

2.5<br />

Boundary<br />

Condition<br />

1. In-plane Uniaxial compression<br />

2. In-plane biaxial Compression<br />

3. In-plane shear load<br />

4. Biaxial compression and in-plane shear<br />

unstiffened plates with uniform loading is investigated in table 1<br />

for buckling and vibration for a/b = 1, 0.5, 2, 2.5 and validated<br />

with available results of Leissa [25]. As the convergence study<br />

shows that a mesh size of 10x10 is sufficient enough to get a<br />

reasonable order of accuracy. The analysis in the subsequent<br />

problems is carried out with this mesh size.<br />

.<br />

Table 1: Buckling and Vibration studies of rectangular unstiffened plate<br />

Buckling<br />

Parameter<br />

Non dimensional frequency parameter<br />

Reference Mode No<br />

1 2 3 4<br />

SSSS 3.99 Present 19.73 49.35 49.35 78.96<br />

Leissa [ 25] 19.732 49.438 49.438 78.95<br />

CCCC 10.07 Present 35.98 73.43 -- 108.21<br />

Leissa [25] 35.992 73.221 73.221 108.27<br />

SCSS 4.84 Present 23.64 51.12 58.23 86.34<br />

SSSS 6.24 Present 49.33 78.94 128.76 167.45<br />

CCCC 19.31 Present 98.29 127.56 179.97 254.56<br />

SCSS 10.37 Present 69.23 94.789 140.09 207.45<br />

SSSS 4.13 Present 11.643 16.97 24.356 35.98<br />

Leissa[25] 11.44 16.18 24.08 35.135<br />

CCCC 7.85 Present 23.64 27.81 35.46 46.93<br />

Leissa [25 ] 23.648 27.817 35.446 46.770<br />

SCSS 4.116 Present 11.74 17.123 25.56 38.76<br />

A square plate clamped in all edges having a centrally placed<br />

concentric stiffener as presented by Nair & Rao [26] using a<br />

package stift1, Mukharjee [17] , Mukhopadhyay [16], and Seikh<br />

[18] using FEM , semi analytical method, and spline finite strip<br />

method respectively has been analyzed presently in table 2. Seikh<br />

[18] has given results neglecting and including mass moment of<br />

inertia which has been validated in present results marked as<br />

Plate size = 600mm x 600 mm Plate thickness = 1.0 mm,<br />

Poisson‘s ratio = 0.34 Mass density = 2.78e-6 Kg /<br />

E = 6.87<br />

7<br />

2<br />

10 N / mm , As = 67.0 mm 2<br />

Present (1) for M.I. Neglecting and Present (2) as mass moment<br />

of inertia including. The first six frequencies are compared. The<br />

agreement is excellent. In Mukhopadhyay [16] in-plane<br />

displacement is not considered in the analysis so results cause<br />

slightly varying. Table2 also present convergence study showing<br />

good convergence of results.<br />

mm<br />

, Is = 2290 mm 4<br />

Js = 22.33 mm 4<br />

Table 2: Frequency in (rad / s) of clamped stiffened plate with a concentric Stiffener<br />

Source Mode<br />

No<br />

Present 6 x 6<br />

8 x 8<br />

10 x 10<br />

Present 10 x 10<br />

1 2 3 4 5 6<br />

318.62<br />

317.36<br />

317.00<br />

317.00<br />

404.53<br />

401.66<br />

400.84<br />

400.84<br />

474.30<br />

472.34<br />

471.74<br />

471.74<br />

541.56<br />

538.26<br />

537.32<br />

537.32<br />

727.81<br />

719.23<br />

716.35<br />

716.35<br />

3<br />

771.47<br />

763.23<br />

759.54<br />

759.54<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 412<br />

ISSN 2250-3153<br />

Nair and Rao [26]<br />

Mukharjee [17]<br />

Mukhopadhyay [16]<br />

(1) Seikh [18]<br />

(2) Seikh [18]<br />

317.54<br />

322.34<br />

305.12<br />

316.85<br />

316.85<br />

400.12<br />

412.23<br />

382.34<br />

400.35<br />

400.35<br />

The Effect of the stiffener for the same plate but with a stiffener<br />

of 20 mm by 3 mm size has been solved and presented in table 3.<br />

Dimension of the stiffened plate is shown in figure 4. Seikh [18]<br />

solved this problem by spline finite strip method and finite<br />

600 mm<br />

A A<br />

AAA 3 mm<br />

600mm<br />

Figure 4: Eccentrically clamped square stiffened plate<br />

472.23<br />

506.87<br />

454.76<br />

471.69<br />

471.68<br />

537.14<br />

599.34<br />

519.17<br />

536.95<br />

536.94<br />

714.14<br />

772.15<br />

696.18<br />

716.04<br />

716.02<br />

760.17<br />

860.93<br />

741.15<br />

759.14<br />

759.12<br />

element method respectively. The results are compared and are<br />

found to agree well. Nair also solved placing the stiffener at<br />

various eccentricities.<br />

1 mm<br />

20 mm<br />

Table 3: Convergence of the frequency with Mesh Division<br />

Mesh Division<br />

3 x 3 4 x 4 6 x 6 8 x 8 9 x 9 10 x 10<br />

Sheikh Mode 1 324.703 319.921 317.433 316.949 316.94 316.799<br />

[18] Mode 2 403.147 403.147 401.627 400.611 400.369 400.327<br />

Present Mode 1 342.473 325.62 318.64 317.66 317.25 316.79<br />

Mode 2 410.06 420.62 404.53 401.66 403.10 400.32<br />

3.2 Buckling of longitudinally stiffened plate under<br />

uniaxial load<br />

3.2.1 Validation Studies for Buckling Studies of a Central<br />

concentric stiffened plate<br />

The present formulation is validated for buckling analysis of<br />

rectangular stiffened plate. The buckling load parameters have<br />

been obtained for various aspect ratios, bending stiffness rigidity<br />

and stiffener area ratios for one central longitudinal stiffener in<br />

table 4. The plate thickness ratio (a/h) and isotropic plate and<br />

stiffener material (ν) are taken as 100 and 0.3 respectively. The<br />

dimension ‗a‟ is varied keeping b as constant to get different<br />

values of aspect ratio (a/b). The plate is subjected to uniform<br />

compression in the x-direction. The mesh division chosen for the<br />

whole plate is 10 x 10. A good agreement is observed with the<br />

result obtained by Timoshenko and Gere [27]. In table 4 A is for<br />

Timoshenko and Gere [27].<br />

Table 4: Comparison of buckling load parameters of a rectangular stiffened plate with one longitudinal central stiffener<br />

subjected to uniform normal edge loading along x- direction.<br />

a/b<br />

= 5<br />

=10<br />

= 0.05 = 0.1 = 0.05 = 0.10<br />

Present A<br />

[27]<br />

Present A<br />

[27]<br />

Present A [27] Present A [27]<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 413<br />

ISSN 2250-3153<br />

0.6<br />

1.0<br />

1.2<br />

1.6<br />

2.0<br />

3.0<br />

16.54<br />

11.98<br />

9.85<br />

8.17<br />

8.01<br />

8.31<br />

16.5<br />

12.0<br />

9.83<br />

8.01<br />

7.95<br />

8.31<br />

16.54<br />

11.03<br />

9.02<br />

7.35<br />

7.28<br />

7.67<br />

After the validation of free vibration analysis and buckling<br />

analysis of stiffened plates, detailed studies has been done for<br />

variation of buckling and vibration load parameters of stiffened<br />

plates for different aspect ratios, various boundary conditions<br />

with varying load P/Pcr with different number of stiffeners.<br />

The variation of buckling and frequency parameters with P/Pcr<br />

for rectangular eccentric stiffened plate with 1, 2, 3 longitudinal<br />

equispaced stiffeners subjected to in-plane uniform uni-axial for<br />

various aspect ratios (a/b = 1, 1.5, 2) and boundary conditions<br />

(SSSS, CCCC, SCSS) are studied in details and presented in<br />

table 5-8 for different boundary conditions and aspect ratios for<br />

the sake of getting various interlinking results of number of<br />

stiffeners and aspect ratios. Here n is number of stiffeners.<br />

16.5<br />

11.11<br />

9.06<br />

7.38<br />

7.29<br />

7.62<br />

16.54<br />

15.99<br />

15.34<br />

11.43<br />

10.20<br />

12.03<br />

16.50<br />

16.00<br />

15.30<br />

11.40<br />

10.20<br />

12.0<br />

16.54<br />

15.99<br />

14.09<br />

10.48<br />

9.34<br />

11.10<br />

16.5<br />

16.0<br />

14.2<br />

10.5<br />

9.35<br />

11.1<br />

It is observed from the above studies that frequency parameters<br />

at any value of P/Pcr will be more for square stiffened plate.<br />

These values decrease with the increase of aspect ratios.<br />

Similarly it is also concluded that buckling loads parameters will<br />

decrease, as the aspect ratios will increase. It may be concluded<br />

from above observation that buckling load parameter and<br />

frequency parameter will increase with increase of number of<br />

stiffeners. The value will also increase with the increase of<br />

degree of restraints. Thus the buckling and frequency parameter<br />

of CCCC is more than SSSS and SCSS. In the same manner the<br />

buckling and frequency parameter of SCSS is more than SSSS.<br />

Table 5: Variation of frequency parameter and buckling load parameter ( ) in the case of different boundary condition and<br />

various aspect ratios for one longitudinal stiffener at the centre having ( = 0.1 and = 5).<br />

a/b<br />

1<br />

1.5<br />

2<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

11.03<br />

24.90<br />

17.02<br />

7.56<br />

23.73<br />

11.07<br />

7.285<br />

22.47<br />

8.89<br />

<br />

Frequency parameter<br />

-1 -0.5 0 0.5 0.9<br />

46.39<br />

87.89<br />

62.70<br />

25.60<br />

52.48<br />

33.47<br />

18.84<br />

37.97<br />

22.49<br />

40.17<br />

79.47<br />

54.91<br />

22.17<br />

46.41<br />

29.20<br />

16.32<br />

33.54<br />

19.64<br />

32.80<br />

69.76<br />

45.60<br />

18.10<br />

39.17<br />

24.09<br />

13.32<br />

28.22<br />

16.22<br />

23.19<br />

57.64<br />

33.24<br />

12.84<br />

29.53<br />

17.29<br />

9.41<br />

21.04<br />

11.667<br />

Table 6: Variation of frequency parameter and buckling load parameter ( ) in the case of different boundary<br />

a/b<br />

1<br />

1.5<br />

condition and aspect ratios for two longitudinal stiffener having ( = 0.1 and = 5)<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

14.44<br />

43.50<br />

26.10<br />

8.72<br />

29.54<br />

14.0<br />

2.31<br />

7.95<br />

1.81<br />

1.28<br />

----<br />

1.77<br />

0.94<br />

2.20<br />

1.20<br />

<br />

Frequency parameter<br />

-1 -0.5 0 0.4 0.6 0.9<br />

53.07<br />

---<br />

77.26<br />

27.49<br />

56.88<br />

37.65<br />

45.96<br />

94.46<br />

67.35<br />

23.81<br />

49.89<br />

32.79<br />

37.52<br />

79.78<br />

55.46<br />

19.44<br />

41.28<br />

26.96<br />

29.07<br />

64.95<br />

43.34<br />

15.06<br />

32.51<br />

21.06<br />

23.73<br />

55.48<br />

35.57<br />

12.29<br />

26.83<br />

2.65<br />

8.73<br />

1.37<br />

1.37<br />

3.07<br />

1.94<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 414<br />

ISSN 2250-3153<br />

2<br />

SSSS<br />

CCCC<br />

SCSS<br />

7.68<br />

25.11<br />

10.27<br />

19.35<br />

39.46<br />

24.18<br />

16.79<br />

34.64<br />

21.07<br />

13.69<br />

28.81<br />

17.35<br />

10.60<br />

22.80<br />

13.56<br />

8.66<br />

18.89<br />

11.13<br />

Table 7: Variation of frequency parameter and buckling load parameter ( ) in the case of different boundary condition and<br />

a/b<br />

1<br />

1.5<br />

2<br />

aspect ratios for three longitudinal stiffener having ( = 0.1 and = 5).<br />

BoundaryC<br />

ondition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

17.04<br />

60.64<br />

32.08<br />

9.69<br />

34.12<br />

16.30<br />

8.03<br />

27.2<br />

11.38<br />

0.96<br />

2.18<br />

1.26<br />

<br />

Frequency parameter<br />

-1 -0.5 0 0.4 0.6 0.9<br />

57.67<br />

---<br />

85.63<br />

28.97<br />

60.95<br />

40.63<br />

19.78<br />

40.92<br />

25.46<br />

49.94<br />

---<br />

74.55<br />

25.09<br />

53.25<br />

35.37<br />

17.13<br />

35.82<br />

22.18<br />

Table 8: Variation of frequency parameter and buckling load parameter ( ) for stiffened plate (Equispaced, one stiffener, two<br />

40.78<br />

88.85<br />

61.27<br />

20.49<br />

43.95<br />

29.05<br />

14<br />

29.67<br />

18.24<br />

31.58<br />

69.93<br />

47.76<br />

15.87<br />

34.42<br />

22.64<br />

10.83<br />

23.35<br />

14.24<br />

25.79<br />

57.79<br />

39.15<br />

12.96<br />

28.29<br />

18.36<br />

8.85<br />

19.25<br />

11.68<br />

2.88<br />

6.61<br />

4.41<br />

1.45<br />

3.20<br />

2. 09<br />

0.99<br />

2.19<br />

1.32<br />

stiffener, three stiffener) with different aspect ratio and boundary condition having ( = 0.1, = 5)<br />

a/b<br />

1<br />

2<br />

1.5<br />

No of Stiffener<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

11.03<br />

24.90<br />

17.02<br />

7.285<br />

22.47<br />

8.89<br />

7.56<br />

23.73<br />

11.07<br />

1 2 3<br />

<br />

32.80<br />

69.76<br />

45.60<br />

13.32<br />

28.22<br />

16.22<br />

18.10<br />

39.17<br />

24.09<br />

3.3 Unstiffened/stiffened plates under in-plane biaxial<br />

load<br />

3.3.1 Convergence and validation study<br />

The accuracy of the proposed method for unstiffened plates<br />

under in-plane biaxial load are first established by comparing the<br />

results of various problems with those of earlier investigators‘<br />

available in the literature. The analysis has been done for<br />

buckling load factor for square plates having various boundary<br />

14.40<br />

43.50<br />

26.70<br />

7.68<br />

25.11<br />

10.27<br />

8.72<br />

29.54<br />

14.03<br />

<br />

37.52<br />

79.78<br />

55.46<br />

13.69<br />

28.81<br />

17.35<br />

19.44<br />

41.28<br />

26.96<br />

17.04<br />

60.64<br />

32.08<br />

8.03<br />

27.2<br />

11.38<br />

9.69<br />

34.12<br />

16.30<br />

<br />

40.78<br />

88.85<br />

61.25<br />

14.00<br />

29.67<br />

18.24<br />

20.49<br />

43.95<br />

29.05<br />

conditions (SSSS, CCCC, CSCS) under bi-axial load considering<br />

compressive in-plane load and validated in table 9. To study the<br />

aspect of convergence, a simply supported square plate subjected<br />

to in-plane compressive load in both directions has been<br />

undertaken in table 10. In this case, the result is compared with<br />

finite difference solution by Singh and Dey [2]. The result is<br />

observed to converge satisfactorily at 8 x 8 and 10 x 10 mesh<br />

divisions.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 415<br />

ISSN 2250-3153<br />

Further frequency parameter ( ) for a simply supported square<br />

plate subjected to bi-axial load. (Nx = Ny = N and Nxy = 0), =<br />

Boundary<br />

Conditions<br />

SSSS<br />

CCCC<br />

CSCS<br />

0.3, P/Pcr = 0.5 is analyzed and validated in table 9 with the result<br />

of Singh and Dey [2] and analytical solution of Diez [1].<br />

Table 9: Buckling load factor for square plate under biaxial load<br />

Non-dimensional buckling load<br />

Present Ref [2]<br />

Mode1 Mode 2 Mode1 Mode 2<br />

1.99<br />

5.60<br />

3.82<br />

4.999<br />

9.333<br />

5.948<br />

Table 10: Convergence and validation study of frequency parameter for a simply supported square plate subjected to biaxial<br />

load. (Nx = Ny = N, Nxy = 0), = 0.3, P/Pcr = 0.5<br />

Mode No.<br />

1<br />

2<br />

3<br />

4<br />

After convergence and validation study for buckling and free<br />

vibration of unstiffened plates in well condition for bi-axial edge<br />

loading, the analysis is now extended to unstiffened/stiffened<br />

plates subjected to bi-axial load for buckling and vibration<br />

analysis.<br />

3.4 Vibration and buckling studies<br />

The variation of frequency parameter with in-plane load intensity<br />

factor of a plate of various aspect ratio and edge condition<br />

compressed uniformly on all edges (Nx = Ny = N & Nxy = 0) is<br />

2.0<br />

5.61<br />

3.83<br />

Frequency Parameter <br />

Present<br />

4 x 4 6 x 6 8 x 8 10 x 10 Singh and Dey<br />

[2]<br />

13.974 13.959 13.957 13.956 13.96<br />

44.729 44.253 44.148 44.144 44.13<br />

44.729 44.253 44.148 44.144 44.13<br />

75.015 74.078 73.892 73.865 73.86<br />

5.0<br />

9.42<br />

5.92<br />

Analytical [1]<br />

13.96<br />

43.35<br />

43.35<br />

73.87<br />

studied in this section. The fundamental frequency parameter for<br />

plate having different boundary conditions (SSSS, CCCC, SCSS<br />

) are studied in table 11.<br />

The trend of the results for a simply supported plate shown in<br />

table 11 is almost similar for CCCC plates and SCSS, except for<br />

its gradient of rise. For CCCC plate, there is a steep increase in<br />

frequencies with increasing aspect ratios. The natural frequencies<br />

are found to increase with decreased magnitude of compressive<br />

in-plane forces.<br />

Table 11: Variation of frequency parameter with in-plane load intensity factor of a late of various aspect ratio and edge<br />

condition compressed uniformly on all edges (Nx = Ny = N & Nxy = 0), = 0.3.<br />

a/b<br />

1<br />

0.5<br />

2<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

Buckling<br />

Parameter<br />

<br />

1.99<br />

5.30<br />

2.66<br />

4.99<br />

15.67<br />

8.61<br />

1.24<br />

3.92<br />

1.34<br />

Frequency parameter<br />

at P/Pcr<br />

0 0.2 0.5 0.8 0.995<br />

19.73<br />

35.98<br />

23.64<br />

43.33<br />

98.29<br />

69.31<br />

12.34<br />

24.57<br />

12.91<br />

17.65<br />

32.28<br />

21.26<br />

44.13<br />

88.22<br />

62.10<br />

11.03<br />

22.06<br />

11.55<br />

13.95<br />

25.65<br />

16.76<br />

34.88<br />

70.17<br />

49.29<br />

8.72<br />

17.54<br />

9.14<br />

8.82<br />

16.32<br />

10.62<br />

22.06<br />

44.73<br />

31.24<br />

5.56<br />

11.18<br />

5.78<br />

0.438<br />

0.815<br />

0.53<br />

0.109<br />

0.224<br />

0.115<br />

0.270<br />

0.558<br />

0.286<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 416<br />

ISSN 2250-3153<br />

Now the study is extended to stiffened plates subjected to biaxial<br />

in-plane edge loading. The variation of buckling and<br />

frequency parameters with P/Pcr for rectangular stiffened plate<br />

with 1, 2, 3 longitudinal equispaced stiffeners (Stiffener<br />

parameters = 0.1 and = 5) subjected to in-plane uniform bi-<br />

axial for various aspect ratios (a/b= 1, 1.5, 2) and boundary<br />

conditions (SSSS, CCCC, SCSS) are studied in detail and shown<br />

in table 12-14 for the sake of getting various interlinking results<br />

of number of stiffeners and aspect ratios.<br />

Table 12: Variation of frequency parameter with in-plane load intensity factor of stiffened Plate with one central stiffener<br />

having ( = 0.1 and = 5) compressed uniformly on all edges (<br />

a/b<br />

1<br />

0.5<br />

2<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

5.00<br />

9.33<br />

5.36<br />

7.99<br />

17.23<br />

10.64<br />

1.67<br />

6.18<br />

2.38<br />

<br />

x y x y<br />

,<br />

0<br />

),<br />

0.<br />

3<br />

Frequency parameter<br />

at Load intensity factor P/Pcr<br />

-2 -1 -0.5 0 0.25 0.5 0.8<br />

53.86<br />

95.28<br />

65.79<br />

131.57<br />

221.34<br />

163.97<br />

23.06<br />

48.12<br />

27.98<br />

44.65<br />

83.89<br />

56.86<br />

111.94<br />

186.09<br />

137.97<br />

18.126<br />

38.98<br />

22.54<br />

39.21<br />

77.32<br />

51.64<br />

100.09<br />

154.12<br />

115.56<br />

15.99<br />

33.98<br />

19.12<br />

32.80<br />

69.75<br />

45.60<br />

78.98<br />

127.22<br />

94.87<br />

13.21<br />

28.43<br />

16.34<br />

29.03<br />

63.78<br />

42.11<br />

68.12<br />

110.76<br />

81.76<br />

11.23<br />

23.98<br />

14.09<br />

24.69<br />

52.22<br />

36.56<br />

55.098<br />

89.98<br />

67.45<br />

Table 13: Variation of frequency parameter with in-plane load intensity factor of stiffened plate with two equispaced stiffener<br />

having ( = 0.1 and = 5) compressed uniformly on all edges (<br />

a/b<br />

1<br />

2<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

7.35<br />

14.21<br />

10.24<br />

1.88<br />

6.39<br />

2.91<br />

<br />

x y x y<br />

9.01<br />

20.34<br />

11.23<br />

,<br />

0<br />

),<br />

17.87<br />

33.18<br />

23.13<br />

35.34<br />

56.78<br />

42.34<br />

5.12<br />

11.98<br />

7.12<br />

0.<br />

3<br />

Frequency parameter<br />

at Load intensity factor P/Pcr<br />

-2 -1 -0.5 0 0.25 0.5 0.8<br />

62.89<br />

---<br />

83.50<br />

23.70<br />

48.32<br />

29.99<br />

51.80<br />

97.82<br />

71.09<br />

19.35<br />

39.95<br />

24.51<br />

45.23<br />

89.60<br />

63.70<br />

16.76<br />

34.89<br />

21.24<br />

37.52<br />

79.78<br />

55.46<br />

13.69<br />

28.81<br />

17.35<br />

33.0<br />

73.62<br />

50.00<br />

11./85<br />

25.13<br />

15.03<br />

27.73<br />

65.33<br />

45.12<br />

9.68<br />

20.70<br />

12.28<br />

19.61<br />

46.50<br />

31.09<br />

6.12<br />

13.26<br />

7.77<br />

Table 14: Variation of frequency parameter with in-plane load intensity factor of stiffened plate with three equispaced<br />

stiffeners having ( = 0.1 and = 5) compressed uniformly on all edges. (<br />

a/b<br />

1<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

SCSS<br />

<br />

8.27<br />

18.96<br />

13.24<br />

<br />

x y x y<br />

,<br />

0<br />

Frequency parameter<br />

At Load intensity factor P/Pcr<br />

-2 -1 -0.5 0 0.25 0.5 0.8<br />

66.59<br />

--<br />

92.66<br />

52.21<br />

---<br />

78.63<br />

48.54<br />

99.40<br />

70.51<br />

40.78<br />

88.85<br />

61.27<br />

36.28<br />

82.80<br />

56.05<br />

31.13<br />

75.88<br />

50.27<br />

)<br />

23.52<br />

54.01<br />

32.53<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 417<br />

ISSN 2250-3153<br />

2<br />

SSSS<br />

CCCC<br />

SCSS<br />

2.08<br />

7.19<br />

3.39<br />

24.42<br />

49.84<br />

31.53<br />

19.78<br />

41.18<br />

25.77<br />

The analysis is also presented below in figure 5 for simply supported stiffened plate which has been above for 1, 2, 3 stiffeners to<br />

show as a combined effects and overview.<br />

Non dimensional frequency parameter<br />

<br />

70<br />

60<br />

50<br />

17.13<br />

35.96<br />

22.33<br />

13.99<br />

29.67<br />

18.24<br />

12.11<br />

25.87<br />

15.80<br />

9.89<br />

21.29<br />

12.91<br />

40<br />

Simply supported<br />

30<br />

stiffened plate<br />

Aspect ratio=1<br />

20<br />

N =N =N<br />

x y<br />

=0.1&=5<br />

10<br />

1 stiffener<br />

2 stiffener<br />

3 stiffener<br />

0<br />

-2.0 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5<br />

P/P cr<br />

Figure 5: Variation of Non-dimensional frequency parameter vs P/Pcr for stiffened plate subjected by uniform compression on<br />

all edges.<br />

3.5 Unstiffened and stiffened plates uunder shear edge<br />

loading<br />

3.5.1 Validation studies with unstiffened plate<br />

The variation of frequency parameter with various in-plane load<br />

intensity (P/Pcr) of unstiffened square plate having boundary<br />

Boundary<br />

Condition<br />

SSSS<br />

CCCC<br />

CSCS<br />

6.26<br />

13.69<br />

8.17<br />

conditions (SSSS, CCCC, CSCS) subjected to inplane shear load<br />

at all edges have been analyzed in various modes and the results<br />

are obtained in table 15 and validated with the result of Singh<br />

and Dey [2].<br />

Table 15: Buckling load factors for square plate under shear load.<br />

3.6 Buckling and Vibration Studies of stiffened pates<br />

subjected to Shear Load<br />

After validating the results for buckling of unstiffened plates<br />

under shear, it is extended for further study for stiffened plates in<br />

order to get details insight and with the view to get some new<br />

numerical results under in-plane shear load.<br />

The variation of frequency parameters with P/Pcr for simply<br />

supported rectangular stiffened plate with 1, 2, 3 longitudinal<br />

equispaced stiffeners (Stiffener parameters = 0.1 and = 5)<br />

Buckling Load Parameter<br />

Present Ref [2]<br />

Mode 1 Mode 2 Mode1 Mode 2<br />

9.32<br />

11.568<br />

9.33<br />

11.56<br />

14.65<br />

16.958<br />

14.66 16.96<br />

12.58<br />

14.228<br />

12.58 14.23<br />

subjected to uniform shear has been studied for (a/b= 1, 1.5, 2) in<br />

table 16-19 4.27- 4.30. Variation of non-dimensional frequency<br />

parameter ( ) vs P/Pcr for simply supported stiffened plate<br />

having ( =0.1 and =5) subjected by in-plane uniform shear<br />

may be drawn. This is for the sake of getting various interlinking<br />

results of number of stiffeners and aspect ratios. It is observed<br />

from the above studies that frequency parameters at any value of<br />

P/Pcr will be more for square stiffened plate. These values<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 418<br />

ISSN 2250-3153<br />

decrease with the increase of aspect ratios. Similarly it is also<br />

concluded that buckling loads parameters will decrease, as the<br />

aspect ratios will increase.<br />

Table 16: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) of a simply supported stiffened plate<br />

with one central stiffener having ( = 0.1, = 5) subjected to edge shear only. (<br />

a/b<br />

1<br />

1.5<br />

2<br />

<br />

20.38<br />

11.41<br />

9.44<br />

Frequency parameter at P/Pcr<br />

0,<br />

<br />

x y x y<br />

0 0.2 0.4 0.5 0.6 0.8<br />

32.80<br />

18.10<br />

13.32<br />

32.10<br />

17.73<br />

13.06<br />

29.71<br />

16.53<br />

12.23<br />

27.58<br />

15.54<br />

11.55<br />

24.42<br />

14.19<br />

10.64<br />

9.44<br />

9.27<br />

7.72<br />

),<br />

0.<br />

3<br />

Table 17: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) of a simply supported stiffened plate<br />

with two equispaced stiffeners ( = 0.1, x y 0,<br />

x y <br />

= 5) subjected to edge shear only. (<br />

), 0.<br />

3<br />

.<br />

a/b<br />

1<br />

1.5<br />

2<br />

<br />

35.76<br />

17.22<br />

11.82<br />

Frequency parameter at P/Pcr<br />

0 0.2 0.4 0.5 0.6 0.8<br />

37.52<br />

19.44<br />

13.44<br />

36.75<br />

19.07<br />

13.44<br />

34.21<br />

17.88<br />

12.66<br />

32.05<br />

16.89<br />

12.01<br />

29.04<br />

15.53<br />

11.13<br />

Table 18: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) of a simply supported stiffened plate<br />

with three equispaced stiffeners ( = 0.1, = 5) subjected to edge shear only. (<br />

a/b<br />

1<br />

1.5<br />

2<br />

<br />

57.78<br />

21.39<br />

13.58<br />

Frequency parameter at P/Pcr<br />

--<br />

10.7<br />

8.20<br />

0,<br />

<br />

x y x y<br />

0 0.2 0.4 0.5 0.6 0.8<br />

40.78<br />

20.49<br />

13.99<br />

39.77<br />

21.12<br />

13.74<br />

36.36<br />

18.93<br />

12.95<br />

33.19<br />

17.93<br />

12.30<br />

14.56<br />

16.56<br />

11.42<br />

---<br />

11.8<br />

8.52<br />

),<br />

0.<br />

3<br />

Table 19: Variation of frequency parameter with in-plane load intensity factor (P/Pcr) and buckling load parameter of a<br />

simply supported stiffened plate with equispaced stiffeners ( =0.1 and =5) subjected to edge shear only.<br />

x y 0,<br />

x y <br />

(<br />

), 0.<br />

3<br />

.<br />

No of<br />

stiffeners<br />

1<br />

a/b Buckling<br />

Parameter<br />

1<br />

1.5<br />

2<br />

20.38<br />

11.41<br />

9.44<br />

Frequency parameter at P/Pcr<br />

0 0.2 0.4 0.5 0.6 0.8<br />

32.80<br />

18.10<br />

13.32<br />

32.10<br />

17.73<br />

13.06<br />

29.71<br />

16.53<br />

12.23<br />

27.58<br />

15.54<br />

11.55<br />

24.42<br />

14.19<br />

10.64<br />

9.44<br />

9.27<br />

7.72<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 419<br />

ISSN 2250-3153<br />

2<br />

3<br />

1<br />

1.5<br />

2<br />

1<br />

1.5<br />

2<br />

35.76<br />

17.23<br />

11.82<br />

57.78<br />

21.39<br />

13.58<br />

37.52<br />

19.44<br />

13.69<br />

40.78<br />

20.49<br />

13.99<br />

36.75<br />

19.07<br />

13.44<br />

39.77<br />

20.12<br />

13.74<br />

34.21<br />

17.88<br />

12.66<br />

36.36<br />

18.93<br />

12.95<br />

32.05<br />

16.89<br />

12.01<br />

33.19<br />

17.93<br />

12.30<br />

29.04<br />

15.53<br />

11.13<br />

14.56<br />

16.56<br />

11.42<br />

--<br />

10.77<br />

8.20<br />

---<br />

11.81<br />

8.52<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 420<br />

ISSN 2250-3153<br />

IV. CONCLUSION<br />

The results from the study of the compressive buckling and<br />

vibration behaviour of a stiffened plate subjected to in-plane<br />

uniform and non-uniform edge loading can be summarized as<br />

follows.<br />

The stability resistance increases with increase of restraint at<br />

the edges for all types of loading, stiffener parameters and plate<br />

aspect ratios. The stability resistance increases with increase of<br />

number of stiffeners. The variation of buckling load with the<br />

position of the concentrated load on the edges is more<br />

pronounced for the stiffened plates of the smaller aspect ratios.<br />

The buckling load parameter of unstiffened plates simply<br />

supported along all the edges increase as the loads are nearer to<br />

the support. For plates with small aspect ratios, the boundary<br />

condition on the loaded edge has the significant effect on the<br />

load required to cause elastic stability. Natural frequencies of<br />

stiffened plates always decrease with the increase of the in-plane<br />

compressive load. The fundamental frequency becomes zero at<br />

the respective values of the buckling load. The inclusion of inplane<br />

displacements reduces the frequency of the stiffened plates.<br />

The buckling load of the stiffened plates reduces with the<br />

eccentricity of the stiffeners. The eccentricity of the stiffened<br />

plate element should not be neglected, especially for higher<br />

modes of vibration.<br />

REFERENCES<br />

[1] Diez, L., Gianetti, C.E. and Laura, P. A. A. A note on transverse vibration<br />

of rectangular plates subjected to in-plane normal and shear forces. Journal<br />

of Sound and Vibration, 59, 503-508,1978.<br />

[2] Singh, J.P. and Dey, S.S. Transverse vibration of rectangular plates<br />

subjected to in-plane forces by a difference based variational approach.<br />

International Journal of Mechanical Sciences. 32(7), 591-598, 1990.<br />

[3] Deolasi, P.K., Datta, P.K., and Prabhakar, D.L. Buckling and vibration of<br />

rectangular plates subjected to partial edge loading (Compression or<br />

tension). Journal of Structural Engineering, 22(3), 135-144, 1995.<br />

[4] Sundaresan, P., Singh, G., and Rao, G.V. Buckling of moderately thick<br />

rectangular composite plates subjected to partial edge compression.<br />

International Journal of Mechanical Sciences, 40(11), 1105-1117, 1998.<br />

[5] Aksu, G. Free vibration analysis of stiffened plates including the effects of<br />

in-plane inertia. Journal of Applied Mechanics, Trans of ASME, 49, 206-<br />

212, 1982.<br />

[6] Shastry, B. P. and Rao, G. V. Vibration of thin rectangular plates with<br />

arbitrarily oriented stiffeners. Computer and Structures, 7, 627-635, 1977.<br />

[7] Olson, M.D and Hazell, C.R. Vibration studies of some integral rib<br />

stiffened plates. Journal of Sound and Vibration. 50 , 43-61,1977.<br />

[8] Bapu Rao, M. N., Guruswami, P., Venketeswara Rao, M. and Pavitran, S.<br />

Studies on vibration of some rib-stiffened cantilever plates. Journal of<br />

Sound and Vibration, 57 (3), 389-402, 1978.<br />

[9] Mukhopadhyay, M. Vibration and stability analysis of stiffened plates by<br />

semi analytic finite difference method. Part I: Consideration of bending<br />

displacement only. Journal of Sound and Vibration, 130 (1), 27-39, 1989.<br />

[10] Sheikh, A.H. and Mukhopadhayay, M. Free vibration analysis of stiffened<br />

plates with arbitrary planform by the general spline finite strip method.<br />

Journal of Sound and Vibration, 162 (1) , 147-164, 1993.<br />

[11] Sheikh, A.H., and Mukhopadhyay, M. Large deflection free flexural<br />

vibration of stiffened plates. AIAA Journal, 24 (11), 1996.<br />

[12] Harik, I.E. and Guo, M. Finite element analysis of eccentrically stiffened<br />

plates in free vibration. Computer and Structures, 49 (6), 1007-1015, 1993.<br />

[13] Bedair, O.K. Fundamental frequency determination of stiffened plates using<br />

sequential quadratic programming. Computer and Structures, 199, 88-106,<br />

1997.<br />

[14] Allman, D. J. Calculation of the elastic buckling loads of thin flat<br />

reinforced plates using triangular finite elements. International Journal of<br />

Numerical Methods in Engineering, 9, 415-432, 1975.<br />

[15] Wu, J. R. and Liu, W. H. Vibration of rectangular plates with edge restraints<br />

and intermediate stiffeners. Journal of Sound and Vibration, 123(1), 103-<br />

113, 1988.<br />

[16] Mukhopadhyay, M. A semi analytic solution for rectangular plate bending.<br />

Computer and Structures, 9, 81-87, 1978.<br />

[17] Mukherjee, A and Mukhopadhyay, M. Finite Element Buckling Analysis of<br />

stiffened plates. Computer and Structures, 34 (6), 795-803, 1990.<br />

[18] Sheikh, A. H. and Mukhopadhyay, M. Analysis of Stiffened plates with<br />

arbitrary planform by the general spline finite strip method. Computer and<br />

Structures, 42(1), 53-67, 1992.<br />

[19] Arun Roy, Y., Shastry, B. P. and Rao, G. V., Stability of partially stiffened<br />

square plates using high precision finite element. Computer and Structures,<br />

37 (4), 613-615, 1990.<br />

[20] Bedair, O.K., A contribution to the stability of stiffened plates under<br />

uniform compression. Computer and Structures, 66, 535-570, 1998.<br />

[21] Chakraborty, S. and Mukhophyay, M. Estimation of In-plane elastic<br />

parameters and stiffener geometry of stiffened plates, Journal of Sound and<br />

Vibration, 231 (1), 99-124, 2000.<br />

[22] Zeng, H and Bert, C. W. A differential quadrature analysis of vibration for<br />

stiffened plates. Journal of Sound and Vibration, 241 (2), 247-252, 2001.<br />

[23] Srivastava, A. K. L., Datta, P. K., Sheikh, A. H., ‗Vibration and Dynamic<br />

instability of stiffened plates subjected to in-plane harmonic edge loading,‘<br />

International Journal of Structural Stability and Dynamics, 2002, 2(2), 185-<br />

206.<br />

[24] Srivastava, A. K. L., Datta, P. K., Sheikh, A. H., ‗Dynamic stability of<br />

stiffened plates subjected to non-uniform harmonic in-plane edge loading,‘<br />

Journal of Sound and Vibration, 2003, 262 (5), 1171-1189.<br />

[25] Leissa, A.W. Recent studies in plate vibration: 1981-1985, Part-I, Classical<br />

theory. Shock and Vibration Digest, 19(2), 11-18, 1987.<br />

[26] Nair, P. S. and Rao, M. S., On vibration of plates with varying stiffener<br />

length. Journal of Sound and Vibration, 95(1), 19-29, 1984.<br />

[27] Timoshenko, S.P. and Gere, J. M. Theory of Elastic Stability. McGraw-Hill,<br />

Newyork, 1961.<br />

AUTHORS<br />

First Author – A.K.L. Srivastava, Department of Civil<br />

Engineering, N. I. T. Jamshedpur- 831014, India, Email:<br />

aklsriv.nitjsr@yahoo.com<br />

Second Author – S.R.Pandey, Department of Civil Engineering,<br />

N. I. T. Jamshedpur- 831014, India, Email:<br />

ravi_sujay@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 421<br />

ISSN 2250-3153<br />

An Efficient Synthesis of Bio Active Azetidinones and<br />

Thiazolidinones of 3-METHYL-1-PHENYL-1H-<br />

PYRAZOL-5-OL<br />

Ravindra Kumar*, Abha Shukla**, and D.S.Tyagi***<br />

* Department of Chemistry, Gurukul Kangri University, Haridwar-249404, India<br />

** Department of Chemistry, K.G.M. Gurukul Kangri University, Haridwar-249404, India<br />

** Department of Chemistry, L.R.P.G.College, Sahibabad, Ghaziabad, U.P., India<br />

Abstract- A series of Azetidinone; 3-chloro-1-{4-[8-(2hydroxy-4-methylphenyl)-6,10-dimethyl-4,12-diphenyl-<br />

2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-1(9), 3(7), 5,10tetraen-2-yl]phenyl}-4-aryl<br />

azetidin-2-one (3a-e) and<br />

thiazolidinones; 3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10dimethyl-4,12-diphenyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9), 3(7), 5,10-tetraen-2yl]phenyl}-2-aryl-1,3-thiazolidin-4-one<br />

(4a-e) were synthesized<br />

using new schiff base; 2-(6,10-dimethyl-4,12-diphenyl-2-{4-<br />

[(E)-(arylmethylidene)amino]phenyl}-2,4,5,11,12pentaazatricyclo<br />

[7.3.0.0 3,7 ]dodeca-1(9), 3(7), 5,10-tetraen-8-yl)-<br />

5-methyl phenol (2a-e). The schiff base were synthesized by the<br />

reaction of aromatic aldehyde and 2-[2-(4-aminophenyl)-6,10dimethyl-4,12-diphenyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9), 3(7), 5,10-tetraen-8-yl]-<br />

5-methyl phenol (1) under microwave and conventional methods.<br />

Our results show that the synthesis of schiff bases under solvent<br />

free microwave conditions is the most efficient method of<br />

synthesis having highest yield than both conventional method<br />

and microwave with solvent. The newly synthesized compounds<br />

were characterized on the basis of different spectroscopic (IR,<br />

1 HNMR, Mass) and elemental (C, H, N) analysis techniques.<br />

Compounds (3a-e and 4a-e) were screened for their biological<br />

activities against the panel of nine bacterial strains.<br />

Index Terms- Antibacterial activity, azetidinones derivatives,<br />

microwave method, thiazolidinones derivatives,.<br />

M<br />

I. INTRODUCTION<br />

icrowave assisted heterocyclic synthesis is an efficient and<br />

eco-friendly synthetic strategy and has now become a<br />

power full tool for green chemistry. Microwave irradiation has<br />

been applied to organic reactions in the absence of solvent and or<br />

in the presence of a solid support such as clay, alumina and<br />

silica, resulting in shorter reaction time and better product yields<br />

than those obtained by using conventional heating (1-7) . Much<br />

attention has been paid to the synthesis of heterocyclic<br />

compounds (8-11) .<br />

Thiazolidinone is one of the most important pharmacores. 4thiazolidinone<br />

derivatives exhibit a broader spectrum of<br />

biological activity (12) . In recent years 4-thiazolidinones are the<br />

most extensively investigated class of compounds, and its<br />

derivatives have been found to have potentially chemotherapic<br />

activities such as anticonvulsant, antibacterial, antifungal,<br />

antinflammatory (13) , anticancer, and antipsychotic properties (14) .<br />

With a view to further assess the pharmacological profile of this<br />

class of compounds contains nitrogen and sulphur, we thought to<br />

synthesize some Azetidinone and thiazolidinones moieties in a<br />

single molecular frame work. Conventional methods are used for<br />

the synthesis of compounds (1). It was prepared by the reaction<br />

of 3-methyl-1-phenyl-5-pyrzolone, p-phenylene diamine and 4methyl-salicylaldehyde<br />

in ethanol condensation of compounds in<br />

ethanol gave the corresponding schiff base (2). Compound (2)<br />

was prepared by both methods conventional and microwave<br />

procedures. Cyclisation of schiff basses (2) with chloroacetic<br />

acid, POCl3 in presence of triethylamine and with thioglycolic<br />

acid in dichloromethane afforded azetidinones and<br />

thiazolidinones respectively. Purity of the compounds was<br />

checked by TLC, and characterized by elemental analysis, IR,<br />

1 H-NMR and mass spectrometric techniques. . The antibacterial<br />

activities of the title compounds were evaluated against the<br />

different bacterial strains (15-18) .<br />

II. RESEARCH ELABORATIONS<br />

All solvents and alcohols employed were distilled once before<br />

use and purchased form S.D. fine chemicals Ltd. India.,<br />

Qualigens fine chemical, India. Melting points were taken in an<br />

open capillary in an electro thermal apparatus and are<br />

uncorrected. IR (KBr) Spectra were recorded on a Perkin-Elmer<br />

spectrophotometer. 1H-NMR spectra were recorded on a Brucker<br />

AMX 560 MHz in DMSO-d6 using TMS as internal standard.<br />

Samsung microwave oven (Model No.M1630N, 2450MHz) was<br />

used for irradiation. The microwave assisted synthesis of schiff<br />

base compounds were carried out in a Samsung laboratory<br />

microwave reactor. EL-MS spectra were determined on a LCQ<br />

ion tap mass spectrometer. (Thermo Fisher, San Jose, CA. USA)<br />

equipped with an El-Source.<br />

2-[2-(4-aminophenyl)-6,10-dimethyl-4,12-dipheneyl-<br />

2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-1(9),3(7),5,10tetraen-8-yl]-5-methylphenol<br />

(1): A mixture of 5-methyl-2phenyl-1H-pyrazol-3-one<br />

(0.2 mol), 4-methyl Salicylaldehyde<br />

(0.1 mol) in ethanol (10 ml) was refluxed for about 3-4 hours.<br />

After cooling, the reaction mixture was poured in ice cold water,<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 422<br />

ISSN 2250-3153<br />

the solid precipitate was obtained and then filtered, dried and<br />

crystallized from chloroform to give light yellow solid.<br />

2-(6,10-dimethyl-4,12-diphenyl-2-{4-[(E)-<br />

(arylmethylidene)amino]phenyl}-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />

5-methylphenol (2a-e):<br />

Microwave method with solvent: 0.01 mol of 2-[2-(4aminophenyl)-6,10-dimethyl-4,12-dipheneyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl]-5methylphenol<br />

(1), and aromatic aldehyde and ethanol were taken<br />

in a glass tube which was loosely closed and irradiated in<br />

microwave oven for 2 minutes. The completion of the reaction<br />

was monitored by TLC. The reaction mixture was allowed to<br />

attain room temperature. The solvent was removed and the crude<br />

product was recrystallized with chloroform. (figure -1)<br />

Classical method: 0.01 mol of 2-[2-(4-aminophenyl)-6,10dimethyl-4,12-dipheneyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl]-5methylphenol<br />

(1), and aromatic aldehyde and 2-3 drops of acetic<br />

acid in ethanol(10 ml) was refluxed for 4-5 hours. The reaction<br />

was monitored by TLC. After completion of the reaction, the<br />

reaction mixture was set in one side to cool. Then the reaction<br />

mixture was poured in ice cold water and solid precipitate was<br />

separated out, filtered and recrystallized from chloroform.<br />

2-(6,10-dimethyl-4,12-diphenyl-2-{4-[(E)-<br />

(phenylmethylidene)amino]phenyl}-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />

5-methylphenol (2a): m. p.: 165 0 C, IR(KBr); 760(1-2<br />

disubtituted benzene ring), 1285 (C-N), 1572(C=C), 1618(C=N),<br />

2920(Ar-CH), 2998 cm -1 (Ar-OH); 1 H-NMR: δ=2.23(m, 6H, Ar-<br />

CH); 3.08 (s, 6H, (N-CH3)2); 4.12 (s, 1H, Ar-CH); 4.47 (d, J=8.5<br />

Hz, 2H, Ar-CH); 6.72-6.94 (m, 6H, Ar-CH), 7.08 (m, 6H, Ar-<br />

CH); 7.27-7.37 (m, 6H, Ar-CH); 7.51 (t, J=7.12 Hz, 3H, Ar-CH),<br />

7.80 (d, J=8.24 Hz, 2H, Ar-CH); 8.33(s, 1H, N=CH); 9.61 (s, 1H,<br />

Ar-OH); Analysis Calculated for C41H34N6O: C, 78.50; H, 5.42;<br />

N, 13.40; Found: C, 78.07; H, 4.37; N, 12.97; Mass spectra, m/z<br />

= 644 (100%).<br />

2-(2-{4-[(E)-[(2-hydroxyphenyl)methylidene]amino]phenyl}-<br />

6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />

5-methylphenol (2b): m. p.: 185 0 C, IR(KBr); 733 (1-2<br />

disubtituted benzene ring), 1210 (C-N), 1553 (C=C), 1605<br />

(C=N), 2850 (Ar-CH), 3015 cm -1 (Ar-OH); 1 H-NMR: δ=2.63(m,<br />

6H, Ar-CH); 3.35 (s, 6H, (N-CH3)2); 4.17 (s, 1H, Ar-CH); 4.64<br />

(d, J=8.2 Hz, 2H, Ar-CH); 6.82-7.24 (m, 6H, Ar-CH), 7.45 (m,<br />

8H, Ar-CH); 7.47-7.64 (m, 7H, Ar-CH); 7.71 (s, 1H, Ar-CH);<br />

8.38 (s, 1H, N=CH); 9.74 (s, 1H, Ar-OH); 11.24 (s, 1H, Ar-OH);<br />

Analysis Calculated for C41H34N6O2; C, 76.55; H, 5.29; N,<br />

13.40; Found: C, 75.81; H, 4.37; N, 12.97; Mass spectra, m/z =<br />

660 (100%).<br />

2-(2-{4-[(E)-[(4-hydroxyphenyl)methylidene]amino]phenyl}-<br />

6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />

5-methylphenol (2c): m. p.: 135 0 C, IR(KBr); 775 (1-2<br />

disubtituted benzene ring), 1293 (C-N), 1523 (C=C), 1635<br />

(C=N), 2935 (Ar-CH), 3035 cm -1 (Ar-OH); 1 H-NMR: δ=1.93(m,<br />

6H, Ar-CH); 3.18 (s, 6H, (N-CH3)2); 3.95 (s, 1H, Ar-CH); 4.34<br />

(d, J=8.5 Hz, 2H, Ar-CH); 6.52-7.14 (m, 8H, Ar-CH); 7.25-7.45<br />

(m, 6H, Ar-CH); 7.55-7..71 (m, 6H, Ar-CH); 7.83 (d, J = 8.2 Hz,<br />

2H, Ar-CH); 8.64 (s, 1H, N=CH); 9.54 (s, 1H, Ar-OH); 9.94 (s,<br />

1H, Ar-OH); Analysis Calculated for C41H34N6O2; C, 76.55; H,<br />

5.29; N, 13.07; Found: C, 76.01; H, 5.09; N, 12.75; Mass spectra,<br />

m/z = 660 (100%).<br />

2-(2-{4-[(E)-[(4-methoxyphenyl)methylidene]amino]phenyl}-<br />

6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />

5-methylphenol (2d): m. p.: 175 0 C, IR(KBr); 762 (1-2<br />

disubtituted benzene ring), 1253 (C-N), 1513 (C=C), 1655<br />

(C=N), 2915 (Ar-CH), 3065 cm -1 (Ar-OH); 1 H-NMR: δ=2.33 (m,<br />

6H, Ar-CH); 3.42 (s, 6H, (N-CH3)2); 3.85 (s, 3H, Ar-OCH3);<br />

4.24 (s, 1H, Ar-CH); 4.48 (d, J=8.5 Hz, 2H, Ar-CH); 6.32-6.94<br />

(m, 6H, Ar-CH); 7.05-7.25 (m, 8H, Ar-CH); 7.34-7.41 (m, 6H,<br />

Ar-CH); 7.88 (d, J = 8.3 Hz, 2H, Ar-CH); 8.54 (s, 1H, N=CH);<br />

9.74 (s, 1H, Ar-OH); Analysis Calculated for C42H36N6O2; C,<br />

76.74; H, 5.48; N, 12.79; Found: C, 75.81; H, 5.01; N, 12.44;<br />

Mass spectra, m/z = 674 (100%).<br />

2-(2-{4-[(E)-[(3-nitrophenyl)methylidene]amino]phenyl}-<br />

6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-<br />

5-methylphenol (2e): m. p.: 145 0 C, IR(KBr); 752 (1-2<br />

disubtituted benzene ring), 1273 (C-N), 1583 (C=C), 1613<br />

(C=N), 2914 (Ar-CH), 3054 cm -1 (Ar-OH); 1 H-NMR: δ=2.43(m,<br />

6H, Ar-CH); 3.32 (s, 6H, (N-CH3)2); 3.83 (s, 1H, Ar-CH); 4.24<br />

(d, J=8.3 Hz, 2H, Ar-CH); 6.62-7.04 (m, 6H, Ar-CH); 7.12-7.25<br />

(m, 6H, Ar-CH); 7.41-7..59 (m, 7H, Ar-CH); 7.73 (s, 1H, Ar-<br />

CH); 8.08 (d, J = 8.2 Hz, 2H, Ar-CH); 8.62 (s, 1H, N=CH); 8.84<br />

(s, 1H, Ar-OH); 9.34 (s, 1H, Ar-OH); Analysis Calculated for<br />

C41H37N7O3; C, 73.24; H, 4.91; N, 14.59; Found: C, 72.71; H,<br />

4.31; N, 14.15; Mass spectra, m/z = 689 (100%).<br />

3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />

4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-arylazetidin-2-one (3ae):<br />

A mixture of schiff base (0.002 mols) chloroacetic acid<br />

(0.002 mols) was dissolved in dichloromethane (15 ml.) in<br />

stoppered conical flask, cooled and stirred. The reaction mixture,<br />

triethylamine (TEA, 0.002 mols) was added in it, which is<br />

followed by dropwise addition of POCl3 in dichloromethane<br />

(0.002 mols) with vigorous stirring. The reaction mixture was<br />

then stirred for additional 18 hrs. The completion of the reaction<br />

was monitored by TLC. The reaction mixture was washed with<br />

water and dried over sodium sulphate. The products that were<br />

obtained after removing the solvent were purified from<br />

chloroform.<br />

3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />

4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-phenylazetidin-2-one<br />

(3a). Yield: 61%; m. p.: 185 0 C, IR (KBr):764 (1, 2 disubtituted<br />

benzene ring),1285 (C-N), 1318 (C-N, β-lactam ring), 1573<br />

(C=C), 1738 (C=O, β-lactam), 2920 (Ar-CH), 2999cm -1 (Ar-<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 423<br />

ISSN 2250-3153<br />

OH); 1 H NMR: δ = 2.22 (m, 6H, Ar-CH); 3.09 (s, 6H, (N-<br />

CH3)2); 4.10 (s, 1H, Ar-CH); 4.46 (d, J = 8.3 Hz, 2H, Ar-CH);<br />

5.12 (s, 1H, Ar-CH); 5.38 (s, 1H, CH-Cl); 6.52 (d, J = 8.4 Hz,<br />

2H, Ar-CH); 6.72-6.89 (m, 6H, Ar-CH); 7.02-7.19 (m, 6H, Ar-<br />

CH); 7.26-7.42 (m, 9H, Ar-CH); 9.58 (s, 1H, Ar-OH); Analysed<br />

Calculated For C43H35N6O2Cl : C, 73.38; H, 4.98; N, 11.94;<br />

Found: C, 73.01; H, 4.45; N, 11.24 ; Mass spectra, m/z = 720<br />

(100%).<br />

3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />

4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(2-hydroxyphenyl)<br />

azetidin-2-one (3b). Yield: 55%; m. p.: 212 0 C, IR (KBr):723 (1,<br />

2 disubtituted benzene ring), 1212 (C-N), 1338 (C-N, β-lactam<br />

ring),1554 (C=C), 1718 (C=O, β-lactam), 2851 (Ar-CH), 3013<br />

cm -1 (Ar-OH); 1 HNMR: δ = 2.29 (m, 6H, Ar-CH); 2.92 (s, 6H,<br />

(N-CH3)2); 3.84 (s, 1H, Ar-CH); 4.37 (d, J = 8.3 Hz, 2H, Ar-CH);<br />

5.22 (s, 1H, Ar-CH); 5.48 (s, 1H, CH-Cl); 6.61 (d, J = 8.2 Hz,<br />

2H, Ar-CH); 6.62-6.71 (m, 8H, Ar-CH); 6.98-7.22 (m, 8H, Ar-<br />

CH); 7.49 (m, 4H, Ar-CH); 9.58 (d, J = 8.5 Hz, 2H, Ar-OH);<br />

Analysis Calculated For C43H35N6O3Cl : C, 71.74; H, 4.87; N,<br />

11.68; Found: C, 71.16; H, 4.26; N, 11.08 ; Mass spectra, m/z =<br />

730 (100%).<br />

3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />

4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(4-hydroxyphenyl)<br />

azetidin-2-one (3c). Yield: 67%; m. p.: 175 0 C, IR (KBr):769 (1,<br />

2 disubtituted benzene ring), 1287 (C-N), 1334 (C-N, β-lactam<br />

ring), 1520 (C=C), 1729 (C=O, β-lactam), 2943 (Ar-CH), 3028<br />

cm -1 (Ar-OH); 1 H NMR: δ = 2.03 (m, 6H, Ar-CH); 3.08 (s, 6H,<br />

(N-CH3)2); 4.02 (s, 1H, Ar-CH); 4.18 (d, J = 8.3 Hz, 2H, Ar-CH);<br />

5.11 (s, 1H, Ar-CH); 5.48 (s, 1H, CH-Cl); 6.53 (d, J = 8.5 Hz,<br />

2H, Ar-CH); 6.72 (d, J = 8.4 Hz, 2H, Ar-CH); 6.78-6.88 (m, 6H,<br />

Ar-CH); 7.13 (m, 8H, Ar-CH); 7.31 (m, 4H, Ar-CH); 9.39 (s, 1H,<br />

Ar-OH); 9.68 (s, 1H, Ar-OH); Analysis Calculated For<br />

C43H35N6O3Cl : C, 71.74; H, 4.87; N, 11.68; Found: C, 71.06; H,<br />

4.36; N, 11.38 ; Mass spectra, m/z = 731 (100%).<br />

3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />

4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(4-methoxyphenyl)<br />

azetidin-2-one (3d). Yield: 70%; m. p.: 248 0 C, IR (KBr):758<br />

(1, 2 disubtituted benzene ring), 1248 (C-N), 1362 (C-N, βlactam<br />

ring), 1518 (C=C), 1752 (C=O, β-lactam), 2920 (Ar-CH),<br />

3065 cm -1 (Ar-OH); 1 HNMR: δ = 2.32 (m, 6H, Ar-CH); 3.18 (s,<br />

6H, (NCH3)2); 3.92 (s, 3H, Ar-CH3); 4.28 (s, 1H, Ar-CH); 4.48<br />

(d, J = 8.5 Hz, 2H, Ar-CH); 5.25 (s,1H, Ar-CH); 5.35 (s, 1H,<br />

CH-Cl); 6.35 (d, J = 8.5 Hz, 2H, Ar-CH); 6.75-6.95 (m, 8H, Ar-<br />

CH); 7.10-7.25 (m, 8H, Ar-CH); 7.42 (m, 4H, Ar-CH); 9.18 (s,<br />

1H, Ar-OH); Analysis Calculated For C44H37N6O3Cl : C, 72.01;<br />

H, 5.05; N, 11.46; Found: C, 71.27; H, 4.18; N, 11.07 ; Mass<br />

spectra, m/z = 750 (100%).<br />

3-chloro-1-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-<br />

4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-4-(3-nitrophenyl) azetidin-<br />

2-one (3e). Yield: 72%; m. p.: 228 0 C, IR (KBr):752 (1, 2<br />

disubtituted benzene ring), 1275 (C-N), 1355 (C-N, β-lactam<br />

ring), 1585 (C=C), 1765 (C=O, β-lactam), 2915 (Ar-CH), 3050<br />

cm -1 (Ar-OH); 1 H NMR: δ = 2.12 (m, 6H, Ar-CH); 3.02 (s, 6H,<br />

(N-CH3)2); 3.85 (s, 1H, Ar-CH); 4.25 (d, J = 8.7 Hz, 2H, Ar-CH);<br />

4.89 (s, 1H, Ar-CH); 5.15 (s, 1H, CH-Cl); 6.25 (d, J = 8.3 Hz,<br />

2H, Ar-CH); 6.45-6.85 (m, 6H, Ar-CH); 7.15-7.25 (m, 6H, Ar-<br />

CH); 7.55 (m, 4H, Ar-CH); 7.75 (d, J = 8.3 Hz, 2H, Ar-CH);<br />

8.05 (s, 1H, Ar-CH); 8.25 (s, 1H, Ar-CH); 9.45 (s, 1H, Ar-OH);<br />

Analysed Calculated. For C43H34N7O4Cl: C, 68.96; H, 4.54; N,<br />

13.10; Found: C, 67.99; H, 4.18; N, 12.40; Mass spectra, m/z =<br />

767 (100%).<br />

3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-aryl-1,3-thiazolidin-4one<br />

(4a-e). A Mixture of Schiff base (0.002 mols) and<br />

thioglycolic acid (0.002 mols) was dissolved in ethanol (10 ml)<br />

and the reaction mixture was refluxed for 14-16 hrs. The<br />

completion of the reaction was monitored by TLC. After the<br />

completion of reaction, it was poured in ice cold water and the<br />

solid precipitate was separated out. Collect the solid deposit by<br />

filtration and the crude product was recrystallized from<br />

chloroform.<br />

3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-phenyl-1,3-thiazolidin-4one<br />

(4a). Yield: 60 %; m. p.: 212 0 C, IR (KBr): 620 (C-S-C, 4thiazolidinone),<br />

758 (1, 2 disubtituted benzene ring), 1275 (C-N),<br />

1576 (C=C), 1616 (C=O, thiazolidinone), 2920 (Ar-CH), 3000<br />

cm -1 (Ar-OH); 1 H NMR: δ = 2.25 (m, 6H, Ar-CH); 3.15 (s, 6H,<br />

(N-CH3)2); 3.95-4.05 (d, J = 8.7 Hz, 2H, Ar-CH, thiazolidinone);<br />

4.05 (s, 1H, Ar-CH); 4.42 (d, J = 8.3 Hz, 2H, Ar-CH); 6.45 (s,<br />

1H, Ar-CH, thiazolidinone); 6.58 (d, J = 8.6 Hz, 2H, Ar-CH);<br />

6.75-6.85 (m, 6H, Ar-CH); 7.20-7.40 (m, 6H, Ar-CH); 7.42-7.72<br />

(m, 9H, Ar-CH); 9.65 (s, 1H, Ar-OH); Analysis Calculated For<br />

C43H36N6O2S : C, 73.62; H, 5.14; N, 11.99; S, 4.57; Found: C,<br />

73.01; H, 4.45; N, 11.50 ; S, 4.11; Mass spectra, m/z = 720<br />

(100%).<br />

3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(2-hydroxyphenyl)-1,3thiazolidin-4-one<br />

(4b). Yield: 60 %; m. p.: 263 0 C, IR (KBr):<br />

640 (C-S-C,4-thiazolidinone), 737 (1,2 disubtituted benzene<br />

ring), 1210 (C-N), 1540 (C=C), 1650 (C=O, thiazolidinone),<br />

2850 (Ar-CH), 3020 cm -1 (Ar-OH); 1H NMR: δ = 2.60-2.62 (m,<br />

6H, Ar-CH); 3.20 (s, 6H, (N-CH3)2); 4.10 (s, 2H, Ar-CH,<br />

thiazolidinone); 4.16-4,20 (d, J = 8.5 Hz, 2H, Ar-CH); 4.50 (d, J<br />

= 8.1 Hz, 2H, Ar-CH); 6.50 (s, 1H, Ar-CH, thiazolidinone); 7.00-<br />

7.70 (m, 2H, Ar-CH); 9.80 (s, 1H, Ar-OH); 10.90 (s, 1H, Ar-<br />

OH); Analysed Calculated For C43H36N6O3S : C, 71.98; H, 5.02;<br />

N, 11.72; S, 4.46; Found: C, 71.17; H, 4.56; N, 11.38 ; S, 4.05;<br />

Mass spectra, m/z = 728 (100%).<br />

3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(4-hydroxyphenyl)-1,3thiazolidin-4-one<br />

(4c). Yield: 70 %; m. p.: 242 0 C, IR (KBr):<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 424<br />

ISSN 2250-3153<br />

625 (C-S-C, 4-thiazolidinone),780 (1, 2 disubtituted benzene<br />

ring), 1280 (C-N), 1530 (C=C), 1610 (C=O, thiazolidinone),<br />

2950 (Ar-CH), 3020 cm -1 (Ar-OH); 1 H NMR: δ = 2.20 (m, 6H,<br />

Ar-CH); 2.80 (s, 6H, (N-CH3)2); 3.95 (s, 1H, Ar-CH,<br />

thiazolidinone); 4.15 (s, 1H, Ar-CH); 4.30 (d, J = 8.1 Hz, 2H, Ar-<br />

CH); 6.40 (s, 1H, Ar-CH, thiazolidinone); 6.40-6.50 (m, 5H, Ar-<br />

CH); 6.75-7.05 (m, 6H, Ar-CH); 7.10-7.40 (m, 6H, Ar-CH); 7.60<br />

(m, 4H, Ar-CH); 7.80 (d, J = 8.3 Hz, 2H, Ar-CH); 9.50 (s, 1H,<br />

Ar-OH); 9.70 (s, 1H, Ar-OH); Analysed Calculated For<br />

C43H36N6O3S: C, 71.98; H, 5.02; N, 11.72; S, 4.46; Found: C,<br />

71.27; H, 4.66; N, 11.28 ; S, 4.05; Mass spectra, m/z = 725<br />

(100%).<br />

3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(4-methoxyphenyl)-1,3thiazolidin-4-one<br />

(4d). Yield: 70 %; m. p.: 272 0 C, IR (KBr):<br />

620 (C-S-C, 4-thiazolidinone), 770 (1, 2- disubtituted benzene<br />

ring), 1260 (C-N), 1520 (C=C), 1660 (C=O, thiazolidinone),<br />

2920 (Ar-CH), 3060 cm -1 (Ar-OH); 1 H NMR: δ = 2.32 (m, 6H,<br />

Ar-CH); 3.10 (s, 6H, (N-CH3)2); 3.70 (s, 3H, Ar-OCH3); 4.20 (s,<br />

1H, Ar-CH, thiazolidinone); 4.30 (s, 1H, Ar-CH); 4.40 (d, J = 8.7<br />

Hz, 2H, Ar-CH); 6.40 (s, 1H, Ar-CH, thiazolidinone); 6.60 (d, J<br />

= 8.2 Hz, 2H, Ar-CH); 6.70-6.80 (m, 7H, Ar-CH); 7.20-7.30 (m,<br />

8H, Ar-CH); 7.40-7.50 (m, 4H, Ar-CH); 7.80 (d, J = 8.4 Hz, 2H,<br />

Ar-CH); 9.60 (s, 1H, Ar-OH); Analysed Calculated For<br />

C44H38N6O3S : C, 72.24; H, 5.20; N, 11.49; S, 4.38; Found: C,<br />

71.77; H, 4.43; N, 11.37 ; S, 4.25; Mass spectra, m/z = 750<br />

(100%).<br />

3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-<br />

1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-(3-nitrophenyl)-1,3thiazolidin-4-one<br />

(4e). Yield: 68%; m. p.: 242 0 C, IR (KBr): 660<br />

C<br />

H 3<br />

N OH<br />

N<br />

2 +<br />

NH 2<br />

NH 2<br />

+<br />

HO<br />

CH 3<br />

CHO<br />

EtOH<br />

N<br />

HO<br />

C<br />

H 3<br />

N<br />

CH 3<br />

N<br />

(C-S-C, 4-thiazolidinone), 760 (1, 2- disubtituted benzene ring),<br />

1260 (C-N), 1590 (C=C), 1660 (C=O, thiazolidinone), 2920 (Ar-<br />

CH), 3050cm -1 (Ar-OH); 1 H NMR: δ = 2.40 (m, 6H, Ar-CH);<br />

3.30 (s, 6H, (N-CH3)2); 4.10 (s, 1H, Ar-CH, thiazolidinone);<br />

4.10 (s, 1H, Ar-CH); 4.40 (d, J = 8.3 Hz, 2H, Ar-CH); 6.10 (s,<br />

1H, Ar-CH, thiazolidinone); 6.80 (d, J = 8.5 Hz, 2H, Ar-CH);<br />

6.70-6.90 (m, 5H, Ar-CH); 7.10 (m, 4H, Ar-CH); 7.40-8.00 (m,<br />

8H, Ar-CH); 8.10 (s, 1H, Ar-CH); 8.00 (s, 1H, Ar-CH); 8.20-<br />

8.30 (d, J = 8.1 Hz, 2H, Ar-CH); 9.90 (s, 1H, Ar-OH); Analysed<br />

Calculated For C43H35N7O4S : C, 69.18; H, 4.38; N, 13.14; S,<br />

4.29; Found: C, 68.50; H, 4.38; N, 12.61 ; S, 3.99; Mass spectra,<br />

m/z = 764 (100%).<br />

III. RESULTS<br />

2-[2-(4-aminophenyl)-6,10-dimethyl-4,12-dipheneyl-<br />

2,4,5,11,12-pentaazatricyclo[7.3.0.0 3,7 ]dodeca-1(9),3(7),5,10tetraen-8-yl]-5-methylphenol<br />

(1): was prepared in quantitative<br />

yield. By the reaction of compound 1 with different aldehydes,<br />

we have synthesized 2-(6,10-dimethyl-4,12-diphenyl-2-{4-[(E)-<br />

(arylmethylidene)amino]phenyl}-2,4,5,11,12pentaazitricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-8-yl)-5methylphenol<br />

(2a-e), in good yields by using neat conditions<br />

under microwave irradiation in presence of solvent as well as<br />

solvent free as compared to that of conventional reflux reactions<br />

in ethanol (Figure 1). The comparison of isolated yields and<br />

reaction time of the three conditions employed showed<br />

microwave-assisted reactions as the most efficient synthetic<br />

method in terms of energy and time consumption (Table 1). The<br />

comparison of the isolated yield by different methods has been<br />

depicted graphically as shown in Figure 2.<br />

N<br />

CH 3<br />

N<br />

MW EtOH<br />

EtOH<br />

MW solvent free<br />

N<br />

NH2 (1)<br />

Ar H<br />

Figure – 1<br />

(2a-e)<br />

Synthesis of Schiff bases (2a-e) by MW, MW Solvent free and classical technique.<br />

N<br />

HO<br />

C<br />

H 3<br />

N<br />

CH 3<br />

N<br />

N<br />

CH 3<br />

N<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 425<br />

ISSN 2250-3153<br />

Compds<br />

. Ar<br />

Table – 1: Time and yield comparison between classical and MW Irradiation.<br />

MWI<br />

(Solvent free)<br />

Reaction time (min/sec) Yield (%) a<br />

MWI<br />

(EtOH)<br />

Classical<br />

(EtOH)<br />

MWI<br />

(Solvent free)<br />

MWI<br />

(EtOH)<br />

Classical (EtOH)<br />

2a -C6H5 2 min 2 min 300 min 92 87 77<br />

2b 2-OHC6H4 2 min 2 min 300 min 85 73 65<br />

2c 4-OHC6H4 2 min 2 min 300 min 82 67 62<br />

2d 4-OCH3C6H4 2 min 2 min 300 min 87 77 72<br />

2e 3-NO2C6H4 2 min 2 min 300 min 79 72 64<br />

a Isolated Yield<br />

Figure – 2: Comparison of the yields of compounds (2a-e) using different methods.<br />

Compounds 2 reacts with chloroacetic acid in presence of triethylamine, POCl3 and mercaptoacetic acid to afford 3-chloro-1-{4-[8-(2hydroxy-4-methylphenyl)-6,10-dimethyl-4,12-diphenyl-2,4,5,11,12-pentaazatricyclo[7.3.0.0<br />

3,7 ]dodeca-1(9),3(7),5,10-tetraen-2yl]phenyl}-4-arylazetidin-2-one<br />

and 3-{4-[8-(2-hydroxy-4-methylphenyl)-6,10-dimethyl-4,12-diphenyl-2,4,5,11,12pentaazatricyclo[7.3.0.0<br />

3,7 ] dodeca-1(9),3(7),5,10-tetraen-2-yl]phenyl}-2-aryl-1,3-thiazolidin-4-one respectively (Figure 3).<br />

HO<br />

H3C N<br />

N<br />

Ar<br />

(3a-e)<br />

CH 3<br />

N<br />

N<br />

Cl<br />

O<br />

CH 3<br />

N<br />

N<br />

POCL 3, DCM, TEA<br />

Chloroacetic acid<br />

N<br />

HO<br />

C<br />

H 3<br />

N<br />

CH 3<br />

N<br />

N<br />

Ar H<br />

N<br />

CH 3<br />

N<br />

Thioglycolic Acid<br />

EtOH<br />

HO<br />

H3C Figure – 3: Synthesis of azetidinones (3a-e) and thiazolidinones (4a-e).<br />

N<br />

N<br />

Ar<br />

S<br />

CH 3<br />

N<br />

N<br />

(4a-e)<br />

O<br />

CH 3<br />

N<br />

N<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 426<br />

ISSN 2250-3153<br />

IV. ANTIBACTERIAL ACTIVITY<br />

Antibacterial activities of all the compounds were studied against<br />

nine different bacterial strains [E. coil (mixed), B. subtilis,<br />

Pseudomonas sp., S.aureus, P.vulageris, Salmonella sp. , E. coil<br />

(+ve strain), Rhodococci, B. stearothermopelus] by measuring<br />

the zone of inhibition on agar plates. The compounds possess<br />

Bacterial strain<br />

moderate to good activity against all stains in comparison with<br />

standard drug (Table 2). It can be observed from these results<br />

that compounds 3a-e and 4a-e have shown positive bacterial<br />

activity against different bacterial species, which are also known<br />

as human pathogenic bacteria. It was also observed that within<br />

the synthesized compound extracts, all compounds show good<br />

activity against all bacterial strains<br />

Table – 2: Biological activities of azetidinones and thiazolidinones.<br />

Zone of inhibition in mm along without well diameter (5mm)<br />

Chemical Compounds<br />

3a 3b 3c 3d 3e 4a 4b 4c 4d 4e<br />

E. coil (mixed) 14 13 8 12.8 – 8 15 10 9 10 16<br />

B. subtilis 3 3.5 5 - 4 4 5 3 10 6 6<br />

Pseudomonas sp. 9 5 12 10.2 8 7 8 11 7 3.6 12<br />

S. aureus 4 - 5.5 6.6 4 7.9 9 7.5 6 8.8 9<br />

P. vulageris 11 14 10.6 14.5 16 12.5 6.5 12 15 9 16<br />

Std.<br />

Nystatin<br />

Salmonella sp. 11 15 16.5 18 14 16 11 13 10 16 18.8<br />

E. coil (+ve strain) - 8 7.2 5.3 10 6.5 10 5 - 4 10<br />

Rhodococci 2 - - 3 4.5 4.8 5 3.8 4 2.6 6<br />

B. Stearothermopelus 4 3 5.1 6.4 3.6 6.4 4.8 3 11 5.8 7.2<br />

―-―represent ―not active‖<br />

V. CONCLUSION<br />

Microwave irradiation technique is becoming a popular<br />

method of heating and replaces the classical chemical route,<br />

because of its features like clean, cheap & convenience. Often, it<br />

affords higher yields and results within short reaction times. In<br />

this paper we have reported synthesis of imines 2a-e using<br />

microwave irradiation, which are far superior over existing<br />

procedures. In microwave synthesis the yield of all the products<br />

are more and the reaction time is considerably reduced to 2<br />

minute instead of 5 hours in the classical way. From data of<br />

antimicrobial activity of the compounds of the series, 3a-e and<br />

4a-e show good comparable activity against standard drugs.<br />

ACKNOWLEDGMENT<br />

The authors are thankful to Head, department of chemistry,<br />

Gurukul Kangri University, Haridwar and Head, department of<br />

chemistry, L.R.P.G.College, Sahibabad, Ghaziabad for<br />

encouraging and providing the research facilities.<br />

REFERENCES<br />

[1] S. Caddick – Tetrahedron 51 (1995) 0403.<br />

[2] L. Perrenx & A. Loupy – Tetrahedron 57 (2001) 9199.<br />

[3] S. A. Galema – Chem. Soc. Rev; 26 (1997) 233.<br />

[4] S. K. Srivastava, A. nena & S. D. Srivastava – Ind. J. Chem. 47B (2008)<br />

9225.<br />

[5] P. Ledstrom, J. Tiernly, B. wathey & J. Westman - 57 (2001) 9225.<br />

[6] A. R. Katritzky & S. K. Singh – Arkivoc 13 (2003) 68.<br />

[7] V. M. Patel & K. R. Desai - Arkivoc 1 (2004) 123.<br />

[8] S. K. Sonwane, S. D. Srivastava, S. K. Srivastava Ind. J. Chem. 47B (2008)<br />

633.<br />

[9] P. Kohli, S. K. Srivastava J. Ind. Chem. Soc. 85 (2008) 326.<br />

[10] K. Mistry & K. R. Desai – Ind. J. Chem. 45B (2006) 1762.<br />

[11] A. Kumar & C. S. – Eur. J. Med. Chem. 44(2009) 83.<br />

[12] K. Omar, A. Geronikaki, P. Zoumpoulakis, C. Camoutsis, M. Sokovic, A.<br />

Ciric & J. Glamoclija – Bio. Org. Med-Chem. 18 (1) (2010) 426.<br />

[13] K. V. G. C. Sekhar, V. S. Sekhar, A. S. Reddy, R. Sunandini & V. S. A. K.<br />

Satuluri – Bull. Korean Chem. Soc. 31 (5) (2010) 1219.<br />

[14] A. Verma, S. K. Saraf - Eur. J. Med. Chem. 43 (5) (2008) 897.<br />

[15] E. C. Oka for – Jour. Inorg. Nucl – chem.; 42 (1980) 1155.<br />

[16] Samkunchandy & P. Indrasevan – Polyhedron 9 (1990) 795.<br />

[17] W. S. Hamama, M. A. Smail, S. Shaaban, H. H. Zoorob – J. Het Chem 45<br />

(4) (2008) 939.<br />

[18] H. N. Chopde, R. Pagdala, S. M. Meshram, V. Jetli – Der Pharma Chemica<br />

2 (3) (2010) 294.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 427<br />

ISSN 2250-3153<br />

AUTHORS<br />

First Author – Author name, qualifications, associated institute<br />

(if any) and email address. Ravindra Kumar, M. Phill, Ph. D.<br />

student, Department of Chemistry, Gurukul Kangri University,<br />

Haridwar, India, Email: ravi_tyagi18@rediffmail.com<br />

Second Author –Abha Shukla, M. Sc. (Ph. D.), Department of<br />

Chemistry, K.G.M., Gurukul Kangri University, Haridwar,<br />

India., Email-id : rks.hdr@gmail.com<br />

Third Author –Prof. D. S. Tyagi, Department of Chemistry,<br />

L.R.P.G.College, Sahibabad, Ghaziabad, India.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 428<br />

ISSN 2250-3153<br />

Colposcopy and carcinoma buccal mucosa: finding<br />

significance, a pilot study<br />

Dr.Abhishek Singh Nayyar 1 , Dr.Gayitri H.C. 2 , Dr.Mubeen Khan 3 , Dr.U.D.Bafna 4 , Dr.Siddique Ahmed 5<br />

Post-graduate 1 , Post-graduate student 2 , Professor and Head 3 , Professor and Head 4 , Professor and Head 5<br />

Department of Oral Medicine and Radiology, Government Dental College and Research Institute 1, 2, 3 , Department of Gynecology, Kidwai Memorial<br />

Institute of Oncology 4 , Department of Pathology, Bowring and Lady Curzon Hospitals 5 , Bangalore-560 002, Karnataka, India<br />

Abstract- Introduction and objectives: The diagnosis of<br />

malignant and potentially malignant epithelial lesions of the oral<br />

mucosa cannot be based solely on clinical findings. Therefore,<br />

histologic evaluation of a representative biopsy specimen is<br />

necessary. However, the site for the biopsy is always a subjective<br />

choice that sometimes raises doubts about its representativeness.<br />

Colposcopy, a well-known gynaecological diagnostic procedure,<br />

is helpful in the selection of these sites of epithelial dysplasia<br />

depending upon the vascular pattern. Hence, this study was<br />

planned to assess the role of Colposcopic examination in the<br />

selection of biopsy site for carcinoma buccal mucosa.<br />

Materials and methods: 30 patients between the ages of 30-60<br />

years clinically diagnosed with carcinoma buccal mucosa were<br />

included in the study. For each of the subject, a thorough clinical<br />

examination followed by Colpospopic assessment was carried<br />

out and the most representative site was selected for biopsy from<br />

the involved buccal mucosa. The biopsy specimens measuring 6<br />

mm were taken using a punch biopsy and subjected to<br />

histopathological examination. The histopathological findings<br />

were then compared in the two cases.<br />

Results: The sensitivity and specificity of biopsy done on the<br />

basis of clinical criteria was found to be more than as compared<br />

to the ones directed through colposcopic examination.<br />

Conclusion: From the study, it was concluded that clinical<br />

criterion was found to be more appropriate for the selection of<br />

biopsy specimens in cases of carcinoma buccal mucosa.<br />

Keywords- Colposcopy, potentially malignant epithelial lesions,<br />

histopathological, epithelial dysplasia, vascular pattern.<br />

O<br />

I. INTRODUCTION<br />

ral squamous cell carcinoma (OSCC) is the most common<br />

cancer in the oral cavity. It accounts for more than 90% of<br />

all oral cancers. 1 Each year, globally, there are 222,000 new<br />

cases of oral cancer diagnosed in men (5% of all cancer) and<br />

90,000 new cases diagnosed in women (2% of all cancer). 2<br />

The incidence of premalignant lesions and oral cancers is<br />

steadily increasing globally. In spite of advancement in the early<br />

detection, there is seen increased mortality and morbidity related<br />

to oral cancers. 3 In India, the incidence of leukoplakia and<br />

carcinoma buccal mucosa is 46% as reported by Paymaster JC<br />

(1962). 4 Carcinoma of buccal mucosa, in particular, deserves<br />

special mention with increased incidence because of numerous<br />

premalignant lesions and conditions seen predominantly in this<br />

part of oral mucosa, the most common being leukoplakia and<br />

pouch keratosis, attributed commonly to the quid habit in Indian<br />

population.<br />

Clinical diagnosis of squamous cell carcinomas of the oral<br />

mucosa is not difficult when the lesion is obviously invasive or,<br />

when the patient experiences pain, functional limitation, or,<br />

regional lymphadenopathy. Conversely, it is more difficult to<br />

diagnose dysplasia and carcinomas mainly in potentially<br />

malignant epithelial lesions (PMELs). With the aim of improving<br />

the efficiency of these diagnoses, techniques are being developed<br />

to complement clinical examination and to facilitate the<br />

identification of early dysplastic changes and initial carcinomas. 5<br />

Though, biopsy with histopathological examination is still<br />

considered the gold standard in the diagnosis of oral cancer and<br />

precancerous lesions and conditions, the selection of the site for<br />

biopsy is the most important criteria to arrive at a correct<br />

diagnosis. But, as biopsy site is a subjective choice, it is possible<br />

that biopsy specimens are taken from unrepresentative sites of<br />

the lesion or, before the morphologic changes could be detected<br />

in it.<br />

At present, though there are simple chairside methods<br />

including staining with toluidine blue and exfoliative cytology to<br />

aid the diagnosis of such changes, there is a high risk of false<br />

positives which can be as high as 30%. 6 Therefore, a technique<br />

for non-invasively detecting dysplastic changes or, helping the<br />

clinician choose the appropriate site for biopsy can save patients<br />

from multiple biopsies and allow a broader range of diagnoses<br />

which can aid early detection of oral cancers. 7<br />

Colposcopy (direct intra-oral microscopy) offers advantages in<br />

selecting the more representative sites for biopsy than routine<br />

clinical examination alone and is a simple, painless, chair side<br />

diagnostic method. 8 Colposcopic criteria included vascular<br />

pattern, inter-capillary distance, surface pattern, color tone, and<br />

opacity, as well as clarity of demarcation of the mucosal lesions. 8<br />

The accuracy of colposcopic examination for the detection of<br />

mucosal changes approximates between 70% and 98%. 9-11<br />

Various authors have tried to adapt gynecologic methods of<br />

examination to the oral cavity as there is similarity between the<br />

two types of mucosa. 12 Colposcopy is one such method used to<br />

observe the mucosa of cervix for premalignant and malignant<br />

changes. So far, a few studies have highlighted the value of<br />

Colposcopy (direct intra-oral microscopy) in the diagnosis of oral<br />

mucosal lesions. Hence, the study has been planned to assess the<br />

role of Colposcopic examination in the selection of biopsy site to<br />

aid early diagnosis of epithelial dysplasia in cases of carcinoma<br />

buccal mucosa.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 429<br />

ISSN 2250-3153<br />

II. OBJECTIVES<br />

1. To assess the feasibility of using Colposcopic examination for<br />

carcinoma buccal mucosa;<br />

2. To compare the Colposcopic examination findings with<br />

clinical criteria for selection of biopsy site in carcinoma buccal<br />

mucosa;<br />

3. To correlate the histopathological findings with Colposcopic<br />

findings and clinical criteria; and<br />

4. To assess the sensitivity and specificity of Colposcopic<br />

examination in selecting the biopsy site in carcinoma buccal<br />

mucosa.<br />

III. MATERIALS AND METHODS<br />

A. Source of data<br />

The study was conducted in the Department of Oral Medicine<br />

and Radiology, Government Dental College and Research<br />

Institute, Bangalore and Kidwai Memorial Institute of Oncology,<br />

Bangalore, for a period of 1 year from May 2010 to May 2011.<br />

The study group consisted of 30 cases of clinically diagnosed<br />

cases of carcinoma buccal mucosa between the age group of 30-<br />

60 years and control group consisting of 25 healthy individuals<br />

with matched age.<br />

B. Method of Collection of Data<br />

Patients were selected according to the defined inclusion and<br />

exclusion criteria. Before selecting the patients for study, details<br />

of the study were explained to the patients and written informed<br />

consent was obtained for inclusion in the study. The ethical<br />

clearance for the study was obtained from the ethical committee<br />

of Government Dental College and Research Institute, Bangalore<br />

and Kidwai Memorial Institute of Oncology, Bangalore.<br />

C. Selection criteria<br />

i. Inclusion Criteria:<br />

1. Clinically diagnosed cases of carcinoma buccal mucosa; and<br />

ii. Exclusion Criteria:<br />

1. Patients with carcinoma buccal mucosa with secondary<br />

infection;<br />

2. Patients with carcinoma buccal mucosa having other systemic<br />

diseases; and<br />

3. Patients undergoing treatment for carcinoma buccal mucosa.<br />

D. Methodology<br />

A total of 30 carcinoma buccal mucosa cases were selected for<br />

the study based on inclusion and exclusion criteria. The<br />

significance of the number of samples was analyzed statistically<br />

before their inclusion into the study. For each of the subjects, a<br />

detailed case history and thorough clinical examination was<br />

carried out and under good illumination, intra-oral examination<br />

of the lesion was performed. Inspectory and palpatory findings<br />

were recorded in a prepared proforma. Following clinical<br />

examination of the lesion, the most representative site of the<br />

lesion was selected for biopsy based on set clinical criteria for<br />

dysplastic changes in leukoplakia and carcinoma buccal mucosa.<br />

Clinical criteria for selection of biopsy site for carcinoma buccal<br />

mucosa included erythema, induration and ulceration. The<br />

outline of the lesion was marked with a black color pen and the<br />

biopsy site with a red color pen with the help of a grid placed on<br />

the buccal mucosa. All the cases were then subjected to the<br />

Colposcopic examination. Before taking up the patients for<br />

Colposcopic evaluation, the normal Colposcopic findings were<br />

standardized based on the Colposcopic criteria. Colposcopic<br />

assessment was done and the most representative site for biopsy<br />

was selected from the involved buccal mucosa depending upon<br />

the Colposcopic criteria as mentioned by the author Göran W.<br />

Gynther. 13<br />

All patients were subjected to routine blood investigations<br />

(Hb, BT, CT, RBS, TLC, DLC and ESR) before the routine<br />

biopsy for histopathological examination and punch biopsy after<br />

Colposcopic evaluation with 6mm diameter under local<br />

anesthesia were performed. Biopsy specimen was immediately<br />

immersed in 10% neutral buffered formaldehyde solution and<br />

was coded. Later it was embedded in paraffin by routine methods<br />

and subjected to histopathological examination.<br />

E. Colposcopic Examination<br />

Following clinical examination, mucosa was wiped with saline.<br />

After the mucosa was wiped with saline, abnormal epithelium<br />

appeared much darker than the normal epithelium. (Fig. 1)<br />

Using the blue (or, green) filter and higher-power magnification<br />

(Fig. 2), abnormal vascular patterns were evaluated.<br />

Then 5% acetic acid was applied to the lesion for about 60<br />

seconds. The grid was placed again on the buccal mucosa. Area<br />

that estimated to have the most extensive cell changes based on<br />

Colposcopic criteria was selected for biopsy and the area of the<br />

biopsy site was marked on the grid with a green pen (Fig. 3).<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 430<br />

ISSN 2250-3153<br />

Colposcopic criteria included vascular pattern, inter-capillary<br />

distance, surface pattern, color tone, and opacity, as well as<br />

clarity of demarcation of the mucosal lesions. In the normal<br />

mucosa of the uterine cervix, two basic types of capillary<br />

networks can be seen with direct microscopy (ie, Colposcopy):<br />

hairpin capillaries (Fig. 4a)<br />

and network capillaries (Fig. 4b).<br />

In areas of dysplasia and carcinoma-in-situ of the uterine cervix,<br />

a specific vascular pattern, punctation (previously called ground),<br />

is seen commonly. Punctation (Fig. 4c) is characterized by<br />

dilated, often twisted, irregular, hairpin-type vessels.<br />

Another pattern of the vessels in dysplasia is called mosaic (Fig.<br />

4d). If the vessels do not reach the epithelial surface but extend<br />

only partially into the epithelium, they appear as red lines as<br />

surrounding blocks of epithelium. The Colposcopic image<br />

resembles tiles of a floor. After application of acetic acid, this<br />

pattern is accentuated because of acetowhiteness of the atypical<br />

epithelium, forming a honey comb pattern. True mosaic vessels<br />

are usually seen in sharply demarcated areas.<br />

When it is difficult to describe the pattern of the vessels, the term<br />

atypical vessels (Fig. 4e) is used.<br />

Capillary, punctation, mosaic, or atypical patterns are<br />

encountered in malignant lesions. Therefore, if one of them is<br />

present, this is an indication for biopsy and histopathological<br />

examination.<br />

When the area selected for biopsy by clinical criteria and<br />

Colposcopy was superimposed (red and green area), then only<br />

one common biopsy sample was obtained. When two different<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 431<br />

ISSN 2250-3153<br />

areas were selected from the same lesion, two different areas<br />

which were marked with red and green pen (Fig. 3) were<br />

biopsied and subjected to histopathological examination. Biopsy<br />

specimens were taken with 6 mm punch, biopsy wounds were<br />

sutured (Fig. 5) and histo-pathological examination of the same<br />

was performed.<br />

F. Histopathological procedure<br />

All the biopsied tissue specimens were sent for histo-pathological<br />

evaluation. The biopsied tissue was immediately transferred to<br />

the bottle containing 10% buffered formalin solution.<br />

Heamotoxylin and Eosin staining was done for the microscopic<br />

examination of the sections.<br />

Comparison of the histo-pathlogical diagnosis obtained with<br />

routine clinical examination and direct intra-oral microscopy was<br />

performed, and the data was subjected to statistical analysis.<br />

G. Grid preparation:<br />

<strong>Print</strong>ed graph on OHP sheet was used as a grid in marking the<br />

biopsy site. Each lesion was measured and the grid was prepared<br />

to the approximate size of the lesion. The entire lesion was<br />

divided into 6 x 6 mm squares on a transparent grid. The outline<br />

of the lesion was marked with black color pen, the red color pen<br />

was used to mark the area of the biopsy site with clinical criteria<br />

and green color pen was used to mark the area of the biopsy site<br />

performed with Colposcopic criteria.<br />

Age<br />

IV. RESULTS<br />

The study group consisted of 30 cases of clinically diagnosed<br />

carcinoma buccal mucosa and a control group consisting of 25<br />

healthy individuals.<br />

Age and gender distribution: The age and gender<br />

distribution of the cases and controls has been illustrated<br />

in the figures. (Table 1)<br />

Commoner clinical presentation observed in cases: Out<br />

of the 30 patients, induration in was observed 18 while<br />

ulceration was observed in 12 patients.<br />

Vascular pattern observed in cases: Out of the 30<br />

patients, punctation vessel pattern was observed in 10<br />

(33%) cases, mosaic pattern in 4 (13%) cases, atypical<br />

vessel pattern in 4 (13%) cases while in 12 (40%) cases,<br />

vascular pattern was not appreciated because of<br />

secondary infection and/or, ulceration. In the control<br />

group, out of the 25 controls, network capillary pattern<br />

was observed in 12 (48%) cases and hair-pin pattern in<br />

9 (36%) cases while in 4 (16%) cases, vascular pattern<br />

could not well be appreciated.<br />

Histopathological findings observed in the biopsy specimen<br />

obtained from clinical presentation: Out of 30 cases,<br />

histopathological report of 19 (66.3%) cases were showing welldifferentiated<br />

squamous cell carcinoma, 7 (23.3%) cases,<br />

moderately differentiated squamous cell carcinoma, 2 (6.7%)<br />

cases, carcinoma-in-situ while 2 (6.7%) cases presented with<br />

severe dysplasia.<br />

Histopathologic findings in Colposcopically directed biopsy<br />

specimens: Out of 30 cases, histopathological report of 15 (50%)<br />

cases revealed well-differentiated squamous cell carcinoma, 9<br />

(30%) cases, moderately differentiated squamous cell carcinoma,<br />

3 (10%) cases, poorly differentiated squamous cell carcinoma<br />

while 3 (10%) cases were showing carcinoma-in-situ.<br />

Sensitivity and specificity for biopsy samples taken from<br />

clinical presentation in cases: A sensitivity of 0.6842 (68%) and<br />

a specificity of 0.5455 (57%) was obtained for biopsy samples<br />

taken from clinical presentation in the patients. (Table 2)<br />

Sensitivity and specificity of Colposcopically directed biopsy<br />

specimens in cases: Sensitivity for Colposcopically directed<br />

biopsy specimens in patients came out to be 0.7826 (78%) with a<br />

specificity of 0.5714 (57%). (Table 2)<br />

Table 1: Age distribution and Gender distribution in the study sample<br />

Age in years<br />

Carcinoma<br />

buccal mucosa<br />

patients<br />

Controls<br />

No % No %<br />

31-40 2 6.7 3 12.0<br />

41-50 5 16.7 12 48.0<br />

51-60 23 76.7 10 40.0<br />

Total 30 100.0 25 100.0<br />

Mean ± SD 54.07±6.55 49.72±7.17<br />

Samples are<br />

age matched<br />

between cases<br />

and controls<br />

with P=0.397<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 432<br />

ISSN 2250-3153<br />

Gender<br />

Male 10 33.3 15 60.0 Samples are<br />

gender<br />

matched<br />

Female 20 66.7 10 40.0 between cases<br />

and controls<br />

with P=0.191<br />

Total 30 100.0 25 100.0<br />

Table 2: Sensitivity and Specificity for biopsy specimens taken from Clinical examination and directed by Colposcopic examination in<br />

Carcinoma buccal mucosa patients<br />

Clinical<br />

examination<br />

Colposcopy<br />

Histopathology<br />

Positive Negative Total<br />

Positive 18 3 21<br />

Negative 5 4 9<br />

Total 23 7 30<br />

Positive 13 5 18<br />

Negative<br />

6 6 12<br />

Total 19 11 30<br />

V. DISCUSSION<br />

Oral squamous cell carcinoma is a well-known malignancy<br />

which accounts for more than 90% of all oral cancers. The<br />

overall 5-year survival rate of oral squamous cell carcinoma has<br />

not significantly increased in the last few years despite<br />

tremendous advancements made in the plethora of diagnostic and<br />

treatment modalities in the last 2-3 decades. Hence, the most<br />

important task is to establish an early diagnosis at the first stages<br />

of the disease. 14<br />

The present study aimed at assessing the vascular patterns by<br />

Colposcopic findings and selecting the biopsy site in clinically<br />

diagnosed cases of carcinoma buccal mucosa and compares the<br />

two methods, clinical criteria and Colposcopic examination for<br />

selecting the biopsy site.<br />

In our study, maximum patients were seen in the age group of<br />

51 to 60 years and there was seen a female predominance in this<br />

group. This suggested the habit of quid to be more common in<br />

females and smoking more common in males. The findings of<br />

our study were consistent with the age and gender of the oral<br />

cancer patients reported by other studies by Silverman 15 ,<br />

Neville 16 and Swango 17 .<br />

Sensitivity Specificity PPV NPV<br />

0.7826<br />

(78%)<br />

0.6842<br />

(68%)<br />

0.5714<br />

(57%)<br />

0.5455<br />

(54%)<br />

0.8571 0.4444<br />

0.7222<br />

0.5000<br />

In our study, 18 patients of oral carcinoma presented indurated<br />

lesions while ulceration was noted in 12 out of 30 patients. These<br />

findings suggested that the patients reported to the clinicians only<br />

when they developed symptoms of pain invariably associated<br />

with ulceration in confirmation with the various other studies.<br />

Jose Bagan 18 reported in his study that the clinical presentation of<br />

these early malignant lesions was usually seen in the form of<br />

well demarcated, indurated erytholeukoplastic lesions, often<br />

associated with pain and ulceration.<br />

A sensitivity of 0.7826 (78%) and specificity of 0.5714 (57%)<br />

of the biopsy specimens taken with the help of clinical criteria<br />

for carcinoma buccal mucosa were in accordance with the studies<br />

reported by Lingen MW, Kalmar JR, Karrison TC, Speight PM 19<br />

who reported similar findings in their study. Lingen, in his study,<br />

suggested the conventional oral examination (COE) using normal<br />

(incandescent) light as one of the standard method for oral cancer<br />

screening. A study by Fedele S 20 with 9 years randomized<br />

controlled trial also revealed that screening via visual<br />

examination of the oral mucosa under white light is effective in<br />

reducing mortality in individuals exposed to risk factors.<br />

Simple visual examination, however, is well known to be<br />

limited by subjective interpretation and by the potential, albeit<br />

rare, occurrence of dysplasia and early oral squamous cell<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 433<br />

ISSN 2250-3153<br />

carcinoma within areas of normal looking oral mucosa. As a<br />

consequence, adjunctive techniques have been suggested to<br />

increase the ability to differentiate between benign changes of<br />

the mucosa from dysplastic/malignant changes as well as to<br />

identify areas of dysplasia/early oral squamous cell carcinoma<br />

that are not visible to the naked eye.<br />

Ellen H Hopman 21 , in his study stated colposcopy as an effective<br />

tool for diagnosing cervical intra-epithelial neoplasia. It was<br />

suggested that micro-invasive carcinoma was suspected when<br />

mosaic, punctation and acetowhite epithelium was seen with a<br />

thick white epithelium that had a clear and elevated margin with<br />

an irregular surface contour and raised capillaries.<br />

Devi Charan Shetty, 22 in his study, stated that the<br />

histopathological assessment of a biopsy specimen is regarded as<br />

the most reliable criterion for a correct diagnosis in cases of<br />

epithelial dysplasia; consequently the specimen must be taken<br />

from the most representative area of a suspicious looking lesion<br />

for increasing the diagnostic accuracy.<br />

In our study, we used the criteria for vascular changes<br />

described in Colposcopic literature for the selection of biopsy<br />

site. 21, 23, 24 These included the vascular pattern, inter-capillary<br />

distance, surface pattern, color tone and opacity as well as the<br />

clarity of demarcation of the mucosal lesions. The results of our<br />

Colposcopic examination regarding the selection of biopsy sites<br />

for carcinoma buccal mucosa reported a sensitivity of 0.6842<br />

(68%) with a specificity of about 0.5455 (54%). The results of<br />

our study were similar to the previously reported studies<br />

including the one conducted by Goran W. Gynther 13 for<br />

assessing the value of Colposcopy in diagnosing the mucosal<br />

lesions and the one reported by Devi Charan Shetty 22 who<br />

correlated the relevance of tumor angiogenesis pattern with the<br />

histopathological results in oral epithelial dysplasia.<br />

The results of Colposcopic findings are actually based on<br />

vascular and tissue changes. The capillary changes preceding<br />

tumor growth with the pattern of tumor angiogenesis are<br />

different from the usual neo-vascularization taking place during<br />

repair and regeneration processes. At a cellular level, various<br />

molecules such as vascular endothelial growth factor, basic<br />

fibroblast growth factor, and transforming growth factor alpha<br />

are implicated. Direct optical visualization of these patterns<br />

would be helpful in the early determination of the underlying<br />

pathology and also aid in marking out the site of biopsy. 25<br />

In the present study, we found that the biopsy specimens<br />

selected with Colposcopic criteria appeared to be more<br />

representative of the histopathological findings at least in certain<br />

cases than those selected with routine clinical examination<br />

(COE). The altered vascular patterns, in the initial stages of<br />

lesion progression, definitely helped with the correct selection of<br />

the biopsy site, which in turn helped us reach a more definitive<br />

diagnosis, thus avoiding false-negative results. The study<br />

however concludes with the conventional oral examination<br />

having a superior edge in carcinoma buccal mucosa patients<br />

against colposcopy criteria. (Table 2) This could be explained by<br />

the fact that keratinization and thickness is more in carcinoma<br />

buccal mucosa cases compared to leukoplakia cases, hence,<br />

vascular patterns could not be visualized. However further<br />

studies are required to conclude the results.<br />

VI. CONCLUSION<br />

This is a preliminary study that emphasized the selection of<br />

biopsy site using Colposcopic examination as a method to select<br />

the most representative sites of epithelial dysplasia in frank<br />

malignant and potentially malignant epithelial lesions (PMELs).<br />

VII. CONTRIBUTIONS FROM THE AUTHORS<br />

Literature search, manuscript preparation, manuscript editing<br />

and manuscript review.<br />

VIII. ETHICAL DECLARATION<br />

The study has been approved by the ethical committee<br />

appointed by the Government Dental College and Research<br />

Institute, Bangalore and Bangalore Medical College and<br />

Research Institute, Bangalore and has therefore been performed<br />

in accordance with the ethical standards laid down in the 1975<br />

declaration of Helsinki and its later amendments in 2000 after a<br />

written informed consent from the patients for their inclusion in<br />

the study. Details that might disclose the identity of the patient<br />

have been omitted.<br />

IX. COMPETING INTERESTS AND OTHER DECLARATIONS<br />

None<br />

ACKNOWLEDGEMENT<br />

We thank all the people who directly and indirectly<br />

contributed for the study as the study required intense efforts<br />

from the people outside our Department including Department of<br />

Oral Pathology, and Department of Gynecology and Department<br />

of General Pathology, Bangalore Medical College and Research<br />

Institute and Associated Hospitals.<br />

LEGENDS FOR FIGURES<br />

Figure.1: Carcinoma buccal mucosa (nodular variety) on left<br />

buccal mucosa before biopsy<br />

Figure.2: Patient positioning for Colposcopic examination<br />

Figure.3: Placement of grid for selection of biopsy site (green<br />

color for colposcopy and red color for clinical criteria)<br />

Figure.4a-e: Vascular patterns seen in colposcopy:<br />

Figure.4a: Hair pin capillary pattern in normal buccal mucosa<br />

Figure.4b: Network capillary pattern in normal buccal mucosa<br />

Figure.4c: Punctation vessel pattern in carcinoma buccal mucosa<br />

Figure.4d: Mosaic pattern in carcinoma buccal mucosa<br />

Figure.4e: Atypical vessel pattern in carcinoma buccal mucosa<br />

Figure.5: Sutured biopsy wounds in relation to carcinoma buccal<br />

mucosa after biopsy at two different sites<br />

REFERENCES<br />

[1] Silverman S Jr. Oral cancer. 5th ed. Hamilton, Canada: BC Decker, 2003.<br />

[2] Parkin DM, Pisani P, Ferlay J. Estimates of the worldwide incidence of 25<br />

major cancers in 1990s. Int J Cancer 1999;80:827-41.<br />

[3] Kujan O, Glenny AN, Duxbury J, Thakker N, Sloan P. Evaluation of<br />

screening strategies for improving oral cancer mortality. A Cochrane<br />

systemic review. J Dent Edu 2005;69(2):255-64.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 434<br />

ISSN 2250-3153<br />

[4] Paymaster JC. Some observations in oral and pharyngeal carcinomas in the<br />

state of Bombay. Cancer 1962;15:578-83.<br />

[5] Onofre A Mirian, Sposto R Maria, Navarro M Claudia. Reliability of<br />

toluidine blue application in the detection of oral epithelial dysplasia and insitu<br />

and invasive squamous cell carcinomas. Oral Surg Oral Med Oral<br />

Pathol Oral Radiol Endod 2001;91:535-40.<br />

[6] Silverman S Jr, Dillon WP. Diagnosis oral cancer. 3rd Ed, New York, Am<br />

cancer soc.1990;p.41-60.<br />

[7] Wang CY, Chiang HK, Chen CT, Chiang CP, Kuo YS, Chow SN.<br />

Diagnosis of oral cancer by light-induced autofluorescence spectroscopy<br />

using double excitation wavelengths. Oral Oncology 1999;35:144-50.<br />

[8] Kolstad P. Terminology and definitions. In: Kolstad P, editor. Atlas of<br />

colposcopy. 3rd ed. London: Churchill Livingstone. 1982;p 21-31.<br />

[9] Kirkup W, Singer A, Hill SA. The accuracy of colposcopically directed<br />

biopsy in patients with suspected intra-epithelial neoplasia of the cervix. Br<br />

J Obstet Gynecol 1980;87:1-4.<br />

[10] Helmerhorst TJM, Dijkhuizen GH, Calame JJ, Kwikkel HJ, Stolk JG. The<br />

accuracy of colposcopically directed biopsy in diagnosis of CIN. Eur J<br />

Obstet Gynecol Reprod Biol 1987;24:221-9.<br />

[11] Cinel A, Oselladore M, Insacco E, Minucci D. The accuracy of<br />

colposcopically directed biopsy in the diagnosis of cervical intra-epithelial<br />

neoplasia. Eur J Gynaec Oncol 1990;6:433-7.<br />

[12] Estrange PL, Bevenius J, Williams L, Brisbane, Australia, Huddinge. Intraoral<br />

application of microcolpohysteroscopy: A new technique for clinical<br />

examination of oral tissues at high magnification. Oral Surg Oral Med Oral<br />

Pathol 1989;67:282-5.<br />

[13] Gynther GW, Rozell B, Heimdahl A. Direct oral microscopy and its value<br />

in diagnosing mucosal lesion. Oral Surg Oral Med Oral Pathol Oral Radiol<br />

Endod 2000;90:164-70.<br />

[14] Smith RA, Cokkinides V, Von Eschenbach AC. American Cancer Society<br />

guidelines for the early detection of cancer. CA Cancer J Clin 2002;52:8-22.<br />

[15] Sol Silverman. Demographics and occurrence of oral and pharyngeal<br />

cancers: The Outcomes, the Trends and the Challenge. J Am Dent Assoc<br />

2001;132:7S-11S.<br />

[16] Brad W Neville, Terry A Day. Oral Cancer and Precancerous Lesions. CA<br />

Cancer J Clin 2002;52:195-215.<br />

[17] Swango PA. Cancers of the oral cavity and pharynx in the United States: an<br />

epidemiologic overview. J Public Health Dent 1996;56:309-18.<br />

[18] Bagan J, Sarrion G, Jimenez Y. Oral cancer: clinical features. Oral Oncol<br />

2010;46(6):414-7.<br />

[19] Lingen MW, Kalmar JR, Karrison TC, Speight PM. Critical evaluation of<br />

diagnostic aids for the detection of oral cancer. Oral oncology 2007;44:10–<br />

22.<br />

[20] Fedele S. Diagnostic aids in the screening of oral cancer Head Neck Oncol.<br />

2009;1:5-15.<br />

[21] Hopman EH, Helmerhorst TJM. Colposcopic findings and nomenclature.<br />

CME Journal of Gynaecologic Oncology 2005;10:11-3.<br />

[22] Shetty DC, Ahuja P, Rathore AS, Ahuja US, Kumar K, Ahuja A et al.<br />

Relevance of tumor angiogenesis patterns as a diagnostic value and<br />

prognostic indicator in oral pre-cancer and cancer. Vascular Health and<br />

Risk Management 2011;7:41-7.<br />

[23] Dresang LT. Colposcopy: An Evidence-Based Update. J Am Board Fam<br />

Med 2005;18(5):383-92.<br />

[24] Walker P, De Palo G, Campion M, Jakob C, Roy M. International<br />

terminology of Colposcopy: An updated report from the International<br />

Federation for Cervical Pathology and colposcopy. Obstet Gynecol<br />

2003;101(1):175-7.<br />

[25] Miriam P Rosin, Catherine F Poh, Martial Guillard, P Michele Williams,<br />

Lewei Zhang, Calum Macaulay. Visualization and Other Emerging<br />

Technologies as Change Makers for Oral Cancer Prevention. Ann NY Acad<br />

Sci 2007;1098:167–83.<br />

AUTHORS<br />

First Author - Dr.Abhishek Singh Nayyar, Post-graduate,<br />

Department of Oral Medicine and Radiology, Government<br />

Dental College and Research Institute, , Bangalore-560 002,<br />

Karnataka, India<br />

Email id - singhabhishek.rims@gmail.com<br />

Second Author - Dr.Gayitri H.C, Post-graduate student,<br />

Department of Oral Medicine and Radiology, Government<br />

Dental College and Research Institute, Bangalore-560 002,<br />

Karnataka, India<br />

Third Author - Dr.Mubeen Khan, Professor and Head,<br />

Department of Oral Medicine and Radiology, Government<br />

Dental College and Research Institute, Bangalore-560 002,<br />

Karnataka, India<br />

Fourth Author - Dr.U.D.Bafna, Professor and Head,<br />

Department of Gynecology, Kidwai Memorial Institute of<br />

Oncology, Bangalore-560 002, Karnataka, India<br />

Fifth Author - Dr.Siddique Ahmed, Professor and Head,<br />

Department of Pathology, Bowring and Lady Curzon Hospitals,<br />

Bangalore-560 002, Karnataka, India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 435<br />

ISSN 2250-3153<br />

On a class of g**-closed sets in topological spaces and<br />

some mappings<br />

Dr. D.Saravanakumar, K.M.Sathishkumar<br />

Department of Mathematics, K.L.N. College of Information Technology, Sivagangai<br />

Abstract- In this paper, we introduced the concepts of<br />

g ** -closed sets as well as g ** -open sets and studied some of<br />

their basic properties. Further we defined g ** -continuous<br />

mappings and investigated their basic properties. In addition we<br />

obtained g ** -irresolute mappings and some of their properties<br />

are derived.<br />

AMS (2000) subject classifications: 54A05, 54A10, and 54D10.<br />

Keywords: g ** -closed, g ** -open, g ** -continuous,<br />

g ** -irresolute.<br />

T<br />

I. INTRODUCTION<br />

he concept of generalized closed (g-closed) sets in a<br />

topological space was introduced by Levine [8] and concept<br />

of T1/2 spaces was initiated by Dunham [5] further investigated<br />

the properties of T1/2 spaces and defined a new closure operator<br />

cl * by using generalized closed sets. We begin with some basic<br />

concepts. A subset A of a topological space (X, ) is called<br />

-open[12] (resp. semi open[9]) if A int(cl(int(A)))<br />

(resp. A cl(int(A))). Also A is said to be -closed (resp. semi<br />

closed) if X – A is -open (resp. semi open). The collection of all<br />

-open (resp. semi open) subsets in (X, ) is denoted by (resp.<br />

SO(X)). The -closure (resp. semi closure) of a subset A is<br />

smallest -closed (resp. semi closed) set containing A and this is<br />

denoted by cl(A) (resp. scl(A)) in the present paper. We recall<br />

definitions of some generalized closed sets. A subset A is called<br />

g-closed[10] (resp. g-closed [10], g # -closed[13]) if cl(A) <br />

U whenever A U and U is an -open (resp. open, g-open) set<br />

in (X, ). Moreover G. Sai Sundara Krishnan et.al [16]<br />

introduced the concept of g ** -open sets and defined a subset A<br />

of X is said to be g ** - open if and only if there exist an open set<br />

U of X such that U A cl ** (U). Also its complement is called<br />

g ** -closed. A topological space (X, ) is said to be a g ** -T½ space<br />

if every g ** -closed set is closed. J.Chitra and D.Saravanakumar<br />

[2] introduced the concept of sg ** -closed sets and defined a<br />

subset A of X is said to be sg ** - closed if scl(A) U whenever<br />

A U and U is a g ** -open set in (X, ).<br />

In this paper we introduced the concept of<br />

g ** -closed sets, which is analogous to -generalized closed sets<br />

and introduced the notion G ** C(X) which is the set of all<br />

g ** -closed sets in a topological space. In addition, we defined<br />

the concept of g ** -open sets and studied of its some basic<br />

properties. Finally we introduced the concept of<br />

g ** -continuous and g ** -irresolute maps in a topological space<br />

and investigated relationship between them. Throughout this<br />

paper we denoted cl * by cl ** and we represented the topological<br />

spaces (X, τ), (Y, ) and (Z, ) as X, Y and Z respectively.<br />

Unless otherwise no separation axiom mentioned.<br />

II. g ** -CLOSED SET<br />

In this section we introduce a new class of closed set called<br />

g ** -closed set and study further some of their properties.<br />

Definition 2.1. Let A be subset of a topological space X. It is<br />

called g ** -closed set if cl(A) ⊆ U whenever A ⊆ U and U is<br />

g ** -open. The set of all g ** -closed sets denoted by G ** C(X). A<br />

subset A of X is called g ** -open if X – A is g ** -closed in X.<br />

Example 2.1. If X = {a, b, c, d}, X, {c, d}}, then<br />

g ** -closed sets of X are X, {a}, {b}, {a, b}, {a, c}, {a, d},<br />

{b, c}, {b, d}, {a, b, c}, {a, b, d}, {a, c, d}, {b, c, d}}.<br />

Remark 2.1. The concepts of -open and g ** -open are<br />

independent.<br />

Let X = {a, b, c} and = {X, {a}, {b}, {a, b}}. Then {a, c}<br />

and {b, c} are g ** -open sets but not -open.<br />

Let X = {a, b, c} and = {X, {a}}. Then {a, b} and {a, c} are<br />

-open sets but not g ** -open.<br />

Remark 2.2.The concepts of g-closed sets and g ** -closed sets<br />

are independent.<br />

Let X = {a, b, c, d} and X, {b}, {b, c}, {a, b, c},<br />

{b, c, d}}. Then {a, b, d} is a g-closed set but not g ** -closed.<br />

Also {c}, {a, c} and {c, d} are g ** -closed sets but not g-closed.<br />

Theorem 2.1. Let A be a subset of a topological space X and if<br />

A is a -closed set in X, then A is g ** -closed.<br />

Proof: Let A be a -closed set in X and A U where U is<br />

g ** -open. Since A is -closed, cl(A) = A U. Hence A is<br />

g ** -closed in X.<br />

The reverse implication does not hold.<br />

Example 2.2. Let X = {a, b, c, d} and X, {a}, {b},<br />

{a, b}, {b, c, d}}. Then {b, c} is a g ** -closed set but not closed.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 436<br />

ISSN 2250-3153<br />

Theorem 2.2. Let A be a subset of a topological space X and if<br />

A is a g ** -closed set in X, then A is g-closed.<br />

Proof: Let A be a g-closed set in X and A U where U is<br />

open. Since every open set is g ** -open and A is g ** -closed,<br />

cl(A) U. Hence A is g-closed in X.<br />

The reverse implication does not hold.<br />

Example 2.3. Let X = {a, b, c, d} and X, {a}, {a, b},<br />

{a, c}, {a, b, c}, {a, b, d}}. Then {a, c, d} is a g-closed set but<br />

not g ** -closed.<br />

Remark 2.3. The concepts of g-closed and g ** -closed are<br />

independent.<br />

Let X = {a, b, c} and = {X, {a}}. Then {a, b} and {a, c} are<br />

g ** -closed sets but not g-closed.<br />

Let X = {a, b, c, d} and = {X, {a}, {a, b}, {c, d}, {a, c, d}}.<br />

Then {b, c} and {b, d} are g-closed sets but not g ** -closed.<br />

Remark 2.4. The concepts of g # -closed and g ** -closed are<br />

independent.<br />

Let X = {a, b, c, d} and X, {a}, {b}, {a, b}, {b, c, d}}.<br />

Then {b, c} and {a, b, c} are g ** -closed sets but not<br />

g # -closed.<br />

Let X = {a, b, c, d} and X, {b}, {b, c}, {a, b, c},<br />

{b, c, d}}. Then {a, b, d} is a g # -closed set but not g ** -closed.<br />

Remark 2.5. From the Theorems 2.1, 2.2 and Remarks 2.3, 2.4,<br />

we have the following diagram<br />

g # -closed<br />

where A B represents A imply B, A B represents A does<br />

not imply B.<br />

Theorem 2.3. If A is a g ** -closed set in X, then it is<br />

sg ** -closed.<br />

Proof: Let A be a g ** -closed set such that AU, where U is<br />

g ** -open. By Definition 2.1, we have cl(A) U. Since cl(A)<br />

is a semi closed set and scl(A) is the least semi closed set<br />

containing A, we have scl(A) cl(A) U. Hence A is sg ** -<br />

closed.<br />

The reverse implication does not hold.<br />

Example 2.4. Let X = {a, b, c, d} and = {, X, {a}, {b},<br />

{a, b}, {a, b, c}}. Then {a}, {b}, {a, c} are sg ** -closed sets in X<br />

but not g ** -closed.<br />

Theorem 2.4. Let A be a g-closed set in a topological space X.<br />

Then A is g ** -closed if X is g ** -T1/2.<br />

Proof: Let A be a g-closed set in X and A U where U is<br />

g ** -open. Since X is a g ** -T1/2 space and A is g-closed, every<br />

g ** -open set is open and hence cl(A) U. Therefore A is<br />

g ** -closed in X.<br />

Corollary 2.1. If X is g ** -T1/2, then every g-closed set is<br />

g ** -closed.<br />

Proof: Follows from the above Theorem 2.4.<br />

Corollary 2.2. If X is g ** -T1/2, then every g # -closed set is<br />

g ** -closed.<br />

Proof: Follows from the above Theorem 2.4.<br />

Theorem 2.5. Let {Ai : i J} be the collection of g ** -closed<br />

sets in a topological space X. Then iJ Ai is also a<br />

g ** -closed set in X.<br />

Proof. Let iJ Ai U where U is g ** -open. Then Ai U for<br />

each i J. Since Ai is g ** -closed for each i J, we have cl(Ai)<br />

⊆ U for each i J. This implies that cl(iJ Ai) = iJ cl(Ai)<br />

⊆ U. Hence iJ Ai is g ** -closed in X.<br />

Remark 2.6. (i) Intersection of two g ** -closed sets need not be<br />

g ** -closed.<br />

Let X = {a, b, c}, X, {a}}. Then g ** -closed sets of X<br />

are X, {b}, {c}, {a, b}, {a, c}, {b, c}}.<br />

If A = {a, b} and B = {a, c}, then the sets A and B are<br />

g ** -closed but A B = {a} is not g ** -closed.<br />

Theorem 2.6. If a set A is g ** -closed in X, then cl(A) – A<br />

contains no non-empty g ** -closed set.<br />

Proof: Let F be a g ** -closed set such that F cl(A) – A. Since<br />

X – F is g ** -open and A X – F, from the definition of<br />

g ** -closed set it follows that cl(A) X – F. Thus F <br />

X – cl(A). This implies that F cl(A) (X – cl(A)) = .<br />

Corollary 2.3. Let A be a g ** -closed set in X. Then A is<br />

-closed if and only if cl(A) – A is g ** -closed.<br />

Proof: Necessity. Let A be -closed in X. Then cl(A) A.<br />

This implies that cl(A) – A = . Therefore cl(A) – A is<br />

g ** -closed.<br />

Sufficiency, Suppose cl(A) – A is g ** -closed. Then by Theorem<br />

2.6, cl(A) – A contains does not contain any non-empty<br />

g ** -closed set and hence cl(A) – A = . This implies that<br />

cl(A) = A. Therefore A is -closed in X.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 437<br />

ISSN 2250-3153<br />

Theorem 2.7. Suppose that X is an -space (i.e., = ). A<br />

g ** -closed set A is -closed in X if and only if cl(A) – A is<br />

-closed in X.<br />

Proof: Necessity. If A is -closed in X, then cl(A) A. This<br />

implies that cl(A) we have cl(A) is -closed in<br />

X.<br />

Sufficiency, Suppose that A is g ** -closed and cl(A) is<br />

-closed. It follows from the assumption that = .<br />

Then cl(A) is g ** -closed in X. By Theorem 2.6, we<br />

have cl(A) this implies that cl(A) enceis<br />

-closed in X<br />

Theorem 2.8. Let A be a g ** -closed set in X. If A is<br />

g ** -open, then cl(A) – A = .<br />

Proof: Let A be g ** -open in X. Since A is g ** -closed, cl(A) <br />

A. This implies that cl(A) – A = .<br />

Theorem 2.9. Every subset is g ** -closed in X if and only if<br />

every g ** -open set is -closed.<br />

Proof: Necessity. Let A be g ** -open in X. Then by hypothesis A<br />

is g ** -closed in X. By Theorem 2.8 cl(A) – A = . Hence A<br />

is -closed.<br />

Sufficiency. Let A be a subset of X and U a g ** -open set such<br />

that A U. Then by hypothesis, U is -closed. This implies that<br />

cl(A) cl(U) U. Hence A is g ** -closed.<br />

Theorem 2.10. If A is a g ** -closed set in X and A B <br />

cl(A), then B is g ** -closed in X.<br />

Proof: Let BU where U is g ** -open. Since A is g ** -closed in<br />

X and A U, it follows that cl(A) U. By hypothesis, B <br />

cl(A) and hence cl(B) cl(A). Consequently, cl(B) U<br />

and B becomes g ** -closed in X.<br />

Theorem 2.11. For each x X, {x} is g ** -closed or its<br />

complement X – {x} is g ** -closed in a space X.<br />

Proof: Suppose that {x} is not g ** -closed in X. Since X – {x} is<br />

not g ** -open, the space X itself is only g ** -open set containing<br />

X – {x}. Therefore, cl(X – {x}) X holds and so X – {x} is<br />

g ** -closed.<br />

III. g ** -OPEN SET<br />

In this section, we introduce a new class of open set called<br />

g**-open set and study some of their properties.<br />

Definition 3.1. A subset A of a topological space is called semi<br />

g ** -open (briefly g ** -open) if and only if X – A is<br />

g ** -closed. The set of all g ** -open set denoted by G ** O(X).<br />

Theorem 3.1. Let {Ai : i J} be the collection of g ** -open sets<br />

in a topological space X. Then iJ Ai is also a g ** -open set in<br />

X.<br />

Proof. Since Ai is g ** -open in X for each i J. This implies that<br />

X – Ai is g ** -closed in X for each i J. Then by Theorem 2.5,<br />

we have X – iJ Ai = iJ (X – Ai) is also g ** -closed in X.<br />

Hence iJ Ai is g ** -open in X.<br />

Remark 3.1. Union of two g ** -open sets need not be<br />

g ** -open.<br />

Let X = {a, b, c}, X, {a}}. Then g ** -open sets of X are<br />

X, {a}, {b}, {c}, {a, b}, {a, c}}<br />

If A= {b} and B={c}. Then the sets A and B are g ** -open but<br />

A B = {b, c} is not g ** -open.<br />

Theorem 3.2. A set A is g ** -open in X if and only if<br />

F int(A) whenever F is g ** -closed and F A.<br />

Proof: Necessity, Let A be g ** -open and suppose F A where<br />

F is g ** -closed. By Definition 3.1, X – A is g ** -closed. Also<br />

X – A is contained in the g ** -open set X – F. This implies that<br />

cl(X – A) = X – int(A). Hence X – int(A) X – F.<br />

Therefore F int(A).<br />

Sufficiency. If F is a g ** -closed set with F int(A) whenever<br />

FA, it follows that X – A X – F and X – int(A) X – F.<br />

Thus cl(X – A) X – F. Hence X – A is g ** -closed and<br />

A becomes g ** -open. This proves the theorem.<br />

Theorem 3.3. If int(A ) B A and A is g ** -open in X, then<br />

B is g ** -open.<br />

Proof: By hypothesis, X – A X – B X - int(A).<br />

Thus X – A X – B X – (X - cl(X – A)) = cl(X – A). Now<br />

X –A is g ** -closed and hence by Theorem 2.10, X – B is<br />

g ** -closed. Hence B is g ** -open in X.<br />

IV. g ** -CONTINUOUS MAP and<br />

g ** -IRRESOLUTE MAP<br />

In this section we introduce the concepts of<br />

g**-continuous map and g**-irresolute map and study<br />

relationship between some other mappings.<br />

Definition 4.1. A map f : X Y is called g ** -continuous if<br />

f –1 (V) is g ** -closed in X for every closed set V of Y.<br />

Definition 4.2. A map f : X Y is called g ** -irresolute if<br />

f –1 (V) is g ** -closed in X for every g ** -closed set V of Y.<br />

Theorem 4.1. Let f : X Y be g ** -continuous. Then f is<br />

g-continuous but not conversely.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 438<br />

ISSN 2250-3153<br />

Proof: Let V be a closed set in Y. Then f –1 (V) is g ** -closed in<br />

X since f is g ** -continuous. By Theorem 2.2, every g ** -closed<br />

set is g-closed. Therefore f –1 (V) is g-closed in X. Hence f is<br />

g-continuous. The converse need not be true as seen from the<br />

following example.<br />

Example 4.1. Let X = {a, b, c, d}, = {, X, {b}, {b, c}, {a, b,<br />

c}, {b, c, d}}, Y = {1, 2, 3, 4} and = {, Y, {1}, {2}, {1, 2},<br />

{2, 3, 4}}. Define a map f : X Y by f(a) = 3, f(b) = 2, f(c) = 1,<br />

f(d) = 4. Then f is g-continuous. f –1 ({2, 3, 4}) = {a, b, d} is not<br />

g ** -closed in X for the closed set {2, 3, 4} of Y. So f is not<br />

g ** -continuous.<br />

Theorem 4.2. Let f : X Y be a mapping from a topological<br />

space X into a topological space Y. Then the following<br />

statements are equivalent.<br />

(i) f is g ** -continuous;<br />

(ii) the inverse image of each open set in Y is g ** -open in X.<br />

Proof: Straight forward from the Definition 3.1.<br />

Definition 4.3. A space X is called g ** -T1/2 space if every<br />

g ** -closed set is g ** -closed.<br />

Theorem 4.3. Let f : X Y be a map. If f is g ** -continuous,<br />

then f is g ** -irresolute where X is g ** -T1/2 and Y is g ** -T1/2.<br />

Proof: Let V be g ** -closed in Y. Since Y is g ** -T1/2, we have V is<br />

closed in Y. Then f –1 (V) is g ** -closed in X, since f is<br />

g ** -continuous. But X is g ** -T1/2 and so f –1 (V) is<br />

g ** -closed. Hence f is g ** -irresolute.<br />

Theorem 4.4. Let f : X Y be a map. If f is g ** -continuous,<br />

then f is g ** -irresolute where X is g ** -T1/2 and Y is g ** -T1/2.<br />

Proof: Let V be g ** -closed in Y. Since Y is g ** -T1/2, we have V<br />

is g ** -closed in Y. Then f –1 (V) is g ** -closed in X, since f is<br />

g ** -continuous. But X is g ** -T1/2 and so f –1 (V) is g ** -closed.<br />

Hence f is g ** -irresolute.<br />

Note that if f : X Y and g : Y Z are both<br />

g ** -continuous, then the composition g f : X Z is not<br />

g ** -continuous mapping.<br />

Example 4.2. Let X = Y = Z = {a, b, c}, = {, X, {a}, {b},<br />

{a, b}}, = {, Y, {a}} and = {, Z, {a}, {a, b}, {a, c}}.<br />

Define f : X Y by f(a) = c, f(b) = a and f(c) = b and define<br />

g : Y Z by g(a) = a, g(b) = c, g(c) = b. Then f and g are<br />

g ** -continuous mappings. The set {b} is closed in Z.<br />

(g f) –1 ({b}) = f –1 (g –1 ({b})) = f –1 ({c}) = {a} which is not<br />

g ** -closed in X. Hence g f is not g ** -continuous.<br />

Theorem 4.5. Let f : X Y and g : Y Z be two mappings.<br />

(i) If f is g ** -irresolute and g is g ** -continuous, then the<br />

composition g f is g ** -continuous;<br />

(ii) If f and g are g ** -irresolute, then the composition g f is<br />

g ** -irresolute;<br />

(iii) Let a space Y be g ** -T1/2. If f : X Y is g ** -irresolute<br />

g : Y Z is g ** -continuous, then the composition g f : X Z<br />

is g ** -continuous.<br />

Proof: (i) Let V be closed in Z. Then g ** -continuity of<br />

g implies that g –1 (V) is g ** -closed in Y. Since f is<br />

g ** -irresolute, it follows that f –1 (g –1 (V)) is g ** -closed in X.<br />

Hence g f is g ** -continuous.<br />

(ii) Let V be g ** -closed in Z. Then g ** -irresolute of g implies<br />

that g –1 (V) is g ** -closed in Y. Since f is g ** -irresolute, it<br />

follows that f –1 (g –1 (V)) is g ** -closed in X. Hence g f is<br />

g ** -irresolute.<br />

(iii) Let V be closed in Z. Then g ** -continuity of g implies that<br />

g –1 (V) is g ** -closed in Y. Thus g –1 (V) is g ** -closed in Y since<br />

Y is g ** -T1/2. Therefore f –1 (g –1 (V)) is g ** -closed in X, because<br />

f is g ** -irresolute. Hence g f is g ** -continuous.<br />

REFERENCES<br />

[1] K.Balachandran, P.Sundram and H.Maki, On generalized continuous maps<br />

in topological spaces, Mem.Fac. Kochi Univ.SerA, Math., 12 (1991), 5-13.<br />

[2] J.Chitra and D.Saravanakumar, On a Class of New Generalized Closed Sets<br />

in Topological Spaces, Proc. of HICAMS-(<strong>2012</strong>), 121 – 128.<br />

[3] R.Devi, K.Balachandran and H.Maki ,Generalized -closed maps and -<br />

generalized closed maps, Indian J. Pure. Appl. Math., 29(1) (1988),37-49.<br />

[4] J.Dontchev, On some separation axioms associated with the -topology,<br />

Mem. Fac.Sci. Kochi Univ. Ser.A. Math.,116 (1997),31-35.<br />

[5] W.Dunham, T ½ -spaces, Kyngpook Math. J.,17 (1977),161-169.<br />

[6] W.Dunham, A new closure operator for non T 1 topologies, Kungpook<br />

Math.J., 22 (1982),55-60.<br />

[7] W.Dunham and N.Levine, Further results on generalized closed sets in<br />

topology, kyungpook Math. J., 20 (1980),169-175.<br />

[8] N.Levine, Generalized closed sets in topology, Rend.<br />

Circ.Math.Palermo,19(2) (1970), 169-96.<br />

[9] N.Levine, Semi- open sets and semi – continuity in topological spaces,<br />

Amer. Math. Monthly, 70 (1963), 36-41.<br />

[10] H.Maki,R.Devi and K.Balachandran, Associated topologies of generalized<br />

- closed sets and -generalized closed sets, Mem. Fac.Sci.Kochi Univ.<br />

Ser.A, Math.,15 (1994),51-63.<br />

[11] H.Maki,R.Devi and K.Balachandran, Generalized -closed sets in topology,<br />

Bull.Fukuoka Univ.Ed.PartIII,42 (1993),13-21.<br />

[12] O. Njastad, On some classes of nearly open sets, Pacif. J. Math, 15(1965),<br />

961 – 970.<br />

[13] K. Nono, R.Devi, M.Devipriya, K.Muthukumaraswamy and H.Maki, On<br />

g#-closed sets and the digital plane, Bull. of Fuku. Univ. Ed. Part III,<br />

53(2004), 15 – 24.<br />

[14] T. Ohba and J. Umehara, A simple proof of being a topology, Mem. Fac.<br />

Sci. Kochi Uni. (Math.), 21 (2000), 1 – 19.<br />

[15] N.Palaniappan and K.C.Rao, Regular generalized closed sets, Kyungpook<br />

math. J., 33(2) (1993),211-219.<br />

[16] G. Sai Sundara krishnan and K. Balachandran, A new type of<br />

homeomorphism in a topological space, Bull. Cal. Math. Soc., 97, (1)<br />

(2005), 69 – 78.<br />

[17] D. Saravanakumar and G. Sai Sundara krishnan , Generalized mappings via<br />

new closed sets, Int. J. of Math. Sci. and Appl., Vol 2, No. 2, <strong>2012</strong>, 127 –<br />

137.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 439<br />

ISSN 2250-3153<br />

AUTHORS<br />

First Author - Dr. D.Saravanakumar, Assistant professor,<br />

Department of Mathematics, K.L.N. College of Engineering,<br />

Sivagangai, Email id – saravana_13kumar@yahoo.co.in<br />

Second Author - K.M.Sathishkumar, Assistant professor,<br />

Department of Mathematics, K.L.N. College of Information<br />

Technology, Sivagangai,<br />

Email id - sathish_infinity@yahoo.co.in<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 440<br />

ISSN 2250-3153<br />

I<br />

The White Tiger: Quest of Existence<br />

I. INTRODUCTION<br />

ndian English literature is full with the novelists who presented<br />

their protagonist character in relation with the humanism.<br />

Mulkraj Anand‘s Bakha, Tagore‘s Gora, Coolie of the Mulkraj<br />

Anand and Arvind Adiga‘s Balram Halwai alias Munna.<br />

Everybody craves for his identity, his existence, in this world.<br />

Balram halwai has done same act He attempted to get life of<br />

human being but his attempts with the moral are in vain. Who<br />

born on this earth, he asks the question to the creator ―Who am<br />

I‖? Some becomes ascetic in search of this, life begins and ends,<br />

nothing remains in our hand because we are mere pawns in the<br />

hands of destiny. But things are not true with the Balram, he is<br />

not ascetic, but he pursued this question in the novel. Although<br />

he is the person who born among low class, but like hero of the<br />

postmodern fruit he challenged his destiny.<br />

―Today, I am really Indian.‖(Rabindranath Tagore-406) Like<br />

Gora he never declared his existence, so it is not only quest of<br />

Balram but it is of the reader too. Reader goes through the page<br />

to page in search of humanity. The novelist has used epistolary<br />

form for novel to express the feelings of the Balram. Balram has<br />

several names among the novel in them he finds his existence.<br />

Balram is the name given by his teacher named Krishna.Balram<br />

is the kickside of the Krishna. Like Coolie journey for search of<br />

existence starts in his life from small village, Laxmangarh, in<br />

Bihar in the heart of darkness. The animal imagery is used to<br />

suggest the Balram Halwai amoral victim of the society.<br />

The white tiger is the nickname of the protagonist Balram<br />

Halwai. He earned name from an education inspector, even<br />

Adiga described as ―so that‘s how I became the White Tiger,<br />

There will be third and fourth name too, but that late in the<br />

story.‖Arvind Adiga-page-35 Like Coolie of Mulkraj Anand he<br />

had several names. Difference among them is Coolie died with<br />

the identity of Coolie, Balram proceeds life as owner of the<br />

White Tigers Company. Like coolie he is working on the tea<br />

stall, when Balram hitting the piece of coal he is hitting<br />

unknowingly, his childhood. A huge portrait of the Mahatma<br />

Gandhi was watching the every chunk of coal burning the<br />

childhood of the Balram. He got another name with new<br />

profession ―the coal breaker‖. He remarks about children in India<br />

are weak, fragile, looks like ―the guilty conscience of the<br />

government‖<br />

At the tea shop one boy asked ―What is the creature that comes<br />

along only once in a genration ―? ―The coal braker‖ Arvind<br />

Adiga-page-37 Feelings of alienation aroused in him. Balram is<br />

gradually turning himself towards explosion.Every incident<br />

making him shellto explode. Balram is not the original thinker<br />

but he was original listener. he listened carefully, so he turned<br />

himself into the new profession of driving. Though he had lost<br />

Prof. Sakate Bharat Shamarao<br />

M.A. NET<br />

Balwant College vita<br />

his childhood days, with humanitarian view he is dreaming to<br />

start Language school. Where he wants teach not about Gandhi,<br />

God- ―nothing but facts of life for these kids. A school full of<br />

White Tigers, unleashed on Banglore……..‖ Arvind Adiga-page-<br />

319 Balram Halwai alias Munna is the son of rikshaw puller<br />

Vikram Halwai .Balram is the youth of 25- 35 blackish in<br />

complexion, oval face, five feet four inches youth. But he is<br />

craving for identity his anguish is in Indian society father forget<br />

to giove names to their children But he is craving for identity his<br />

anguish is in Indian society parents forget to give names to their<br />

children. Time makes them orphan. Alienation made Balram to<br />

passes comments ―now what kind of place is it where people<br />

forget to name their children‖. - Arvind Adiga-page-14.<br />

Balram speaks about Buddha‘s philosophy, scared Ganga,<br />

Hanuman the Hindu god in the Ramayana as wellas fidelity, love<br />

and devotion, which reader as well as Balram, couldn‘t see<br />

anywhere it is the feelings of alienation. He had surrendered to<br />

the society of the evil like Dr. Faustus in search of physical<br />

luxury. Even on a tea shop owner named him thug. He searched<br />

his identity in the half baked, person of the postmodern world.<br />

Balram driver fascinated so much due to the moll wants to enter<br />

in the moll where only big bellies have permission to enter, when<br />

he entered the guard pushed him outside of the moll. These small<br />

Bellies had not right to enter into the society of the big bellied<br />

person. As driver, he had new name given by the society<br />

‗country mouse‘. Rootlessness is slowly developed in the mind<br />

of the Balram. Cleaned society needs clean clothes but they<br />

neednot clean mans. Balram changed roles as per demand of the<br />

period, because he observed on the tea stall, the people use the<br />

paper to wrap greasy samosas, wherw written the philosophy<br />

―May be once in hundred years there is revolution that frees the<br />

poor.‖ Arvind Adiga - page - 303. But the representative of the<br />

poor, Balram had had his view. According to him revolution<br />

wouldn‘t take place in India because people are waiting for the<br />

war which would give him freedom. But it would come from<br />

from somewhere else. Apathy of related life can be clearly seen<br />

on the face of Balram Halwai by through this opinion. He<br />

became murder, thief by snatching the amount from his master<br />

Ashoka whom he considers Ram and Seeta. He founds the white<br />

tigers company.<br />

He ponders over country, culture. He wrote that if people<br />

started to biting judge then what is the future of this country. The<br />

protagonist calls himself half baked,even he noted that his story<br />

is ―The Autobiography of a Half Baked‖, who made of the halfbaked<br />

clay We can see sense of loss in his dialogue and action.<br />

Still he has compassion about poor people, he helped to the<br />

parents of victim. Reader has to search Balram existence He<br />

admitted his crime in front parents although he rescued from<br />

court. Reader has to search Balram existence According to<br />

Adiga- ―The novelist U R Anatha Murthy in an essay published<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 441<br />

ISSN 2250-3153<br />

in Kannad newspaper last year, pointed that Dickens had hsd<br />

virtually no impact on his contemporaries. Thoms hardy and<br />

Gorky showed them how to describe the social forces (capital,<br />

tradition and patriarchy) that constrained the protagonists of their<br />

novels, also how to withhold any overt commentary on these<br />

forces. Dickens in contrast is shamelessly didactic and<br />

sentimental; a writer who shows us divided society not to<br />

demand revolution but only ―change of the heart‖ from rich and<br />

poor alike. No self-respecting Indian novelist has wanted to<br />

imitate him‖. The Times of India- page-3<br />

Arvind Adiga is interested not only in demand of revolution<br />

but also change of heart. So Balram Halwai changed many roles,<br />

to get value of human beings. Rootlessness, alienation, loss<br />

identity, attitude of big bellies made him loose his identity<br />

among the hands of corrupt people. So he wrote ―I‘ve made it!<br />

I‘ve broken out of the coop‖ Arvind Adiga-page-320 ―That‘s<br />

why I was cheated of my destiny to be fact, and creamy skinned<br />

and smiling.‖ (Arvind Adiga-page-64)<br />

These lines remarks that he is White Tiger in the society of the<br />

beasts. The destruction of the identity laid him to prove existence<br />

by hook or crook. He would not want to die like his father<br />

suffering from the TB.So he proved his existence with beastly<br />

way.<br />

REFERENCES<br />

[1] Arvind Adiga.The White Tiger.Harper Collins Publishers India &India<br />

Today Group. New Delhi.2008<br />

[2] Arvind Adiga: A Tale of Two Artists .Times of India, (Newspaper) Pune<br />

Saturday March, 3 <strong>2012</strong>.<br />

[3] Mulakraj Anand. Untouchable. Published by Gulabo Vazirani for Arnold<br />

Heineman publishers (India) Delhi.1981<br />

Mulakraj Anand, Coolie (London: Bodley Head 1972)<br />

[4] Ravindranath Tagore.Gora. Macmilan India limited Edition -1999<br />

AUTHORS<br />

Prof. Sakate Bharat Shamarao, M.A. NET, Balwant College vita<br />

Email id - kingofindia.1696@rediffmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 442<br />

ISSN 2250-3153<br />

Integrity Checking Mechanism with Effective 1nd<br />

Realistic Approach in Distributed Database<br />

Pallavi Saxena, Nitin Dubey, Sonali Pathak<br />

Lovely Professional University, Department Computer Science Phagwara, Punjab, India<br />

Abstract- In Constructing of a successful distributed<br />

database we require to introduce the strong integrity checking<br />

mechanism as less adhering may possibly breach security<br />

aspects. The mechanism should represent the semantic<br />

properties of stored data. Verifying the integrity of data from<br />

various outsourced safety is a challenge for database<br />

researchers, this paper proposes a specific approach to bring<br />

pureness of data by employ checking method to substantiating<br />

send back query result in distributed database. To accomplish<br />

our goals, a unique property is dynamically inserted into each<br />

tuples called faux attribute as well as this method also detects<br />

the unauthorized alteration on data.<br />

Index Terms- faux attribute; verification; validation;<br />

trigger manager<br />

T<br />

I. INTRODUCTION<br />

he race between confidentiality, integrity and availability<br />

has put terrible pressure for the need of out-of-box<br />

thinking. The increase in cruciality of information to the<br />

business has inflated the challenges in protecting and managing<br />

the data. The bulk of data that business must manage has<br />

driven planning to make data available on 59‘s rule that is<br />

99.999%.The goal of business continuity is to assure<br />

information security. The main aspects are to increase the<br />

accessibility of information without compromising of security<br />

measures. Distributing data is one of the ways to provide<br />

business continuity. Distributed database is a aggregation of<br />

different databases that are logically distributed and stored in a<br />

variety of outsourced database system that aspects client as a<br />

centralized application where each database application may<br />

involve different database technology and different computer<br />

architecture that contribute the execution of global query. With<br />

the more promotion of internet technologies, the major<br />

problem is to preserve the integrity of data. Integrity is the<br />

unity of stored data. In decentralized environment, the more<br />

advanced view of Integrity as shown in Fig.1 is degree of<br />

correctness, completeness, freshness, timeliness, efficient,<br />

accuracy, entireness and identity of data set. Infects, there are<br />

more research on data confidentiality and integrity on<br />

centralized system but very little have been focused on<br />

integrity checking in distributed system keeping in mind the<br />

cloud environment that have brood of storage array‘s contain<br />

multiple fragment of data .Based on researches on traditional<br />

integrity maintenance techniques and methods, this paper<br />

design Real time integrity checking through Verifying and<br />

Validate Query result by accommodate the trusted third party<br />

in distributed system This is set up by dynamically inserting a<br />

unique attribute on every tuples of each fragment by using<br />

trigger called faux attribute.<br />

Figure1: Advanced view of integrity<br />

.<br />

Structure of the paper are as follow. In section 2, we briefly<br />

discuss the previous work on integrity and next section contain<br />

method and performance countermeasure and atlast we<br />

summarize our solution and outline the future work.<br />

II. RELATED WORK<br />

A Glimpse of pre-implemented techniques for integrity in<br />

distributed database<br />

As with the increase in requirement of distributed data,<br />

different threats of database like Excessive Privilege Abuse,<br />

Legitimate Privilege Abuse, Privilege Elevation, Database<br />

Platform abuse, SQL Injection, Weak Audit Trail, Weak<br />

authentication, Backup Data Exposure, weak audit trail and<br />

Denial of service sneak their way inside which greatly breach<br />

the integrity of decentralized system. From the analysis as<br />

illustrated in fig. 2, it may be shown that the excessive<br />

privilege abuse and sql injection greatly affects the integrity of<br />

the global schema. By keeping in mind of these kinds of<br />

threats, the integrity can be categorized into different group.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 443<br />

ISSN 2250-3153<br />

Figure 2: Effect of database treats on distributed system<br />

From the last 5 year, there have been many research fruits<br />

on these vulnerabilities. Some discussion on the multilevel<br />

using security policy or tag to achieve integrity, as in [5],<br />

author upholds a integrity of data in term of completeness and<br />

freshness by using fake attribute, as in [2], but this fake<br />

attribute is generated manually by owner not dynamic,<br />

moreover in distributed environment because for every<br />

fragment to insert a fake attribute manually is very time<br />

consuming also privacy of fake attribute is compromised, when<br />

malicious user will able to break through the fake attribute.<br />

Some research focus on intrusion-tolerant mechanism to<br />

maintain integrity and confidentiality in distributed<br />

environment, as in [9], the approach like strategies of the<br />

control, test of the integrity, the test of efficiency and legality<br />

of data from client to assure the integrity of data with the<br />

technology of tighten, defaulting, ruling, in database, as in [6],<br />

and author use the concept of traditional hashing and<br />

encryption techniques by assembling a hash function through<br />

the application of grouping of encryption algorithm to<br />

simultaneously provides data confidentiality and integrity<br />

during storing and operating to protect illegally stolen and<br />

distorted in database application. This database assurance can<br />

be obtained from the encryption, as in [5], However from the<br />

encryption the main drawback is to big amount of key and<br />

more complex management of key. Adopting one-way hash<br />

function signature ensure the client as tuples receive by them<br />

are not tampered or destroy by malicious transaction In hashing<br />

some serious drawback is before digest the database tuples<br />

must be sorted and cannot support dynamic update properly,<br />

update will generate a new value that is time consuming work.<br />

Moreover Table I shown that there will be more number of<br />

collision attacks in different hashing algorithm.<br />

Table 8: List of Attacks on Hash Algorithm<br />

Algor Design<br />

ithm ers<br />

MD2 Ronald<br />

Rivest<br />

in<br />

1989<br />

MD5 Ronald<br />

Rivest<br />

in<br />

1992<br />

SHA-<br />

0<br />

SHA-<br />

1<br />

Nation<br />

al<br />

Securit<br />

y<br />

Agenc<br />

y<br />

Nation<br />

al<br />

Securit<br />

y<br />

Agenc<br />

y<br />

Diges<br />

t size<br />

128<br />

bits<br />

128<br />

bits<br />

160<br />

bits<br />

160<br />

bits<br />

Attack year Scout<br />

er<br />

Finding<br />

a preimage<br />

attack with tim<br />

e complexity<br />

equivalent to<br />

2 104 2004 Mulle<br />

r<br />

applicatio<br />

ns of the<br />

compaction<br />

function.<br />

Vulnerable to<br />

a primate<br />

attack against<br />

MD5 This<br />

attack is only<br />

theoretical,<br />

with a time<br />

complexity of<br />

2 123.4 2009 Toe<br />

Xie<br />

and<br />

dengg<br />

uo<br />

feeng<br />

.<br />

Determine the<br />

collision attack<br />

with time<br />

complexity 2 51<br />

The attacks<br />

can find<br />

collisions in<br />

the full version<br />

of SHA-1,<br />

requiring time<br />

complexity<br />

smaller than<br />

2 69 operations.<br />

2004 Joux,<br />

Carri<br />

bault,<br />

Lemu<br />

et,<br />

and<br />

Jalby<br />

2005 Profe<br />

ssor<br />

Wang<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 444<br />

ISSN 2250-3153<br />

Concepts<br />

In this paper ,the main concepts behind this is the owner store<br />

the encrypted database that contain faux attribute on the service<br />

provider and meanwhile for the verification and validation of<br />

data transmit the encrypted total sum value of faux attribute to<br />

the trusted third party. The encrypted value in trusted third<br />

party should be able to protect and secure reasonable data and<br />

should be in accordance with the data in service provider.<br />

III. METHODOLOGY<br />

A. Preliminaries<br />

The sensitivity of metadata for distributed storage. At present<br />

most enterprise network, use distributed system to store files in<br />

different nodes, we need to store Data definition call catalog<br />

files in specialized server that facilitates the management,<br />

access and retrieval of massive fragment of schema. catalog<br />

files are used for the translation, optimization and execution of<br />

transaction and their statistics is also updated when data<br />

definition changed with respect to local autonomy of each site.<br />

The catalog consists of a global schema module includes the<br />

global relation‘s attributes, Fragments distribution modules<br />

includes the attributes belong to each fragment, qualification<br />

of fragment ,fragment mapping or allocation module consists<br />

of binding the name of physical images to the local data stored<br />

at each site in related to access matrix module includes<br />

accessibility of fragments with respect to remote and site<br />

autonomy, statistics module consists of profile of each of the<br />

fragments, and state management module comprise lock and<br />

recovery information. Catalog management system located in<br />

corresponding with different fragment to ensure the files access<br />

efficiency for users. We don‘t need to access all sites for<br />

finding location of data just focus on catalog for fast retrieval<br />

of data which enhances the performance and scalability of<br />

Distributed System.<br />

Faux attribute. The idea of the approach is to consider faux<br />

attribute which is the basic protection unit in distributed<br />

system. We use trigger to generate faux attribute, as trigger is<br />

an stored procedure which is automatically fired when<br />

insertion, deletion and updating happen in database. When<br />

insertion of data goes on, trigger manager automatically inserts<br />

unique faux attribute on every tuples into the schema.<br />

Definition. For the purpose of convenience, ”FA” in this<br />

paper means faux attribute, and refers to the faux tuple of Row<br />

N and column M “RPN” stands for random parity number.<br />

S(FA) means the process of adding parity number to faux<br />

attribute. TS(FA) stands for the process of adding faux<br />

attribute and generation total sum of it. E(TS((FA)) means<br />

the process of encrypting total sum by key “K”.<br />

Techniques of generating Faux attribute. Let us suppose a<br />

tuple R where t1 is an attribute of the R0 and t1 is<br />

of any data type to fulfill our mechanism we add a faux<br />

attribute call tf ,now the tuple become Rf. The<br />

generated faux attribute will correlate with every tuples, Fig.3<br />

shows the structure. Irrespective of this random parity number<br />

is added to the faux attribute it is same as in case of CRC in<br />

networking to check whether the value of faux attribute receive<br />

by user is same as send by providers, this improve the privacy<br />

of faux attribute then calculate the total sum of all faux<br />

attribute after that encrypt sum from symmetric key with<br />

algorithm triple DES.<br />

Figure 3: Structure of faux attribute<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 445<br />

ISSN 2250-3153<br />

B. Verification.<br />

We use five participants in our approach, Fig. 4 show the<br />

procedure<br />

Figure 4: Structure of verification mechanism<br />

Trigger manager. Here trigger manager has responsibility to<br />

manage special kind of catalog which stores the information<br />

related to different trigger for different fragments. Whenever new<br />

tuples insert into fragment, trigger manager automatically fires<br />

trigger for that fragments that will insert faux attribute in respect<br />

of that tuple.<br />

Owner. Owner refers to the current authorization identifier<br />

which creates the database. Owner firstly make some operation,<br />

they breakup the whole global schema into logical units called<br />

fragments meanwhile with the help of trigger manager generate<br />

faux attribute by using (1) and insert it into the fragments of each<br />

database and then allocate those fragments into service provider.<br />

S(FA) = ((tf1)+t(RPN))+(tf2+t(RPN))+…(tfn+t(RPN)) (1)<br />

T(S(FA)) = FA1+FA2+FA3+…FAn (2)<br />

T(S(FA)) = E(TS((FA)) (3)<br />

Service Provider. After inserting faux attribute, owner resides<br />

the encrypted database on the premises of provider. It is an<br />

organization that provides access to database. It processes the<br />

user query and facilitates verification and validation of data.<br />

TTP. Trusted Third Party is a constitution that assists the real<br />

time integrity checking of data by different users. The owner<br />

send the encrypted total sum value E(TS((FA)) of faux attribute<br />

to the TTP. When user get result from service provider at the<br />

same time will receive the E(T(FA)). TTP ease interaction<br />

between service provider and user who both have trust to TTP.<br />

User. When one authenticate user desire to access the<br />

database, he will fetch query to the service provider, user receive<br />

the predicted result that hold the integrity checking module<br />

TS((FA)) generated by the service provider by Using(2), In the<br />

meantime user gets the E(T(FA))from the TTP, decrypt it. The<br />

same value ensures the verification of result and implies no<br />

alteration take place. Since faux attribute relates with every<br />

tuples as suppose tuples will contain data {x,y,z} then<br />

faux attribute will be tf1 = {( xyz)+RPN},.If any unauthorized<br />

modification will happen and tuple changed to {r,y,z}, then faux<br />

attribute value clearly interpolate the inconsistency by matching<br />

it with each tuples and detect where violation of integrity occur.<br />

Furthermore, user recalculates the value of faux attribute by<br />

deducting it with RPN to assure that faux attribute is not<br />

manipulated during transmission by malicious transaction.<br />

IV. PERFORMANCE COUNTERMEASURE<br />

Compared with the traditional method for integrity checking<br />

as hash function like MD5 and CRC a more compact hash (< 128<br />

bits) are convenience and do attention about performance but<br />

very prone to security attacks while SHA-256 or SHA-512 where<br />

security is predominant but for a network system with high<br />

traffic, these hash functions can take a substantial toll on the<br />

CPU. Moreover this algorithm is more vulnerable to attack and<br />

susceptible to collision attack. The addition of faux attribute that<br />

is numeric for Simplicity will have great impact on security and<br />

performance, illustrate in Fig.5. .<br />

Figure 5: Performance Result<br />

1) More secure as for every row there will be unique faux<br />

attribute it is difficult for attacker to guess which<br />

attribute is fake, Moreover addition of RPN which is<br />

only known to user and service provider increase the<br />

confidentiality of faux attribute as it ensure that<br />

authenticate users will get the result.<br />

2) Save storage space as only one column is added to the<br />

original table this reduce the cost of transmission,<br />

therefore increase performance.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 446<br />

ISSN 2250-3153<br />

3) Sustain integrity between data as Faux attribute is<br />

related with every tuples, it will be easy to find where<br />

violation can take place by examine the faux attribute.<br />

4) Although, no manually work is perform by owner for<br />

insertion, updating and deletion of faux attribute.<br />

Trigger manager will automatically insert and update<br />

faux attribute when require in each fragment of table,<br />

improve the speed of system.<br />

V. CONCLUSION<br />

The main motive of the paper is to check the unity of<br />

important and sensible data system by infix faux attribute in each<br />

fragment of distributed system. The faux attribute bring real time<br />

integrity check value which can be used to provide verification<br />

and validation of data. This method also provides trust to service<br />

provider by verifying result of send back query with TTP.<br />

Moreover, the solution requires less consuming power as<br />

compared with other solutions. Uniqueness of faux attribute will<br />

be bottleneck, but with effectual use of advanced trigger can<br />

impart to the problem solving approach<br />

ACKNOWLEDGMENT<br />

First of all we would like to thank <strong>IJSRP</strong> for providing us<br />

with the platform to present our work to people and for giving us<br />

opportunity to get our research completed. We thank Lovely<br />

professional University for its support throughout the research<br />

work. This project was supported by the University efficiently,<br />

so we thank everyone involved throughout the work. We would<br />

like to thank the university for providing us with tools required to<br />

complete the research work<br />

REFERENCES<br />

[1] Bertino, E, Sandhu, R, ‖ Database Security –concepts and challenges,‖ on<br />

IEEE Transaction on Dependable and Secure Computing, vol.2 (1), 2005,<br />

pp.2-19.<br />

[2] Dai Jiazhu, Zhang Yurong, Li Xin, Luo Shuangyan, ‖A completeness and<br />

freshness guarantee scheme for outsourced database,‖ on Second<br />

International Conference on Networking and Distributed Computing,<br />

2011, pp.201-205.<br />

[3] Min Xie, Haixun Wang, Jian Yin, and Xiaofeng Meng. Integrity auditing of<br />

outsourced data. In VLDB, 2007.<br />

[4] Li-xin Xu, Dong Sun, and Dan Liu, ‖ study on method for data<br />

confidentiality and data integrity in relational Database,‖ in 3rd IEEE<br />

International Conference on Computer Science and Information Technology<br />

(ICCSIT),vol(1),2010,pp.292-295.<br />

[5] S. Jajodia and R. Sandhu, "Polyinstantiation Integrity in Multilevel<br />

Relations," in Proc IEEE Symposium on Research in Security and<br />

Privacy, 1990, pp. 104-105.<br />

[6] S. Jajodia and R. Sandhu, "Integrity Mechanisms in Database<br />

Management System," in Proceedings of the 13th NINS-NCSC<br />

National Computer Security Conference, 1990-10, pp. 526-540.<br />

[7] V. Daza and J. Herranz, "A Distributed and Computationally Secure<br />

Key Distribution Scheme. ISC'02. LNCS 2433.," on<br />

http://eprint.iacr.org/2002/069 , 2002.<br />

[8] Zubi, Z.S. ‖ On distributed database security aspects,‖ in International<br />

Conference on Multimedia Computing and Systems, pp231-235, April 2009<br />

[9] Gu-Ping Zheng andLu-Feng Xu, ‖ Distributed database system security<br />

model of power enterprise based on intusion tolerance technology, ‖ on<br />

International Conference on Power System Technology, pp1-4,<br />

October2006<br />

[10] http://en.wikipedia.org/wiki/MD2_(cryptography)<br />

AUTHORS<br />

First Author – Pallavi Saxena, M.Tech, Student, Lovely<br />

Professional University,Department.Computer Science<br />

Phagwara, Punjab, India, Email: pallavisaxena021@gmail.com<br />

Second Author – Nitin Dubey, Assistant Professor, Lovely<br />

Professional University,Department.Computer Science<br />

Phagwara, Punjab, India, Email: nitmeerut@gmail.com<br />

Third Author – Sonali Pathak, M.Tech, Student, Lovely<br />

Professional University,Department.Computer Science<br />

Phagwara, Punjab, India, Email: Pritipathak.pathak@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 447<br />

ISSN 2250-3153<br />

Empowerment of Women in India- An Attempt to Fill the<br />

Gender Gap (June, <strong>2012</strong>)<br />

Dr. Ravi N. Kadam<br />

Associate Professor,Department of P.G. Studies and Research in Economics, Jnana Sahyadri, Kuvempu University, Shankarghatta, Shimoga Dist.<br />

Karnataka, India.<br />

Abstract- The discriminated and exploited of women is seen<br />

all over the world. The empowerment is an aid to help women to<br />

achieve equality with men or, at least, to reduce gender gap<br />

considerably. Women play a very strategic role in the<br />

development of society in particular and development of<br />

economy in general. Woman is the leader planner of the family,<br />

the first trainer; supplier of labour power and by playing focal<br />

role in the development of agriculture, industry, service sector,<br />

socio-culture etc. creates a civilized society. Women contribute<br />

directly or indirectly for economic development. Though the<br />

nature has given the genetic power of reproduction especially to<br />

the women, the socio-economic status of women is so poor and<br />

the incidence of poverty is more on woman only. Empowering<br />

women is the only solution for all questions. Her potential<br />

hidden power is to be utilized for which, her status in the society<br />

must be improved and economically she should be strengthened.<br />

The poverty is the main cause for her low bargaining power<br />

hence poverty should be removed. Empowering women and<br />

removal of poverty go hand in hand. Woman if is educated and<br />

empowered, her potential power can be utilized for the economic<br />

development. Mahatma Gandhiji says, ―You educate a man, you<br />

educate an individual. You educate a woman, you educate an<br />

entire family‖.<br />

The paper contains need, objectives, methodology of the<br />

study, Better and Bitter conditions of Women, Need for Women<br />

Empowerment, Women Empowerment of India, Government<br />

Schemes of Empowerment, Conclusion, etc<br />

Index Terms- Empowerment, Safeguarding, opportunity,<br />

development, potential<br />

T<br />

I. INTRODUCTION<br />

he discriminated and exploited of women is seen all over the<br />

world. The empowerment is an support to help women to<br />

accomplish equal opportunity with men or to reduce the gap<br />

between men and women. Women play a very strategic role in<br />

the development of society in particular and development of<br />

economy in general. Woman is the leader planner of the family,<br />

the first trainer; supplier of labour and by playing focal role in<br />

the development of different sectors like agriculture, industry,<br />

service, etc. and she contrbutes for the creation of a enlightened<br />

society. Women contribute directly or indirectly for economic<br />

development. Though the nature has given the genetic power of<br />

reproduction especially to the women, the socio-economic status<br />

of women is so poor and the incidence of poverty is more on<br />

woman only. Empowering women is the only solution for all<br />

questions. Her potential hidden power is to be utilized for which,<br />

her status in the society must be improved and economically she<br />

should be strengthened. The poverty is the main cause for her<br />

low bargaining power hence poverty should be removed.<br />

Empowering women and removal of poverty go hand in hand.<br />

Woman if is educated and empowered, her potential power can<br />

be utilized for the economic development. Mahatma Gandhiji<br />

says, ―You educate a man, you educate an individual. You<br />

educate a woman, you educate an entire family‖.<br />

Women make up 496 million (48 pecent) of the India‘s<br />

population, comprise 127 million workers with 26 percent of<br />

work participation rate (31percent discriminated and exploited.<br />

India is not exception for this (as per 2001 census). The intensity<br />

of exploitation and subjugation varies from society to society.<br />

But there is no such a society which has eliminated the<br />

exploitation and subjugation. The patriarchal system has<br />

confined the women to specific areas such as kitchen and the bed<br />

room and fixed gender roles like bearing and rearing children,<br />

cooking and cleaning. Even today a woman is viewed as<br />

‗property‘ and not a human being who has her own likes and<br />

dislikes. Opportunities for self development are denied to them.<br />

Need and Importance of the Study:<br />

Women play an important role in all the fields of<br />

development. Socially economically if she is strengthened then<br />

she will create wonders. Women contribute directly and<br />

indirectly for the economic development. Though the nature has<br />

given the genetic power of reproduction especially to the women,<br />

the socio-economic status of women is so poor and the incidence<br />

of poverty is more on woman only. Empowering women is the<br />

only solution for all questions. Hence it is essential to study the<br />

past and present position of women and suggest measures for<br />

their upliftment.<br />

II. OBJECTIVES OF THE STUDY<br />

The study has following objectives,<br />

1. To study the scenario of status of women and efforts<br />

made in past and present,<br />

2. To study the necessity of empowerment of women and<br />

3. To know the available schemes for women<br />

empowerment in India.<br />

III. METHODOLOGY:<br />

For the preparation of this paper secondary data is used.<br />

BETTER AND BITTER CONDITION OF WOMEN:<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 448<br />

ISSN 2250-3153<br />

Women in Ancient India<br />

The status of women is changing from time to time. The<br />

history of women in India has been exciting. Over the past few<br />

millennia, the status of women in India has been subject to many<br />

changes. Women enjoyed equal status with men in all fields of<br />

life in ancient days of India. Works by ancient Indian<br />

grammarians such as Patanjali and Katyayana point out that,<br />

women were educated in the early Vedic period. The Rigvedic<br />

verses tell that, the women married at a mature age and were free<br />

to select their life partner. Rig Veda and Upanishads, the holy<br />

books mention that, There were many women sages and seers,<br />

like Gari and Maitreyi. Stri. Dharma Paddhati, the text of<br />

Tryambakayajvan reflects the role of women and tells that,<br />

‗women were enjoined to be of service to their husbands‘. In<br />

some kingdoms of ancient India, tradition like Nagar Vadhu i.e<br />

bride of the city was practiced. Amrapali was the famous Nagar<br />

Vadhu. Women were competing to win the popular title of the<br />

‗Nagar Vadhu‘.<br />

During the early Vedic Period women enjoyed equal<br />

position and rights. Later around 500 B.C the position of women<br />

started to decline with the Manusmiti and with the Mughal<br />

invasion of Babur and the Mughal empire and later Christianity<br />

cut the freedom and rights of women. Even though penitentiary<br />

movements like Jainism allowed women to be admitted to the<br />

religious order by and large, the women in India faced captivity<br />

and restrictions. Around sixth century, the practice of child<br />

marriages started.<br />

Medieval Period<br />

During the medieval period, the position of Indian woman<br />

in the society further deteriorated. Among some communities in<br />

India, practice of Sati, Child Marriages and a ban on remarriages<br />

of widows became part of social life. The Muslim conquest<br />

brought the purdah practice in the Indian society. The Jauhar was<br />

practiced among the Rajputs of Rajasthan. The practices of<br />

temple women (Devadasi) was in practice and were sexually<br />

exploited in some parts of India. Among Hindu Kshatriya rulers<br />

polygamy was widely practiced. Women were restricted to<br />

Zenana areas in many Muslim families.<br />

During and after British rule the condition of women is not<br />

very good. The women are not viewed with equal status. In India,<br />

woman herself doesn‘t feel equal and many times she ill treats<br />

herself.<br />

IV. NEED FOR WOMEN EMPOWERMENT<br />

The empowerment is an aid to help women to achieve<br />

equality with men or, at least, to reduce gender gap considerably.<br />

Without empowerment certain social roles cannot be performed.<br />

Women play a distinct role in the economic development. She is<br />

the chief architect of family, the first teacher; supplier of labour<br />

power and by playing main role in the development of<br />

agriculture, industry, service sector, socio-culture etc. creates a<br />

civilized society. In the visible and invisible form women<br />

contribute for economic development. The nature has given the<br />

biological power of reproduction especially to the women. She<br />

can create social, cultural and economic wonders. Even then the<br />

socio-economic status of women is so poor. Often the women are<br />

victimized in the cases like rape, dowry harassments, sexual<br />

harassments, kidnapping, female infanticides and sex selective<br />

abortions, domestic violence, trafficking, etc. The verdicts of<br />

many of such cases go against women because of the nonavailability<br />

of witness, discontinuation of suits, difficulty of<br />

proving the incidents etc. Hence she should be strengthened and<br />

her status should be improved; she should be physically,<br />

mentally, economically, socially, politically and culturally<br />

strengthened so that the country can make use of hidden potential<br />

power for the economic development. Therefore empower the<br />

women.<br />

V. WOMEN EMPOWERMENT IN INDIA<br />

It is the man who has to take initiative for women<br />

empowerment. The efforts for the upliftment of conditions of<br />

Indian women have been noticed before and after British rule in<br />

India.<br />

During British Rule<br />

In the 19th century European scholars observed that, the<br />

Hindu women are naturally innocent, faithful and more virtuous<br />

than other women. During the British Rule, many reformers like<br />

Rajaram Mohan Roy, Ishwar Chandra Vidyasagar, Jyotirao<br />

Phule, etc. struggled for the upliftment of the conditions of<br />

women in India. The first free school for girls (Kalikrishna Girls'<br />

High School) in Barasat (Calcutta) was started by Peary Charan<br />

Sarkar, (student of Hindu College, Calcutta and a member of<br />

Young Bengal) in 1847. missionaries' wives like Martha Mault<br />

née Mead and her daughter Eliza Caldwell née Mault pioneered<br />

the education and training of girls in south India<br />

In 1829, the efforts of Raja Rammohan Roy resulted in the<br />

abolition of the practice of ‗Sati‘ under Governor- General<br />

William Bentinck. The Widow Remarriage Act of 1856 was the<br />

result of Ishwar Chandra Vidyasagar's movement for the<br />

improvement in conditions of widows. The efforts of women<br />

reformer, Pandita Ramabai also helped for upliftment of<br />

conditions of women in India. The Indian National Congress<br />

supported the first women's delegation which met the Secretary<br />

of State to demand women's political rights in 1917. In 1927, The<br />

All India Women's Education Conference was held at Pune. The<br />

efforts of Mahhommad Ali Jinna, resulted in passing of Child<br />

Marriage Restraint Act in 1929. Mahatma Gandhi called upon<br />

the young men to marry the child widows and urged people to<br />

boycott child marriages.<br />

Independent India<br />

After independence India is free to take new and innovative<br />

steps for women empowerment. The Indian Constitution<br />

guarantees about, women equality, no discrimination, equality of<br />

opportunity, equal pay for equal work for all Indian women and<br />

it allows the State to make special provisions in favour of women<br />

and children, renounces practices insulting to the dignity of<br />

women and for provisions for securing just and humanitarian<br />

conditions of work and for maternity relief. The cases of<br />

trafficking of young girls and women have been reported. These<br />

women are either forced into prostitution, domestic work or child<br />

labour to prevent this, the Immoral Traffic (Prevention) Act was<br />

passed in 1956. In 1961, the Government of India passed the<br />

Dowry Prohibition Act and the Dowry Prohibition (maintenance<br />

of lists of presents to the bride and bridegroom) rules were<br />

framed in 1985. In India all the medical tests that can be used to<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 449<br />

ISSN 2250-3153<br />

decide the sex of the child have been banned. Female infanticide<br />

is still prevails in some areas. In India the abuse of the dowry<br />

tradition has been one of the major reasons for sex-selective<br />

abortions and female infanticides. During late 1970s the feminist<br />

activism got momentum and the protest due to the issue of rape<br />

of young girl Mathura in police station by a policeman compelled<br />

the government to amend the Evidence Act, the Criminal<br />

Procedure Code and the Indian Penal Code and introduce the<br />

category of custodial rape. Female activists amalgamated the<br />

issues of female infanticide, gender bias, women health, and<br />

female literacy. The Government of India passed the Muslim<br />

Women's (Protection of Rights Upon Divorce) Act, on the base<br />

of Supreme Court Judjment in 1986. Women-oriented NGOs<br />

were formed with the help of grants from foreign donors in<br />

1990s. Self Help Groups, Self Employed Women‘s Association<br />

(SEWA), etc. played a key role in protecting women's rights by<br />

which many women have emerged as leaders of local movements<br />

in India. In 1997, the Supreme Court of India in important<br />

judgment took a strong stand against sexual harassment of<br />

women in the workplace and the Court laid down guidelines for<br />

the prevention and redressal of grievances. Subsequently the<br />

National Commission for Women elaborated these guidelines<br />

into a Code of Conduct for employers.<br />

In 2001, the Government of India declared the year 2001 as<br />

the Year of Women's Empowerment (Swashakti) and the<br />

National Policy for the Empowerment of Women was passed. In<br />

2005, the Hindu law of inheritance has been amended and now<br />

the women have been provided the same status as that of men<br />

have i.e right of having share in ancestral property. In 2006, the<br />

rape case of Imrana was highlighted, the announcement of some<br />

Muslim religious leader that, ‗Imrana should marry her father-inlaw‘<br />

(the rapist) caused widespread protests and resulted in<br />

conviction verdict for 10 years imprisonment which was<br />

welcomed by many women's groups and the All India Muslim<br />

Personal Law Board. On 26 th October, 2006, the Protection of<br />

Women from Domestic Violence Act, 2005 has come into force.<br />

Rajyasabha passed Women's Reservation Bill, ensuring 33<br />

percent reservation to women in Parliament and State Legislative<br />

bodies on 9 th March, 2010. According to the 73rd and 74th<br />

Constitutional Amendment Acts, all local elected bodies reserve<br />

one-third of their seats for women. Even though the percentages<br />

of women in various levels of political activity have risen<br />

considerably, women are still under-represented in governance<br />

and decision making positions.<br />

VI. GOVERNMENT SCHEMES FOR WOMEN<br />

EMPOWERMENT<br />

The government of India has been trying to empower the<br />

women through various schemes some of schemes related to<br />

women empowerment in India are-<br />

Creches/ Day Care Centres for the children of working and<br />

Ailing mothers.Swayamsidh, Swa-Shakti Project, Support to<br />

Training and Employment Programme for Women (STEP),<br />

Swawalamban, Hostels for working women, Swadhar, Rashtriya<br />

Mahila Kosh (RMK), Self Help Groups (SHGs) etc.<br />

VII. CONCLUSION:<br />

The women play a strategic role in the society and in the<br />

economy. The status of women in India is not even in all the<br />

times. In ancient period they enjoyed equal status with men, in<br />

the medieval period, the position of Indian women deteriorated.<br />

During British rule and after independence many efforts are<br />

being made for improving the status of women in India. The<br />

government of India, by passing timely and essential Acts and<br />

implementing rules and regulations trying to empower and<br />

strengthen the women. No doubt the government of India has<br />

many weapons to fight for women empowerment, the prompt and<br />

strict implementation is quite essential. Unless the Acts, Policies,<br />

Rules, Regulations, etc, are strictly implemented the idea of<br />

women empowerment remains unachieved. Hence the efforts of<br />

the government are still inadequate and the process of<br />

empowering women in India is long way to go.<br />

REFERENCES<br />

[1] Neera Desai & Mathreyi Krishnaraj: ―Women & Society in India‖ (1990) -<br />

Ajanta book International, Delhi.<br />

[2] Neera Desai & Usha Thakkar: ―Women in Indian Society‖ (2001) - NBT,<br />

New Delhi.<br />

[3] C. N. Shankar Rao (2005) –― Indian Society Structure and Change‖, Jai<br />

Bharath Prakashana, Manglore. Ref.1.pp.161<br />

[4] Ruddar Dutt & K.P.M. Sundaram: Indian Economy‖ (2006) - S Chand&<br />

Company Ltd. 7361, Ram Nagar, New Delhi-55.<br />

[5] H. R. Krishnamurthy: ―Economic Development ion India‖ (2006) - Sapna<br />

Book House, Bangalore.<br />

[6] Web pages.<br />

AUTHORS<br />

First Author –Dr.Ravi N.Kadam, Associate Professor, Dept. of<br />

Economics, Kuvempu University, Shimoga, Karnataka,<br />

09480024629, e-mail:ravinkadam123@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 450<br />

ISSN 2250-3153<br />

Energy Efficient Multi Hop Clustering Protocol for<br />

Wireless Networks<br />

M.Shankar, G.JegaJothi, S. Karthigaiveni, M.Ganesan, L Dinesh<br />

Abstract- Bluetooth and wireless LAN communication models<br />

are used in mobile devices. Mobile devices are equipped with<br />

multi radio features for WLAN and Bluetooth communications.<br />

IEEE 802.11 standards are used for WLAN communication.<br />

Bluetooth supports bandwidth level of 2 Mbps with a range of 10<br />

meters. Wireless LAN communication requires high energy<br />

resources. Wireless LAN communication model is integrated<br />

with Bluetooth communication mechanism. Bluetooth Personal<br />

Area Network (PAN) is formed with one cluster head and a set of<br />

nodes. Low power Bluetooth is used to access WLAN resources.<br />

Cooperative networking (CONET) protocol is used to<br />

dynamically cluster the nodes. Node‘s bandwidth requirement,<br />

energy use, and application type details are used in cluster<br />

construction process. Clustering is performed independently of<br />

WLAN access points. CONET protocol reduces the energy<br />

consumption in WLAN. CONET protocol supports single hop<br />

clustering model. Limited coverage and constraint based WLAN<br />

access are the main problems in CONET protocol. CONET<br />

protocol is enhanced with multi hop clustering model. Max-Min<br />

D-Clustering algorithm is integrated with CONET protocol. Cost<br />

functions are optimized to multi hop clustering. Coverage<br />

maximization is achieved with Bluetooth.<br />

Index Terms- Polarization, Reflection guide map, Mask layers<br />

W<br />

I. INTRODUCTION<br />

ireless local area network (WLAN), or IEEE 802.11, has<br />

created a wave of popular interest because of its sufficient<br />

bandwidth and well-constructed infrastructures. However, a<br />

serious problem of WLAN is its considerable energy<br />

consumption, energy consumed by WLAN interfaces accounts<br />

for more than 50 percent of the total energy consumption in<br />

hand-held devices and up to 10 percent in laptops. Because<br />

mobile devices are usually driven by limited battery power, it is<br />

essential to devise novel solutions to reduce the power<br />

consumption due to the WLAN interface without degrading its<br />

performance.<br />

About 70 percent of smart phones in the market have a<br />

Bluetooth interface as a secondary radio for personal area<br />

networking [2]. The Bluetooth standard is primarily designed for<br />

low-power consumption, requiring only about a 10th of the<br />

WLAN power. However, because of its limited power, Bluetooth<br />

supports a low bandwidth of only 2 Mbps, with a short range of<br />

10 meters (class 2). In this work, we explore the idea of using<br />

this coexistence of high-power/high-bandwidth WLAN and lowpower/low-bandwidth<br />

Bluetooth in a single mobile platform to<br />

solve the power consumption problem in WLAN-based<br />

communication systems. Several previous works have exploited<br />

Bluetooth as a secondary radio to reduce the overall power<br />

consumption [1]. Bluetooth is mainly used to provide always a<br />

connected channel between mobile devices and the WLAN<br />

access point (AP). In On Demand Paging and Wake on Wireless,<br />

mobile devices and the AP exchange control messages, e.g.,<br />

wake-up messages, via low-power channels.1 this allows a<br />

mobile device to turn off the WLAN interface when it is not<br />

being used. CoolSpots and SwitchR use Bluetooth more actively<br />

to lengthen the power-off time of WLAN: Bluetooth is used not<br />

only for the wake-up channel, but also for data communication<br />

when applications demand low data rates. WLAN is powered up<br />

only when the data rate reaches the Bluetooth limit. However,<br />

these approaches usually assume that APs also have both WLAN<br />

and Bluetooth interfaces. This assumption guides the hardware<br />

and software modifications to our wireless infrastructures.<br />

Unlike these previous works, our approach is based on<br />

clustering. Clustering is commonly used in sensor networks for<br />

network scalability, load balancing [8], data aggregation [7], or<br />

energy efficiency. In our work, clustering makes nodes that share<br />

their WLAN interfaces with each other. Depicts the concept of<br />

our approach and compares it to the previous approaches. A<br />

cluster is a Bluetooth Personal Area Network (PAN) that consists<br />

of one cluster head (CH) and several regular nodes (RNs). CHs<br />

are responsible for coordination among the nodes within their<br />

clusters and the forwarding of packets from the PANs (clusters)<br />

to the WLAN, and vice-versa. CHs keep their WLAN interfaces<br />

on to provide links to the WLAN AP, allowing RNs to use only<br />

Bluetooth and turn their WLAN interfaces off in order to save<br />

energy. Clustering is periodically performed in a distributed<br />

manner based on the energy uses and bandwidth requirements of<br />

the nodes.<br />

In this work, clustering is performed independently of<br />

WLAN APs. Therefore, our approach does not require<br />

modifications to existing infrastructures, while the previous<br />

approaches require specialized APs with dual radios. Moreover,<br />

we solved the scalability problem of the previous works. Because<br />

of the large difference between the communication ranges of<br />

WLAN and Bluetooth, only a few devices close to the dual AP<br />

can use the low-power radio. In our case, on the other hand, since<br />

clusters can be created anywhere, most devices can obtain the<br />

benefit of energy saving.<br />

One unique requirement which distinguishes our approach<br />

from the traditional clustering problem in sensor networks is that,<br />

unlike sensor nodes which are left unattended after deployment,<br />

mobile devices are arbitrarily controlled by their users. This<br />

necessitates the consideration of node mobility as well as a large<br />

variance of bandwidth requirements of various applications.<br />

Moreover, because all devices have equal significance, rotating<br />

the CH role among all devices is necessary to distribute energy<br />

consumption. Mobile devices also can be turned off at any time<br />

and powered again depending on the users‘ needs, which<br />

necessitates the consideration of unexpected link failures.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 451<br />

ISSN 2250-3153<br />

This paper presents a distributed clustering protocol,<br />

Cooperative Networking protocol (CONET). CONET has four<br />

main objectives:<br />

1. Improving the energy efficiency of wireless networks<br />

by exploiting a secondary radio,<br />

2. Dynamically configuring clusters to meet the bandwidth<br />

requirements of all nodes,<br />

3. Producing well-distributed cluster heads, and<br />

4. Minimizing control overhead.<br />

CONET dynamically clusters the network according to each<br />

node‘s bandwidth, energy, and application type. We have<br />

implemented the CONET prototype using wearable computers to<br />

evaluate its performance on real hardware systems. We also<br />

simulate CONET for large networks of more than 100 mobile<br />

nodes and evaluate the performance. Both results demonstrate<br />

that CONET is effective in reducing the power consumption of<br />

WLAN-based communication systems.<br />

II. RELATED WORK<br />

Many previous studies have investigated techniques that<br />

reduce the energy consumption due to WLAN interfaces in<br />

single radio mobile devices. They optimize the power<br />

consumption at various layers, such as the application layer,<br />

transport/network layer [9] and MAC layer [5]. The IEEE 802.11<br />

standards also define several low-power modes, such as PSM in<br />

the legacy 802.11 and Automatic Power Save Delivery (APSD)<br />

in 802.11e. They allow nodes to keep their WLAN cards in the<br />

sleep state when they do not have to communicate and switch to<br />

active state periodically (PSM) or at application-specific instants<br />

of time APSD to retrieve data buffered in the access point.<br />

Although the majority of the WLAN interface‘s circuitry is<br />

turned off in the sleep state, the base power consumption for the<br />

minimal host card interaction and state transition is not<br />

negligible, which is typically 200-400 mW. On the other hand,<br />

CONET allows RNs to completely turn off their WLAN<br />

interfaces and use only Bluetooth. Moreover, since Bluetooth<br />

also supports low-power modes, such as sniff mode, which<br />

operate in similar manner to PSM but consume an order of<br />

magnitude less power than PSM, RNs can save more energy<br />

using Bluetooth low power modes. Of course, CHs can operate<br />

using PSM or APSD to communicate with the access point,<br />

resulting in lower average power consumption than PSM or<br />

APSD.<br />

Some advanced WLAN chipsets dramatically reduce the idle<br />

power consumption, but require cost and time for hardware<br />

upgrade or worldwide deployment. As a result, the majority of<br />

today‘s hand-held products still have power consumption<br />

problem due to the WLAN interface [4]. In contrast, CONET<br />

needs only a simple software patch at OS level, resulting fast<br />

deployment to existing mobile devices and infrastructures.<br />

As mobile devices increasingly feature multiple radios, the<br />

idea of using a secondary low-power radio to reduce the power<br />

consumption of the WLAN interface. In [3], a VoIP device<br />

exploits a secondary radio as a wake-up channel, but this incurs<br />

long latencies for activating the sleeping device. For general<br />

applications, several paging schemes have been proposed, but<br />

they also contain the latency problem to activate the WLAN<br />

channel. CoolSpots and SwitchR use the secondary radio not<br />

only for control signaling but also for data communication. They<br />

alleviate the latency problem and save more energy by<br />

lengthening the power-off time of WLAN interfaces. However,<br />

they require hardware/software modifications of existing LAN<br />

environment for deployment. Conceptually, CoolSpots and<br />

SwitchR can be special cases of CONET: if a dual AP exists, it<br />

can be regarded as a stationary node whose cost is always zero<br />

(lowest) thus always acts as a cluster head.<br />

III. PROBLEM STATEMENTS<br />

The mobile devices that we consider in this paper are popular<br />

user terminals, such as smart phones or wearable computers. For<br />

the rest of this paper, we simply refer to a mobile device as a<br />

node. We assume the following properties about the nodes and<br />

wireless networks:<br />

1. Each node has one WLAN interface (primary) and one<br />

Bluetooth interface (secondary).<br />

2. There is at least one WLAN access point in the field.<br />

Each node can communicate with the access point using<br />

its WLAN interface, regardless of its location and time.<br />

3. The WLAN access points do not have Bluetooth<br />

interfaces. This is typical for most existing wireless<br />

environments. Therefore, the previous approaches are<br />

inapplicable.<br />

4. Each node i knows the total bandwidth required, Need<br />

BWi, and the free bandwidth of its Bluetooth link, Free<br />

BWit.<br />

5. Each node i can measure its residual energy Eit.<br />

6. All Bluetooth interfaces have the same communication<br />

range.<br />

The final goal of our CONET is to reduce the power<br />

consumption in wireless networking applications. For this<br />

purpose, we first classify popular applications into two types:<br />

group networking and individual networking. Next, we propose a<br />

general clustering protocol that considers both application types.<br />

Our goal is to design a general clustering protocol that<br />

satisfies the requirements of the above application types. To<br />

accomplish this, we separate cost functions from the clustering<br />

algorithm and provide two cost functions for each of application<br />

type. Users can select proper cost functions for their applications.<br />

Depending on the selected cost function, a different set of nodes<br />

is selected as cluster heads to meet the user requirements. Also,<br />

the following requirements must be met:<br />

1. Clustering should be completely distributed. Each node<br />

independently makes its decisions based only on local<br />

information.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 452<br />

ISSN 2250-3153<br />

2. For each cluster Cj, the sum of bandwidth requirements<br />

of all regular nodes within the cluster must not exceed<br />

the maximum data rate of Bluetooth RB, i.e., RNK <br />

.NeedBWk(t) < AR B , where RNk is the regular node of<br />

ID k and NeedBWk(t) is the required bandwidth for<br />

node k at time t.<br />

3. At the end of the clustering process, each node should<br />

be either a cluster head or a regular node that belongs to<br />

exactly one cluster.<br />

4. Clustering should be efficient in terms of processing<br />

complexity and message exchange.<br />

IV. THE CONET PROTOCOL<br />

This section describes CONET in detail. First, we present the<br />

protocol design. Next, we define the parameters and cost<br />

functions.<br />

A. PROTOCOL OPERATION<br />

Fig. 2 shows the details of our protocol. Nodes exchange<br />

clustering messages via Bluetooth. For easy understanding, we<br />

describe our protocol based on the example a group networking<br />

scenario: nodes 1, 2, and 3 have a common collaborative task and<br />

attempt to maximize the group lifetime.<br />

A.1 CLUSTER HEAD ADVERTISEMENT<br />

When a node is newly booted up, it becomes a CH, as shown<br />

in the flow chart (Fig. 1). Assume that all three nodes of the<br />

example are booted up at the same time. Then, since all of them<br />

independently become CHs, three clusters are created. However,<br />

the only member of each cluster is the cluster head itself. Like<br />

these clusters, a cluster which has no RNs is called a trivial<br />

cluster, and the head of the trivial cluster is called a trivial cluster<br />

head (tCH). Therefore, tCHs do not need to use Bluetooth for<br />

packet forwarding, but only for advertising. Note that tCH is a<br />

subset of CH.<br />

When a node becomes a CH, it starts to advertise its resource<br />

information periodically via Bluetooth. It repeats advertising as<br />

long as it is a CH. The advertisement message of node i contains<br />

the clustering cost Ci, the amount of bandwidth available for<br />

packet forwarding FreeBWi, and some required information,<br />

such as the ID and the network address. Each node manages a set<br />

S , which stores the information advertised by neighboring<br />

CH<br />

i<br />

CHs.<br />

Because act as gateways that connect Bluetooth nodes (RNs)<br />

to the WLAN access point, FreeBWi of CH i should be the<br />

smaller value between Free BW w<br />

i and FreeBW B<br />

i , the amount of<br />

free bandwidth on Bluetooth and WLAN links, respectively. To<br />

estimate the free bandwidth on a wireless link, we can use wellstudied<br />

bandwidth estimation techniques [6].<br />

Fig. 1: Flow chart of CONET clustering protocol.<br />

For example, we can estimate the free bandwidth using the<br />

idle channel time. A channel is considered to be idle if the node<br />

is not sending or receiving data through the channel and a carrier<br />

or interference signal is not sensed on that channel. By<br />

monitoring the idle channel times of WLAN and Bluetooth<br />

i<br />

channels ( w<br />

i T and T B , respectively) during a period of time T,<br />

each node i can estimate its Free BW w<br />

i and FreeBW B<br />

i using a<br />

moving average with weight 2 =0, 1 as follows:<br />

Free BW w<br />

i = Free BW w T<br />

i + (1- )<br />

T<br />

I W<br />

R W - R mar , (1)<br />

Free BW w<br />

i = Free BW w T<br />

i + (1- )<br />

T<br />

I B<br />

R B - R mar, R, (2)<br />

Where R W and R B are the transmission rates of WLAN<br />

and Bluetooth, respectively. R mar is a predefined constant used to<br />

maintain the free bandwidths to be slightly lower than the<br />

bandwidth actually available. It is necessary to switch between<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 453<br />

ISSN 2250-3153<br />

radio interfaces dynamically based on the current data rate. Later,<br />

in this section, we explain the details of interface switching. Our<br />

current design assumes that R W is a predefined constant, but the<br />

IEEE 802.11 standard provides multiple transmission rates<br />

depending on Signalto Noise Ratio (SNR). We plan to improve<br />

CONET to support multiple rates in our future research.<br />

Although only CHs advertise their resources, RNs also<br />

measure free bandwidth for cluster head election (discussed<br />

later). However, because RNs use only Bluetooth, their<br />

FreeBW W values are always zero, and thus, meaningless.<br />

Therefore, the free bandwidth of RNs should be set to FreeBW B .<br />

In summary, the free bandwidth of node i, FreeBWi, can be<br />

obtained as follows:<br />

<br />

W<br />

B<br />

Min(<br />

Free BWi<br />

, FreeBWi<br />

),<br />

<br />

<br />

, (3)<br />

if node i is a CH<br />

<br />

<br />

B<br />

FreeBWi<br />

, otherwise.<br />

<br />

FreeBw i<br />

Note that CONET does not limit the bandwidth estimation<br />

technique. It can also operate with other techniques with minor<br />

modifications.<br />

A.2 RESPONDING TO JOINT REQUESTS<br />

In stage (B) of Fig. 1, each CH waits for JOIN requests from<br />

other nodes for a short time. The JOIN message of node i<br />

includes the amount of required bandwidth NeedBWi. Upon<br />

receiving a JOIN message, the CH goes to stage (C) and<br />

compares its FreeBW with the sender‘s NeedBW. If the CH has a<br />

sufficient amount of free bandwidth for the sender, it will accept<br />

the request, but, otherwise, reject it. After responding to the<br />

request, the CH returns to the initial stage. The sentence,<br />

―Become a CH,‖ in stage (A) means ―keep the CH role‖ for the<br />

nodes that are already CHs. At the initial moment, because no<br />

node has sent a JOIN message yet, all the nodes go down to stage<br />

(D).<br />

A.3 CLUSTER HEAD ELECTION<br />

When there is no JOIN request, the CH counts the number of<br />

RNs within its clusters (stage (D) in Fig. 1). If there is at least<br />

one RN in the cluster, the CH returns to the first step and keeps<br />

its current role. This allows RNs to select their next CHs by<br />

themselves, which is necessary for network stability: If CHs stop<br />

their roles of packet forwarding regardless of the associated RNs,<br />

the RNs will occasionally lose their links to the WLAN access<br />

point. Furthermore, clusters will be reformed quite frequently if<br />

CHs ignore the status of each RN, such as the first association<br />

time. The chance for energy saving is given to trivial CHs<br />

(tCHs), which turned out to have no RNs within their clusters at<br />

the end of stage (D). A tCH selects its next CH by itself. In stage<br />

(E), each tCH calls the FIND_NEXT_CH procedure, which<br />

presents the CH election process of CONET. Assume that node i<br />

calls FIND_NEXT_CH. It then executes the following<br />

procedure:<br />

FIND_NEXT_CH:<br />

1) Prune the node which has insufficient bandwidth. Let<br />

Si C H and Si CH be the original and pruned<br />

neighboring CH set of node I, For each node K Si CH<br />

,if MIN (Free BWi ,Free BWK) > Need BWi, then copy<br />

K into S i CH<br />

2) Find i‘s next CH candidate which has the lowest cost<br />

among I and all nodes in Si CH<br />

3) Return the Selected node.<br />

Even though all nodes estimate FreeBW using (3), the<br />

estimation results of two neighboring nodes could be different<br />

due to the limited radio range. For example, let us assume that<br />

there is a hidden flow on the left side of node 1, which is in node<br />

1‘s radio range, but out of nodes 2‘s radio range. In this case,<br />

FreeBW1 will be estimated to be smaller than FreeBW2 because<br />

the flow only interferes the idle channel time of node 1.<br />

Therefore, the maximum bandwidth between nodes 1 and 2 is<br />

bounded by the smaller value FreeBW 1 . This indicates that the<br />

free bandwidth on the link between nodes i and k should be the<br />

minimum value between FreeBWi and FreeBWk, i.e.,<br />

MIN(FreeBWi ,FreeBWk) because there is no hidden flow and all<br />

nodes have equal available bandwidths of 2 Mbps, neither node 2<br />

nor 3 is pruned when node 1 calls the FIND_ NEXT_CH<br />

procedure. Therefore, node 1‘s pruned<br />

CH<br />

S1 setCHSet CH<br />

S1 Next, node 1 selects the lowest cost node among the nodes in<br />

CH<br />

S 1 and itself. For simple explanation, let us assume that the<br />

cost of each node i, Ci, is simply the reciprocal of its residual<br />

energy Ei, i.e., C i =1/Ei. The purpose of this cost function is to<br />

select the node with the highest residual energy as the CH for<br />

other low-energy nodes. Because node 1 has the lowest cost in<br />

the case, it returns to stage (A) and repeats the above processes.<br />

Similarly, nodes 2 and 3 elect node 1 as their CH and send JOIN<br />

messages to it. As their requests are accepted by node 1, they go<br />

to stage (F) and become the RNs of node 1. Finally, nodes 1, 2,<br />

and 3 are clustered together.<br />

B. APPLICATION TYPES AND COST FUNCTIONS<br />

In this section, we present two cost functions designed for<br />

group networking and individual networking.<br />

B.1 GROUP NETWORKING<br />

The main objective of group networking is to prolong the<br />

group lifetime. In sensor networks, one popular cost function<br />

used to maximize the network lifetime is primarily based on the<br />

residual energy of each node, e.g., (maximum energy)/(residual<br />

energy). This cost function distributes energy dissipation over the<br />

network particularly well when the power consumption rates are<br />

equal for all nodes. In CONET, however, a variety of nodes types<br />

made by different venders are clustered together, breaking the<br />

homogeneity of the power consumption rate. Therefore, our cost<br />

function for the group networking case is based on each node‘s<br />

estimated lifetime, the estimated time for a node to survive in the<br />

www.ijsrp.org<br />

.


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 454<br />

ISSN 2250-3153<br />

future. We define the cost of being a CH for node i at time t, Cit,<br />

as follows:<br />

Ci(t) =<br />

1<br />

( t)<br />

L i<br />

……………(4)<br />

Where i t L~ is node i‘s estimated lifetime. We assume that each<br />

node i knows its current power consumption Pi(t) and residual<br />

energy Ei(t). Then, the lifetime estimation is based on the moving<br />

average of the current and past power usage.<br />

B.2 INDIVIDUAL NETWORKING<br />

For individual networking, energy saving should be as equal<br />

as possible to all cooperating nodes. This motivates us to use the<br />

energy saving ratio (ESR) as the cost for individual networking.<br />

Our goal is to equalize ESR among all cooperating nodes.<br />

Consider node i, which was booted up at t = 0 and has cooperated<br />

with others using CONET for [0, t] t >0. The role (CH or RN) of<br />

the node and cluster organization may have changed with time,<br />

depending on its resource usage. Using the cumulative amount of<br />

energy consumption, the energy saving ratio of node i at time t,<br />

ESRi(t), can be defined as follows:<br />

where Pit represents the future power consumption<br />

estimated at time t. Once Pit has been estimated, the node can<br />

calculate its Lit as follows:<br />

tr co<br />

co<br />

ESRi (t) =<br />

Ei<br />

( t)<br />

Ei<br />

( t)<br />

Ei<br />

( t)<br />

1<br />

,<br />

tr<br />

tr<br />

E ( t)<br />

E ( t)<br />

i<br />

Where E (t)<br />

tr<br />

i represents the expected energy that would<br />

be consumed if node i had communicated in the traditional<br />

WLAN-only manner (i.e., without CONET) during I =0; t<br />

E co<br />

(t)<br />

i represents the energy actually consumed by the node<br />

when it has used CONET. Therefore, E (t)<br />

co<br />

i mainly depends<br />

on the history of the node‘s current and past roles: when the node<br />

is an RN, E (t)<br />

co<br />

i will increase more slowly than E (t)<br />

tr<br />

i<br />

because RNs use only Bluetooth, resulting in an increase in<br />

ESRit. Otherwise, when the node is a CH, E (t)<br />

co<br />

i will increase<br />

as fast as (or slightly faster than) E (t)<br />

tr<br />

i thus, ESRit will<br />

decrease. According to (5), high ESR means that by cooperating<br />

with others, the node could save more energy than the others.<br />

Therefore, every time nodes rotate their roles, CONET selects<br />

high-ESR nodes as the next CHs, allowing low-ESR nodes to<br />

become RNs for energy saving. We define the cost of being a CH<br />

for node i at time t, Cit, as follows:<br />

Ci (t) = 1- ESRi (t) =<br />

co<br />

Ei<br />

( t)<br />

~ tr<br />

E ( t)<br />

With appropriate role switching periods, our protocol<br />

equalizes ESR among nodes.<br />

i<br />

i<br />

(5)<br />

(6)<br />

V. CONET PROTOCOL WITH MULTI HOP<br />

CLUSTERING MODEL<br />

CONET protocol is enhanced with multi hop clustering<br />

model. Max-Min D-Clustering algorithm is integrated with<br />

CONET protocol. Cost functions are optimized to multi hop<br />

clustering. Coverage maximization is achieved with Bluetooth.<br />

The system is designed to improve data communication under<br />

the wireless LAN environment with energy management. The<br />

private area networks are formed to manage data transmission<br />

using Bluetooth. The clustering techniques are used for the PAN<br />

construction process. The system is divided into five modules.<br />

They are Network analysis, Single hop clustering, Multi hop<br />

clustering, PAN management and Data communication.<br />

The network analysis module is designed to discover the<br />

nodes and their neighbors. The node grouping is performed under<br />

the single hop clustering process. Multi hop clustering module is<br />

designed to cluster the nodes with multi hop model. PAN<br />

construction module is designed to group up the bluetooth nodes.<br />

Data communication module handles the communication<br />

between the wireless nodes.<br />

A. NETWORK ANALYSIS<br />

The network analysis is performed to detect the node and<br />

network status. The WLAN nodes are connected through the<br />

access points. Nodes and their neighborhood nodes are identified<br />

in the network analysis. Nodes radio and energy details are<br />

collected in the network analysis.<br />

B. SINGLE HOP CLUSTERING<br />

Clustering process is carried out to manage energy and<br />

network load. CONET protocol is used for the clustering process.<br />

The bandwidth requirements are managed by the clusters. The<br />

clusters are configured dynamically.<br />

C. MULTI HOP CLUSTERING<br />

Max-Min D-Clustering algorithm is used for the multi hop<br />

clustering process. The CONET protocol is enhanced to support<br />

multi hop clustering process. The PAN construction is also tuned<br />

for multi hop clustering environment. Cluster head selection is<br />

optimized for multi hop clustering model.<br />

D. PAN MANAGEMENT<br />

The private area network is constructed with Bluetooth<br />

enabled nodes. Cluster head (CH) manages the nodes under<br />

PAN. Regular nodes (RN) communicate with cluster head (CH).<br />

Cluster head is connected with wireless LAN access points.<br />

E. DATA COMMUNICATION<br />

Data communication is done with WLAN and Bluetooth<br />

protocols. Secondary radio based communication is used to<br />

achieve energy efficiency. Cluster head manages the data<br />

transmission within its area. Cluster level transmissions are done<br />

through PAN nodes.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 455<br />

ISSN 2250-3153<br />

VI. SCREENSHOTS<br />

VII. CONCLUSION<br />

Wireless communication standards are used in Wireless<br />

Local Area Networks (WLAN). Clustering techniques are used<br />

to group up the mobile devices with Bluetooth communication.<br />

Cluster head manages the communication between the WLAN<br />

and bluetooth environment. CONET is a bandwidth aware and<br />

energy-efficient clustering protocol for multiracial mobile<br />

networks. CONET uses Bluetooth to reduce the power<br />

consumption of WLAN in mobile devices. It dynamically<br />

reconfigures the clusters based on the bandwidth requirements of<br />

applications to avoid the performance degradation. We have<br />

classified the applications into two cases: group networking and<br />

individual networking.<br />

Multi hop clustering scheme is used to handle data<br />

communication process. The system supports high frequency and<br />

low frequency environment. Multi hop is constructed. Cluster<br />

head manages the data transmission process. The system reduces<br />

the energy consumption.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 456<br />

ISSN 2250-3153<br />

REFERENCES<br />

[1] Jong-Woon Yoo and Kyu Ho Park, ―A Cooperative Clustering Protocol for<br />

Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces‖,<br />

IEEE Transactions On Mobile Computing, Vol. 10, No. 5, April 2011.<br />

[2] GSMArea,http://www.gsmarena.com/search.php3, Dec. 2009.<br />

[3] Y. Agarwal, R. Chandra, A. Wolman, P. Bahl, K. Chin, and R. Gupta,<br />

―Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi<br />

Smartphones,‖ Proc. ACM MobiSys, pp. 179-191, 2007.<br />

[4] N. Banerjee, S. Agarwal, P. Bahl, R. Chandra, A. Wolman, and M. Corner,<br />

―Virtual Compass: Relative Positioning to Sense Mobile Social<br />

Interactions,‖ Microsoft Technical Report MSR-TR-2010-5, Jan. 2010.<br />

[5] Y. He and R. Yuan, ―A Novel Scheduled Power Saving Mechanism for<br />

802.11 Wireless LANs,‖ IEEE Trans. Mobile Computing, vol. 8, no. 10, pp.<br />

1368-1383, Oct. 2009.<br />

[6] Y. Yang and R. Kravets, ―Contention-Aware Admission Control for Ad<br />

Hoc Networks,‖ IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377,<br />

July/Aug. 2005.<br />

[7] Y. Wu, X.-Y. Li, Y. Liu, and W. Lou, ―Energy-Efficient Wake-Up<br />

Scheduling for Data Collection and Aggregation,‖ IEEE Trans. Parallel and<br />

Distributed Systems, vol. 21, no. 2, pp. 275-287, Feb. 2010.<br />

[8] M. Cheng, X. Gong, and L. Cai, ―Joint Routing and Link Rate Allocation<br />

under Bandwidth and Energy Constraints in Sensor Networks,‖ IEEE Trans.<br />

Wireless Comm., vol. 8, no. 7, pp. 3770-3779, July 2009.<br />

[9] X.-Y. Li, Y. Wang, H. Chen, X. Chu, Y. Wu, and Y. Qi, ―Reliable and<br />

Energy-Efficient Routing for Static Wireless Ad Hoc Networks with<br />

Unreliable Links,‖ IEEE Trans. Parallel and Distributed Systems, vol. 20,<br />

no. 10, pp. 1408-1421, Oct. 2009.<br />

AUTHORS<br />

First Author – M. Shankar, M.E (Software Engineering),<br />

Department of Information Technology, Periyar Maniammai<br />

University, Thanjavur, India.<br />

Second Author – Dr. G. Jegajothi, Head of the Department,<br />

Department of Information Technology, Periyar Maniammai<br />

University, Thanjavur, India.<br />

Third Author – S. Karthigaiveni, Assistant Professor,<br />

Department of Information Technology, Periyar Maniammai<br />

University, Thanjavur, India<br />

Fourth Author – M. Ganesan, M.E (Computer Science and<br />

Engineering), Department of Computer Science and Engineering,<br />

Karpagam University, Coimbatore, India.<br />

Fifth Author – L. Dinesh, M.E (Software Engineering),<br />

Department of Information Technology, Periyar Maniammai<br />

University, Thanjavur, India. Emai: l_dinuma@yahoo.co.in<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 457<br />

ISSN 2250-3153<br />

Migration of Mobicents SIP Servlets on Cloud Platform<br />

Mr. Manish Giri, Sachin Waghmare, Balaji Bandhu, Akshay Sawwashere, Atul Khaire<br />

Department of Computer Engineering, Maharashtra Academy of Engineering, Alandi, Pune, India<br />

Abstract- Mobicents Sip Servlets helps the users to create,<br />

deploy, and manage services and applications that integrate<br />

voice, video and data in real time over IP networks. These<br />

applications require high resources to run. Mobicents Sip<br />

Servlets has not offered a cloud support yet. Running Mobicents<br />

Sip Servlets in a cloud would allow the users to adapt the<br />

resources used by Mobicents Sip Servlets to the real time load of<br />

the applications. We have proposed a solution to migrate<br />

Mobicents Sip Servlets on a cloud platform. Our solution<br />

provides a set of cloud images that support the Mobicents Sip<br />

Servlets platform. Besides, our solution provides an auto-scaling<br />

algorithm that automatically scales the number of instances of<br />

Mobicents Sip Servlets. It is now possible to deploy SIP<br />

applications in a cloud and the platform will adapt its resource<br />

according to the need.<br />

Index Terms- Cloud Computing, SIP servlet, JBOSS AS,<br />

Cloud images.<br />

M<br />

I. INTRODUCTION<br />

obicents Sip Servlets is an application server which runs<br />

on top of JBoss AS and which provides an Implementation<br />

of the SIP Servlet specification. The purpose of this platform is<br />

to help the users to create, deploy, and manage services and<br />

applications that integrate voice, video and data in real time over<br />

IP networks. Because of the large amount of data the applications<br />

must process, they require high resources to run. Most vendors<br />

of application servers now offer an Amazon image in order to<br />

use their products on a cloud. Indeed, a cloud can provide the<br />

high resources needed by the applications since it is easy to add<br />

or remove some resource allocated to the application in a cloud.<br />

Mobicents Sip Servlets has not offered a cloud support yet. In<br />

order to offer a cloud support, Mobicents Sip Servlets should<br />

offer cloud images that would contain the Mobicents Sip Servlets<br />

platform. Besides offering these images, another problem arises<br />

in cloud environment. This problem is how to scale the number<br />

of instances of these images according to the real time load. A<br />

cloud platform needs an entity which control the resources usage<br />

and which can allocate more or less resources depending on the<br />

load. This document will study the migration of Mobicents Sip<br />

Servlets on a cloud platform. We will provide cloud images that<br />

will contain the Mobicents Sip Servlets platform. Besides, we<br />

will propose a solution to scale up and down the resources used<br />

by the cloud.<br />

2. Cloud Architecture<br />

II. CLOUD<br />

Cloud computing is a client-server approach where the server<br />

is a network of nodes. The job of the server is distributed among<br />

several nodes that form a cloud. Some nodes can be dynamically<br />

added or removed at runtime to the cloud .Depending on the<br />

cloud, the client may either send its request to any node in the<br />

cloud, or it may send its request to a load balancer, which will act<br />

as an entry-point for the cloud and forward the request to a node.<br />

Where, a node is an instance of a virtual machine. Thus a node is<br />

also called an instance. The virtual machines are executed on a<br />

set of inter-connected physical machines. The set of physical<br />

machines is called a cluster. There are three types of cloud<br />

service models.<br />

2.1.1 IaaS<br />

If the user uses an IaaS, she is basically gaining a computer.<br />

The user has access to a virtual machine. She can decide which<br />

OS and software install on it. Then, she can use it as any server.<br />

An example of IaaS provider is Amazon Web Services.<br />

2.1.2 PaaS<br />

If the user uses a PaaS, she is gaining software or a<br />

framework. A PaaS is a hosted tool that the user can leverage to<br />

build something on. An example of PaaS is Google AppEngine.<br />

With AppEngine, the user can run her web apps on Google's<br />

infrastructure. AppEngine provides the hardware, the OS and the<br />

framework. All she has to provide is her application. Then, the<br />

clients can access her application.<br />

2.1.3SaaS<br />

If the user uses a SaaS, she is gaining business functionality.<br />

Basically, a SaaS is an software the user uses, but that is installed<br />

on a provider's hardware. For example, all web applications are<br />

SaaS. The user uses the software, but she has not had something<br />

to install.<br />

2.2 Cloud Properties<br />

Cloud has two main properties: pay per use and elasticity.<br />

2.2.1 Elasticity<br />

The user can scale resources usage up and down rapidly. In<br />

the IaaS cloud model, this means that it is possible to start new<br />

instances or stop existing instances rapidly. The newly created<br />

instances must be used by the cloud in order to decrease the load<br />

of the other instances.<br />

2.2.2 Pay per use<br />

The user only pays for the resources that she actually uses.<br />

The IaaS cloud providers usually charge an instance on an hourly<br />

basis.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 458<br />

ISSN 2250-3153<br />

III. MOBICENTS SIP SERVLETS<br />

Mobicents Sip Servlets is used to build real time system, such<br />

as VoIP software‘s. The user wants her application to be able to<br />

handle a large amount of traffic in a very short time. Mobicents<br />

is the most popular Open Source SIP Application Server for the<br />

Java platform. It facilitates the implementation of new services in<br />

a simple way and quickly enables the development of a Market<br />

oriented and cost effective Service Delivery Platform.<br />

IV. RELATED WORK<br />

4.1 Current situation<br />

Mobicents Sip Servlets is used to build real time systems,<br />

such as VoIP software‘s. The user wants her application to be<br />

able to handle a large amount of traffic in a very short time.<br />

Some applications may face a huge amount of traffic. Those<br />

applications will require a consequent computation power in<br />

order to process all this traffic. In order to ensure a quick<br />

response time, a single machine may not be able to handle all the<br />

traffic by itself. In this case, the application can be deployed on a<br />

cluster. A SIP load balancer receives the traffic from outside and<br />

distributes it to the nodes of the cluster. A more sophisticated<br />

configuration would contain several SIP load balancers. The<br />

JBoss AS cluster provides three properties: elasticity, high<br />

availability and failover. Since Mobicents Sip Servlets is built on<br />

top of JBoss, those properties are also ensured by the former.<br />

Those properties ensure that it is possible to add or remove nodes<br />

at runtime in the cluster. The new nodes are automatically added<br />

to the cluster and are responsible for processing a part of the<br />

traffic. If a node fails or is removed, the traffic that was handled<br />

by this node is redirected to the other nodes of the cluster.<br />

4.2 Problem in Current situation<br />

The problem that may occur is that the number of clients of<br />

the user's application may vary considerably in a short period of<br />

time. At some time in the day, there might be a lot of clients, and<br />

at some other time, there might be a few clients. As a result,<br />

some resources of the cluster in which the application is running<br />

may be unused, or on the contrary, the cluster may be overloaded<br />

by the amount of traffic it has to process. A first solution would<br />

be to add or remove nodes in the cluster depending of the needs.<br />

In order to do so, one would have to monitor the status of each<br />

node of the cluster. The monitoring process would then decide if<br />

some nodes need to be added or removed, and would do so.<br />

However, this solution has two drawbacks. First, it is hard to<br />

predict the amount of traffic the application will meet. As a<br />

consequence, it is also hard to predict the amount of resources<br />

that should be added to or removed from the cluster. Such a<br />

prediction would be useful, as it is needed to have those<br />

resources available in order to put them in the cluster. Secondly,<br />

the resources that are not currently used in the cluster are not<br />

costless. Indeed, the user needs to own those resources in order<br />

to be able to add them quickly in the cluster. In other words, the<br />

problem that a Mobicents Sip Servlets cluster is facing is the<br />

waste of unused resources (because they are reserved in case of<br />

higher load), or on the contrary, the overload of the cluster<br />

(because no other resource is available).<br />

V. PROPOSED SOLUTION<br />

5.1 Requirements<br />

The solution of the problem requires that we migrate,<br />

Mobicents Sip Servlets to a cloud platform. The goal for the user<br />

is to be able to access in some way to some cloud images and to<br />

use them. The user shall be able to start a set of images that will<br />

compose a Mobicents Sip Servlets platform. The user shall be<br />

able to use this platform as a Mobicents Sip Servlets cluster.<br />

Finally, to achieve a full usage of the resources, the user shall be<br />

able to adjust the number of instances allocated to the Mobicents<br />

Sip Servlet platform depending on the load of this platform.<br />

Thus, the cloud images are the building blocks of the solution.<br />

Once Mobicents Sip Servlets will run on a cloud, we will be able<br />

to solve the problem. We will have the resources we need in<br />

order to scale according to the load. Because of the pay per use<br />

property of the cloud, no resource will be wasted anymore.<br />

5.1.1 Scaling Mode<br />

There are two types of scaling modes provided.<br />

5.1.1.1 Manual-scaling<br />

The user is responsible of the scaling. The scaling is made<br />

consecutively to a manual action of the user. This requirement<br />

will be fully achieved if Mobicents Sip Servlet runs on a cloud,<br />

as the user will be able to start or stop some Mobicents Sip<br />

Servlets instances.<br />

5.1.1.2Auto-scaling<br />

The environment scales automatically depending of the<br />

load. This requires the development of a management solution.<br />

The management solution will especially need to define the<br />

factors whereby the scaling is made.<br />

5.2 Images<br />

In order to put Mobicents Sip Servlets in the clouds, we<br />

will define the role of the images that need to be provided. We<br />

will provide three images: a Mobicents Sip Servlets image, a<br />

Mobicents load balancer image and a management image.<br />

5.2.1 The Mobicents Sip Servlets image<br />

The Mobicents Sip Servlets image will contain an instance<br />

of Mobicents Sip Servlets running in clustering mode. The JBoss<br />

AS clustering mode will allow several instances of this image to<br />

work as a cluster. Besides, thanks to the elasticity provided by<br />

the JBoss AS clustering mode, new instances will be<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 459<br />

ISSN 2250-3153<br />

automatically detected by the cluster and added therein. Existing<br />

instances will also be allowed to leave the cluster. This image<br />

will also contain the applications of the user. Finally, this image<br />

will need to be monitored. The monitoring will provide<br />

measurements of the auto-scaling factors. Thus, this image will<br />

contain an agent, which will communicate with an instance of the<br />

management image.<br />

5.2.2 The Mobicents load balancer image<br />

Since the Mobicents Sip Servlets image will work as a JBoss<br />

AS cluster, a SIP load balancer is needed in order to route the<br />

traffic among the running instances of the Mobicents Sip Servlets<br />

image. Although it is possible to have multiple instances of the<br />

SIP load balancer running a distributable algorithm, we plan to<br />

initially have only one instance of the SIP load balancer. The<br />

Mobicents load balancer image will contain, as its name<br />

indicates, the SIP load balancer. The Mobicents Sip Servlets<br />

instances will need to know somehow the IP address of the<br />

Mobicents load balancer instance in order to register to the SIP<br />

load balancer.<br />

5.2.3 The Management image<br />

The management image is responsible for collecting<br />

measurements of the monitoring factors from the Mobicents Sip<br />

Servlets instances. According to those data, the management<br />

instance will be responsible for starting or stopping new<br />

instances of the Mobicents Sip Servlets image.<br />

5.3 Auto-scaling<br />

Auto-scaling is the fact that, depending of the states of all<br />

Mobicents Sip Servlets instances, some instances may be started<br />

or stopped. The goal to achieve is to have all the instances<br />

running to be in a state such as they are not idle, i.e. they are<br />

processing a substantial part of the traffic. Also, none of the<br />

instances running should be in state such as they are overloaded,<br />

i.e. they are not lacking some resources to process the traffic.<br />

Auto-scaling is a process that can be decomposed in three steps<br />

5.3.1 Monitoring<br />

It is the action of retrieving the state from an (Mobicents Sip<br />

Servlets) instance. This step is done by the agent.<br />

5.3.2 Deciding<br />

It is the ability to decide if an instance should be started or<br />

stopped. This step is done by the management system.<br />

5.3.3 Scaling<br />

It is the ability to start or stop instances. This step is done by<br />

the management system.<br />

We must also define the state of an Mobicents Sip Servlets<br />

instance. This state is defined by a set of metrics. Those metrics<br />

are the following:<br />

The uptime of the instance.<br />

The CPU load.<br />

The memory usage.<br />

The Java heap memory usage of the Java virtual<br />

machine, Mobicents Sip Servlets is running on.<br />

The number of active SIP sessions.<br />

The number of active SIP application sessions.<br />

We will define two thresholds: the minimum threshold and<br />

the maximum threshold. Each threshold will contain a value for<br />

each metric that is monitored. Periodically, the scalar will get the<br />

list of the instances of each environment it has to monitor from<br />

the Nginx (Engine-x) server. Auto Bench is a tool which gives<br />

the above parameters. It will then trigger the monitor method and<br />

get some values for each metric monitored for each instance. We<br />

will have the parameter MONITOR_INTERVAL, which allows<br />

the user to set the duration of the periods. Here three sets will be<br />

created: below, averages and above. The instances for which all<br />

the metrics are below the minim threshold are put in the bellow‘s<br />

set. The instances for which at least one of the metrics is above<br />

the maximum threshold are put in the above set. The others (for<br />

which the metrics are between the minimum and maximum<br />

thresholds) are put in the averages set. If there is not any instance<br />

in both the below and the above sets, the system is stable and no<br />

action is taken. If there are as many instances in the below as in<br />

the above set, the system is well distributed, and no action will be<br />

taken. If there are more instances in the below set than in the<br />

above set, one instance is stopped. On the other hand, if there are<br />

more instances in the above set than in the below set, one new<br />

instance is started.<br />

VI. IMPLEMENTATION DETAILS<br />

Below fig shows our proposed system for this project.<br />

6.1 Eucalyptus and NginX<br />

Eucalyptus enables the creation of on-premise private clouds,<br />

with no requirements for retooling the organization's existing IT<br />

infrastructure or need to introduce specialized hardware.<br />

Eucalyptus implements an IaaS (Infrastructure as a Service)<br />

private cloud that is accessible via an API compatible with<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 460<br />

ISSN 2250-3153<br />

Amazon EC2 and Amazon S3. We stored the virtual machine<br />

image in EUCALYPTUS, which cached it on all three NCs.<br />

Nginx is a HTTP and mail proxy server capable of load<br />

balancing. We used Nginx as a load balancer because it offers<br />

detailed logging and allows reloading the configuration file<br />

without termination of existing client sessions. We installed the<br />

Nginx as a load balancer on the front-end node and the Tomcat<br />

application server on the virtual machine. Our Web application<br />

contains one Java servlet that performs a matrix calculation. The<br />

Jboss server hosts the Web application while Nginx balances the<br />

load. We used Httperf and Autobench to generate a HTTP<br />

workload for the Web application. We developed a software<br />

component named VLBManager to monitor the average response<br />

time of requests by real-time monitoring of Nginx logs. We<br />

developed another software component named VLBCoordinator<br />

to invoke the virtual machines on the EUCALYPTUS-based<br />

cloud. Both components interact with each other using XML-<br />

RPC.<br />

The VLBManager detects the violation of the average<br />

response time for each virtual machine in the load balancer due<br />

to the heterogeneous testbed cloud.<br />

Whenever VLBManager detects a violation of the average<br />

response time, it signals the VLBCooridnator to invoke another<br />

virtual machine and add it to the load balancer.<br />

6.2 Mobicents SIP servlet s Application: ClicktoCall<br />

This simple Application shows how SIP Servlets can be used<br />

along with HTTP servlets as a converged application to place<br />

calls from a web page<br />

This application consists of following steps:<br />

1. Alice and Bob each register a SIP Softphone<br />

2. Alice clicks on the "Call" link to place a call to Bob<br />

3. Alice's phone rings<br />

4. When Alice picks up her phone, Bob's phone rings<br />

5. When Bob answers his phone, the call is connected<br />

6. When one of them hangs up, the other one is also<br />

disconnected<br />

Starts two sip phones. Open up a browser to<br />

http://localhost:8080/click2call/. If you have no registered Sip<br />

clients you will be asked to register at least two.<br />

Configure your SIP clients to use the sip servlets server as a<br />

register and proxy. (Ip address: 127.0.0.1, port: 5080)<br />

By default it will accept any password, see below for instructions<br />

on how to enable security and authentication. After the<br />

registration you will see a table where each cell will initiate a call<br />

between the corresponding clients. You can also navigate to<br />

http://localhost:8080/click2call/simplecall.html, which is a<br />

simplified version that doesn't require registered clients. You will<br />

see the index page where you can enter two SIP URIs. Enter the<br />

URIs of the two SIP phones you just started and click "Submit".<br />

The SIP phones don't have to be registered. After you pick up<br />

both phones the RTP session starts.<br />

VII. CONCLUSION<br />

It is possible to propose images with Mobicents Sip Servlets<br />

that are ready to run on a cloud. The user only needs to upload its<br />

applications to the appliance, and she will be ready to use<br />

Mobicents Sip Servlets in a cloud. We have also proposed an<br />

Auto-Scaling algorithm which will use the elasticity and pay per<br />

use property of cloud. We have proposed to use JBoss as server<br />

which will support clustering and uses high availability, failover<br />

properties of clusters.<br />

ACKNOWLEDGMENT<br />

We would like to express our gratitude towards a number of<br />

people whose support and consideration has been an invaluable<br />

asset during the course of this work. I would like to thank the<br />

Mobicents community, and more generally the whole JBoss AS<br />

community.<br />

REFERENCES<br />

[1] Securing Session Initiation Protocol in Voice over IP Domain .<br />

http://ieeexplore.ieee.org . Authors: Alsmairat, I.; Shankaran, R.; Orgun,<br />

M.; Dutkiewicz, E.<br />

[2] Eucalyptus Systems, Inc.: Eucalyptus. http://www.eucalyptus.com/<br />

[3] Mobicents :<br />

http://www.mobicents.org<br />

[4] The Session Initiation Protocol: Internet-centric signaling.<br />

http://ieeexplore.ieee.org .<br />

Authors: Dutta, A.; Makaya, C.; Das, S.; Chee, D.; Lin, J.; Komorita, S.;<br />

Chiba, T.; Yokota, H.; Schulzrinne.<br />

[5] Eucalyptus Systems, Inc.: Eucalyptus. http://www.eucalyptus.com/.<br />

[6] Mihir Kulkarni and Yannis Cosmadopoulos: Sip servlet 1.1. Specification<br />

JSR 289, Oracle, August 2008,<br />

[7] http://jcp.org/aboutJava/communityprocess/_nal/jsr289/index.html.<br />

[8] Red Hat, Inc.: JBoss AS. http://www.jboss.org/jbossas/.<br />

[9] Red Hat, Inc: Mobicents Sip Servlets. http://www.mobicents.org/products<br />

sipservlets.html.<br />

[10] Partitioning, and Clustering Working Group: Open Virtualization Format<br />

Specification. Specification, [7] DSP0243, Distributed Management Task<br />

Force, January 2010.<br />

AUTHORS<br />

First Author – Mr. Manish Giri, Master of Engineering,<br />

Maharashtra Academy of Engineering, Pune, E-mail:<br />

mbgiri@comp.maepune.ac.in<br />

Second Author – Balaji Bandhu, Bachelor of Engineering,<br />

Maharashtra Academy of Engineering, Pune, E-mail:<br />

balajibandhu@gmail.com<br />

Third Author – Sachin Waghmare, Bachelor of Engineering,<br />

Maharashtra Academy of Engineering, Pune, E-mail:<br />

sachinwaghmare3@gmail.com<br />

Fourth Author – Akshay Sawwashere, Bachelor of Engineering,<br />

Maharashtra Academy of Engineering, Pune, E-mail:<br />

arsawwashere@gmail.com<br />

Fifth Author – Atul Khaire, Bachelor of Engineering,<br />

Maharashtra Academy of Engineering, Pune, E-mail:<br />

atulkhaire.om@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 461<br />

ISSN 2250-3153<br />

Study of Fast Frequency Hopping Spread Spectrum and<br />

Jamming Systems<br />

Er.Nilesh Agrwal**, Er.Navendu Nitin**, Manjay Yadav*<br />

**Faculty and *PG Student ECE Department SHIATS-DU Allahabad India 211007<br />

manjayyadav2010@gmail.com<br />

Abstract- Frequency hopping spread spectrum is an efficient<br />

technique to combat jamming. . In this paper we analysis the<br />

effect of partial band noise jamming in Fast Frequency hopping<br />

spread spectrum system. We consider a communication system<br />

that transmits MFSK over a channel. The partial band noise<br />

interference is model as AWGN Channel using the phase<br />

analysis method. We consider (ρ) as a worst case partial band<br />

noise fraction and Pb is bit error rate probability for given m and<br />

signal to noise ratio.<br />

Index Terms- Frequency hopping spread spectrum,<br />

interference, partial band noise, AWGN<br />

I<br />

I. INTRODUCTION<br />

n frequency hopping spread spectrum the signal is broad cost<br />

over a random series of a radio frequency hopping from<br />

Frequency to Frequency speech untrue a receiver. A receive<br />

hopping between frequency in synchronization with the<br />

transmitter, piece of the message signal attain to 'jam'. It is a<br />

method of transmitting radio signal by radio rapidly switching a<br />

carrier among many frequency channels, using a pseudorandom<br />

sequence known to both transmitter and receiver. It is utilized as<br />

a multiple access method in the frequency hopping code division<br />

multiple access (FH-CDMA) Scheme. In FH-SS, the total<br />

available band width of the system is dividing into many smaller<br />

bandwidth Pulse guard spaces b/w each band width. Each band<br />

width represents channel. Transmitter and receive stay on one of<br />

these channel at one time & them hop on to another channel.<br />

Larger numbers of frequencies are used in FH-SS system. So that<br />

spread spectrum signal band width (WS) is much larger than<br />

original signal band width. Jamming is usually defined as a<br />

group of hostile communication or intentional interferers that<br />

attempt to disrupt the communication of targeted users by<br />

transmitting an interfering signal over the same communication<br />

range Additive white Gaussian Noise channel is a channel model<br />

in which the only impairment to communication is a linear<br />

addition of wideband or white noise with a constant spectral<br />

density and a Gaussian distribution of a amplitude.<br />

II. SYSTEM MODEL<br />

In the Fast Frequency hopping system the hopping rate is<br />

higher then user data rate. Therefore there are many hopes per<br />

frequency bit. It is given the block diagram of frequency hopping<br />

spread spectrum Transmitter & receiver.<br />

Fig. 1 Frequency hoping transceiver<br />

Fig. 2 Frequency hoping receiver<br />

A model of FFH-SS and Jamming system a partial band noise<br />

jamming transmits noise over a fraction of the total spread<br />

spectrum signal band spread noise of total power J evenly over<br />

some frequency range of band width Wj. We define fraction (ρ)<br />

[1] as the ratio<br />

w<br />

<br />

W<br />

j<br />

ρ ss …………………..(1)<br />

Where ρ is (0,1) which is the fraction of the total spread<br />

spectrum band and Ws is a subset the total spread band width.<br />

J<br />

W<br />

J<br />

<br />

J<br />

W<br />

ss<br />

N<br />

W<br />

<br />

W<br />

J<br />

0<br />

J<br />

N<br />

J<br />

N<br />

/ P<br />

j<br />

IP<br />

…………..(2)<br />

Suppose a Gaussian noise jammer choose to restrict its total<br />

power to a fraction ρ of the full ss band width Wss .<br />

Eb <br />

N<br />

E<br />

N<br />

b<br />

…………(3)<br />

t t ……….(4)<br />

It is assumed in Figure that the jammer hops the jammed band<br />

over Wss, relation to the FH dwell time 1/Rh, but often enough<br />

to deny the FH system the opportunity to detect that it is being<br />

jammed in a specific portion of Wss and take remedial action<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 462<br />

ISSN 2250-3153<br />

1<br />

Pb<br />

<br />

2(<br />

M )<br />

P <br />

b<br />

pP<br />

b<br />

p E<br />

N<br />

M<br />

<br />

i<br />

2<br />

b<br />

i <br />

( 1)<br />

<br />

<br />

M<br />

i<br />

<br />

e<br />

( KpEb<br />

/ N<br />

<br />

J<br />

) ( 11/<br />

i)<br />

.(5)<br />

J ……………..(6)<br />

From equation 4 and 5 the resulting average performance can be<br />

expressed as.<br />

max<br />

0 p1<br />

p<br />

<br />

2(<br />

M<br />

M<br />

1)<br />

i2<br />

1<br />

M <br />

( 1)<br />

e<br />

i <br />

(<br />

KpE / N ) ( 11/<br />

i<br />

b<br />

J<br />

) <br />

<br />

<br />

Figure 3: Frequency hopping spread spectrum with<br />

jamming.<br />

III. RESULT OF DISTENSION<br />

.(7)<br />

As mentioned equation that if ρ is reduced, the probability that<br />

an m-ary transmission is jammed is decreased. But jammed<br />

signals suffer a higher conditional error rate.<br />

Variation of Pb (probability error) with different value of ρ<br />

Keeping M= 2<br />

Table 1 Variation of Pb with different values of p.<br />

EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />

0.25 0.14 0.20 0.17 0.50 0.14<br />

1.60 0.14 1.60 0.14 1.27 0.12<br />

3.19 0.13 3.19 0.11 3.19 0.12<br />

6.37 0.12 6.37 0.10 6.37 0.11<br />

8.01 0.12 8.01 0.09 8.01 0.11<br />

12.70 0.10 12.70 0.07 12.71 0.08<br />

16.00 0.08 16.00 0.06 16.00 0.00<br />

BitErrorRate<br />

10 0<br />

10 -1<br />

M =2<br />

p = 0.3<br />

p=0.6<br />

p =1<br />

10<br />

0 2 4 6 8 10 12 14 16<br />

-2<br />

Eb/Nj<br />

Fig. 4 Performance of FH/BFSK system in partial-band noise<br />

for several fixed values of r .<br />

Table 2 Variation of Pb with different values of p keeping<br />

M=4<br />

EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />

0.25 0.88 0.25 0.84 0.25 0.84<br />

1.60 0.72 1.01 0.76 1.27 0.80<br />

3.19 0.64 5.06 0.76 3.19 0.72<br />

4.01 0.72 4.01 0.68 4.01 0.72<br />

5.06 0.64 6.37 0.68 5.06 0.72<br />

8.01 0.64 8.01 0.68 8.01 0.68<br />

16.00 0.56 16.00 0.68 16.00 0.60<br />

BitErrorRate<br />

10 -0.1<br />

10 -0.2<br />

M =4<br />

p = 0.3<br />

p=0.6<br />

p =1<br />

0 2 4 6 8<br />

Eb/Nj<br />

10 12 14 16<br />

Figure 5: Degradatub in FH/MFSK performance due to<br />

worst case, PBNJ with M=4<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 463<br />

ISSN 2250-3153<br />

Table 3: Variation of Pb with different values of p keeping<br />

m=8<br />

EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />

0.33 2.20 0.53 2.11 0.268 2.112<br />

1.69 2.11 1.07 2.02 0.358 2.112<br />

2.69 2.11 1.69 2.02 2.686 2.02<br />

5.36 2.11 2.13 2.02 3,381 1.928<br />

6.75 2.02 2.69 1.92 6.746 1.928<br />

8.49 2.02 4.25 1.20 8.492 1.837<br />

21.33 1.84 13.46 1.75 21.333 1.745<br />

BitErrorRate<br />

10 0.3<br />

10 0.2<br />

M =8<br />

p = 0.3<br />

p=0.6<br />

p =1<br />

0 5 10 15 20 25<br />

Eb/Nj<br />

Figure 6 Degradation in FH/MFSK performance due to<br />

worst case, PBNJ with M=8<br />

Table No. 4 Variation of Pb with different values of p keeping<br />

M=10<br />

EB/NJ =1 EB/Nj =.6 EB/NJ =.3<br />

0.30 2.788 0.48 2.667 0.76 2.666<br />

0.38 2.667 1.207 2.556 1.20 2.556<br />

1.519 2.667 1.519 2.556 3.817 2.556<br />

3.03 2.556 6.049 2.444 4.805 2.444<br />

6-049 2.444 7.615 2.444 15.19 2.333<br />

15.19 2.333 15.19 2.333 24.06 2.222<br />

24.08 2.11 24.08 2.333<br />

BitErrorRate<br />

10 0.44<br />

10 0.43<br />

10 0.42<br />

10 0.41<br />

10 0.4<br />

10 0.39<br />

10 0.38<br />

10 0.37<br />

M =10<br />

p = 0.3<br />

p=0.6<br />

p =1<br />

0 5 10 15 20 25<br />

Eb/Nj<br />

Figure 7 Degradation in FH/MFSK performance due to<br />

worst case, PBNJ with M=10<br />

IV. CONCLUSION<br />

This paper provide the study of fast frequency hopping spread<br />

spectrum operating in the presence of partial band noise<br />

jamming. The result has been presented for several cases. This<br />

improves the system performance in all cases. Particular it<br />

increases the value ρ of more drastically than it decrease the<br />

value of Eb/Nj.<br />

REFERENCES<br />

[1] Hussain S. and Barton S., ―Non-Coherent Detection of FSK Signals in the<br />

Presence of Oscillator Phase Noise in an AWGN Channel,‖ in Proceedings<br />

of the 7th IEE European Conference Mobile Personal Communications,<br />

Brighton, Proceedings 387, pp. 95-98, 1993.<br />

[2] Massaro M., ―Error Performance of M-ary No coherent FSK in the Presence<br />

of CW Tone Interference,‖ IEEE Transactions Commununication, vol. 23,<br />

pp. 1367-1369, 1975[3] Husain S. and Barton S., ―Non-Coherent Detection<br />

of FSK Signals in the Presence of Oscillator Phase Noise in an AWGN<br />

Channel,‖ in Proceedings of the 7th IEE European Conference Mobile<br />

Personal Communications, Brighton, Proceedings 387, pp. 95-98, 1993.<br />

[3] S. W. Houston, "Modulation Techniques for Communication, Part I: Tone<br />

and Noise Jamming Performance of Spread Spectrum M-ary FSK and 2,4ary<br />

DPSK Waveforms," in Proc.IEEE NAECON, 1975, pp. 51-58.<br />

[4] Hussain, S. and Button, S. K.; "Non-coherent Detection of FSK signals in<br />

the Resence of Oscillator Phase Noise in an AWGN Channel", Seventh IEE<br />

Erumpent Confine on Mobile Personal Comtnunica'ons, (Proc No. 383,<br />

Brighton, 13-15 Dec 1993, pp.95-98.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 464<br />

ISSN 2250-3153<br />

The Compliance of Temporary Soft Lining Materials-An<br />

in vivo & vitro study<br />

Dr. N.Shanmuganathan, Dr.T.V.Padamanabhan, Dr.R.Subramaniam, Dr.S.Madhankumar<br />

Abstract- Objective: The purpose of this study was to<br />

evaluate the change in clinical compliance of the three selected<br />

soft lining materials during use (in vivo) and also to analyze the<br />

leached out component during use. (In vitro)<br />

Methods and materials: Three soft-liner materials (Visco-gel,<br />

Coe-soft, GC Soft liner) were studied. Three circular depressions<br />

were made on the intaglio surface of the posterior palatal seal<br />

region, and they were filled with the three selected soft lining<br />

material and marked as A, B, C. Modified penetrometer was used<br />

to test the clinical compliance of the material over a period of 2<br />

hrs, 24 hrs, 1 week and 4 weeks after the denture was inserted.<br />

An in vitro study was conducted to find out the leachable<br />

components, both qualitatively and quantitatively with the use of<br />

high performance liquid chromatography and the clinical<br />

findings were correlated.<br />

Results: Paired t-test was applied to analyze the data. It was<br />

found that compliance of Visco-gel reduced the most in the 1 st<br />

week which was followed by GC Soft liner over a period of 4<br />

weeks followed by Coe Soft. In vitro study revealed that initial<br />

loss of ethanol was shown by HPLC test which caused the<br />

reduction in compliance.<br />

Conclusion: The results of this study indicated that physical<br />

property of the materials mainly depend on the type of<br />

plasticizer used and not ethanol that is present in most of the<br />

tissue conditioners. It could also be inferred that the use of<br />

plasticizer with large molecular size like benzyl salicylate, would<br />

preserve the physical property of the material over a longer<br />

period of time.<br />

Index Terms- Soft-liners, Clinical Compliance, High<br />

performance liquid chromatography<br />

T<br />

I. INTRODUCTION<br />

he inflammation and accompanying edema of the soft tissue<br />

underlying ill-fitting dentures have been the concern for<br />

many years. In the past, management of these patients, and those<br />

with congenital or acquired abnormalities, systemic disturbances<br />

or a combination of these, using hard and rigid polymers was<br />

very difficult if not impossible. The use of material designed to<br />

recondition abused denture supporting tissues and to restore a<br />

normal healthy state was reported by Chase 12 . Since then, these<br />

class of dental materials have stimulated several clinical and<br />

laboratory studies and there are many products designed to<br />

produce, tissue conditioning of the soft tissues underlying<br />

dentures‖. Clinicians who have long been aware of these<br />

materials can be effective in relieving the pain, discomfort and<br />

inflammation associated with this situation. In these conditions,<br />

tissue conditioners are used to treat the abused mucosa. These<br />

materials will confirm to the anatomy of the residual ridge and<br />

gel in that position and continue to flow slowly after application.<br />

The purpose of the soft liner is to absorb some of the energy<br />

produced by masticatory impact that would otherwise be<br />

transmitted through the denture to the soft mucosal tissues.<br />

The soft relining material can be either temporary or<br />

permanent. The temporary soft relining material which set intraorally<br />

inside the mouth, can be used for a short period (up to<br />

several weeks) to improve the comfort and fit of the complete<br />

denture until it can be remade or permanently relined. After a<br />

few weeks they begin to foul smell and debond from the denture.<br />

Hence this material has to be replaced often. The permanent soft<br />

relining material (processed soft liners) is used in a patient who<br />

is wearing a complete denture and experiencing chronic soreness<br />

with their dentures, may be because of heavy bruxism or poor<br />

oral health. These materials are processed in the laboratory in a<br />

manner similar to denture base. They may remain resilient up to<br />

a year. After which they tend to debond from the denture base or<br />

become porous and foul smelling.<br />

These soft lining materials are mainly made up of polyethyl<br />

methacrylate or polymethyl methacrylate resin added with<br />

plasticizer such as Dibutyl Phthalate or Ethanol. During use,<br />

these materials may become more rigid and inelastic due to loss<br />

of alcohol. The most important characteristic physical property<br />

of resilient denture liners is their elastic modulus. The reciprocal<br />

of the elastic modulus is called compliance, which is also<br />

referred to compressibility of the material. A compliance<br />

measurement gives the flexibility of the material. Reduction of<br />

these properties as a result of constant use in an oral cavity has<br />

been its great disadvantage. Hence this study was done to assess<br />

the resilient property and the loss of this property during intraoral<br />

use and to analyze the leachable component of these materials by<br />

in vitro to correlate with loss in the resilient property of these<br />

materials.<br />

II. MATERIALS AND METHODS<br />

Ten completely edentulous patients were selected randomly<br />

among the patients attending the Dept of Prosthodontics in the<br />

Saveetha Dental College, Chennai for replacement of their<br />

missing teeth. Convenience sampling technique was adopted for<br />

selecting the patients. The inclusion criteria included patients<br />

from both the genders, having completely edentulous area in both<br />

the maxillary and mandibular arch. All the individuals who were<br />

selected for this study had extracted their teeth before one year,<br />

with complete healing of the ridge, and it was also ensured that<br />

no pathological conditions existed in the oral cavity at the time of<br />

this study. Consent of the patient was obtained after explaining<br />

the purpose of the study and its procedures that would be<br />

followed during its conduct.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 465<br />

ISSN 2250-3153<br />

Clinical phase: Ten patients were selected and complete<br />

dentures were constructed in the conventional methods. On all<br />

the ten selected maxillary dentures, three circular depression, in<br />

the right (A) , centre (B) and left (C) on the intaglio surface of<br />

the posterior palatal region measuring about 4mm diameter x<br />

2mm depth in dimensions were made(figure-1). This region was<br />

(Table 1)<br />

Product Code Manufacturer Powder/ Liquid<br />

Ratio by weight<br />

Visco-gel VG DeTreyDivision, Dentsply Ltd,<br />

Weybridge, Surrey, England<br />

1.25<br />

COE Soft<br />

GC Soft-<br />

Liner<br />

CS Coe Laboratories Inc<br />

GC G-C Dental Industry<br />

Co,Tokyo,Japan<br />

PEMA: Polyethyl methacrylic; PMMA: Polymethyl methacrylic;<br />

BPBG: butyl pthalyl butyl glycolate; DBP: dibutylpthalate; BS:<br />

benzyl salicylate; EtOH: ethyl alcohol. In which the right (A)<br />

was filled with Visco-gel, centre (B) was filled with COE Soft<br />

and left (C) was filled with GC Soft Liner.<br />

Method of testing: The dentures were then tested for clinical<br />

compliance of each of the three samples of soft liner material<br />

using modified penetrometer and measured separately. This test<br />

was done after a period of 2 hrs, 24 hrs, 1 week and 4 weeks,<br />

after the denture was inserted. Modified flat end penetrometer<br />

needle probe was used to test the clinical compliance of the<br />

tested materials. Clinical compliance of each material, Visco-gel,<br />

Coe Soft and GC Soft liner were measured separately. The tests<br />

were performed according to Nicholas J.A Jepson et al. 9 A load<br />

of 30g was held constantly for five seconds, strain cured in<br />

during loading, recovery were recorded. Test was performed on<br />

three separate points on each specimen.<br />

III. LAB PHASE<br />

An in-vitro study was conducted to find out the leachable<br />

components, both qualitatively and quantitatively. This test was<br />

done to correlate with the clinical findings. The technique, HPLC<br />

(High performance liquid chromatography) was used for<br />

analyzing the molecules that are dissolved in a solvent. These<br />

solvents were qualitatively and quantitatively analyzed to find<br />

the leachable components of the specimen. Three samples of the<br />

relining material were made to the dimension 8.5mm in diameter<br />

and 2mm thickness(figure-3) according to Hironori Tsuchiya et<br />

al 11 .These samples were placed in nano purified water (figure-4).<br />

Selectively the samples were removed from each test material<br />

after a period of 2 hrs, 24hrs, 1week, and 4 weeks and analyzed.<br />

The high performance liquid chromatography is a method used<br />

for separating molecules dissolved in a solvent. The solvent is<br />

selected due to the space available for the placement of test<br />

sample as done by David M Casey et al. 10 These depressions<br />

were filled with the following selected soft lining materials<br />

(Table 1) and placed in the oral cavity (figure-2).<br />

Composition<br />

Powder Liquid<br />

PEMA(86.2%) BPBG(86.9%)<br />

PMMA(13.8%) DBP(8.2%)<br />

EtOH(4.9%)<br />

1.34 PEMA(100%) BS(35.1%)<br />

DBP(49.7%)<br />

EtOH(15.2%)<br />

1.25 PEMA(100%) BPBG(80.9%)<br />

DBP(4.3%)<br />

EtOH(14.8%)<br />

qualitatively and quantitatively analyzed to find the leached out<br />

components of the specimen.<br />

Figure 1: Three circular depression created on the intaglio<br />

surface<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 466<br />

ISSN 2250-3153<br />

Figure 2: depressions filled with selected three different soft<br />

lining materials<br />

Figure 3: Dyes made for preparing the samples<br />

Figure 4: All the three samples immersed in the nano purified<br />

water<br />

Similar study has been done by Minoru Kawaguchi et al 13<br />

using the HPLC test to study the amount of leachable monomers<br />

of a light activated reline resin. The different solutes will interact<br />

with stationary phase to differing phase, due to difference in size,<br />

adsorption, partitioning etc. These differences allow the mixture<br />

components to be separated from each other and studied<br />

separately. This instrument consists of a column with a fritted<br />

bottom that holds the stationary phase. The mixture to be<br />

separated is loaded on to the top of the column. The different<br />

component in the solvents passes through the column at different<br />

rates due to difference in their partitioning behavior. The<br />

different solutes are studied using UV detector at different times<br />

when it passes through the column.<br />

Qualitative analysis: Identification of different components of<br />

the samples was made by comparing retention time of different<br />

analysts with that of the standard.<br />

Quantitative analysis: Quantization was done by comparison of<br />

the sample chromatogram with that of the standard. In this study,<br />

the peak height of the chromatogram was taken in to<br />

consideration.<br />

IV. RESULTS<br />

Data were analyzed with IBM SPSS 19.0 version software.<br />

The descriptive statistics with ten numbers of samples in all the<br />

groups were shown in the table number 1 with their mean and<br />

standard deviation.<br />

Table: 1 The table shows the mean and standard deviation of<br />

clinical compliance at 2 hours,24 hours, 1 week and 4 weeks for<br />

all the three groups. In group A, the mean value in 2 hours was<br />

3.785 and it was decreased in the 4 week to 0.489. The same<br />

trend was shown in group B and group C.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 467<br />

ISSN 2250-3153<br />

Table:1<br />

Descriptive Statistics<br />

N Mean<br />

Std.<br />

Deviation<br />

Group<br />

2hrs<br />

A- 10 3.78520 .112252<br />

Group<br />

2hrs<br />

B 10 4.78380 .009271<br />

Group<br />

2hrs<br />

C 10 4.60800 .102940<br />

Group<br />

24hrs<br />

A 10 3.39120 .026097<br />

Group<br />

24hrs<br />

B 10 4.75200 .010893<br />

Group<br />

24hrs<br />

C 10 4.2321 .01022<br />

Group<br />

1wk<br />

A 10 1.44760 .010113<br />

Group<br />

1wk<br />

B 10 3.92930 .010371<br />

Group<br />

1wk<br />

C 10 2.76970 .010371<br />

Group<br />

4wks<br />

A 10 .48920 .006579<br />

Group<br />

4wks<br />

B 10 1.78330 .010371<br />

Group<br />

4wks<br />

C 10 .59290 .010225<br />

Table 2: Paired sample t test was implemented to find out the<br />

significance between the groups A, B, and C during the time<br />

duration of 2 hours, 24 hours, 1 week and 4 weeks respectively.<br />

Paired t-test<br />

Groups<br />

Table: 2<br />

Sig. (2-<br />

T Df tailed)<br />

Group A-2hrs - Group B<br />

2hrs<br />

-27.490 9 .000<br />

Group B-2hrs - Group C<br />

2hrs<br />

-26.584 9 .000<br />

Group C 2hrs - Group A-<br />

2hrs<br />

22.341 9 .000<br />

Group A 24hrs - Group<br />

B 24hrs<br />

-128.142 9 .000<br />

Group B 24hrs - Group<br />

C 24hrs<br />

89.648 9 .000<br />

Group C 24hrs - Group<br />

A 24hrs<br />

98.790 9 .000<br />

Group A 1wk - Group B -504.466 9 .000<br />

1wk<br />

Group B 1wk - Group C<br />

1wk<br />

292.305 9 .000<br />

Group C 1wk - Group A<br />

1wk<br />

412.865 9 .000<br />

Group A 4wks - Group<br />

B 4wks<br />

-307.413 9 .000<br />

Group B 4wks - Group C<br />

4wks<br />

252.371 9 .000<br />

Group C 4wks - Group<br />

A 4wks<br />

28.984 9 .000<br />

The identified p value was .0001<br />

Table 3: The following table shows the mean and standard<br />

deviation of the three types of softliner during the duration of 2<br />

hours, 24 hours, 1 week and 4 weeks respectively.<br />

Table :3<br />

Descriptive Statistics<br />

N Mean Std. Deviation<br />

VG 2 ETOH 6 .14050 .019398<br />

CS 2 ETOH 6 .82000 .028014<br />

GC 2 ETOH 6 .46183 .021321<br />

VG 24 ETOH 6 .95900 .019647<br />

VG 24 DBP 6 .14050 .018534<br />

CS 24 ETOH 6 1.33967 .017189<br />

CS 24 DBP 6 .45883 .019198<br />

GC 24 ETOH 6 .46567 .024841<br />

GC 24 DBP 6 .04617 .020913<br />

VG 1W ETOH 6 2.16967 .018403<br />

VG 1W DBP 6 .45083 .024045<br />

VG 1W BPBG 6 1.16000 .018243<br />

CS 1W ETOH 6 2.84867 .019997<br />

CS 1W DBP 6 .95850 .025758<br />

CS 1W BS 6 1.15850 .020226<br />

GC 1W ETOH 6 2.95567 .023526<br />

GC 1W DBP 6 .35967 .018085<br />

GC 1W BPBG 6 1.05283 .028273<br />

VG 4W ETOH 6 3.75050 .025774<br />

VG 4W DBP 6 1.36500 .022680<br />

VG 4W BPBG 6 2.16183 .023259<br />

CS 4W ETOH 6 4.66283 .027007<br />

CS 4W DBP 6 1.76067 .022367<br />

CS 4W BS 6 1.86350 .023287<br />

GC 4W ETOH 6 4.95533 .023636<br />

GC 4W DBP 6 1.05283 .036141<br />

GC 4W BPBG 6 2.36617 .029158<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 468<br />

ISSN 2250-3153<br />

Table4: Paired sample t test was implemented to find out the<br />

significance between the soft liners with the time duration of 2<br />

hours, 24 hours, 1 week and 4 weeks respectively. The table<br />

shows there was a significant difference between the three soft<br />

liners in the time period of 2 hours, 24 hours, 1 week and 4<br />

weeks with the p value of .0001.<br />

Table :4 Paired t-test<br />

t<br />

df<br />

Sig.(2tailed)<br />

VG 2 ETOH -<br />

CS 2 ETOH<br />

-50.389 5 .000<br />

VG 2 ETOH -<br />

GC 2 ETOH<br />

-19.750 5 .000<br />

GC 2 ETOH -<br />

VG 2 ETOH<br />

19.750 5 .000<br />

VG 24 ETOH -<br />

CS 24 ETOH<br />

-33.817 5 .000<br />

VG 24 ETOH -<br />

GC 24 ETOH<br />

65.166 5 .000<br />

CS 24 ETOH -<br />

GC 24 ETOH<br />

85.758 5 .000<br />

VG 24 DBP - CS<br />

24 DBP<br />

-30.522 5 .000<br />

CS 24 DBP - GC<br />

24 DBP<br />

37.467 5 .000<br />

GC 24 DBP - VG<br />

24 DBP<br />

-7.446 5 .001<br />

VG 1W ETOH -<br />

CS 1W ETOH<br />

-67.720 5 .000<br />

CS 1W ETOH -<br />

GC 1W ETOH<br />

-9.746 5 .000<br />

GC 1W ETOH -<br />

VG 1W ETOH<br />

77.877 5 .000<br />

VG 1W DBP -<br />

CS 1W DBP<br />

-32.927 5 .000<br />

CS 1W DBP -<br />

GC 1W DBP<br />

35.483 5 .000<br />

VG 1W DBP -<br />

GC 1W DBP<br />

7.817 5 .001<br />

GC 1W BPBG -<br />

VG 1W BPBG<br />

-8.592 5 .000<br />

VG 4W ETOH -<br />

CS 4W ETOH<br />

-59.107 5 .000<br />

CS 4W ETOH -<br />

GC 4W ETOH<br />

-15.576 5 .000<br />

GC 4W ETOH -<br />

VG 4W ETOH<br />

74.064 5 .000<br />

VG 4W DBP -<br />

CS 4W DBP<br />

-25.659 5 .000<br />

CS 4W DBP -<br />

GC 4W DBP<br />

63.990 5 .000<br />

GC 4W DBP - -15.559 5 .000<br />

VG 4W DBP<br />

VG 4W BPBG -<br />

GC 4W BPBG<br />

-13.366 5 .000<br />

V. DISCUSSION<br />

It is admitted that ill fitting dentures are bane to the patients<br />

and dental professionals. This may be due to poor fabrication of<br />

the dentures, prolonged use of the dentures and also due to<br />

systemic conditions like diabetes. These poor fitting dentures<br />

often abuse the basal tissue. The reaction may range from simple<br />

denture stomatitis to hyperplasia. The hard tissues may undergo<br />

accelerated resorption. The reason for this could be due to the<br />

pressure on the mental foramen; sharp bony spicules; thin,<br />

atrophic mucosa; bony undercuts, particularly in the mylohyoid<br />

region; irregular bony resorption; poor fit of the denture base;<br />

incorrect occlusal relationship; bruxism; and/or debilitating<br />

disease. 1 It is wise to decide whether the treatment should include<br />

remaking the prosthesis rather than simply relining a prosthesis<br />

for short-term benefit without a plan for long –term success.<br />

Research site the use of tissue conditioners to treat an abused<br />

mucosa during 1960s. 2-4 These materials stay intact to the<br />

anatomy of residual ridge and gel in that position and continue to<br />

flow slowly after application and distribute stress on denture –<br />

bearing tissues 3-6 .These tissue conditioners have plasticizer or<br />

ethanol which being a low molecular weight compound is<br />

usually leached out in the saliva over a period of time. This<br />

leaching out may result in reduction in softness of the material,<br />

which may have a negative impact on the tissues. These<br />

materials are very porous; porosity of these materials imparts the<br />

quality of shock absorption. The adverse effect of the porosity is<br />

that it forms a nidus for easy colonization with fungi and other<br />

microorganisms. So prolonged therapy is usually not possible<br />

with this class of material. The other disadvantage is the<br />

marginal leakage between these liners and the denture base.<br />

Extensive study has been done regarding these physical<br />

properties and the influence of bacterial colonization and its<br />

manifestation on the tissue liner. But studies to elicit the change<br />

of physical properties of these materials in the oral environment<br />

have not been dealt much. Hence this study was conducted to<br />

measure the change in compliance of selected tissue conditioners<br />

i.e.; Visco gel, Coe soft, GC Soft-liner and correlate it with the<br />

type and amount of chemicals leached out from the tissue<br />

conditioners over a period of time. The clinical compliance of<br />

Coe soft, Visco gel, GC Soft liner were measured individually<br />

using the modified penetrometer. The manufacture‘s<br />

recommended period of use in the oral cavity is between 3-4<br />

weeks and so it was decided to test the specimens at 2hrs, 24hrs,<br />

1 week and 4 weeks. Concurrent with this study, evaluation of<br />

the chemicals leached out from the test samples was studied<br />

using High performance liquid chromatography (HPLC). The<br />

results of this study that all the three test materials have similar<br />

initial compliance when tested at 2 hrs had the mean value of<br />

compliance at 2 hrs Group A (Visco gel) – 3.785, Group B (Coe<br />

soft) – 4.783 and Group C (GC Soft liner) – 4.608.<br />

There was a significant change in compliance over a period of 4<br />

weeks for each of the tested materials. Group B (Coe soft)<br />

showed the least change (mean value 1.781) there was a<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 469<br />

ISSN 2250-3153<br />

statistically significant difference of change in compliance when<br />

the material Group A, B & C were compared with each other.<br />

When the change in compliance between the material Group A<br />

and C were compared at a time period of 2-24 hrs there was no<br />

significant difference ( t value- 0.41). The HPLC analysis<br />

showed that ethanol leached out first in all the three samples<br />

which was seen in the 2 hrs test results with the mean value of<br />

0.1405 for Visco gel, 0.8200 for Coe soft and 0.4618 for Soft<br />

liner. Dibutyl phthalate was seen to leach out in all the three<br />

samples and was present in the 24 hrs test sample, the mean<br />

value for Visco gel was 0.1405 with a t-value of 74.23. The Coe<br />

soft had a mean value of 0.4588 with a t-value of 83.73 and GC<br />

Soft liner had the mean value of 0.0461 with the t-value 100.86.<br />

Butyl pthalyl butyl glycolate leached out at 1week from the two<br />

test samples. The mean value for Visco gel was 1.1600 with the<br />

SD of .018243 and GC Soft liner was 1.0528 with the SD of<br />

.028273. Benzyl salicylate leached out at 1 week from Coe soft,<br />

the mean value was 1.1585 with the SD of .020226. Butyl<br />

pthalyl butyl glycolate leached out at 4 weeks from the two test<br />

samples. The mean value for Visco gel was 2.1618 with the SD<br />

of .023259 and for GC Soft liner it was 2.3661 and .029158.<br />

Benzyl salicylate leached out at 4 weeks from Coe soft and had<br />

the mean value of 1.8635 with the SD - .023287. The amount of<br />

ethanol, Dibutyl phthalate, butyl pthalyl butyl glycolate, benzyl<br />

salicylate increased from leaching out at 2 hrs to 4 weeks was<br />

measured.<br />

Similarly there was an increase in the amount of Dibutyl<br />

phthalate from leaching at 24 hrs to 4 weeks. Butyl pthalyl butyl<br />

glycolate and benzyl salicylate was last to leach out and<br />

increased from 1 week to 4weeks.Correlating the above said tests<br />

for the various test specimens, it was found that the initial loss of<br />

ethanol between 2 hrs- 24 hrs caused statistically insignificant<br />

change in compliance of all the three test samples. On further<br />

testing it was found that loss of ethanol and plasticizer produced<br />

a significant change in compliance over a period of 1 week, loss<br />

of butyl pthalyl butyl glycolate produced more significant change<br />

in compliance ( as seen in Visco gel and GC Soft liner) than the<br />

loss of benzyl salicylate as seen in the case of Coe soft. Further<br />

test to a period of 4 weeks retreated the same result i.e. loss of<br />

plasticizer like butyl pthalyl butyl glycolate produced more<br />

change than loss of benzyl salicylate. This result can be inferred<br />

as the loss of ethanol and Dibutyl phthalate for all the three test<br />

samples were similar. These changes could be due to the<br />

difference in molecular size. Benzyl salicylate being larger<br />

molecule would be leached out slower than butyl pthalyl butyl<br />

glycolate which would be leached out faster and hence lead to<br />

deterioration of the physical properties as found by H.Murata et<br />

al. 13<br />

Differences in base-line properties between materials<br />

probably reflect the combined effects of varying polymer<br />

composition, ethanol concentration, plasticizer type, and powder:<br />

liquid ratio. Reductions in compliance tended to reflect a<br />

material‘s baseline softness- the higher the baseline initial<br />

compliance, the greater the reduction. Baseline values of<br />

compliance and the differences in these values between materials<br />

were both significantly reduced such that at 28 days there were<br />

only small differences in compliance values that ranged from<br />

0.14 mm/ N for CC to 0.5mm/ N for VG. Several authors have<br />

described that the viscoelastic properties best suited to their<br />

specific use as tissue conditioners or functional impression or<br />

temporary reline materials. These properties concern various<br />

combination of softness, elastic recovery, and plastic flow but<br />

have often been described only in relation to the gel formed after<br />

initial mixing. Continued changes in these properties over time<br />

are clearly important to their actual effectiveness. These were<br />

modified over time through a rapid reduction in compliance and<br />

increase in elastic recovery, a combination of properties ideally<br />

suited to its use as a functional impression material. The<br />

combination of high initial compliance and elastic recovery seen<br />

for CC and to a lesser extent CS would indicate a soft elasticity<br />

appropriate to tissue conditioning. 7-8<br />

VI. CONCLUSION<br />

The study identifies that the use of a simple, modified<br />

penetrometer enabled a clear and reproducible characterization of<br />

the viscoelastic properties of four temporary soft lining<br />

materials. 10 These changes would be attributed to the loss of<br />

ethanol and plasticizers. Initial loss of ethanol which was shown<br />

by HPLC test was also the cause for reduction in compliance.<br />

But loss of plasticizers let too drastic reduction in clinical<br />

compliance. This was more apparent when butyl phthalate butyl<br />

glycolate was the plasticizer used in the soft liner where as the<br />

material using benzyl salicylate as the plasticizer showed less<br />

change than earlier ones.<br />

Hence it can be concluded that physical property of the<br />

material mainly depends on the type of plasticizer used and not<br />

ethanol that is present in most of the tissue conditioners. It can<br />

also be inferred that use of plasticizer with large molecular size<br />

like benzyl salicylate, would preserve the physical property of<br />

the material over a longer period of time.<br />

REFERENCES<br />

[1] Storer R. Resilient denture base materials. Br Dent J 1962;113:95.<br />

[2] Goll G, Smith DE, Plein JB. The effect of denture cleaners on temporary<br />

soft liners. J Prosthet Dent 1983;50:466-472.<br />

[3] Lytle RB. Complete denture construction based on a study of the<br />

deformation of the underlying soft tissues. J Prosthet Dent 1959;9:539-551.<br />

[4] Calikkocaoglu S. Tam Protezler. 2. cilt, Protez Akademisi ve Gnatoloji<br />

Dernegi 2. Bilimsel yayini,1988.<br />

[5] Qudah S Harrison A, Huggett R: Soft lining materials in prosthetic<br />

dentistry: A review . Int J Prosthodont 1990;3:477-483.<br />

[6] Jepson NJA, McCabe JF, Storer R: Evaluation of the viscoelastic properties<br />

of denture soft lining materials. J Dent 1993;21:163-170.<br />

[7] Graham BS, Jones DW, Thomson JP, Johnson JA: Clinical compliance of<br />

two resilient denture liners. J Oral Rehabil 1990;17:157-63.<br />

[8] Jepson NJ, McCabe JF, Storer R: Age changes in the viscoelasticity of a<br />

temporary soft lining material. J Dent 1993;21:244-7.<br />

[9] Nicholas J.A.Jepson, Joseph T.McGill, John F. McCabe: Influence of<br />

dietary stimulating solvents on the viscoelasticity of temporary Soft lining<br />

materials. J Prosthet Dent 2000;83:25-31.<br />

[10] David M Casey, Ellen C.Scheer: Surface treatment of a temporary soft liner<br />

for increased longevity J Prosthet Dent 1993;69:318-324.<br />

[11] Hironori Tsuchiya,Yoshiyuhi Hoshino etal: Leaching and Cytotoxicity of<br />

formaldehyde and methyl metacrylate from acrylic resin denture base<br />

materials. J Prosthet Dent 1994;71:618-624.<br />

[12] Chase W.W: Tissue conditioning utilizing dynamic adaptive stress. J<br />

Prosthet Dent 1961;11: 804-815.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 470<br />

ISSN 2250-3153<br />

[13] Murata H, Iwangaga H, Shigeto N, Hamada T: Initial flow of tissue<br />

conditioners influence of compostion and structure on gelation. J Oral<br />

Rehabi 1993;20:177-187.<br />

AUTHORS<br />

First Author: Dr. N.Shanmuganathan,<br />

Professor, Department of Prosthodontics<br />

Faculty of Dental Sciences, Sri Ramachandra University<br />

Chennai – 600 116, India<br />

Phone: +91 9840231829<br />

Email: shansdr@yahoo.co.in<br />

Second Author: Dr.T.V.Padamanabhan<br />

Professor and HOD, Department of Prosthodontics<br />

Faculty of Dental Sciences, Sri Ramachandra University<br />

Chennai – 600 116<br />

India<br />

Third Author: Dr.R.Subramaniam<br />

DEAN, Noor-ul Islam Institue of Dental sciences<br />

Kerala, India<br />

Forth Author: Dr.S.Madhankumar<br />

Senior Lecturer, Department of Prosthodontics<br />

Faculty of Dental Sciences, Sri Ramachandra University<br />

Chennai – 600 116<br />

India<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 471<br />

ISSN 2250-3153<br />

M<br />

A Case Report – MELAS Syndrome<br />

Dr Hariom Meena*, Dr Ramraj Meena*, Dr Surendra Khosya*<br />

Department of Medicine<br />

Govt Medical College & Attached, MBS. Hospital, Kota, Rajasthan, India<br />

*JR 3 IN DEPARTMENT OF INTERNAL MEDICINE<br />

Email: drkhosya3@gmail.com<br />

I. INTRODUCTION<br />

ELAS (mitochondrial encephalomyopathy, lactic acidosis,<br />

and recurrent stroke-like episodes) syndrome is a rare<br />

neurodegenerative and fatal disease cause by mutation in<br />

mitochondrial DNA. Patients with mitochondrial myopathies<br />

typically have exercise- induced symptoms. Thus, patients are<br />

often advised to avoid exercise, which leads to deconditioning.<br />

Currently, the concept of aerobic exercise training as therapy for<br />

mitochondrial disease is not well established.<br />

MELAS is a condition that affects many of the body's systems,<br />

particularly the brain and nervous system (encephalo-) and<br />

muscles (myopathy). In most cases, the signs and symptoms of<br />

this disorder appear in childhood following a period of normal<br />

development[3].Early symptoms may include muscle weakness<br />

and pain, recurrent headaches, loss of appetite, vomiting, and<br />

seizures. Most affected individuals experience stroke-like<br />

episodes beginning before age 40. These episodes often involve<br />

temporary muscle weakness on one side of the body<br />

(hemiparesis), altered consciousness, vision abnormalities,<br />

seizures, and severe headaches resembling migraines. Repeated<br />

stroke-like episodes can progressively damage the brain, leading<br />

to vision loss, problems with movement, and a loss of intellectual<br />

function (dementia).<br />

Most people with MELAS have a buildup of lactic acid in<br />

their bodies, a condition called lactic acidosis. Increased acidity<br />

in the blood can lead to vomiting, abdominal pain, extreme<br />

tiredness (fatigue), muscle weakness, loss of bowel control, and<br />

difficulty breathing. Less commonly, people with MELAS may<br />

experience involuntary muscle spasms (myoclonus), impaired<br />

muscle coordination (ataxia), hearing loss, heart and kidney<br />

problems, diabetes, Epilepsy, and hormonal imbalances.<br />

MELAS (mitochondrial encephalomyopathy, lactic acidosis, and<br />

recurrent stroke-like episodes) syndrome is a mitochondrial<br />

disorder. Patients with MELAS generally have a poor prognosis<br />

and outcome, as effective therapiesfor MELAS syndrome have<br />

not been established. The clinical management of individuals is<br />

largely supportive and includes exercise training.[1] In recent<br />

studies, exercise has been shown to be of possible benefit to<br />

patients with mitochondrial disease as it prevents deconditioning,<br />

which can exacerbate pre-existing exercise intolerance and<br />

fatigability[2,3].Aerobic training enhances aerobic capacity,<br />

muscle oxidative metabolism, and ATP production, decreases<br />

lactate levels, and improves quality of life in patients with<br />

mitochondrial disease.[4] A regular low intensity regimen can<br />

improve muscle endurance and cardiopulmonary function.<br />

II. CASE REPORT<br />

The patient, Ahsaan Mohd. 40-year-old man, was admitted to<br />

our hospital due to an episode involving visual hallucinations,<br />

migraine-like headaches, seizure, vomiting, recurrent sudden loss<br />

of consciousness, and relative lower limbs weakness.None of his<br />

family members or relatives had MELAS. His speech was fluent<br />

with normal comprehension and repetition. He had grade 4<br />

muscle power of his both upper and lower limb, bilateral plantar<br />

are extensor. He had intact, brisk symmetrical deep tendon<br />

reflexes and absent Babinski sign bilaterally. On day 2 of his<br />

hospitalization, he become conscious and his altered sensorium<br />

improved and headache, vomiting completely resolved. On day<br />

3 he walk a maximal distance of 5 meters. He had a wide-based,<br />

slightly ataxic gait as well.<br />

Laboratory data included a serum lactate of 62.9 mmol/L<br />

(normal < 2.1 mmol/L). widal test and MP by card are normal.<br />

CSF done which is within normal limit. Serum phorphobilinogen<br />

level was normal. Magnetic resonance imaging (MRI) brain<br />

studies showed area of hyperintencity in periventricular ,parietooccipital<br />

white matter s/o leukoencephalopathy .(Figure 1).<br />

Nerve conduction velocities (NCV) of bothlower limbs were<br />

normal, but, on electromyography (EMG), myopathic changes<br />

were seen in both lowerlimbs.. A muscle biopsy was taken from<br />

the rectus femoris muscle and ragged red fibers were noted on<br />

examination.<br />

In the10 th day the patient‘s showed neurological<br />

improvement in muscle power, balance, endurance, and his gait<br />

speed. Her both extremity muscle power improved from grade 4<br />

to grade 5. After discharge, the rehabilitation program prescribed<br />

for the patient emphasized instrumentaldaily activity and home<br />

aerobic exercise walked in his community 15-20 min daily. he<br />

coulddo household tasks, including housecleaning,bathing<br />

washing dishes, and changing bed linens with minimal difficulty.<br />

After one month he was readmitted in hospital with similar kind<br />

of illness.and improved within two days.<br />

III. DISCUSSION<br />

Figure 1. Magnetic resonance imaging study of the brain<br />

shows hyperintense T2 lesions predominantly in the subcortical<br />

white matter in the right temporal, parietal, and occipital lobes.<br />

Muscle strength, gait speed, physical function, and quality of life.<br />

The recovery was possible due to the muscle adaptation that<br />

occurs with exercise training, which may improve aerobic<br />

capacity, muscle oxidative metabolism, the mitochondrial<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 472<br />

ISSN 2250-3153<br />

respiratory chain, and decrease secondary physical<br />

deconditioning.[5,6] The patient‘s ataxic gait pattern resolved,<br />

and he was able to walk with a normal gait due to improved<br />

muscle strength and decreased muscle fatigability. The patient<br />

progressed greatly in his daily functional skills. After discharge,<br />

the patient was prescribed a low level exercise program as part of<br />

her outpatient phase. The goal of our daily activity training is to<br />

minimize dependence and give the patient the ability to perform<br />

daily skill tasks. We evaluated the needs of the treatment phase<br />

based on the patient‘s physical status and provided an effective<br />

rehabilitation program.<br />

Home aerobic exercise with minimal resistance can prevent<br />

fatigue and cardiopulmonary dysfunction. All of these results<br />

have been reported to be related to improvement of skeletal<br />

muscle oxidative capacity by extraction of available oxygen and<br />

enhancement of oxygen utilization by muscle[7].The treatment of<br />

mitochondrial disease has traditionally involved diets or drugs,<br />

such as coenzyme Q,cytochrome C, nicotinamide,<br />

dichloroacetate, and succinate; however, their effects are<br />

IV. CONCLUSION<br />

Multidisciplinary management of pt. with MELAS required<br />

and would involve a geneticist, neurologist,cardiologist,<br />

nephrologist, ophthalmologist,Endocrinologist and dentist.<br />

There is no known treatment of underlying disease which is<br />

progressive and fatal. Patients are managed according to what is<br />

affected at particular time. Metabolic therapies have been used to<br />

increase production of ATP. CoenzymeQ10 (CoQ10)<br />

,ascorbate,riboflavin, vit k1 and vit k3, L-carnitin,succinate have<br />

proven quite successful.<br />

Figure 1<br />

controversial. Rehabilitation in the form of aerobic training is<br />

another approach to the treatment of mitochondrial disease. It is<br />

thought that the capacity for oxygen extraction is directly<br />

correlated with the degree of impaired muscle O2 extraction, and<br />

that capillary density and mitochondrial oxidative capacity<br />

increase in skeletal muscle if adequate training is given.[6] The<br />

reported benefits of endurance training in patients with<br />

mitochondrial myopathy include notable improvement in work<br />

and oxidative capacity. Thus, muscle mitochondrial adaptations<br />

can improve the systemic a-vO2 difference, increase the<br />

extraction of oxygen during exercise, and may also allow patients<br />

to tolerate submaximal exercise.[6] Muscle strength, gait speed,<br />

physical function, and quality of life. The recovery was possible<br />

due to the muscle adaptation that occurs with exercise training,<br />

which may improve aerobic capacity, muscle oxidative<br />

metabolism, the mitochondrial respiratory chain, and decrease<br />

secondary physical deconditioning.[5,6] th and decreased muscle<br />

fatigability. Long term follow up of MELAS patients is required.<br />

Both pt. and family members should receive genetics<br />

counseling and the family should be educated about further<br />

deterioration and possible complication.<br />

Clinical course is usually unpredictable with fluctuation and<br />

gradual determination leading to coma or death(usually from<br />

respiratory failure).<br />

REFERENCES<br />

[1] Tarnopolsky MA, Raha S. Mitochondrial myopathies:diagnosis, exercise<br />

intolerance, and treatment options.Med Sci Sports Exerc 2005;37:2086-93.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 473<br />

ISSN 2250-3153<br />

[2] Chinnery P, Majamaa K, Turnbull D, et al. Treatment for mitochondrial<br />

disorders. Cochrane Database Syst Rev 2006;1:CD004426.<br />

[3] Taivassalo T, De Stefano N, Argov Z, et al. Effects of aerobic training in<br />

patients with mitochondrial myopathies. Neurology 1998;50:1055-60.<br />

[4] Clay AS, Behnia M, Brown KK. Mitochondrial disease: a pulmonary and<br />

critical-care medicine perspective.Chest 2001;120:634-48.Rehabilitation in<br />

MELAS Syndrome 187<br />

[5] Mahoney DJ, Parise G, Tarnopolsky MA. Nutritional and exercise-based<br />

therapies in the treatment of mitochondrial disease. Curr Opin Clin Nutr<br />

Metab Care 2002;5:619-29.<br />

[6] Taivassalo T, Shoubridge EA, Chen J, et al. Aerobic physiological,<br />

biochemical and genetic effects. Ann Neurol 2001;50:133-41.<br />

[7] Taivassalo T, Haller RG. Exercise and training in mitochondrial<br />

myopathies. Med Sci Sports Exerc 2005; 37:2094-101.<br />

[8] Coyle EF, Martin WH 3rd, Sinacore DR, et al. Time course of loss of<br />

adaptations after stopping prolonged intense endurance training. J Appl<br />

Physiol 1984;57: 1857-64.<br />

[9] Finsterer J, Milvay E. Stress lactate in mitochondrial myopathy under<br />

constant, unadjusted workload. Eur J Neurol 2004;11:811-6. Gold DR,<br />

Cohen BH. Treatment of mitochondrial cytopathies. Semin Neurol<br />

2000;21:309-25.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 474<br />

ISSN 2250-3153<br />

Research Directions in Quantum Cryptography and<br />

Quantum Key Distribution<br />

Abstract- Quantum cryptography is an approach to securing<br />

communications by applying the phenomena of quantum physics.<br />

Quantum cryptography provides secure communication whose<br />

security depends only on the validity of quantum theory.<br />

Interesting characteristics of quantum mechanics includes the<br />

existence of indivisible quanta and of entangled systems, both of<br />

which lie at the root of the quantum cryptography (QC). QC is<br />

one of the few commercial applications of quantum physics at<br />

the single quantum level. Computers and Telecommunications<br />

system would become safe havens for criminal activity. Even<br />

may himself unknowns that crypto anarchy provides a means for<br />

tax evasion money laundering, espionage (with digital dead<br />

drops), contract killings, and implementation of data havens for<br />

Monitoring and marketing illegal or controversial material.<br />

Encryption also threatens national Security by interfering with<br />

foreign intelligence operations.<br />

T<br />

Index Terms- Quantum Cryptography, Quantum level<br />

I. CLASSICAL CRYPTOGRAPHY<br />

o achieve cryptography an algorithm also called<br />

(cryptosystem or cipher) is used to combine a message with<br />

some additional information (known as the key) and produce a<br />

cryptogram. The primary application of cryptography is to send<br />

secret messages. Many cryptographic systems are based on<br />

computational assumptions. Decrypting is equivalent to solving<br />

some computationally difficult problem. Based on mathematics<br />

is the classical cryptography and one based on physics quantum<br />

cryptography. Classical cryptography relies on the computational<br />

difficulty of factoring large integers; quantum cryptography<br />

relies on what we believe to be the universal laws of at quantum<br />

mechanics.<br />

These classical cryptosystems come in two flavors: Symmetric<br />

systems and asymmetric systems. The security of public key<br />

cryptosystem is based on competition complexity.<br />

II. SYMMETRICAL (SECRET KEY) CRYPTOSYSTEMS<br />

Symmetrical ciphers require the use of a single key, both for<br />

encryption and decryption. The symmetrical cryptosystems in<br />

use for routine applications such as e-commerce employ rather<br />

short keys.<br />

Asymmetrical allegorizing is used not so much for encryption,<br />

because of their slowness, but rather for distribution of session<br />

Ms. Deepa Harihar Kulkarni<br />

Assistant Professor, SKN College of Engineering<br />

University of Pune, Maharshtra, India<br />

deepakulkarniskn@gmail.com<br />

keys for symmetric cryptosystems such as DES. Barriers of<br />

classical cryptography<br />

2.1 Secret key cryptography<br />

• Require secure channel for key distribution.<br />

• In practice principle every classical channel can be<br />

monitored passively.<br />

• Security is mostly based on complicated, non proven<br />

algorithms.<br />

2.2 Public key cryptography<br />

• Security is based on non proven mathematical<br />

assumptions (ex. in RSA cipher, difficulty of factoring large<br />

numbers.<br />

III. QUANTUM CRYPTOGRAPHY<br />

The main advantage of quantum cryptography is that it gives<br />

us perfectly secure data transfer the first successful quantum<br />

cryptographic device could translate a secret key over 30<br />

centimeters using polarized light, calcite crystals(s), and other<br />

elect optical devices.<br />

Figure 3.1: A Quantum Cryptographic Communication<br />

System for Securely Transferring Random Key<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 475<br />

ISSN 2250-3153<br />

IV. QUANTUM ENTANGLEMENT<br />

Entanglement is a kind of quantum correlation that is<br />

stronger, in certain sense, than any classical one. If some<br />

quantum system, consisting of several subsystems, then it is in<br />

entangled state (even in a pure entangled state) its individual<br />

subsystems cannot be described by pure quantum stages.<br />

Entangled states can be used to serve for quantum key<br />

distribution and quantum teleportation.<br />

Quantum entanglement is a quantum mechanical phenomenon<br />

in which the quantum of two or more objects has to be described<br />

with reference to each other, even though the individual objects<br />

may be spatially separated. This leads to correlations between<br />

observable physical properties of the systems. As the results,<br />

measurements performed on one system seen to be<br />

instantaneously influencing. Other systems entangled cipher.<br />

V. QUANTUM KEY DISTRIBUTION<br />

Quantum mechanics has multiple cryptographic applications<br />

as well. The best known is quantum key distribution (QKD)<br />

which enables Alice and Bob to create a secure classical secret<br />

key despite the potential presence of an eavesdropper. QKD<br />

requires only an insecure quantum channel and authenticated<br />

classical channels, but unfortunately requires multiple rounds of<br />

back and forth communication between Alice and Bob.<br />

QKD is a means of distributing keys from one party to<br />

another, and detecting eavesdropping. It always two parties to<br />

establish a common random secret key by taking advantage of<br />

the fact that quantum mechanics does not allow for<br />

distinguishing non-orthogonal states with certainty.<br />

The primary proposed application of QKD is to create a secret<br />

key, which is then used with the one-time pad to send<br />

unconditionally secure messages.<br />

One of the best-known protocols for quantum key distribution<br />

is usually called BB84. (In 1984, by Bennett and Brassard) In<br />

BB84, Alice sends Bob a random sequence of quantum bits (on<br />

cubits). These quantum bits are equally likely to be in one of four<br />

possible states, as follows<br />

State Basis value<br />

0 │0> Z<br />

1 │1> Z<br />

0 │0>+ │1> X<br />

1 │0>- │1> X<br />

VI. INTEGRATION OF QUANTUM CRYPTOGRAPHY IN 802.11<br />

NETWORKS<br />

Quantum cryptography is considered as a promising solution<br />

towards absolute security in long term cryptosystems. The<br />

application of quantum cryptography in fiber networks has<br />

significant advances.<br />

The appealing characteristics of quantum cryptography is the<br />

possibility of distributing secret key between two users in a<br />

manner that it is impossible for a third party to eavesdrop without<br />

disturbing the quantum transmission and hence the<br />

eavesdropping is detected by legitimate users. With this<br />

characteristic, quantum cryptography is considered as a<br />

promising key distribution solution towards long-term<br />

unconditionally secure cryptosystems.<br />

In fiber networks, some products have been commercialized to<br />

provide a turnkey service for widely used encryption algorithms.<br />

While the application of quantum cryptography in fiber networks<br />

has significant advances, the application of quantum<br />

cryptography in fiber networks has significant advances; the<br />

application of quantum cryptography in mobile networks is still<br />

premature. Some advanced topics in this field concern satellite<br />

communications. In satellite networks, the ground stations and<br />

the satellites are main communication entities of the quantum<br />

key distribution process.<br />

There are a large verity of kinds of mobile wireless network<br />

such as GSM (Global System for Mobile communications),<br />

GPRS (General Packet Radio Service, WLAN (Wireless Local<br />

Area Network) has its own characteristics concerning the<br />

mobility level of the users, the environment where it could be<br />

deployed, the size of the coverage area etc. our first tentative is<br />

towards WLAN 802.11 networks because of the four following<br />

reasons. First, WLAN 802.11 is mainly used in office and<br />

campus environments (e.g. offices, class rooms, meeting rooms,<br />

halls in airports). This building oriented environment facilitates<br />

the deployment of a quantum key distribution network with a<br />

high density of quantum apparatus if necessary.<br />

Second, the mobility speed of mobile users in WLAN 802.11<br />

is relatively slower in comparison with cellular networks. Third<br />

WLAN 802.11 terminals (e.g. laptop) usually have more<br />

computational capacity and more energy for the autonomy than<br />

cellular network‘s terminals (e.g. cell phones). This characteristic<br />

may allow a sufficient amount of control and protocol related<br />

tasks in the quantum key distribution process.<br />

Fourth, from on application point of view, WLAN 802.11 is<br />

usually used to provide access to the internet through an access<br />

point installed by an organization or by a wireless ISP (Internet<br />

Service Provider). In comparison with another kind of network<br />

such as Bluetooth which is mainly used only to replace the wired<br />

links between personal devices (e.g. mouse, PDA, desktop), the<br />

WLAN 802.11 in an apt environment for an enhancement of<br />

security provided by quantum cryptography.<br />

We are interested in the aspect of network protocol design for<br />

the integration of quantum key distribution in currently specified<br />

802.11 security mechanisms.<br />

In 802.11 we distinguish three aspects: Authentication,<br />

encryption key establishment and encryption algorithm.802.11<br />

Security Mechanisms.<br />

6.1 Authentication:<br />

Authentication is the first thing to do when a mobile terminal<br />

wants to join a network. In order to rectify the flaw at the WEP<br />

(Wired Equivalent Privacy) based authentication mechanism<br />

specified in the 802.11 standard, 802.11 defines the 802.1x<br />

authentication based on EAP( Extensible authentication protocol)<br />

The architecture of 802.ix authentication with three elements:<br />

The supplicant, the authenticator, and the authentication server.<br />

The supplicant corresponds to the mobile terminal which wants<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 476<br />

ISSN 2250-3153<br />

to join a network. The authenticator corresponds to the access<br />

point which relies the 802.1x access control and only admits data<br />

traffic from supplicants who are authenticated by the<br />

authentication server.<br />

6.2 Key management: - 802.11i uses many keys at different<br />

levels, constituting a key hierarchy.<br />

Figure 6.2: Pair Wise Key Hierarchy<br />

Figure depicts this key hierarchy. At the top level, we have the<br />

master key called pair wise master key (PMK) which is used to<br />

derive the other keys. Upon having the PMK, the access point<br />

start the 4 way handshake with the mobile terminal to derive the<br />

PTK. This PTK is then split into three final temperate keys:<br />

EAPOL- Key key confirmation key (KCK), EAPAL – Key key<br />

Encryption key (KEK), and Temporal key (TK). The KCK is<br />

used to calculate the MIC (Message Integrity Code) at the<br />

EAPOL – Key message during the 4- way handshake. The TK is<br />

used to encrypt unicast user data traffic.<br />

6.3 Encryption Algorithms: The 802.11i standard<br />

specifies into encryption algorithms: TKIP (Temporal Kay<br />

Integrity Protocol) and CCMP (Counter Mode with CBC – MAC<br />

Protocol). CCMP is mandatory and TKIP is optional. TKIP is<br />

considered as transient solution towards CCMP – based system<br />

because TKIP is based on the RC4 algorithm and only requires a<br />

software upgrade on WEP – based systems. CCMP is based on<br />

AES (Advanced Encryption Standard) and requires hardware<br />

modification for the translation from WEP – based systems.<br />

VII. CONCLUSION AND FUTURE WORK<br />

Other applications of quantum mechanics to cryptography and<br />

future scope which tend to come in three flavors:<br />

Quantum mechanics can be used to break classical<br />

cryptographic protocols.<br />

Quantum states can make possible new or improved<br />

cryptographic protocols protecting classical<br />

information.<br />

Cryptographic methods can be applied to protect<br />

quantum information instead of classical information.<br />

Examples would include quantum secret sharing<br />

schemes and quantum authentication protocols.<br />

REFERENCES<br />

[1] William Stalling, ―Cryptography and Network Security (Principles and<br />

Practices)‖, Fourth Edition, Pearson Publishers, pp. 259-281,<br />

[2] Othman O. Khalifa, ―Communication Cryptography‖, IEEE transaction on<br />

Cryptography, 2004, pp. 1-15.<br />

[3] National Bureau of Standard, Security Requirement for Cryptographic<br />

modules, Federal Information processing standards publication FIPs<br />

Publication, 1994, p.188 – 199.<br />

[4] J. Watson, ―Data Security Hits Home‖, IEEE micro, Oct. 1995, P 88<br />

[5] IEEE Standard 802.1x, part based network access control, December 2004,<br />

pp. 47-53<br />

[6] http://www.IEEEXPLORE.com<br />

[7] SC51 User‘s Manual Edition 2.1<br />

AUTHORS<br />

Ms. Deepa Harihar Kulkarni is presently working as an<br />

Assistant Professor in Computer Department, SKN college of<br />

Engineering, Pune , Maharashtra, India. She has completed her<br />

graduate and post graduate from Maharashtra, India. Research<br />

areas are Data Mining, Pattern Recognition and Computer<br />

Networking.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 477<br />

ISSN 2250-3153<br />

Controller Performance Evaluation for Concentration<br />

Control of Isothermal Continuous Stirred Tank<br />

Reactor<br />

Vishal Vishnoi, Subhransu Padhee, Gagandeep Kaur<br />

Department of Electrical and Instrumentation Engineering<br />

Thapar University, Patiala, 147004, Punjab<br />

vishalvishnoi07@gmail.com, subhransu_padhee@yahoo.com, gagan_deep_kaur@yahoo.com<br />

Abstract: This paper presents a comparative analysis of<br />

performance of PID controller and hybrid fuzzy controller for<br />

concentration control of isothermal continuous stirred tank<br />

reactor, which is used to carry out chemical reactions in an<br />

industry. Isothermal continuous stirred tank reactor is one of<br />

the types of reactor which operates at a constant temperature.<br />

The authors developed a mathematical model of the isothermal<br />

CSTR and implemented PID controller and PD-fuzzy<br />

controller to control the product concentration of the reactor<br />

irrespective of the disturbances and delays. Time domain<br />

analysis of the controller is performed to study the<br />

performance of different controllers and it is observed that PDfuzzy<br />

controller performs better than the conventional PID<br />

controller to control the product concentration of isothermal<br />

CSTR.<br />

Keywords: CSTR, PID, PD-Fuzzy<br />

PID<br />

I. INTRODUCTION<br />

controllers are most widely used controllers in past<br />

two decades. There are many tuning methods<br />

available and most of the PID controller tuning uses frequency<br />

response methods for example Zeigler-Nichols rule, symmetric<br />

optimum rule, Cohen-Coon tuning, internal model control,<br />

ITAE tuning rules etc. These tuning rules provide a simple way<br />

to calculate the parameters of PID controllers. But in most of<br />

the cases, it doesn‘t provide satisfactory closed loop<br />

performance.<br />

The widespread use of chemical reactors has led to design<br />

of different control mechanism to control different parameters<br />

of the reactor. The control mechanism can be a conventional<br />

control or an intelligent control. This paper considers an<br />

isothermal CSTR and models the system to obtain the state<br />

space and transfer function model of the system. The primary<br />

objective of the control mechanism developed for the<br />

isothermal CSTR is that the product concentration should be<br />

controlled irrespective of the different disturbances and delays.<br />

To obtain this control mechanism, conventional and intelligent<br />

controller is developed and a comparative study of controller is<br />

performed.<br />

II. NOMENCLATURE<br />

CSTR Continuous Stirred Tank Reactor<br />

A Cyclopentadine<br />

B Cyclopentenol<br />

C Cylcopentanediol<br />

D Dicyclopentadiene<br />

k Rate constant for A B<br />

1<br />

min <br />

1<br />

k 2 Rate constant for B C<br />

k 3 Rate constant for 2A D<br />

r A<br />

r<br />

r<br />

r<br />

B<br />

C<br />

D<br />

C<br />

C<br />

A<br />

B<br />

Molar rate of formation of A<br />

Molar rate of formation of B<br />

Molar rate of formation of A<br />

Molar rate of formation of A<br />

Concentration of A<br />

Concentration of B<br />

<br />

<br />

1 min <br />

C Steady state concentration of A<br />

As<br />

C Steady state concentration of B<br />

Bs<br />

III. CHEMICAL REACTOR<br />

mol / l min<br />

Chemical reactors are the most important unit of a<br />

chemical plant used for unit operations. Basically a chemical<br />

reactor is a device in which chemical reaction takes place.<br />

Chemical reactors can be classified according to different<br />

properties<br />

1. Reaction phase<br />

2. Operating modes<br />

According to the reaction phase chemical reactor can be<br />

classified as<br />

1. Homogeneous reactor<br />

2. Heterogeneous reactor<br />

According to the operating modes chemical reactors can be<br />

classified as<br />

1. Continuous stirred tank reactor<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 478<br />

ISSN 2250-3153<br />

2. Batch stirred tank reactor<br />

3. Semi batch<br />

4. Tubular reactor<br />

While designing a chemical reactor following factor has to be<br />

considered, (i) Overall size of reactor, (ii) Products emerging<br />

from reactor, (iii) Temperature inside the reactor (iv) Pressure<br />

inside the reactor (v) Rate of reaction (vi) Activity and mode of<br />

catalyst (vii) Stability and controllability of reactor<br />

IV. ISOTHERMAL REACTOR & MODELLING<br />

Isothermal CSTR is a type of CSTR which is<br />

operating at a constant temperature. The volume is also<br />

assumed to be constant. The reaction scheme consists of the<br />

following irreversible reactions. The feed stream contains only<br />

component A. The isothermal CSTR has following reaction<br />

scheme which is called Van de Vusse reaction.<br />

k1 k2<br />

A B C<br />

k3<br />

2A<br />

D<br />

For the above reaction the values of rate constant are<br />

1 1<br />

k150h 0.83min<br />

1 1<br />

k2100h 1.66min<br />

k 10mollh 0.166moll min<br />

3<br />

1 1 1 1<br />

Steady state feed concentration is<br />

Overall material balance is given as<br />

C 10gmoll<br />

<br />

<br />

Afs<br />

<br />

d V<br />

dt<br />

i<br />

1<br />

F F<br />

So, F Fi<br />

(1)<br />

(2)<br />

Component material balance can be shown as<br />

<br />

d VC<br />

dt<br />

A<br />

2<br />

Af A 1 A 3 A<br />

F C C Vk C Vk C (3)<br />

Simplifying eq(3) we obtain eq(4)<br />

dCA F<br />

C C k C k C<br />

2<br />

Af A 1 A 3 A<br />

dt<br />

<br />

V<br />

(4)<br />

dCB F<br />

CB k1CA k2CB dt V<br />

(5)<br />

dCC F<br />

CC k2CB dt V<br />

(6)<br />

dCD F 1 2<br />

CD k3CA dt V 2<br />

(7)<br />

The molar rate of formation for each component (per unit<br />

volume) is<br />

r k C k C<br />

(8)<br />

A 1 A 3<br />

2<br />

A<br />

r kC k C<br />

(9)<br />

B 1 A 2 B<br />

r k C<br />

(10)<br />

C 2 B<br />

1<br />

r k C<br />

2<br />

(11)<br />

D 3<br />

2<br />

A<br />

Solving eq(4) and eq(5)<br />

F F<br />

k C kCC V V<br />

2<br />

s s<br />

3 As 1 As Afs 0<br />

(12)<br />

Steady state concentration of A and B is defined as<br />

C<br />

C<br />

As<br />

Bs<br />

2<br />

Fs<br />

Fs Fs<br />

k1<br />

1 43<br />

<br />

<br />

V <br />

<br />

2k3 k<br />

V <br />

2k3<br />

k CAfs<br />

V<br />

(13)<br />

kC 1 As <br />

Fs<br />

k2<br />

V<br />

(14)<br />

The linear state space model is represented as<br />

x Ax Bu<br />

y Cx Du<br />

The state variable is represented as<br />

The output variable is represented as<br />

The input variable is represented as<br />

CA x <br />

CB CAs<br />

C<br />

<br />

Bs <br />

CA y <br />

CB CAs<br />

C<br />

<br />

Bs <br />

F u <br />

V Fs<br />

<br />

V <br />

<br />

Two dynamic functional equation is represented as<br />

dCA F F<br />

f C, C , <br />

dt V V<br />

C C k C k C<br />

dCB F F<br />

f2 CA, CB, CBk1CAk2CB<br />

dt V V<br />

2<br />

1 A B Af A 1 A 3 A<br />

The elements of state space A matrix is found by<br />

A<br />

ij<br />

fi<br />

<br />

x<br />

j<br />

xs, us<br />

The elements of state space B matrix is found by<br />

B<br />

ij<br />

fi<br />

<br />

u<br />

j<br />

xs, us<br />

The state space model is represented as<br />

Fs k12k3CAs V<br />

A <br />

k1 <br />

0 <br />

<br />

Fs<br />

k <br />

2<br />

V <br />

<br />

CAfs CAs<br />

B <br />

<br />

CBs<br />

Fs<br />

<br />

V <br />

<br />

0 <br />

C 0 1<br />

<br />

D 0 0<br />

Based on steady state operating point<br />

C gmoll <br />

1<br />

Bs 1.117 ,<br />

Fs<br />

V<br />

<br />

0.5714min<br />

C gmoll <br />

1<br />

As 3 ,<br />

1<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 479<br />

ISSN 2250-3153<br />

2.4 A <br />

0.83 0 <br />

2.23<br />

<br />

<br />

7<br />

B <br />

1.117 0.57<br />

0<br />

<br />

<br />

C 0 1<br />

D <br />

<br />

0 0<br />

Converting the state space model to transfer function<br />

1 <br />

G() s CsI A B<br />

1.117s3.1472 gp() s 2<br />

s 4.6429s5.3821 0.5s<br />

1.117s3.1472e gp() s 2<br />

s 4.6429s5.3821 0.4762<br />

gd() s 2<br />

s 4.6429s5.3821 (15)<br />

(16)<br />

(17)<br />

Eq(15) represents the process transfer function, eq(16)<br />

represents the process transfer function with delay and eq(17)<br />

represents the disturbance transfer function.<br />

V. CONVENTIONAL CONTROL OF REACTOR<br />

Control of isothermal CSTR has generated a lot<br />

of research interest and a large number of literatures<br />

can be found in this area. Some of the research<br />

findings are discussed in this section.<br />

Jose Alvarez-Ramirez et.al presents proportional-integral<br />

(PI) control of continuously stirred tank reactors (CSTR). The<br />

main ingredient in the formulation is the use of a novel PI<br />

control configuration derived from modeling error<br />

compensation ideas. The main theoretical contribution is a<br />

novel stability analysis of a wide class of CSTR. It is shown<br />

that the performance of an inverse dynamics feedback control<br />

can be recovered by classical PI control. This performance<br />

recovery includes the region of attraction and transient<br />

response [6].<br />

Nina F. Thornhill et.al presents the simulation of<br />

CSTR. In this article, volumetric and heat balance equations<br />

are presented along with algebraic equations derived from<br />

experimental data for calibration of sensors and actuators and<br />

unknown quantities such heat transfer through the heating<br />

coils. Many of these relationships have nonlinearities, and hard<br />

constraints such as the tank being full are also captured. A<br />

valuable feature is that the model uses measured, not<br />

simulated, noise and disturbances and therefore provides a<br />

realistic platform for data-driven identification and fault<br />

detection [14].<br />

S M Giriraj Kumar et.al has proposed Genetic<br />

Algorithm to improve the performance of bioreactor [16].<br />

J Prakash et.al has presented a design criterion for<br />

nonlinear PID controller and non linear model predictive<br />

controller for a CSTR system which exhibits dynamic<br />

nonlinearity [19].<br />

R Suja Mani Malar et.al has propsed the use of<br />

Artificial Neural Network to model and control the CSTR [20,<br />

21].<br />

In this research paper, the primary control objective is<br />

to control the product concentration of isothermal CSTR by<br />

varying the rate of dilution of the feed flow. The schematic<br />

diagram of the feedback control loop of isothermal CSTR is<br />

shown in figure 1.<br />

Rate of dilution<br />

F<br />

V<br />

CC<br />

CM<br />

Product Concentration<br />

Figure 1: Feedback control mechanism for concentration control of<br />

isothermal CSTR<br />

Here CM represents the measurement of<br />

concentration and CC represents the concentration controller.<br />

Figure 2 shows the block diagram approach of feedback<br />

control scheme.<br />

Set point<br />

(Ks)<br />

+<br />

mA<br />

-<br />

Controller<br />

(Ka)<br />

(Q m)<br />

mA psig kg/min<br />

Actuator<br />

(Ke)<br />

mA<br />

Input Flow<br />

Sensor<br />

(Ks)<br />

Valve<br />

(Kv)<br />

Input flow<br />

disturbance<br />

Process<br />

Gp(s)<br />

Figure 2: Block diagram based feedback control approach for<br />

concentration control of isothermal CSTR<br />

+<br />

PID<br />

0.4762<br />

4.64295.3821 2<br />

s s<br />

1.117s3.1472 4.64295.3821 2<br />

s s<br />

Figure 3: Transfer function based feedback control approach for<br />

concentration control of isothermal CSTR<br />

Figure 3 shows the transfer function model of the<br />

feedback control scheme for concentration control of<br />

isothermal CSTR. The transfer function for process and the<br />

disturbance is derived in section IV. Ideal PID controller in<br />

continuous time is given as<br />

t 1 de( t)<br />

<br />

u( t) Kce( t) e( t) dt d<br />

<br />

<br />

i<br />

dt<br />

0<br />

<br />

+<br />

+<br />

+<br />

+<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 480<br />

ISSN 2250-3153<br />

The PID controller is tuned using Zeigler-Nichols criteria of<br />

tuning and the unit step response of feedback control is shown<br />

in figure 4. The values of proportional gain, integral gain and<br />

derivative gain of PID controller are 0.2, 0.95 and 0.23<br />

respectively.<br />

Figure 4: Unit step response of PID controller for concentration<br />

control<br />

Figure 4 represents the unit step response of PID controller<br />

Figure 5 shows the unit step response of feedback control<br />

scheme with a disturbance. Due to this disturbance, the peak<br />

overshoot increases.<br />

Figure 5: Unit step response of PID controller with disturbances<br />

Figure 6: Unit step response of PID controller with delay and<br />

disturbances<br />

VI. FUZZY CONTROL OF ISOTHERMAL REACTOR<br />

Fuzzy logic is a form of logic that is the extension<br />

of boolean logic, which incorporates partial values<br />

of truth. Instead of sentences being "completely<br />

true" or "completely false," they are assigned a value<br />

that represents their degree of truth. In fuzzy<br />

systems, values are indicated by a number (called a<br />

truth value) in the range from 0 to 1, where 0.0<br />

represents absolute false and 1.0 represents absolute<br />

truth.<br />

The fuzzy logic controller provides an algorithm, which<br />

converts the expert knowledge into an automatic control<br />

strategy. Fuzzy logic is capable of handling approximate<br />

information in a systematic way and therefore it is suited for<br />

controlling non linear systems and is used for modeling<br />

complex systems, where an inexact model exists or systems<br />

where ambiguity or vagueness is common. The fuzzy control<br />

systems are rule-based systems in which a set of fuzzy rules<br />

represent a control decision mechanism for adjusting the<br />

effects of certain system stimuli. With an effective rule base,<br />

the fuzzy control systems can replace a skilled human operator.<br />

The rule base reflects the human expert knowledge, expressed<br />

as linguistic variables, while the membership functions<br />

represent expert interpretation of those variables.<br />

Rule Base<br />

Pre Processing Fuzzification<br />

Fuzzy Inference<br />

System<br />

De-fuzzification Post Processing<br />

Crisp<br />

Crisp<br />

Input<br />

Processed<br />

Crisp Input<br />

Fuzzified<br />

Input<br />

Fuzzified<br />

Output<br />

De-fuzzified<br />

Output<br />

Output<br />

Figure 7: Block diagram of fuzzy inference system<br />

Hybrid PD-Fuzzy Controller<br />

Although it is possible to design a fuzzy logic<br />

type of PID controller by a simple modification of<br />

the conventional ones, via inserting some<br />

meaningful fuzzy logic IF- THEN rules into the<br />

control system, these approaches in general<br />

complicate the overall design and do not come up<br />

with new fuzzy PID controllers that capture the<br />

essential characteristics and nature of the<br />

conventional PID controllers. Besides, they<br />

generally do not have analytic formulas to use for<br />

control specification and stability analysis. The<br />

fuzzy PD, PI, and PI+D controllers to be introduced<br />

below are natural extensions of their conventional<br />

versions, which preserve the linear structures of the<br />

PID controllers, with simple and conventional<br />

analytical formulas as the final results of the design.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 481<br />

ISSN 2250-3153<br />

Thus, they can directly replace the conventional PID<br />

controllers in any operating control systems (plants,<br />

processes).<br />

et ()<br />

P<br />

I<br />

D<br />

Figure 8: Parallel form of PID controller<br />

+<br />

ut ()<br />

The conventional design of PID controller was some what<br />

modified and a new hybrid fuzzy PID controller was designed.<br />

Instead of summation effect a mamdani based fuzzy inference<br />

system is implemented. The inputs to the mamdani based fuzzy<br />

inference system are error and change in error.<br />

et ()<br />

et<br />

()<br />

Gd<br />

Gi<br />

G p<br />

d<br />

dt<br />

<br />

Fuzzy Inference<br />

System<br />

Figure 9: Fuzzy inference system<br />

Fuzzy Inference<br />

System<br />

(MAMDANI)<br />

SUM<br />

ut ()<br />

Figure 10: Architecture of proposed hybrid fuzzy<br />

controller<br />

Figure 9 shows the fuzzy inference system developed<br />

for hybrid fuzzy controller. Figure 10 shows the structure of<br />

hybrid fuzzy logic controller, which keeps the general<br />

architecture of PID controller as shown in figure 8 with some<br />

slight modifications. A mamdani based fuzzy inference system<br />

is implemented in between proportional and derivative term.<br />

The integral term is then added to the output of fuzzy inference<br />

system.<br />

G , d G and G i are scaling factors for the input where<br />

p<br />

as G u is the scaling factor for the output. In this design the<br />

input and output scaling factors are determined by trial and<br />

error methods and are taken very small. The linguistic<br />

variables used in the membership functions are described in<br />

table 1.<br />

Table 1: Linguistic variable for fuzzy logic<br />

Gu<br />

Error e(t) Change in error Controller output<br />

∆e(t)<br />

u(t)<br />

NB Negative NB Negative NB Negative<br />

Big<br />

Big<br />

Big<br />

NM Negative NM Negative NM Negative<br />

Medium<br />

Medium<br />

Medium<br />

NS Negative NS Negative NS Negative<br />

Small<br />

Small<br />

Small<br />

ZO Zero ZO Zero ZO Zero<br />

PS Positive PS Positive PS Positive<br />

Small<br />

Small<br />

Small<br />

PM Positive PM Positive PM Positive<br />

Medium<br />

Medium<br />

Medium<br />

PB Positive PB Positive Big PB Positive<br />

Big<br />

Big<br />

Figure 11 (a), (b) and (c) shows the inputs and output<br />

membership functions for mamdani based fuzzy inference<br />

system.<br />

(a)<br />

(b)<br />

(c)<br />

Figure 11 (a), (b) and (c): Membership function for error, change in<br />

error and output<br />

u(t)<br />

Table 2: Fuzzy rule base<br />

e(t)<br />

NB NM NS ZO PS PM PB<br />

NB NB NB NB NB NM NS ZO<br />

NM NB NB NB NM NS ZO PS<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 482<br />

ISSN 2250-3153<br />

∆e(t)<br />

NS NB NB NM NS NS PS PS<br />

ZO NB NM NS ZO ZO PM PM<br />

PS NM NS ZO PS PS PB PB<br />

PM NS ZO PS PM PM PB PB<br />

PB ZO PS PM PB PB PB PB<br />

Table 2 shows the fuzzy rule base for mamdani fuzzy inference<br />

system.<br />

Figure 12: Unit step response of hybrid fuzzy controller for<br />

concentration control of isothermal CSTR<br />

Figure 12 shows the unit step response of hybrid fuzzy<br />

controller for concentration control of isothermal CSTR. It is<br />

evident from the response that the overshoot is less as<br />

compared to the PID controller, which shows the efficiency of<br />

fuzzy based controllers.<br />

Figure 13: Comparative response of unit step response of different<br />

controller<br />

Figure 13 shows comparative response of controller.<br />

VII. RESULTS & DISCUSSION<br />

This section evaluates the controller perfromance on the basis<br />

of tranisent response and error criteria. Table 3 shows the<br />

comparative tranisent response of conventional PID controller<br />

and fuzzy controller.<br />

Table 3: Transient response<br />

Parameters/<br />

type<br />

Peak<br />

overshoot<br />

(%)<br />

Rise<br />

time<br />

(Sec)<br />

Delay<br />

time<br />

(Sec)<br />

Sett<br />

time<br />

(Sec)<br />

Peak<br />

time<br />

(Sec)<br />

PID 9.1251 4.679 3.0459 7.4062 6.1049<br />

PID with<br />

disturbances<br />

PID with<br />

disturbances<br />

and delay<br />

Fuzzy<br />

Controller<br />

20.3425 4.365 2.956 7.0852 5.6760<br />

16.0946 4.379 2.982 7.5983 6.0825<br />

5.5092 4.580 3.115 6.5306 6.0402<br />

Table 4: Performance criteria of controllers<br />

IAE ISE ITAE<br />

PID 2.279 1.579 6.226<br />

PID with disturbance 2.49 1.552 8.2<br />

PID with<br />

disturbance with delay<br />

2.528 1.661 7.974<br />

Fuzzy controller 2.342 1.872 5.702<br />

Table 4 shows the error criteria for different controllers. From<br />

transient response analysis in table 3 and error analysis in table<br />

4 it is evident that the hybrid fuzzy controller is best for<br />

concentration control.<br />

VIII. CONCLUSION<br />

This paper presents a comparative study of performance of<br />

different conventional and fuzzy based controllers. The aim of<br />

the proposed controller is to regulate the product concentration<br />

of isothermal CSTR. After time response analysis it is<br />

observed that hybrid fuzzy controller provides a satisfactory<br />

control performance.<br />

REFERENCES<br />

[1] Chuen Chien Lee, ―Fuzzy logic in control systems: Fuzzy logic<br />

controller, part I,‖ IEEE Transactions on Systems, Man and Cybernetics,<br />

vol. 20, no. 2, 1990, pp. 404-418<br />

[2] Chuen Chien Lee, ―Fuzzy logic in control systems: Fuzzy logic<br />

controller, part II,‖ IEEE Transactions on Systems, Man and Cybernetics,<br />

vol. 20, no. 2, 1990, pp. 419-435<br />

[3] Stuart Bennett, ―A brief history of automatic control,‖ IEEE Control<br />

Systems, June 1996, pp. 17-25<br />

[4] Sng Hong Lian, Messom H Christopher, Yue Pik Kong, ―Fuzzy hybrid<br />

PID controller of a steam heated dryer,‖ in Proceedings of 1999 IEEE<br />

International Fuzzy System Conference, Aug 1999, pp. 1707-1711<br />

[5] Mygunsoo Jun and Michael G. Safonov, ―Automatic PID tuning: An<br />

application of unfalsified control,‖ IEEE Symposium on CACSD, August<br />

1999, pp. 1-5<br />

[6] Jose Alvarez-Ramirez, America Morales, ―PI control of continuously<br />

stirred tank reactors: stability and performance,‖ Chemical Engineering<br />

Sciences, 55, 2000, pp. 5497 – 5507<br />

[7] G. P Liu and S. Daley, ―Optimal-tuning PID control for industrial<br />

systems,‖ Control Engineering Practice, 9, 2001, pp. 1185-1194<br />

[8] K J Astrom and T Hagglund, ―The future of PID control,‖ Control<br />

Engineering Practice, vol. 9, 2001, pp. 1163-1175<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 483<br />

ISSN 2250-3153<br />

[9] G K I Mann, B G Hu and R.G Gosine, ―Time domain based design and<br />

analysis of new PID tuning rules,‖ IEEE Proceedings of Control Theory<br />

Applications, vol. 148, no. 3, May 2001, pp. 251-261<br />

[10] P. Cominos and N. Munro, ―PID controllers: recent tuning methods and<br />

design to specification,‖ IEE Proceedings of Control Theory Application,<br />

vol. 149, no. 2, Jan 2002, pp. 46-53<br />

[11] Fernando G. Martins, ―Tuning PID controllers using the ITAE criterion,‖<br />

International Journal of Engineering Education, vol. 21, no. 3, June 2005,<br />

pp. 1-7<br />

[12] Kiam Heong Ang, Gregory Chong and Yun Li, ―PID control system<br />

analysis, design and technology,‖ IEEE Transactions on Control System<br />

Technology, vol. 13, no. 4, July 2005, pp. 559-576<br />

[13] Yun Li, Kiam Heong Ang and Gregory C Y Chong, ―PID control system<br />

analysis and design,‖ IEEE Control Systems Magazine, Feb 2006, pp. 32-<br />

41<br />

[14] Nina F Thornhill, Sachin C Patwardhan, Sirish L Shah, ―A continuous<br />

stirred tank heater simulation model with applications,‖ Journal of<br />

Process Control, 18, 2008, pp. 347 – 360<br />

[15] B M Mohan and Arpita Sinha, ―Analytical structure for fuzzy PID<br />

controllers,‖ IEEE Transactions on Fuzzy Systems, vol. 16, no. 1, Feb<br />

2008, pp. 52-60<br />

[16] S M Giriraj Kumar, R Jain, N Anantharaman, V Dharmaingam and K M<br />

M Sheriffa Begum, ―Genetic algorithm based PID controller tuning for a<br />

model bioreactor,‖ Indian Chemical Engineer, vol. 50, no. 3, July-Sep<br />

2008, pp. 214 – 226<br />

[17] C R Madhuranthakam, A Elkamel, H Budman, ―Optimal tuning of PID<br />

controllers for FOPTD, SOPTD and SOPTD with lead processes,‖<br />

Chemical Engineering and Processing, 47, 2008, pp. 251 – 264<br />

[18] Ahmad Ali and Somanath Majhi, ―PI/PID controller design based on<br />

IMC and percentage overshoot specification to controller set point<br />

change,‖ ISA Transactions, vol. 48, 2009, pp. 10-15<br />

[19] J Prakash and K Srinivasan, ―Design of nonlinear PID controller and<br />

nonlinear model predictive controller for a continuous stirred tank<br />

reactor,‖ ISA Transactions, 48, 2009, pp. 273 – 282<br />

[20] R Suja Mani Malar and T Thyagarajan, ―Artificial neural networks based<br />

modeling and control of continuous stirred tank reactor,‖ American<br />

Journal of Engineering and Applied Sciences, vol. 2, no. 1, 2009, pp. 229<br />

– 235<br />

[21] R M Suja Malar, T Thyagarajan, ―Modeling of continuous stirred tank<br />

reactor using artificial intelligence techniques,‖ International Journal of<br />

Modelling, 8, 3, 2009, pp. 145 - 155<br />

[22] V Rajinikanth and K Latha, ―Identification and control of unstable<br />

biochemical reactor,‖ International Journal of Chemical Engineering and<br />

Applications, vol. 1, no. 1, June 2010, pp. 106 – 111<br />

[23] G Glandevadhas, S Pushpakumar and S V Muruga Prasad, ―Optimum<br />

setting of controller using soft computing techniques for a chemical<br />

system,‖ American Journal of Engineering and Applied Sciences, vol. 8,<br />

no. 11, 2011, pp. 1140 – 1148<br />

[24] B Wayne Bequette, Process Control: Modeling, Design and Simulation,<br />

Prentice Hall India, 2008.<br />

AUTHORS<br />

First Author– Vishal Vishnoi, M.E. (Instrumentation &<br />

Control), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID- vishalvishnoi07@gmail.com<br />

Second Author– Subhransu Padhee, M.E. (Instrumentation &<br />

Control), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID- subhransu_padhee@yahoo.com<br />

Third Author– Gagandeep Kaur, M.E. (Instrumentation &<br />

Control), Thapar University, Patiala, Punjab, India-147004<br />

E-mail ID- gagan_deep_kaur@yahoo.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 484<br />

ISSN 2250-3153<br />

Design of Fractional Order PID Controller for Speed<br />

Control of DC Motor<br />

Abstract- Conventional PID controller is one of the most<br />

widely used controllers in industry, but the recent advancement<br />

in fractional calculus has introduced applications of fractional<br />

order calculus in control theory. One of the prime applications of<br />

fractional calculus is fractional order PID controller and it has<br />

received a considerable attention in academic studies and in<br />

industrial applications. Fractional order PID controller is an<br />

advancement of classical integer order PID controller. In many a<br />

cases fractional order PID controller has outperformed classical<br />

integer order PID controller. This research paper, studies the<br />

control aspect of fractional order controller in speed control of<br />

DC motor. A comparative study of classical PID controller and<br />

fractional order PID controller has been performed.<br />

Index Terms- PID controller, Fractional order PID controller,<br />

DC motor<br />

F<br />

I. INTRODUCTION<br />

ractional order calculus has gained acceptance in last couple<br />

of decades. J Liouville made the first major study of<br />

fractional calculus in 1832. In 1867, A. K. Grunwald worked on<br />

the fractional operations. G. F. B. Riemann developed the theory<br />

of fractional integration in 1892. Fractional order mathematical<br />

phenomena allow us to describe and model a real object more<br />

accurately than the classical ―integer‖ methods. Earlier due to<br />

lack of available methods, a fractional order system was used to<br />

be approximated as an integer order model. But at the present<br />

time, there are many available numerical techniques which are<br />

used to approximate the fractional order derivatives and<br />

integrals. A typical example of a non-integer (fractional) order<br />

system is the voltage-current relation of a semiinfinite lossy<br />

transmission line [30].<br />

The past decade has seen an increase in research efforts<br />

related to fractional calculus and use of fractional calculus in<br />

control system. For a control loop perspective there are four<br />

situations like (i) integer order plant with integer order controller,<br />

(ii) integer order plant with fractional order controller, (iii)<br />

fractional order plant with integer order controller, (iv) fractional<br />

order plant with fractional order controller. Fractional order<br />

control enhances the dynamic system control performance.<br />

This paper studies the control effect of fractional order PID<br />

controller in speed control of DC motor and performs a<br />

comparative study of classical PID controller and fractional order<br />

PID controller for speed control of DC motor.<br />

Rinku Singhal, Subhransu Padhee, Gagandeep Kaur<br />

Department of Electrical and Instrumentation Engineering<br />

Thapar University, Patiala, Punjab<br />

srinku1987@gmail.com<br />

II. FRACTIONAL ORDER CALCULUS: MATHEMATICAL<br />

OVERVIEW<br />

Fractional order calculus is an area where the mathematicians<br />

deal with derivatives and integrals from non-integer orders.<br />

Gamma function is simply the generalization of the factorial for<br />

all real numbers. The definition of the gamma function is given<br />

<br />

x1z by ( x) z e dz (1)<br />

0<br />

<br />

( x) x<br />

1 !<br />

Differintegral operator is denoted by aDt . It is the<br />

combination of differentiation and integration operation<br />

commonly used in fractional calculus. Reimann- Liouville<br />

D is<br />

definition for a t<br />

D<br />

<br />

a t<br />

<br />

d<br />

0<br />

<br />

dt<br />

<br />

1 0<br />

t<br />

<br />

d 0<br />

<br />

a<br />

(2)<br />

Here is the fractional order. a and t are the limits.<br />

There are two commonly used definitions for<br />

D .<br />

1. Grunwald - Letnikov<br />

2. Riemann- Liouville<br />

general Differintegral a t<br />

Grunwald – Letnikov definition<br />

ta <br />

<br />

<br />

1 D f ( t) lim 1 f t jh<br />

h0<br />

<br />

h j0<br />

j <br />

a t<br />

h<br />

j<br />

(3)<br />

. is a flooring-operator<br />

1 Here j j1j1 <br />

(4)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 485<br />

ISSN 2250-3153<br />

Riemann- Liouville definition<br />

f <br />

<br />

<br />

n t<br />

1 d<br />

a t () n<br />

n1 ndtat <br />

D f t d<br />

(5)<br />

The condition for above equation is n1 n.<br />

. is called the gamma function.<br />

<br />

Laplace Transform of Differintegral operator<br />

Differintegral operator is denoted by aDt and the<br />

Laplace transform of Differintegral operator is<br />

represented as<br />

<br />

t st t<br />

a a <br />

0<br />

<br />

L <br />

D f t e D f t dt<br />

(6)<br />

t<br />

n1<br />

m<br />

a <br />

m0<br />

0 t<br />

j <br />

1<br />

1<br />

<br />

L <br />

D f t s F s s D f t<br />

Here n lies in between n1 n<br />

III. FRACTIONAL ORDER CALCULUS IN CONTROL<br />

One of the primary controllers is PID controller, which is<br />

widely used. Fractional controller is denoted by PI D<br />

was<br />

proposed by Igor Podlubny in 1997 [1], here and have<br />

non-integer values. Figure 1 shows the block diagram of<br />

fractional order PID controller.<br />

Figure 1: Fractional PID Controller<br />

The transfer function for conventional PID controller<br />

is<br />

us ( ) 1<br />

GPID ( s) Kc 1<br />

ds<br />

e() s is<br />

<br />

<br />

(7)<br />

<br />

Transfer function for fractional order PID controller is<br />

us ( ) 1 <br />

GFOPID ( s) Kc 1ds (8)<br />

e() s is<br />

<br />

Where λ and µ are an arbitrary real numbers, Kp is amplification<br />

(gain), Ti is integration constant and Td is differentiation constant.<br />

Taking λ=1 and µ=1, a classical PID controller is obtained. For<br />

further practical digital realization, the derivative part has to be<br />

complemented by first order filter. The filter is used to remove<br />

high frequency noise.<br />

<br />

<br />

1 ds<br />

<br />

GFOPID ( s) Kc<br />

1 <br />

is<br />

<br />

<br />

d s 1<br />

<br />

N <br />

(9)<br />

The PI λ D µ controller is more flexible and gives an opportunity to<br />

better adjust the dynamics of control system. Its compact and<br />

simple but the analog realization of fractional order system is<br />

very difficult.<br />

Intuitively, the FOPID has more degree of freedom than<br />

the conventional PID. It can be expected that the FOPID can<br />

provide better performance with proper choice of controller<br />

parameters. However, with more parameters to be tuned, the<br />

associated optimization problem will be more difficult to deal<br />

with. It is motivated to develop a systematic procedure for the<br />

FOPID optimization to achieve a certain performance.<br />

Different fractional controllers are summarized below.<br />

CRONE Controller (Commande Robuste d’Ordre<br />

Non Entier)<br />

CRONE has a French acronym which means<br />

fractional order robust control.<br />

TID Controller (Tilted Proportional Integral<br />

Controller)<br />

TID controller has the same structure as<br />

classical PID controller, but the proportional gain is<br />

replaced with a function s <br />

Fractional Lead-Lag Controller<br />

Fractional lead-lag controller is an extension<br />

of classical lead-lag controller.<br />

Related Works<br />

Fractional order PID controllers are used in<br />

many control applications. This section summarizes<br />

some of the contribution in this field.<br />

Schlegel Milos et.al [5], performed a comparison<br />

between classical controller and fractional controller<br />

and summarized that the fractional order controller<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 486<br />

ISSN 2250-3153<br />

outperforms the classical controller. D Xue et.al [6],<br />

implemented fractional order PID control in DC<br />

motor. Chuang Zhao et.al [9], Ramiro S Barbosa et.al<br />

[12] and Ying Luo et.al [17], implemented fractional<br />

order controller in position servo mechanism. Varsha<br />

Bhambhani et.al [11] implemented fractional order<br />

controller in water level control. Hyo-Sung Ahn et.al<br />

[15] implemented fractional order integral derivative<br />

controller for temperature profile control. Concepcion<br />

A. Monje et.al [16], and Fabrizio Padula et.al [26],<br />

devised methods for tuning and auto tuning of<br />

fractional order controller for industry level control.<br />

Venu Kishore Kadiyala et.al [21] implemented<br />

fractional order controller for aerofin control.<br />

Jun-Yi Cao et.al [2, 4] implemented genetic<br />

algorithm and particle swarm optimization methods<br />

for optimization of fractional order controller. Majid<br />

Zamani et.al [7] implemented particle swarm<br />

optimization for robust performance of fractional<br />

order controller. Deepyaman Maiti et.al [8],<br />

implemented particle swarm optimization for design<br />

of fractional order controller. Li Meng et.al [18]<br />

implemented multi objective genetic algorithm<br />

optimization for fractional order PID controller. Arijit<br />

Biswas et.al [20] implemented improved differential<br />

evolution techniques for design of fractional PID<br />

controller. Ammar A Aldair et.al [23] implemented<br />

evolutionary algorithm based fractional order<br />

controller for a full vehicle nonlinear activation<br />

suspension system.<br />

IV. SPEED CONTROL OF DC MOTOR USING FRACTIONAL<br />

ORDER PID CONTROLLER<br />

In this section the authors investigate the control<br />

performance of fractional order PID controller by<br />

designing a fractional order PID controller to control<br />

the speed of an armature controlled DC motor. Figure<br />

2 shows the schematic diagram of armature controlled<br />

DC motor.<br />

Figure 2: Schematic diagram of armature controlled DC motor<br />

Notations<br />

R = Armature Resistance (Ω).<br />

L = Inductance of armature winding (H).<br />

ia = Armature current (A).<br />

if = Field current (A).<br />

ea = applied armature voltage (V)<br />

eb = back emf (V)<br />

Tm = torque developed by motor (Nm)<br />

θ = angular displacement of motor shaft (rad).<br />

ω = angular speed of motor shaft (rad/sec.)<br />

J = equivalent moment of inertia of motor and load referred to<br />

motor shaft (kg-m 2 )<br />

B = equivalent friction coefficient of motor and load referred to<br />

motor shaft (Nm*s/rad)<br />

Mathematical Modeling<br />

In servo applications, the DC motors are generally used<br />

in the linear range of magnetization curve. Therefore, the air gap<br />

Ki<br />

flux ϕ is proportional of field current, i.e. f f<br />

Where K f is constant.<br />

The torque Tm developed by the motor is proportional to the<br />

product of armature current and air gap flux, i.e.<br />

T K K i i<br />

(10)<br />

m 1 f f a<br />

Here 1<br />

K is constant.<br />

In armature controlled dc motor, the field current is kept<br />

T K i<br />

(11)<br />

constant, so m T a<br />

Here K T is known as the motor torque constant.<br />

The motor back EMF being proportional to speed is given as<br />

d<br />

eb Kb dt<br />

(12)<br />

Here K b is the back EMF constant.<br />

The differential equation of the armature circuit is<br />

dia<br />

L Ria eb ea<br />

dt<br />

0<br />

(13)<br />

2<br />

d d<br />

J B T 2 m KTia (14)<br />

dt dt<br />

The torque equation is<br />

Applying Laplace transform<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 487<br />

ISSN 2250-3153<br />

ebsKbss Ls R I s e s e s (15)<br />

(16)<br />

a a b<br />

2 Js Bs s Tm s KTia s (17)<br />

So the final transfer function will be<br />

<br />

s KT<br />

<br />

<br />

Eas s R Ls Js B KTKb <br />

G s<br />

s KT<br />

<br />

<br />

<br />

Eas R Ls Js B KTKb (a)<br />

(b)<br />

Figure 3(a) (b): Block diagram of armature controlled DC Motor<br />

(18)<br />

(19)<br />

After applying the values of DC motor parameters<br />

as mentioned in appendix A, final transfer function<br />

can be represent as:<br />

0.0924<br />

Gs () <br />

(20)<br />

7<br />

2<br />

8.4910 s 0.00585s0.01729 Eq(20) represents the transfer function of DC<br />

motor. The primary objective is to control the speed of<br />

DC motor using fractional order PID controller.<br />

Section V shows the results of speed control using<br />

conventional and fractional PID controller.<br />

V. RESULTS AND DISCUSSIONS<br />

This section shows the results of speed control of<br />

DC motor using conventional PID controller and<br />

fractional order PID controller. Ziegler-Nicholas<br />

tuning method is used to tune the conventional PID<br />

controller. Proportional Gain Kp, Derivative Gain Kd<br />

and Integral Gain Ki of conventional PID controller<br />

are 0.05, 0.0525 and 0.98 respectively. Unit step<br />

response of DC motor for different values of Kp, Kd,<br />

Ki are shown in figure 4.<br />

Figure 4: Unit step response for different values of Kp, Kd, Ki<br />

To evaluate the performance of the unit step response<br />

different steady state and transient state parameters<br />

are taken in to consideration. The parameters are peak<br />

overshoot, peak time and settling time. For different<br />

values of proportional gain, derivative gain and<br />

integral gain the values of the parameter are shown in<br />

table 1.<br />

Table 1: Performance parameters for different values of Kp, Kd, Ki<br />

Kp Ki Kd %Overshoot Peak Time<br />

Settling<br />

Time<br />

0.05 0.98 0.0525 29.5939 1.9937 5.5025<br />

0.09 1.456 0.0929 37.9562 2.0736 6.5158<br />

0.785 1.39 0.099 39.3546 2.0241 6.7980<br />

0.06 1.2 0.059 33.3067 1.9835 5.7706<br />

The unit step response gives an overshoot of 29.5%<br />

which is undesirable. To minimize the overshoot,<br />

fractional order PID controller can be used in place of<br />

conventional PID controller. In fractional order PID<br />

controller the order of the integral and derivative are<br />

in fractions. This paper evaluates the performance of<br />

the controller with different combinations of µ and λ,<br />

and tries to find the best combination of µ and λ in a<br />

heuristic method. Different combinations of µ and λ<br />

are shown below.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 488<br />

ISSN 2250-3153<br />

i. λ=1 and µ1<br />

vii. λ1<br />

viii. λ>1 and µ


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 489<br />

ISSN 2250-3153<br />

Figure 7: Unit Step Response of DC motor Control using FOPID for Different<br />

Values of λ1<br />

The transient and steady state parameters of unit step<br />

response with different combinations of λ and µ are shown in<br />

table 5.<br />

Table 5: Comparison of Parameters for Different Combinations of λ and µ<br />

<br />

Mp Tp Ts ISE IAE ITAE<br />

1 1.05 27.8089 2.0473 5.5645 .2777 .5891 .9141<br />

1 1.1 23.7612 2.0413 4.6560 .232 .5226 .8725<br />

1 1.15 17.1389 2.1465 4.7784 .1523 .4428 1.052<br />

It can be seen that from the above table 5 that with the increase in<br />

the value of µ, control parameters are reduce upto the value of λ<br />

=1 and µ=1.15.after these response will be more slow and more<br />

oscillatory.<br />

(iv) With varying values of λ>1 and µ=1<br />

Figure 9 shows the unit step response of speed control of DC<br />

motor with λ> 1 and µ=1<br />

Figure 9: Unit Step Response of DC motor using FOPID for Different Values of<br />

λ >1<br />

Table 6: Comparison of Parameters for Different Combinations of λ and µ<br />

Mp Tp Ts ISE IAE ITAE<br />

1.1 1 28.1038 2.213 5.8632 .3186 .6525 1.199<br />

1.2 1 26.9088 2.1637 5.906 .3354 .668 1.22<br />

1.3 1 25.9522 2.2026 5.8922 .3521 .684 1.243<br />

1.4 1 25.1895 2.2377 5.2537 .3686 .7003 1.267<br />

1.5 1 24.5857 2.2695 5.2965 .3847 .7167 1.293<br />

1.6 1 24.1127 2.2978 5.3295 .4005 .733 1.319<br />

1.7 1 23.7982 2.3228 5.3536 .4158 .7491 1.345<br />

1.8 1 23.476 2.3457 5.3705 .4307 .965 1.373<br />

1.9 1 23.2754 2.3669 5.3817 .445 .7805 1.4<br />

It can be seen that from the above table 6 with the increase in the<br />

value of λ, peak overshoot reduces but system will be slow.<br />

(v) With varying values of λ>1 and µ>1<br />

Figure 10 shows the unit step response of speed control of DC<br />

motor with λ> 1 and µ>1<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 490<br />

ISSN 2250-3153<br />

Figure 10: Unit Step Response of DC motor using FPID for Different Values of λ<br />

>1 and µ>1<br />

Table 7: Comparison of Parameters for Different Combinations of λ and µ<br />

<br />

Mp Tp Ts ISE IAE ITAE<br />

1.5 1.05 22.6561 2.2488 5.1095 .3588 .669 1.166<br />

1.5 1.1 19.3614 2.2628 5.0276 .3143 .6149 1.054<br />

1.5 1.15 15.2327 2.4100 5.1690 .2349 .5083 1.091<br />

1.7 1.05 21.7979 2.3060 5.1665 .3895 .7018 1.222<br />

1.7 1.1 18.7298 2.3235 5.0846 .3453 .652 1.116<br />

1.7 1.15 15.2073 2.1774 5.0176 .266 .6141 1.033<br />

1.9 1.05 21.3166 2.3520 5.1959 .4183 .7342 1.275<br />

1.9 1.1 18.4303 2.3738 5.1230 .3744 .6873 1.178<br />

1.9 1.15 15.3788 2.5293 5.3213 .2952 .657 1.262<br />

It can be seen from the above table 7 that all the different<br />

combinations of λ and µ, control parameters for the values of<br />

λ=1.7 and µ=1.15 are less than other values of λ and µ.<br />

(vii) With varying values of λ1<br />

Figure 11 shows the unit step response of speed control of DC<br />

motor with λ1<br />

Figure 11: Unit Step Response of DC motor using FOPID for different Values of<br />

λ1<br />

Table 8: Comparison of Parameters for Different Combinations of λ and µ<br />

Mp Tp Ts ISE IAE ITAE<br />

.5 1.01 43.5083 1.7294 5.4501 .2147 .5439 1.012<br />

.5 1.1 38.8578 1.6955 4.8685 .1687 .4679 .8576<br />

.5 1.15 27.1098 1.6918 4.9308 .08584 .3453 .7442<br />

.7 1.01 36.4376 1.8956 5.7249 .2532 .5946 1.12<br />

.7 1.1 30.6041 1.8496 4.7835 .188 .4819 .866<br />

.7 1.15 21.3701 1.8986 4.8358 .1074 .3751 .7721<br />

.9 1.01 31.1797 2.0156 5.5637 .282 .6155 1.139<br />

.9 1.1 25.5206 1.9830 5.1964 .2162 .5062 .8874<br />

.9 1.15 18.1406 2.0724 4.6213 .1363 .4186 .836<br />

It can be seen from the above table 8 that all the different<br />

combinations of λ and µ,peak overshoot will be less for the<br />

combination for λ=.9 and µ=1.15.<br />

(viii) With varying values of λ>1 and µ 1 and µ


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 491<br />

ISSN 2250-3153<br />

Figure 12: Unit Step Response of DC motor using FOPID for different Values of<br />

λ >1 and µ


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 492<br />

ISSN 2250-3153<br />

[14] Mithun Chakraborty, Deepyaman Maiti and Amit Konar, ―The application<br />

of stochastic optimization algorithms to the design of a fractional-order PID<br />

controller,‖ 2008 IEEE region 10 colloquium, 3 rd ICIIS, 2008, pp. 1-6<br />

[15] Hyo-Sung Ahn, Varsha Bhambhani and YangQuan Chen, ―Fractional-order<br />

integral and derivative controller design for temperature profile control,‖ in<br />

Proc. 2008 CCDC-2008, pp. 4767-4771<br />

[16] Concepcion A. Monje, Blas M. Vinagre, Vicente Feliu, YangQuan Chen,<br />

―Tuning and auto-tuning of fractional order controllers for industry<br />

applications,‖ Control Engineering Practice, 16, 2008, pp. 792 – 812<br />

[17] Ying Luo and YangQuan Chen, ―Fractional order [PD] controller for robust<br />

motion control: Tuning procedure and validation,‖ 2009 American control<br />

conf., 2009, pp. 1412-1417<br />

[18] Li Meng, Dingyu Xue, ―Design of an optimal fractional-order PID<br />

controller using multi-objective GA optimization,‖ Proc. Chinese Contr.<br />

Desi. Conf., 2009, pp. 3849-3853<br />

[19] Ivo Petras, ―Fractional-order feedback control of a DC motor,‖ J. Elect.<br />

Engg., vol. 60, no. 3, 2009, pp. 117-128<br />

[20] Arijit Biswas, Swagatam Das, Ajith Abraham, Sambarta Dasgupta, ―Design<br />

of fractional order PI λ D μ controller with improved differential evolution,‖<br />

Engineering Applications of Artificial Intelligence, 22, 2009, pp. 343-350<br />

[21] Venu Kishore Kadiyala, Ravi Kumar Jathoth, Sake Pothalaiah, ―Design and<br />

implementation of fractional order PID controller for aerofin control<br />

system,‖ Proc. 2009 World Congress NaBIC, 2009, pp. 696-701<br />

[22] Mohamed Karim Bouafoura, Naceur Benhadj Braiek, ―PID controller<br />

design for integer and fractional plants using piecewise orthogonal<br />

functions,‖ Commun Nonlinear Sci Number Simulat 15, 2010, pp. 1267-<br />

1278<br />

[23] Ammar A Aldair, and Weiji J Wang, ―Design of fractional order controller<br />

based on evolutionary algorithm for a full vehicle nonlinear active<br />

suspension system,‖ Int. J. Contr Automation, vol. 3, no. 4, 2010, pp. 33-46<br />

[24] Juan J. Gude and Evaristo Kahoraho, ―Analysis and performance<br />

comparison of PID and fractional PI controllers,‖ Proc. 9 th Int. Symps.<br />

Dynamics and Control of Process Systems, 2010, pp. 503-508<br />

[25] Ricardo Enrique Gutierrez, Joao Mauricio Rosario, Jose Tenreio Machado,<br />

―Fractional order calculus: Basic concepts and engineering applications,‖<br />

Mathematical Problems in Engineering, Hindwai Publishing Corporation,<br />

vol. 2010. 2010. pp. 1- 19<br />

[26] Fabrizio Padula, Antonio Visioli, ―Tuning rules for optimal PID and<br />

fractional order PID controllers,‖ Journal of Process Control, 21, 2011, pp.<br />

69-81<br />

[27] S A David, J L Linares e EMJA Pallone, ―Fractional order calculus:<br />

Historical apologia, basic concepts and some applications,‖ Revista<br />

Brasileira de Ensino de Fisica, vol. 33, no. 4, 2011<br />

[28] Abir De, Sidhartha Sen, ―Root locus method for any fractional order<br />

commensurate system,‖ in Proceedings of IEEE TechSym-2011,2011<br />

[29] Radek Matusu, ―Application of fractional order calculus to control theory,‖<br />

International Journal of Mathematical Models and Methods in Applied<br />

Sciences, issue 7, vol 5, 2011, pp. 1162 – 1169<br />

[30] Ivo Petras, Fractional-order nonlinear systems: Modeling, Analysis and<br />

Simulation, Springer, 2010<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 493<br />

ISSN 2250-3153<br />

FUZZY GRAPHS ON COMPOSITION, TENSOR AND<br />

NORMAL PRODUCTS<br />

Dr. G.NIRMALA* and M.VIJAYA**<br />

*Associate Professor, P.G & Research Department of Mathematics,<br />

K.N.G Arts College for Women (Autonomous), Thanjavur- 613007.Tamil Nadu, India<br />

nirmalamanohar11@yahoo.com<br />

**Head, Department of Mathematics, Marudupandiyar College, Thanjavur- 613403,<br />

Tamil Nadu, India. mathvijaya79@yahoo.com<br />

Abstract<br />

Special fuzzy graph can be obtained from two given fuzzy graphs using the operations, Cartesian product, composition, tensor and<br />

normal products. In this paper, we find the degree of a vertex in fuzzy graphs formed by these operations in terms of the degree of<br />

vertices in the given fuzzy graphs in some particular cases.<br />

Index Terms- Cartesian product, Composition, Degree of a vertex, Tensor product, Normal product.<br />

1. Introduction<br />

Fuzzy graphs introduced by Rosenfeld in 1975[1-2,9,10]. The operations of union, join, Cartesian product and composition<br />

on two fuzzy graphs were defined by Moderson.J.N. and Peng.C.S [3-8]. In this paper, we study about the degree of a vertex in fuzzy<br />

graphs which are obtained from two given fuzzy graphs using the operations Cartesian product and composition of two fuzzy graphs,<br />

tensor and normal product of two fuzzy .In general, the degree of vertices in Cartesian product and composition of two fuzzy graphs,<br />

tensor and normal product of two fuzzy graphs G1 andG2 cannot be expressed in terms of those in G1 andG2. In this paper, we find the<br />

degree of vertices in Cartesian product, composition, tensor and normal product of G1 andG2 in some particular cases.<br />

2. Research Elaborations<br />

Definition 2.1: A fuzzy subset of a set V is a mapping σ from V to [0, 1]. A fuzzy graph G is a pair of<br />

functions G: (σ, μ) where σ is a fuzzy subset of a non empty set V and μ is a symmetric fuzzy relation on σ,<br />

(i.e.) μ (uv) ≤ σ (u) ∧ σ (v). The underlying crisp graph of G: (σ, µ) is denoted by G*: (V, E) where E⊆ V× V.<br />

Definition 2.2: Let G: (σ, µ) be a fuzzy graph. The degree of a vertex u in G is defined by<br />

dG(u) =<br />

=<br />

Definition 2.3: The order of a fuzzy graph G is defined by O (G) =<br />

Note: Throughout this paper G₁: (σ₁, μ₁) and G₂ :( σ₂, μ₂) denote two fuzzy graphs with<br />

underlying crisp graphs G₁*: (V₁, E₁) and G₂* :( V₂, E₂) with | Vi | =Pi, i = 1, 2. Also d (Gi*) (ui)<br />

denotes the degree of ui in Gi*<br />

Definition 2.4: The cartesian product of two fuzzy graphs G₁ and G₂ is defined as a fuzzy graph G = G₁ x<br />

G₂ : ( σ₁x σ₂ , μ₁ x μ₂ ) on G*: (V, E) where V=V₁ x V₂ and E= {((u₁,u₂)(v₁,v₂)) /<br />

u₁=v₁, u₂v₂ E₂ or u₂=v₂ ,u₁v₁ E₁} with<br />

(σ1 x σ2)(u1, u2) = σ₁(u₁) ∧ σ2(u2), for all (u1,u2) V₁ × V₂<br />

& (µ1 × µ2)(( u1,u2)( v1,v2)) =<br />

Definition 2.5: The Composition of two fuzzy graphs G₁ and G₂ is defined as a fuzzy graph G= G1 [ G₂ ] :<br />

( σ₁ ⃘ σ₂ , μ₁ ⃘ μ₂ ) on G*:(V,E) where V= V₁ × V₂ and E={((u1,u2)(v1,v2)) / u1=v1 , u2v2 E2 or<br />

u2 ≠ v2 ,u₁v₁ E1} with<br />

(σ1 x σ2)(u1, u2) = σ₁(u₁) ∧ σ2(u2), for all (u1,u2) V₁ × V₂<br />

& (µ1 × µ2)(( u1,u2)( v1,v2)) =<br />

3. Results<br />

Definition 3.1: The normal product of two fuzzy graphs (σi, µi) on Gi = (Vi , Xi), i=1,2 is defined as a fuzzy graph (σ1 ⃘ σ2 ,<br />

µ1 ⃘ µ2) on G = (V,X) where V= V1 X V2 and X ={((u,u2)(u,v2) \<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 494<br />

ISSN 2250-3153<br />

u V1, (u2v2) X2} {((u1,w)(v1,w))\ (u1,v1) X1,w V2} ∪{(u1, u2)(v1,v2)\(u₁v₁)∈X₁,(u₂v₂)∈X₂} Fuzzy sets σ1 ⃘ σ2 and µ1 ⃘ µ2 are<br />

defined as (σ1 ⃘σ2) (u1, u2) = (σ1(u1) ∧<br />

σ2(u2) ) (u1, u2) V1xV2 ( 1 ⃘ 2) ((u, u2)(v1, v2)) = { 1(u)∧ 2 (u2v2) }<br />

u V1 and (u2v2) X2 1 ⃘ 2) ((u1, w)(v1, w)) = { 1 (u1v1)∧ 2(w)}<br />

w V2 and (u1v1) X1 (µ1 ⃘ 2) ((u1,u₂)(v₁,v2)) = {µ1(u₁v₁)∧µ2(u₂v2)}<br />

(u1u2) X1 and (v1v2) X2<br />

Definition 3.2: The tensor Product of two fuzzy graphs (σi, µi) on Gi = (Vi , Xi), i=1,2 is defined as a fuzzy graph (σ₁⊗ σ2<br />

, µ1 ⊗ µ2) on G = (V,X) where V= V1 X V2 and X ={(u1, u2), (v1, v2)\(u₁,v₁)∈X₁,(u₂,v₂)∈X₂}. Fuzzy sets σ1⊗ σ2 and µ₁⊗<br />

µ2 are defined as 1 ⊗ 2) (u1, u2) = {( 1 (u1) ∧ 2<br />

(u2)} for all (u1, u2) V ( 1 ⊗ 2) {(u1, u2), (v1, v2)} = 1<br />

(u1, v1) ∧ 2 (u2, v2)} (u1, u2) X1 and (v1, v2) X2<br />

3.1 Degree of a vertex in Cartesian product By the<br />

definition, for any vertex (u1, u2) ∈ V1 x V2, dG xG₂ (u₁,u₂) =<br />

= +<br />

In the following theorems, we find the degree of (u1, u2) in G1 X G2 in terms of those in G1 and G2 in some particular cases.<br />

Theorem 3.1: Let G1:(σ₁,µ₁) and G2:(σ₂,µ₂) be two fuzzy graphs. If σ1≥ µ2 and σ2 ≥ µ1 then d G₁ x G₂ (u₁,u₂) =<br />

dG₁(u₁) +dG₂(u₂).<br />

Proof: From the definition of a degree of a vertex in cartesian product<br />

d G₁ x G₂ (u₁,u₂) = +<br />

= + (since σ1≥ µ2 and σ2 ≥ µ1) = dG₁ (u1) +dG₂<br />

(u2). Example 3.1<br />

u₁ (.6)<br />

.5<br />

u₁ (.7)<br />

G1<br />

u₂ (.5) v₂ (.7)<br />

.4<br />

.5<br />

.5<br />

G2<br />

σ₁≥µ₂<br />

σ₂≥µ₁<br />

(u₁, u₂).5 (u₁, v₂) .6<br />

.4<br />

.5<br />

(v₁, u₂).5 .4 (v₁, u₂) .7<br />

Figure. 1. Cartesian product of G₁ & G₂ (G₁ x G₂)<br />

Here G₁, G₂ are two fuzzy graphs d G₁ x G₂<br />

(u₁,u₂) = dG₁(u₁) + dG₂ (u2). ( since σ₁≥µ₂, σ₂≥µ₁ & by theorem 3.1 )<br />

= .5 + .4<br />

= .9<br />

d G₁ x G₂ (u₁,v₂) = .5 + .4<br />

= .9 Similarly<br />

we can find the degrees of all the vertices in G₁ x G₂. This can be verified in the figure 1.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 495<br />

ISSN 2250-3153<br />

3.2 Degree of a vertex in composition By the<br />

definition, for any vertex (u1,u2) ∈ V1 x V2, d G₁ x G₂<br />

(u1,u2) = µ₂)((<br />

= + + µ₁ (u₁ v₁)<br />

Theorem 3.2 Let G1: (σ₁, µ₁) and G2 :(σ2,µ2) be two fuzzy graphs. If σ1≥ µ2 and σ2 ≥ µ1 then<br />

dG₁[G2](u₁,u₂) =P₂ dG₁(u₁) +dG₂(u₂).<br />

Proof: d G₁ [G₂]<br />

(u1,u2) = + + µ₁ (u₁v₁) =<br />

+ + (since σ₁ ≥ µ₂ and σ₂ ≥ µ₁) = d G₂ (u2) +| V2 |<br />

= d G₂ (u2) + p₂ d G₁(u₁).<br />

Example 3.2<br />

u₁ (.6)<br />

.5<br />

u₁ (.7)<br />

G1<br />

Consider the fuzzy graphs G₁, G₂ and G₁ [G₂] in figure 2 .<br />

u₂ (.5) v₂ (.7)<br />

.4<br />

G2<br />

(u₁, u₂).5 (u₁, v₂) .7<br />

.4<br />

.5<br />

.5 .5<br />

.5<br />

.4<br />

(v₁, u₂).5 (v₁, u₂) .7<br />

Figure .2. Composition of G₁ & G₂ (G₁ [G₂])<br />

Here σ₁ ≥ µ₂ and σ₂ ≥ µ₁ and by theorem 3.2 d G₁ [G₂] (u₁,u₂) =<br />

dG₂(u₂) +P₂dG₁(u₁).<br />

= .4 + 2 (.5)<br />

=1.4 d G₁ [G₂] (u₁,v₂) = dG₂(v₂)<br />

+P₂dG₁(u₁).<br />

= .4 + 2(.5)<br />

= 1.4<br />

Similarly we can find the degrees of all the vertices in G₁[ G₂]. This<br />

can be verified in the figure 2.<br />

3.3 Degree of a vertex in tensor product<br />

By definition, for any (u₁, u₂) ∈ V₁ × V₂<br />

d G₁ ⊗ G₂ (u₁, u₂) = ∑ (µ₁ ⊗ µ₂)(( u₁, u₂)( v₁, v₂)) =<br />

Theorem 3.3: Let G₁ : (σ₁, µ₁) and G₂ : (σ₂, µ₂) be two fuzzy graphs. If µ₂ ≥ µ₁ then<br />

d G₁ ⊗ G₂ (u₁, u₂) = dG₁(u₁).And if µ₁≥µ₂ then d G₁ ⊗ G₂ (u₁, u₂)<br />

= dG₂(u₂). Proof: d G₁ ⊗<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 496<br />

ISSN 2250-3153<br />

G₂ (u₁, u₂) = = ∑ µ₁ (u₁,<br />

v₁) = dG₁(u₁)<br />

Example 3.3<br />

Consider the fuzzy graphs G₁ and G₂ in fig 3. Here µ₂ ≥ µ₁ and by theorem 3.3 d G₁ ⊗ G₂<br />

(u₁, u₂) = dG₁(u₁) = .6<br />

d G₁ ⊗ G₂(v₁,v₂) = dG₁(v₁)<br />

= .6 This can be<br />

verified in the fig 3.<br />

3.4 Degree of a vertex in normal product By definition,<br />

for any (u₁, u₂) ∈ V₁ × V₂ dG₁ ⃘ G₂ (u₁, u₂) =<br />

=<br />

Theorem 3.4 Let G1: (σ₁,µ₁) and G2:(σ2,µ2) be two fuzzy graphs. If σ1≥ µ2 , σ2 ≥ µ1 and µ₁≤µ₂ then dG₁ ⃘G₂(u1,u2) =P2 dG1(u1)<br />

+dG2(u2).<br />

Proof:<br />

dG₁ ⃘ G₂ (u₁, u₂) =<br />

=<br />

G₁(u₁).<br />

u₁ (.9)<br />

.6<br />

v₁ (.7)<br />

u₂ (.9)<br />

.7<br />

v₂ (.8)<br />

( u₁, u₂)(.9) ( u₁, v₂)(.8)<br />

.6 .6<br />

(v₁, u₂)(.7) (v₁, v₂)(.7)<br />

G₁ G₂ G₁⊗ G₂<br />

Figure. 3. Tensor product of G₁& G₂ (G₁⊗ G₂)<br />

= +<br />

+ (since σ₁ ≥ µ₂, σ₂ ≥ µ₁ and µ₁≤µ₂)<br />

= d G₂ (u2) +| V2 | d G₁(u₁). = d G₂ (u2) + p₂ d<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 497<br />

ISSN 2250-3153<br />

Example 3.4 u₁ (.6)<br />

Consider the fuzzy graphs G₁ and G₂ in figure 4. Here σ1≥ µ2 , σ2 ≥ µ1 and µ₁≤µ₂ and by theorem 3.4 d G₁ ⃘ G₂(u₁,u₂)<br />

= dG₂(u₂) + P₂dG₁(u₁)<br />

=.4 + 2( .3)<br />

=1 d G₁ ⃘<br />

G₂(v₁,v₂) = dG₂(v₂) + P₂dG₁(v₁)<br />

= .4 + 2( .3 )<br />

= 1 Similarly we can find the<br />

degrees of all the vertices in G₁ x G₂. This can be verified in the figure 3.<br />

Conclusion<br />

In this paper ,we have found the degree of vertices in G₁ x G₂, G₁[G₂], G₁ ⊗ G₂, G₁ ⃘ G₂ in terms of the degree of<br />

vertices in G₁ and G₂ under some conditions and illustrated them through examples. This will be helpful when the graphs are very<br />

large. Also they will be very useful in studying various properties of cartesian product, composition, tensor product, normal product of<br />

two fuzzy graphs.<br />

REFERENCES<br />

.3<br />

5<br />

v₁ (.7)<br />

G1<br />

u₂ (.5) v₂ (.7)<br />

.4<br />

G2<br />

(u₁, u₂).5 (u₁, v₂) .7<br />

.4<br />

.3<br />

5<br />

.3<br />

45<br />

.3<br />

45<br />

.4 (v₁,<br />

u₂).5 G₁ ⃘ G₂ (v₁, v₂) .7<br />

Figure.4. Normal product of G₁ & G₂ (G₁ ⃘ G₂)<br />

[1] R.Balakrishnan and K.Ranganathan, A text book of Graph Theory, Spinger, 2000.<br />

[2] A.Roseneld, fuzzy graphs, in: L.A.Zadeh, K.S. Fu,, K .Tanaka, M.Shimura (Eds), Fuzzy sets and Their Applications to Cognitive and Decision Processes,<br />

Academic Press, New York,1975,pp77-95.<br />

[3] J.N.Mordeson, C.S.Peng, ―Operation on fuzzy graphs‖. Information Sciences 79 (1994) 159-170.<br />

[4] J.N.Mordeson, & P.S.Nair, Information Sciences 90 (1996) 39-49.<br />

[5] John N.Mordeson and Premchand S.Nair, Fuzzy Graphs and Fuzzy hypergraphs, Physica – Verlag, Heidelberg 2000.<br />

[6] A.Nagoorgani and V.T.Chandrasekaran, ―Fuzzy graph Theory‖, Allied Publishers pvt. Ltd<br />

[7] A.Nagoorgani & M.Basheer Ahamed, 2003, ―Order and Size of fuzzy graphs‖, Bullet ion of pure and applied sciences. 22E (1), pp. 145-148.<br />

[8] A.Nagoorgani & K.Radha,2009,‖The degree of a vertex in some fuzzy graphs‖,International Journal of Algorithms,Computing and Mathematics‖,vol 2 (107-<br />

116).<br />

[9] Harary.‖F,.Graph Theory‖, Addition Wesly, Third printing, October 1972.<br />

[10] Zimmermann, H.J., ―Fuzzy Set Theory and its applications‖,Kluwer-Nijhoff,Boston,1985.<br />

.3<br />

5<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 498<br />

ISSN 2250-3153<br />

AUTHORS<br />

Dr. G. NIRMALA<br />

Associate Professor, P.G & Research Department of Mathematics,<br />

K.N.G Arts College for Women (Autonomous), Thanjavur- 613007.Tamil Nadu, India.<br />

nirmalamanohar11@yahoo.com<br />

Correspondence Author:<br />

M.VIJAYA<br />

Head, Department of Mathematics,<br />

Marudupandiyar College, Thanjavur- 613403, Tamil nadu, India.<br />

mathvijaya79@yahoo.com<br />

M. No:+91 9443560178<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 499<br />

ISSN 2250-3153<br />

Text Fusion in Medical Images Using Fuzzy Logic Based<br />

Matrix Scanning Algorithm<br />

Pinki Jain, Anu Aggarwal (Guide)<br />

Doon Valley Institute of Engineering and Technology, Kurukshetra University, Karnal, India<br />

Faculty of Doon Valley Institute of Engineering and Technology, Kurukshetra University, Karnal, India<br />

Abstract- Text fusion in medical images is an important<br />

technology for image processing. We have lots of important<br />

information related to the patient‘s reports and need lots of space<br />

to store and the proper position and name which relates that<br />

image with that data.<br />

In our work we are going to find out the AOI (area of interest)<br />

for the particular image and will fuse the related document in the<br />

NAOI (non area of interest) of the image, till yet we have many<br />

techniques to fuse text data in the medical images one of form<br />

them is to fuse data at the boarders of the images and build the<br />

particular and pre defined boarder space.<br />

We are going to propose an algorithm called fuzzy logic based<br />

matrix scanning algorithm in which we will first find out the area<br />

of interest and after that we find noisy pixels of the image to<br />

embed data in that noisy portions to save the boarder size. Our<br />

proposed technique is LSB to store text data in pixels. We use<br />

MATLAB for carrying out implementation on our proposed<br />

work.<br />

Index Terms- Electronic Patient Record, medical images, Text<br />

data, text fusion<br />

D<br />

I. INTRODUCTION<br />

ue to the development of latest technologies in<br />

communication and computer networks, exchange of<br />

medical images between hospitals has become a usual practice<br />

now days. Healthcare institution that handles a number of<br />

patients, opinions is often sought from different experts. It<br />

demands the exchange of the medical history of the patient<br />

among the experts which includes the clinical images,<br />

prescriptions, initial diagnosis etc. With the increasing use of<br />

Internet, these digital images can be easily accessed and<br />

manipulated. Considering patient‘s privacy and diagnostic<br />

accuracy, the prevention of medical images from tampering tends<br />

to be an urgent task. It is required to imbibe the aspects of<br />

confidentiality, authentication and integrity with the distribution<br />

of these images in the Health Information System. Medical<br />

images are exchanged for number of reasons, for example<br />

teleconferences among clinicians, interdisciplinary exchange<br />

between radiologists for consultative purposes, and distant<br />

learning of medical personnel. Most hospitals and health care<br />

systems involve a large amount of data storage and transmission<br />

such as administrative documents, patient information, and<br />

medical images, and graphs. Among these data, the patient<br />

information and medical images need to be organized in an<br />

appropriate manner in order to facilitate using and retrieving<br />

such data and to avoid mishandling and loss of data. In order to<br />

overcome the capacity problem and to reduce storage and<br />

transmission cost, data hiding techniques are used for concealing<br />

patient information with medical images. Those data hiding<br />

techniques can be also used for authentication. These<br />

applications demand large amount of patient information<br />

available in one single image rather than over several entities.<br />

In medical images, AOI is an area which contains important<br />

information and must be stored without any distortion. In this<br />

paper , we present an fuzzy logic based matrix scanning<br />

algorithm which finds the noisy pixels in the medical images by<br />

scanning the whole image in several directions using 3*3<br />

scanning window .Then patient data is hidden inside these pixel.<br />

A. Related Researches<br />

1. In 2005, Hung kyo lee proposed digital watermarking<br />

technique for medical image that prevents illegal forgery that can<br />

be caused after transmitting medical image data remotely[1]. A<br />

wrong diagnosis may be occurred if the watermark is embedded<br />

into the whole area of image. Therefore, they embed the<br />

watermark into some area of medical image, except the decision<br />

area that makes a diagnosis so called region of interest (ROI)<br />

area in our paper, to increase invisibility. The watermark is the<br />

value of bit-plane in wavelet transform of the decision area for<br />

certification method of integrity verification. The experimental<br />

results show that the watermark embedded by the proposed<br />

algorithm can survive successfully in image processing<br />

operations such as JPEG lossy compression.<br />

2. In 2007, Rodríguez-Colín Raúl, Feregrino-Uribe Claudia,<br />

Trinidad-Blas Gershom de J. proposed watermarking scheme<br />

that combines data compression, encryption and watermarking<br />

techniques and image moment theory applied to radiological<br />

medical images[2]. In this work we use DICOM data as a<br />

watermark to embed in medical images. Image quality is<br />

measured with metrics which are used in image processing such<br />

as PSNR and MSE. Our results show good accuracy in the<br />

watermark extraction process.<br />

3. In 2009, Liu Xin a semi-fragile digital watermarking<br />

algorithm[3] is proposed based on integer wavelet transform to<br />

estimate integrity and authenticity of medical images. Using<br />

matrix norm quantization, it embeds watermarks into mediumfrequency<br />

an high-frequency detail sub-bands of medical images‘<br />

integer wavelet domain and it is a blind-testing watermarking<br />

algorithm. Attacking experiments show that the algorithm not<br />

only has both robustness and sensitivity, but also exactly locates<br />

distorted area, so it is an effective semi-fragile digital<br />

watermarking algorithm for medical image field. Semi-fragile<br />

watermarks require not only certain robustness but also<br />

sensitivity, so this paper proposes a semi-fragile watermarking<br />

algorithm based on integer wavelet transform and matrix norm<br />

quantization, in which watermarks are separately embedded into<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 500<br />

ISSN 2250-3153<br />

medium-frequency and high frequency in medical images‘<br />

integer wavelet domain.<br />

II. PROPOSED METHOD<br />

Our proposed work consists of two modules:<br />

A. Module 1<br />

It is the first module we read the host image file on which we are<br />

going to implement our algorithm to MATLAB workspace and<br />

do the needful changes on that like if the image is in RGB format<br />

we convert it into grayscale and if the size of the image is too big<br />

then convert it to the nominal size.Then the normalization of<br />

light intensity for the image is to be done so that we can get more<br />

specific intensities to work with that.After the normalization we<br />

proceed with the finding the noisy pixels in the image by various<br />

scanning methods. We are going to implement a new fuzzy logic<br />

based (5x5) and (3x3) matrix scanning algorithm which will scan<br />

the whole picture in several directions and according to the<br />

direction of the majority carries the direction on the preceding<br />

pixel will be decided. According to which we can able to decide<br />

whether the point is a noise or not.<br />

B. Module 2<br />

After detecting the noisy coordinates of the image we add our<br />

data to them as a watermarking content and save the positions<br />

where we are going to fuse our patient data in image. After<br />

fusing the data in noisy coordinates we again calculates the<br />

reaming data to be hide or not and if there will be any data left to<br />

fuse in the image then our algorithm proceed towards hiding the<br />

data in the image boarder and generates only that much of<br />

boarder which is needed to be store the remaining data and cuts<br />

rest of the non area of interest to save image.<br />

C. Fusion of patient data in medical image<br />

Fuzzy logic based matrix scanning algorithm<br />

As we propose an algorithm which finds the non area of interest<br />

in the medical image. A 3*3 scanning window is used to find the<br />

non area of interest in medical image. Our algorithm works as<br />

follows:<br />

1. Initialize Naoi (non area of interest) equal to zero.<br />

2. Then, separate the color planes of the image .We will<br />

embed the patient data in any one color plane of the<br />

image. We separate green color plane and starts work on<br />

this.<br />

3. The size of the resulting image is determined.<br />

4. Our algorithm completes when<br />

The total length of the data > Naoi<br />

5. For j = 1 to col -2<br />

For i= 1 to row – 2<br />

Where i,j are the elements of the scanning window.and<br />

row and col are the total no of rows and columns of the<br />

window.<br />

6. Initialize votes = 0;<br />

Where votes are the predictions of finding noisy pixels<br />

by the neigbours.<br />

7. For m= 0 to 2<br />

For n= 0 to 2<br />

Subtract the image (i+1,j+1) from the image (i+m,i+n)<br />

if its subtraction is greater than the threshold value<br />

then<br />

otes = votes+1;<br />

end<br />

end<br />

end<br />

8. If(votes>4)<br />

9. Naoi _add=[naoi_add;i+1 j+1];<br />

Naoi=naoi+1;<br />

end<br />

end<br />

end<br />

th = th -2;<br />

end<br />

10. Noisy pixels computed.<br />

Hence noisy pixels computed.we hide the patient data into these<br />

pixels .our hiding technique is LSB (Least significant bit).<br />

D. Methodology<br />

Fig 1: Fusion process of patient data in medical image<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 501<br />

ISSN 2250-3153<br />

Fig 2: Defusion of patient data from the watermarked image<br />

E. Defusion of patient data from the fused image<br />

This is the reverse process of fusion of patient data in medical<br />

image .<br />

1) we finds the noisy pixels in watermarked image.<br />

2) after finding the non area of interest, we can extract the patient<br />

data from the image.<br />

III. RESULTS<br />

In this section, we present the results obtained with our work<br />

.To evaluate our proposed algorithm, we simulated with the<br />

medical images; Ctscan, Brain and liver with the size of 512*512<br />

that converted patient files of DICOM to image data using<br />

MATLAB 7.7.0(R2008b). In our scheme ,the extracted<br />

watermark is a visually recognizable pattern. The viewer can<br />

compare the results with referenced watermark subjectively.<br />

However ,.the subjective measurement is dependent on factors<br />

such as the expertise of the viewers and the experimental<br />

conditions. Therefore. a quantitative measurement is needed to<br />

provide objective judgment of the extracting fidelity. We define<br />

the similarity measurement between the original image and the<br />

defused image by the two quality metrices.<br />

1. PSNR( power signal-to-noise ratio)<br />

2. MSE is mean square error<br />

The mathematical representation of PSNR and MSE is given<br />

below:<br />

where m and n are the rows and columns of the image .f(i,j) is<br />

the original image and g(i, j) is the fused image.<br />

Fig 3 shows original ctscan image and watermarked image<br />

(a) (b)<br />

Fig 3: (a) Original ctscan image and (b) Watermarked image<br />

Table 1 below shows the variation of PSNR ,MSE and time taken<br />

to hide the patient data based on data capacity in bytes for ctscan<br />

image.then,fig 4 shows the graphical representation for variation<br />

of PSNR ,MSE and time taken vs data capacity.High value of<br />

PSNR shows the less image degradation .<br />

Table 1: Variation of PSNR and MSE based data capacity (ctscan<br />

image)<br />

Data<br />

PSNR(dB) MSE(dB) Time<br />

fused(bytes)<br />

taken(sec)<br />

10 60.5629 0.0576 0.3213<br />

100 51.8303 0.4300 0.3099<br />

500 40.7794 5.4769 0.3696<br />

1000 37.8313 10.7981 0.9373<br />

1500 36.4688 14.7776 2.1020<br />

2000 35.3967 18.9150 2.4407<br />

2500 34.5596 22.9361 2.8748<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 502<br />

ISSN 2250-3153<br />

(a)<br />

(b)<br />

(c)<br />

Fig 4: Graphs for ctscan images (a) PSNR vs data fused ,<br />

(b)MSE vs data fused and (c) bytes fused vs time taken to hide<br />

Fig 5 shows the original brain image and watermarked image<br />

after hiding patient and table 2 shows the variation of PSNR,<br />

MSE and time taken to hide the patient data based data capacity.<br />

(a) (b)<br />

Fig 5: Brain images (a) original brain image, (b) fused brain<br />

image<br />

Table 2: Variation of PSNR, MSE and time taken to hide data<br />

based on data capacity (Brain image)<br />

Data<br />

PSNR(dB) MSE(dB) Time<br />

fused(bytes)<br />

taken(sec)<br />

10 62.3068 0.0385 0.3316<br />

100 54.7907 0.2175 0.3187<br />

500 44.5106 2.3197 0.8918<br />

1000 41.4401 4.7040 2.3093<br />

1500 39.4699 7.4044 3.0069<br />

2000 38.0103 10.3622 3.2750<br />

2500 36.5773 14.4129 3.5736<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 503<br />

ISSN 2250-3153<br />

(a)<br />

(b)<br />

(c)<br />

Fig 6: Graphs (a) PSNR vs data fused, (b) MSE vs data fused and<br />

(c) bytes fused vs time taken<br />

Fig 7 shows the original liver image and fused image with size<br />

512*512 and table 3 shows the below shows the variation of<br />

PSNR ,MSE and time taken to hide the patient data based on data<br />

capacity in bytes for ctscan<br />

(a) (b)<br />

Fig 7 : liver images (a) original image , (b) fused liver image<br />

Table 3: Variation of PSNR, MSE and time taken to hide data<br />

based on data capacity (liver image)<br />

Data<br />

PSNR(dB) MSE(dB) Time<br />

fused(bytes)<br />

taken(sec)<br />

10 55.2368 0.1962 0.2988<br />

100 48.6952 0.8850 1.8745<br />

500 44.1132 2.5419 3.3767<br />

1000 42.2025 3.9467 3.8616<br />

1500 40.2472 6.1910 4.1885<br />

2000 39.0200 8.2125 4.2970<br />

2500 37.9861 10.4200 4.3339<br />

(a)<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 504<br />

ISSN 2250-3153<br />

(b)<br />

(c)<br />

Fig 8: Graphical representation (a) PSNR VS data fused , (b)<br />

MSE VS data fused and (c) time taken VS data fused<br />

IV. CONCLUSION<br />

Digital medical imaging technologies have become<br />

increasingly important in medical practice and health care for<br />

providing assistant tools for diagnosis: treatment, and surgery.<br />

Due to the volume of medical images is huge and has grown<br />

rapidly. Especially on CT (computer tomography) and MRI<br />

(magnetic resonance imaging), the compression technique must<br />

be applied. Our proposed work is very effective for hiding the<br />

large amount of patient data. As it finds the non area of interest<br />

in the medical image. Then, patient data is embedded onto noisy<br />

pixels. This algorithm is an effective algorithm providing good<br />

results with accuracy because it selects the region of non area of<br />

interest which is unusable part of the image. Hence there is not<br />

any problem at the time diagonosis of the image .Image does not<br />

lose its originality also. Results have shown the accuracy of non<br />

area of interest detection using fuzzy logic based matrix scanning<br />

algorithm over other algorithms. The fuzzy logic based algorithm<br />

has been successful in obtaining the noisy pixels that are present<br />

in an image after the its implementation and execution with<br />

various sets of images. Sample outputs have been shown to make<br />

the readers understand the accuracy of the algorithm. Thus<br />

developed algorithm exhibits tremendous scope of application in<br />

various areas of digital image processing.<br />

V. FUTURE SCOPE<br />

1. In future, we will extend our proposed algorithm in order to<br />

obtain the less degradation and results with more accuracy .<br />

2. We can use 5*5 and 7*7 Scanning mask window in future for<br />

predicting the noisy pixels in the medical image.<br />

3. In our proposed work, the image is first to be converted into<br />

gray image. This limitation can be eliminated and algorithm can<br />

be applied directly to color images, and the detection would then<br />

become significantly more complex.<br />

REFERENCES<br />

[1] Hyung-Kyo Lee, Hee-Jung Kim, Ki-Ryong Kwon, Jong-Keuk Lee, ―Digital<br />

Watermarking of Medical Image Using R01 Information‖ 2005 IEEE.<br />

[2] Rodríguez-Colín Raúl, Feregrino-Uribe Claudia, Trinidad-Blas Gershom de<br />

J., ― Data Hiding Scheme for Medical Images‖ 2007 IEEE .<br />

[3] Liu Xin, Lv Xiaoqi, A Semi-fragile Digital Watermarking Algorithm Based<br />

on Integer Wavelet Matrix Norm Quantization For Medical ImagesWang<br />

Ying,‖2009 IEEE.<br />

[4] Henning M¨uller, Jayashree Kalpathy–Cramer,‖ The ImageCLEFMedical<br />

Retrieval Task at ICPR 2010 Information Fusion,IEEE 2010.<br />

[5] Xinde Sun and Shukui Bo, ―A Blind Digital Watermarking for Color<br />

Medical Images Based on PCA‖ 2010 IEEE.<br />

[6] Osamah M. Al-Qershi, Bee Ee Khoo,‖ ROI–based Tamper Detection and<br />

Recovery for Medical Images Using Reversible Watermarking<br />

Technique‖,IEEE 2010.<br />

[7] Hsiang-Cheh Huang A, Wai-Chi Fang B, Shin-Chang Chen ―Privacy<br />

Protection and Authentication for Medical Images with Record-Based<br />

Watermarking‖ 2009 IEEE .<br />

[8] P.Viswanathan, Dr.P.Venkata Krishna,‖ Text fusion watermarking in<br />

Medical image with Semi-reversible for Secure transfer and<br />

Authentication‖, IEEE 2009.<br />

[9] Nisar Ahmed Memon , Syed Asif Mehmood Gilani ,‖ Adaptive Data Hiding<br />

Scheme for Medical Images using Integer Wavelet Transform ,IEEE 2009.<br />

[10] Khurram Khurshid1, Claudie Faure2, Nicole Vincent,‖ Fusion of Word<br />

Spotting and Spatial Information for Figure Caption Retrieval in Historical<br />

Document Images‖, IEEE 2009.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 505<br />

ISSN 2250-3153<br />

[11] P.Viswanathan, Dr.P.Venkata Krishna,‖ Text fusion watermarking in<br />

Medical image with Semi-reversible for Secure transfer and<br />

Authentication‖, IEEE 2009.<br />

[12] M.C. D´ıaz-Galiano, M.T. Mart´ın-Valdivia,A. Montejo-R´aez, L.A.<br />

Ure˜na-L´opez,"improving Performance of Medical Images Retrieval by<br />

Combining Textual and Visual Information‖IEEE 2008.<br />

[13] Amrinder Singh Brar, Mandeep Kaur, ―Reversible Watermarking<br />

Techniques for Medical Images with ROI-Temper Detection and Recovery<br />

- A Survey‖ IJETAE 2010.<br />

[14] Caroline Lacoste, Joo-Hwee Lim, Jean-Pierre Chevallet, and Diem Thi<br />

Hoang Le ―Medical-Image Retrieval Based on Knowledge- Assisted Text<br />

and Image Indexing‖ 2007 IEEE .<br />

[15] Joo-Hwee Lim, Caroline Lacoste, Jean-Pierre Chevallet, and Diem Thi,‖<br />

Hoang Le,‖knowledge assisted medical image retrieval‖ IEEE 2007.<br />

[16] Pedro R. Kalva, Fabricio Enembreck and Alessandro L. Koerich,‖web<br />

Image Classification Based on the Fusion of Image and Text<br />

Classifiers‖IEEE 2007.<br />

[17] S.Poonkuntran, R.S.Rajesh, ―A Messy Watermarking for Medical Image<br />

Authentication‖ 2011 IEEE.<br />

AUTHORS<br />

First Author – Pinki Jain, Doon Valley Institute of Engineering<br />

and Technology, Kurukshetra University, Karnal<br />

Email id - Pinki.jain 1988@gmail.com<br />

Second Author – Anu Aggarwal, Faculty of Doon Valley<br />

Institute of Engineering and Technology, Kurukshetra<br />

University, Karnal.<br />

Email id - anu.cse.diet@gmail.com.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 506<br />

ISSN 2250-3153<br />

Impact of Peace and Disturbances on Tourism and<br />

Horticulture in Jammu and Kashmir<br />

RAJNI SHARMA, VINOD KUMAR SHARMA AND VAR INDER SINGH WARIS<br />

Abstract- J&K is an important tourist destination of the<br />

country and has been a place of attraction for tourists since<br />

centuries. The lush green forests, sweet springs, perennial rivers,<br />

pictures que, alpines scenery and pleasant climate of Kashmir<br />

valley has remained an internationally acclaimed tourist<br />

destination, whereas Jammu region- the land of temples is<br />

attracting a large number of pilgrim, tourists and the important<br />

destination has been Shri Mata Vaishno Devi (SMVD). J&K is<br />

also well known for its horticulture produce both in India and<br />

abroad. The state offer good scope for cultivation of all types of<br />

horticulture crops covering a variety of temperate fruits like<br />

apple, chestnut, apricot, pear, peach, plum etc. This paper<br />

emphasized the growth of tourism and horticulture in different<br />

periods, peace and disturbances. Under this paper impact of<br />

peace and disturbances are shown by showing the growth of<br />

tourism and horticulture.<br />

Index Terms- Depuration, fish, habitat, metals, wastewater,<br />

wetlands<br />

J<br />

I. INTRODUCTION<br />

ammu and Kashmir occupies a strategic place on the country's<br />

map with its borders touching Pakistan, Tibet and China. The<br />

state has three distinct regions of Kashmir, Jammu and ladakh.<br />

Each region has a specific resources base. it has a mountainous<br />

terrain, except for some portion of Jammu region and Kashmir<br />

valley. Jammu and Kashmir has a unique economic feature. It as<br />

many innate economic disadvantages, like remoteness and poor<br />

connectivity, hilly and often inhospitable terrain, susceptibility to<br />

natural disasters, poor infrastructure, sparse population density<br />

etc. in J&K all these factors resulted in a classic backwardness<br />

trap arising from low economic activity leading to low<br />

employment opportunity and subsequently resulting in low<br />

income generation. In spite of all these disadvantages, the<br />

economy has suffered badly due to extremely adverse law and<br />

order situation prevailing in the state for more than two decades<br />

now. These economic disadvantages together with disturbed<br />

conditions have their significant implications on the size and<br />

nature of development problem influencing the approach to be<br />

adopted.<br />

II. PEACE AND DEVELOPMENT: THE LINKAGE<br />

Recent decades have seen the emergence and escalation of a<br />

wide variety of violent conflicts around the globe. Regardless of<br />

the motives, violent conflicts are usually disastrous socially as<br />

well as culturally; economically as well as politically. Apart from<br />

a few beneficiaries in the arms industry, economic disruption is<br />

(P.HD Scholars Deptt of Economics University of Jammu)<br />

Email id - remmi2pangotra@gmail.com<br />

an integral part of conflicts, negatively affecting people‘s<br />

livelihoods and the longer-term development process.<br />

With violence becoming a part of the everyday life, the whole<br />

system becomes ―conflict habituated‖, with an emphasis from<br />

both sides on getting an edge and in this scenario, development<br />

takes a back seat. This has led some to question whether<br />

sustainable development can be advanced during times of<br />

protracted armed conflict. Most often the cause or spur of<br />

conflict in many cases is lack of development – economic,<br />

political, or social – or a combination of all. The relationship<br />

between conflict and development is strong, and is a two way<br />

process: conflict retards development; and equally, failures in<br />

development substantially increase proneness to conflict.<br />

Tourism, one of the main industries in the Kashmir valley and<br />

Jammu, has suffered tremendously due to violent activities. It has<br />

declined substantially since the late 1980s when militancy gained<br />

momentum. The number of tourists visiting the state per year had<br />

gone down from around 7,000,000 in the pre-militancy days to a<br />

few thousands in the following years. It is estimated that the state<br />

lost 27 million tourists from 1989-2002 leading to tourism<br />

revenue loss of $3.6 billion. According to the records, while as<br />

many as 557974 tourists visited the state in 1989, in 1993 the<br />

number reduced to 8026. In the year 2002, 27358 tourists visited<br />

the state. Since then the number of tourists keeps on increasing or<br />

decreasing depending on the level of violence at that particular<br />

point of time. However, the number of tourists has never come<br />

anywhere near the level of tourists that visited the state in the<br />

pre-militancy period.<br />

Another issue that remains almost elusive in the context of<br />

tourism sector in the state is that, while in the pre-militancy era<br />

the favourite destination was the beautiful Kashmir valley, the<br />

present period has witnessed increase in number of the tourists to<br />

Vaishno Devi shrine, in Jammu region and to Leh in Ladakh.<br />

During their surveys in Leh the authors interacted with many<br />

local and foreign tourists who regularly visit the area and are<br />

quite keen to visit Srinagar but prefer not to go (Personal<br />

Communications, May 21-June 1, 2007). Though the number of<br />

tourists to Srinagar has increased with the launch of the peace<br />

process, their specific targeting by the militants have led to<br />

decline in their numbers. The local people bemoan this tragedy<br />

befalling on them. Junaid Hussain, a shopkeeper in Srinagar<br />

(personal communication, July 26, 2006) told the authors, ―The<br />

local economy has been completely shattered due to ongoing<br />

turmoil. While earlier thousands of outsiders thronged to the city,<br />

now only hundreds visit the valley.‖<br />

Violence has also directly affected other important sources of<br />

livelihood such as agriculture, horticulture, and the handicraft<br />

industry. These sectors have become the survival mechanisms for<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 507<br />

ISSN 2250-3153<br />

the local people but are not flourishing. The state is known for<br />

wide variety of agricultural and horticulture products. However,<br />

the conflict environment has prevented people from maximally<br />

utilizing this gift of the nature. The horticulture industry has also<br />

suffered directly as well as indirectly due to conflict situation.<br />

These issues are discussed in detail in the section on challenges<br />

and opportunities.<br />

III. OBJECTIVES OF THE STUDY<br />

The present study has certain specific research objectives.<br />

They are as follows:<br />

1. To evaluate the impact of peace and disturbance on the growth<br />

of tourism and horticulture sector in J&K.<br />

2. To find out the role of horticulture and Tourism in the GDP of<br />

J&K economy<br />

3. To evaluate the growth of employment in Tourism and<br />

horticulture sector<br />

4. To find out the major problems development by tourism in<br />

Jammu and Kashmir<br />

5. Lastly provide the feasible suggestion for sustainable<br />

development of tourism in J&K<br />

IV. METHODOLOGY<br />

In the present study secondary data has been used. Secondary<br />

data has been collected from the tourism department and<br />

Economic survey of Jammu and Kashmir. The underlying idea of<br />

the Inskeep methodology is to know the impact of peace and<br />

disturbance on the tourism and horticulture development. To find<br />

out the result of peace and disturbance on both the sector tourism<br />

and horticulture is shown by using regression method.<br />

V. IMPACT OF PEACE AND DISTURBANCE ON TOURISM IN<br />

JAMMU AND KASHMIR<br />

Tourism constitutes one of the main sources of income for vast<br />

sections of the Kashmiri population. Tourist destinations like<br />

Sonmarg and Gulmarg are known internationally for winter<br />

games such as skiing. Gulmarg is also known as the highest<br />

Table 1: Tourist‘s arrival from 1988 to 2010 in Jammu and Kashmir<br />

green golf course in the world, and boasts the world‘s largest<br />

cable car lift. The famous Dal Lake in the Kashmir valley needs<br />

special mention in this context. Adventure sports in J&K include<br />

trekking, mountaineering, winter sports, water sports, golf and<br />

fishing. However, most of these tourist attractions remain<br />

underdeveloped. Many other tourist attractions in the state<br />

remained untapped partly due to the conflict. Like in the Kashmir<br />

valley, the regions of Jammu and Ladakh also have lot of tourism<br />

potential. Some of the tourist spots in Jammu, which need<br />

development, are Patni Top, the Forts of Ramnagar, the temples<br />

of Babor and Krimchi, Sudh Mahadev and Mantalai, Shiv Khori,<br />

the saint-soldier Banda Bairagi‘s memorial, as well as the<br />

Kishtwar and Bhaderwah hills, all of which can be developed<br />

with modern facilities in order to attract wider cross-section of<br />

people from different parts of the world. In Jammu and Kashmir<br />

tourism sector accounts for 5.92% of india's GDP. Tourism<br />

sector is a labour intensive and as per world Travel and tourism<br />

Council (WTTC 2010) world wide estimates, is expected to<br />

contribute 8.1% to total employment. WTTC(2010) projects that<br />

india will generate 2nd largest travel and tourism employment by<br />

2010 and 2020 at 49 & 58 millon jobs respectively, coming at<br />

2nd place only after China.<br />

It is a stark reality that till late 1980s, the state of J&K used to<br />

attract huge numbers of national as well as foreign tourist, but the<br />

tourist sector received a serious jolt with the out break of<br />

militancy in the year 1989. The tourist‘s influx declined<br />

considerably up to 2002 during which the state heavily suffered<br />

in this sector due to militancy and insurgency. The tourist rush in<br />

the year 1988 was recorded as the highest. The infrastructure<br />

created over the years suffered huge damage, besides<br />

destructions to the gardens and parks and with the improvement<br />

in the security and scenario, the govt made all possible efforts<br />

and took all possible steps for the revival of tourism sector by<br />

raising the requisite infrastructure for restoration of the pristine<br />

glory of the places of the tourist attraction and the average flow<br />

of tourist between 1990 and 1996 was just around 10000 per<br />

annum. But the flow of tourist registered a considerable increase<br />

as shown by the figure in table1<br />

Year Amarnath Kashmir Foreign Total Jammu Ladkh Foreign Total Grand<br />

ji<br />

Domestic<br />

Domestic<br />

Total<br />

1988 259891 662097 59938 722035 19926965 8608 16256 24864 21680654<br />

1989 262691 490212 67762 557977 2312001 6689 16079 22748 3736159<br />

1990 395202 6095 4627 10722 2169202 396 8342 6738 2601324<br />

1991 439722 1400 4887 6267 3151310 1041 8014 9055 3621696<br />

1992 445580 1175 9149 10324 3527289 2438 13580 16018 4025553<br />

1993 461443 450 8026 8026 3368735 2000 12401 14401 3875482<br />

1994 471101 500 9314 9814 3705945 2080 15369 17449 4231572<br />

1995 549778 322 8198 8520 4032127 5594 12391 17985 4634915<br />

1996 582213 375 9592 9967 4335532 3537 13036 16573 4970825<br />

1997 495165 7027 9111 16131 4434233 3991 12810 16801 4995269<br />

1998 540453 99636 10247 109883 4622097 6792 15238 22030 5426376<br />

1999 635042 200162 17130 217292 4667340 1905 96669 11574 5847114<br />

2000 - 104337 7575 111912 5109575 6217 11825 18042 5369483<br />

2001 - 66732 5859 72591 5056919 4260 15439 19699 5241499<br />

2002 - 7993 1015 9008 1053771 87 361 448 1072683<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 508<br />

ISSN 2250-3153<br />

2004 400000 358000 19000 777000 6100000 13000 22000 35000 7724000<br />

2005 388000 585702 19680 993382 6251998 13781 24665 38446 8315654<br />

2006 265000 412879 20009 697888 6950573 17822 26078 43900 8434149<br />

2007 213565 417264 24576 655405 7222318 22102 28477 50579 8634286<br />

2008 498075 550100 22000 1070175 6576000 39000 33000 72000 8860350<br />

2009 373419 520454 20809 914682 7657000 48127 30446 78573 9643510<br />

2010 458046 698564 24376 1180986 8239474 54684 21371 76055 10753556<br />

In the above table it is shown that after 2000 the flow of tourist in<br />

J&K has increasing but tourist inflow to J&K has continuously<br />

been increasing steadily from 69.12 lakhs in 2004 to 94.97 lakhs<br />

in 2010, which indicates increases of 37.39%. There is an<br />

increase in pilgrim visitors to Mata Vaishno Devi by 35.7% and<br />

domestic tourist by more than double i.e. (103%) and in the same<br />

period the percentage of the foreign tourist by 11.57.<br />

The perspective of overall, tourist inflow to all the three<br />

regions of the state, the percentage has increased during the years<br />

2004 to 2010 by 37.39%. The number of foreign tourist to<br />

Kashmir Valley has drastically dwindled from the figure of 0.60<br />

lakhs to 0.24 lakhs during the years 1988 to 2010. Contrary to<br />

this, the number of foreign tourist to ladkh has increased during<br />

the same period of time from 0.16 lakhs in 1988 to 0.21 lakhs in<br />

2010.<br />

Table 2: Jammu and Kashmir‘s share in foreign arrivals to india<br />

The Jammu and Kashmir has been witnessing resilience in the<br />

tourism sector as Foreign Tourist Arrivals (FTA) increases from<br />

0.41 lakhs in 2004 to 0.46 lakhs in 2010. Despite global<br />

economic slow down effecting the tourism sector worldwide and<br />

the prevailing political conditions in the state, the Foreign Tourist<br />

Arrival (FTA) to J&K in the year 2009 showed a marginal<br />

decreases of 6.8% over the year 2008. The state is now<br />

witnessing a turn around in FTA; by 2010 it is 0.46 lakhs.<br />

Jammu and Kashmir‘s share in foreign arrivals to India is<br />

shown in table 2 which indicates that in 2000 the share is 0.78<br />

percent and it was increase 0.80 percent in 2001. In 2002 the<br />

J&K ‗s share in foreign arrivals decline to 0.31, after 2002 the<br />

percentage of share has increased to 1.02 % in 2003 and<br />

increasing onwards up to 2008, but again in 2009 it decline 0.97<br />

percent.<br />

Year India J&K Percentage share<br />

2000 2481928 19400 0.78<br />

2001 2649378 21295 0.80<br />

2002 2537282 7806 0.31<br />

2003 2384364 24330 1.02<br />

2004 3457477 41000 1.19<br />

2005 3918160 44345 1.13<br />

2006 4447167 46087 1.04<br />

2007 5081504 53053 1.04<br />

2008 5356966 55000 1.03<br />

2009 5280361 51255 0.97<br />

Sources: M/o Tourism, Gol/Dte. Tourism Kashmir<br />

The tourism industry in Jammu and Kashmir is supposed to be<br />

one of the most flourishing industries in the state. This industry is<br />

very important for the development of the regions of Ladakh,<br />

Jammu and Kashmir. As there are not much industrial<br />

developments in the other sectors of this place so the industry<br />

related to tourism is considered with much seriousness by the<br />

state government. Apart from agriculture economic activities<br />

related to Kashmir tourism is the most popular source of income<br />

here.<br />

VI. INCOME FROM REVENUE EARNING<br />

The tourism sector also generates sufficient revenue for<br />

government and public sector undertaking which has shown<br />

significant increase over the years, the revenue generations is<br />

expected to increase manifold provide the situation remains<br />

normal and the tourist influx increases in a desired manner. The<br />

state has sufficient potential to exploit more and more revenue<br />

generation and the revenue made under the public sector during<br />

last six years is about Rs. 167.39 Crore the details of which are<br />

summarized as under in table 3.<br />

Table 3: Income from revenue earning in J&K from Tourist Department<br />

Name of the deptt/organisation Revenue<br />

earned in<br />

lakhs<br />

2004-05<br />

2005-06 2006-07 2007-08 2008-09 2009-10<br />

Director Tourism Kashmir 11.46 14.83 35.25 62.06 54.00 56.65<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 509<br />

ISSN 2250-3153<br />

/Jammu (DGT)<br />

SKICC 46.00 49.34 52.00 64.00 71.20 65.00<br />

Gulmarg Dev Authority 19.7 21.86 32.46 48.50 51.17 34.35<br />

Phalgam Dev Authority 5.12 9.16 9.95 19.00 12.73 6.68<br />

Sonamarg Dev Authority 0.00 13.78 36.35 32.50 45.00 39.00<br />

Patnitop Dev Authority 11.00 10.15 15.62 79.00 20.00 19.54<br />

Royal Spring Golf Course 57.26 35.09 34.73 50.06 45.66 44.25<br />

Cable car Corporation 289.00 754.41 676.00 798.81 839.14 1116.00<br />

J&K TDC 1642.41 1796.44 1763.00 1763.00 1963.00 1894.00<br />

Total 2081.95 2705.06 657.75 2916.93 3101.9 3275.47<br />

In the above table the total revenue from the last six years are<br />

14739.06 lakhs to Jammu and Kashmir. But this revenue was<br />

hampered because of the massive political disturbances here. The<br />

tourist footfall in this region gradually decreased in and after the<br />

nineties. The economic structure of the state suffered a sudden<br />

downfall as a result, since the state economy was primarily<br />

dependent on this sector.<br />

Most of the people here were into professions related to tourist<br />

activities. The financial conditions of the people in Jammu and<br />

Kashmir suffered badly after the sudden setback.<br />

The state of Jammu and Kashmir is yet to recover from this<br />

sudden decline in the tourist industry. But the department of<br />

tourism is trying hard to improve the condition of the tourism<br />

industry in Kashmir and bring back the past glory of the state.<br />

They are trying to beautify the existing tourist spots and increase<br />

the facilities for the visitors in order to attract more people to the<br />

state.<br />

To reconstruct the tourism industry here the state government<br />

has declared many incentives and facilities for those who are<br />

interested in business related to this field of activity.<br />

VII. IMPACT OF PEACE AND DISTURBANCE ON HORTICULTURE<br />

SECTOR IN J&K<br />

Horticulture industry in Kashmir is considered the bulwark of<br />

rural economy in the state. Nearly 75 per cent of temperate fruits<br />

in India are grown in the state. The cultivated orchards yield fine<br />

quality of pears, apples, peaches, cherries, walnut, almond,<br />

saffron, apricot, strawberry, plums, etc. The industry earns<br />

revenue of over INR 500 million yearly and provides job<br />

facilities for the thousands of people directly and indirectly<br />

involved in the agricultural sector. This sector is adversely<br />

affected due to lack of marketing strategy and violence-prone<br />

image of the state. Considering the growth prospects of this<br />

sector, the state government needs to plan for higher and more<br />

quality production. The state should shift its agriculture<br />

development strategy from food security mode to that of value<br />

addition by growing certain products like high value fruits,<br />

vegetables and cash crops like saffron that can give high returns.<br />

The modernization of all these sectors can play a vital role in<br />

economic reconstruction of the state. Besides providing the<br />

professional guidance, there is a need to ensure availability of<br />

basic inputs such as seeds, fertilizers, pesticides, storage facilities<br />

etc. to develop agriculture and allied sectors. There is also a need<br />

to develop an aggressive sector specific marketing strategy and<br />

explore new markets.<br />

Horticulture is the cultivation of garden plants, fruits, berries,<br />

nuts, vegetables, flowers, trees, shrubs and turf. Horticulturists<br />

work for plant propagation, crop production, plant breeding,<br />

genetic engineering, plant biochemistry, plant physiology,<br />

storage, processing and transportation. They work to better crop<br />

yield, quality, nutritional value and resistance to insects, diseases,<br />

and environmental pollution. Horticulturalists use modern<br />

nurseries for the production of seedlings and mother plants.<br />

These plants are propagated through different methods such as<br />

seeds, inarching, budding, veneer grafting, patch budding and<br />

soft wood grafting.<br />

The growth of horticulture sector can be attributed to the<br />

various incentives towards market interventions like established<br />

of fruit mandies, provision for support prices, technological<br />

support awareness options research and extension. Area under<br />

fruits in J&K State has increased from 3.06 lakhs hectares in<br />

2008-09 to 3.15 lakhs hectares in 2009-10, showing an increase<br />

of 2.94 percent and the production has increased from 16.19<br />

lakhs MTs in 2008-09 to 17.13lakhs MTs in 2009-10, showing<br />

an increase of 1.3 percent.<br />

Table 4: Area, Production and Productivity of fruits(All fruits)J&K State<br />

Year Kind of Fruits Area Lakhs in (Ha) Production<br />

Lakhs MTs<br />

in Productivity<br />

2005-06 Fresh<br />

1.75<br />

12.89<br />

7.36<br />

Dry<br />

0.93<br />

1.24<br />

1.33<br />

Total<br />

2.68<br />

14.13<br />

5.27<br />

2006-07 Fresh<br />

1.85<br />

13.77<br />

7.43<br />

Dry<br />

0.99<br />

1.31<br />

1.33<br />

Total<br />

2.84<br />

15.08<br />

5.31<br />

2007-08 Fresh 1.96 14.78 7.54<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 510<br />

ISSN 2250-3153<br />

Dry<br />

0.99<br />

Total<br />

2.95<br />

2008-09 Fresh<br />

2.06<br />

Dry<br />

1.00<br />

Total<br />

3.06<br />

2009-10 Fresh<br />

2.10<br />

Dry<br />

1.05<br />

Total<br />

3.15<br />

2010-11 Fresh<br />

2.17<br />

Dry<br />

1.08<br />

Total<br />

3.25<br />

Sources: Agriculture Production Deptt, J&K<br />

In the above table 4 the productivity of the total dry and fresh<br />

fruits are 5.27 in 2005-06 and it was slightly increased in 2006-<br />

2007 to 5.31 percent. In the year 2008-09 the productivity of<br />

total fruits are 5.53 and reaches 6.84 in 2010-11. This shows that<br />

with the peace in the State the productivity of the Horticulture<br />

sector are increased.<br />

VIII. PRODUCTION OF HORTICULTURE PRODUCTS<br />

The overall production of fruits has been recoded to be 17.12<br />

lakhs metric tones for the year 2009-10, recoding a net addition<br />

1.58<br />

16.36<br />

15.26<br />

1.65<br />

16.91<br />

15.35<br />

1.78<br />

17.13<br />

20.46<br />

1.76<br />

22.22<br />

Table 5: Production of fruits during 2004-05 to 2010-11<br />

1.60<br />

5.55<br />

7.41<br />

1.65<br />

5.53<br />

7.31<br />

1.70<br />

5.44<br />

9.43<br />

1.63<br />

6.84<br />

of 21.45 lakhs MTs over the production figures of n previous<br />

year measuring 1.27 percent rate of growth. In the production<br />

figures, share of fresh and dry fruits is 89.62 percent and 10.38<br />

percent with 15.35 lakhs MTs and 1.78 lakhs MTs respectively.<br />

Apple ranks first with a share of 80.18 percent followed by<br />

walnut with 9.64 percent.<br />

Year Fresh<br />

Dry<br />

Total<br />

Fruits<br />

fruits<br />

Fruits<br />

Apple Pear Other Total Walnuts Almonds Other Total<br />

2004 -<br />

05<br />

1093.33 40.25 84.02 1217.60 100.60 13.47 0.19 114.26 1331.86<br />

2005-<br />

06<br />

1151.34 42.36 86.73 1280.43 108.27 14.33 0.20 122.80 1403.23<br />

2006-<br />

07<br />

1222.18 43.09 108.41 1373.68 114.93 15.18 0.22 130.33 1504.01<br />

2007-<br />

08<br />

1311.85 45.86 120.31 1478.02 146.78 11.26 0.24 158.28 1636.27<br />

2008-<br />

09<br />

1332.81 47.38 150.74 1530.93 147.64 12.17 0.25 160.06 1690.99<br />

2009-<br />

10<br />

1373.00 47.98 113.73 1534.71 165.02 12.52 0.19 177.73 1712.44<br />

2010-<br />

11<br />

1852.41 50.50 140.65 2045.56 163.74 12.51 0.22 176.47 2222.03<br />

IX. EXPORT OF THE FRUIT OUTSIDE THE STATE<br />

In J&K the export of fruits outside of the state has occupied a<br />

prominent place in trade of the State. Export of fruit has shown<br />

considerable progress. The total quantity exported during 2009-<br />

10 was 9.57 lakhs MTs, which is 55.9 percent of the production<br />

figure of the same year. The production under horticulture is<br />

increasing year by year while as there is no significant growth in<br />

Table 6: Export of Fruits outside the State (lakh Metric Tonnes)<br />

the export of horticulture produced outside the state. The decline<br />

in the export of fruits outside the state is due the introduction of<br />

market intervention scheme (MIS) under which ―C‖ grade apples<br />

are produced at a support price of rupee 6 per kg for processing<br />

into juice concentrates in the locally established juice processing<br />

units. Secondly India is importing fruit from foreign countries as<br />

free trade policy is in force at the country level.<br />

Production Export<br />

Year Fresh Dry Total Fresh Dry Total<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 511<br />

ISSN 2250-3153<br />

2003-04 11.65 1.08 12.74 7.63(98.32) 0.13(1.68) 7.76(60.83)<br />

2004-05 12.18 1.14 13.32 8.20(98.3) 0.14(1.68) 8.34(62.61)<br />

2005-06 12.80 1.23 14.03 8.58(98.62) 0.12(1.38) 8.70(62.01)<br />

2006-07 13.74 1.30 15.04 7.35(98.00) 0.15(2.0) 7.50(49.87)<br />

2007-08 14.78 1.58 16.36 7.34(97.86) 0.16(2.13) 7.50(45.84)<br />

2008-09 15.26 1.65 16.91 11.01(98.56) 0.16(1.43) 11.17(66.06)<br />

2009-10 15.35 1.76 17.12 9.34(60.84) 0.23(12.99) 9.57(55.90)<br />

2010-11 20.46 1.76 22.22 8.51(42.59) 0.51(8.52) 8.66(38.97)<br />

X. FOREIGN EXCHANGE EARNING<br />

In J&K the govt is promoting exports from Jammu and<br />

Kashmir State. State‘s fruits especially dry fruits, go also to the<br />

other countries and in turns earn substantial foreign exchange.<br />

The export of the dry fruits viz, almond and walnut during the<br />

year 2007-08 was 6889.11 MTs comprising of 197.11 MTs of<br />

Table 7: Foreign Exchange Earned on Horticulture Produce<br />

Almond, 6692 MTS of walnuts. The foreign exchange earning<br />

were Rs. 115.95 Crore during 2005-06 and Rs 161.44 Cros<br />

during 2007-08. the export of dry fruits viz almond sand walnuts<br />

during the year 2009-10 was 9132.687 MTs, which has increased<br />

by 55.72 percent over previous years figures of 5864.74 MTs<br />

foreign exchange earning has increased from Rs. 142.24 Crs in<br />

2008-09 to Rs. 198.86 Crs in 2009-10 i.e. by 39.81 percent.<br />

Quantity exported in MTs Foreign Exchange earns in Crs<br />

Kinds 2005- 2006- 2007- 2008- 2009-10 2005- 2006- 2007- 2008- 2009-<br />

Dry<br />

Fruit<br />

06 07 08 09<br />

06 07 08 09 10<br />

a)<br />

Almond<br />

296.45 260.88 197.11 168.42 60.97 1.48 1.82 0.91 1.02 1.05<br />

Total<br />

Walnut<br />

5256 5437 6692 5696.32 9071.71 114.47 118.02 160.53 141.22 197.80<br />

i)<br />

shell<br />

in 179 376 161 294.73 364.52 N.A N.A N.A 2.61 2.87<br />

ii) in 5077 5061 6531 5401.59 8707.18 N.A NA NA 138.61 194.93<br />

kernal<br />

Total<br />

Dry<br />

Fruit<br />

5552.45 5697.88 6889.11 5864.74 9132.68 115.95 119.84 161.44 142.24 198.86<br />

XI. ECONOMIC BENEFITS BY TOURISM AND HORTICULTURE<br />

SECTOR IN J&K<br />

In Jammu and Kashmir State the scope of large scale industrial<br />

development is very limited and due to hilly terrains and small<br />

size of land holdings agriculture is unable to meet the<br />

expectations of the state economy, tourism is considered to be an<br />

economic bonanza. Being a labour intensive industry the scope<br />

of employment is varying vast. It requires very low level of<br />

investment and employments provided under this industry are<br />

comparatively higher than many other industries. Tourism is<br />

regarded multi- segmental industry, therefore, provides different<br />

types of jobs like hotel managers, receptionist, accountant‘s<br />

clerks, guides, tour conductors, travel agents, transport operators,<br />

chef etc and many other jobs which are required to strengthen the<br />

tourism. The positive economic benefits of tourism are given<br />

below.<br />

1. Contribution to State‘s income generations.<br />

2. Expansion of employment opportunities.<br />

3. Raising Tax Revenue.<br />

4. Generation of Foreign Exchange.<br />

5. Transformation of regional economy<br />

6. Social Effects<br />

7. Culture effect<br />

8. Impact on environment<br />

XII. PROBLEMS FACED BY TOURISM AND HORTICULTURE<br />

SECTOR IN J&K<br />

1. Mismanagement<br />

2. Problems of Infrastructure<br />

3. Lack of Transport Facilities<br />

4. Lack of Basic Facilities<br />

5. Militancy in the State<br />

6. Natural factors<br />

7. Lack of coordination<br />

XIII. SUGGESTIONS FOR SUSTAINABLE TOURISM<br />

DEVELOPMENT<br />

The main point to keep in mind is the inter-relationship of<br />

sustainability, planning, development and tourism.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 512<br />

ISSN 2250-3153<br />

Integrated planning in the tourism sector should include<br />

consideration of the following issues:<br />

1. Impact on the natural environment, the host communities,<br />

the local (regional, national) economy, the indigenous<br />

culture;<br />

2. Demands made on human resources, including knowledge,<br />

skills, aptitudes, and numbers;<br />

3. Impact of and on transport and infrastructure systems,<br />

regional development, resource use and distribution;<br />

4. Responsibilities derived from international agreements,<br />

accords and protocols;<br />

5. Impact of and on other sectors of the economy, especially<br />

the primary sectors of agriculture, forestry, mining and<br />

fishing, but also some industrial sectors, transportation and<br />

various aspects of commerce;<br />

6. Implications of tourism development for land ownership<br />

and land tenure, land and property values, alternative or<br />

substitute uses;<br />

7. Linkages through the different levels of planning; and<br />

8. Linkages with governments and agencies, tourism industry,<br />

interest groups, host communities, indigenous communities,<br />

development industry (other than in tourism).<br />

These issues can be dealt with when developing tourism<br />

policies and plans at various levels as long as the following<br />

strategic elements are also included:<br />

1. Tourism-related infrastructure – transportation, water<br />

supply, energy and power supply, waste disposal,<br />

pollution control, telecommunications;<br />

2. Tourism-specific development – accommodations of<br />

various types, integrated resorts, restaurants, shopping,<br />

support services, travel services, recreation and<br />

entertainment, health and emergency services, safety<br />

systems and visitor attractions;<br />

3. Appraisals and impacts (including carrying capacity<br />

assessments) of tourism development on, for example,<br />

the economy, the environment, the host community,<br />

culture and heritage;<br />

4. Financing, marketing, promotion and information<br />

systems;<br />

5. Tourism awareness in the host community and human<br />

resources development programmes.<br />

Integrated tourism planning also means integration of goals,<br />

objectives, programmes, projects, investment, and resource use.<br />

Resource use is of central importance, particularly for sustainable<br />

development, because it involves the relationship between<br />

economic development and the conservation of natural resources.<br />

In recent years, conservation of cultural and human resources has<br />

been added.<br />

XIV. CONCLUSION<br />

In conclusion, integrated planning for sustainable tourism and<br />

horticulture development needs to be considered as one<br />

important component within a broad policy framework. In this<br />

situation, tourism is one means for achieving sustainable<br />

development. Achievement will be influenced by the degree to<br />

which planning for tourism is integrated both horizontally and<br />

vertically. Integrated tourism and horticulture planning should be<br />

seen as an exercise in the creative and innovative management of<br />

resources to achieve sustainable outcomes.<br />

REFERENCES<br />

[1] Agriculture Production Department Jammu and Kashmir, Govt of J&K<br />

[2] Government of J&K, Digest of Statistics 2010, Directorate of Economic<br />

and Statistical Planning, J&K.<br />

[3] Government of J&K, Handbook of J&K State Jammu Directorate of<br />

Economics, Statistics and Planning, Government of Jammu and Kashmir<br />

[4] Government of Jammu and Kashmir, Economics Survey 2010-2011,<br />

Directorate of Economic and Statistical Planning, J&K.<br />

[5] Michel Peter‘s, International Tourism, Economies and Development of<br />

International Tourist Trade.<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 513<br />

ISSN 2250-3153<br />

Fate of Metals in Fish under Variable Sewage Input in<br />

Fish Ponds<br />

Abstract- Use of raw sewage in aquaculture spelling prosperity<br />

to farmers is actually a veritable threat to the environment. Metal<br />

contaminated fish grown in the sewage-fed East Kolkata<br />

Wetlands, is potentially hazardous for the consumers. Alarmed<br />

by the increase of these persistent elements, an in-depth study<br />

was carried out to find out a possible way to reduce metal body<br />

burden in fish. The first part of the study deals with the<br />

quantitative analyses of metals in several species of fish reared in<br />

the sewage fed system. In the second part, sewage input in the<br />

ponds was temporarily stopped for six months that helped us to<br />

understand the depuration pattern of the accumulated metals<br />

from fish tissues. It was observed that, copper accumulates<br />

maximally with age in the fish liver especially in the benthic<br />

species such as Cirrhinus mrigala and Oreochromis nilitica.<br />

However, its depuration rate from the organ is low. After six<br />

months, the metal is completely excreted from muscle, skin, gills<br />

and kidney. Gills of Catla catla accumulate excess of zinc. Lead<br />

and zinc show size dependent increase in muscle, liver, kidney,<br />

skin and gills of fish but are steadily depurated in the relatively<br />

uncontaminated system. The rate of cadmium uptake and release<br />

is extremely low in fish.<br />

Index Terms- Depuration, fish, habitat, metals, wastewater,<br />

wetlands<br />

T<br />

I. INTRODUCTION<br />

he East Kolkata Wetlands with an area of 25,000 hectares<br />

are the largest basin for natural purification of wastewater<br />

.Once occupied by the Bidyadhari River, these wetlands receive<br />

city sewage, storm water run off and effluents from thousands of<br />

industries. Underground sewers drain the untreated city sewage<br />

to several pumping stations from where it is led into open surface<br />

outfall channels networks that distributes this water into the<br />

different fish ponds. Here the recycled organic waste of the<br />

sewage provides nutrients for commercially grown fish.<br />

Aquaculture thus maintains a balanced ecologically efficient<br />

Paulami Maiti * and Samir Banerjee **<br />

*Corresponding Author<br />

*Lady Brabourne College,<br />

P 1/ 2 , Suhrawardy Avenue<br />

Park Circus, Kolkata – 700017.<br />

Mobile number - 967437345<br />

paulamim262@gmail.com<br />

**Aquaculture Research Unit, Department of Zoology,<br />

University of Calcutta,<br />

35 Ballygange Circular Road , Kolkata-700017.<br />

Mobile number - 9331021657<br />

samirbancu@gmail.com<br />

system where effluent quality comes down to an acceptable<br />

range, reducing the BOD value of the sewage water. About 308<br />

sewage-fed ponds show a turnover rate of 15,000 million tones<br />

of fish annually where average rate of organic loading vary<br />

between 20-70 kg per hectare. Efficient utilization of sewage is<br />

therefore crucial for aquaculture production that effectively<br />

meets the challenge of unemployment and protein crisis for the<br />

ever-increasing population of this area. ( Kundu et al., 2008 ) .<br />

However, these wetlands receive enormous pollutants<br />

including metals along with the effluents. In the natural waters,<br />

metals remain either in particulate or in soluble form but the<br />

labile fraction are more harmful.The impact of metal pollution<br />

depends upon the, source of wastewater, duration of their input<br />

or the presence of organic and inorganic particles in the water<br />

and sediment. Bioaccumulation of metals occurring in the food<br />

chain of the aquatic system, ultimately affects the human<br />

through, consumption of contaminated fish. In fish, metal levels<br />

vary as a function of their dietary difference and body size,<br />

which is closely related to their growth and metabolism.<br />

(Moriarty et al.,1984). All these interrelated factors determine the<br />

elemental concentration in the system and their relative<br />

availability, transport and toxicity to aquatic organisms.<br />

Bioaccumulation of metals in fish warrants our attention. The<br />

present study, firstly attempts to quantify metal level in the<br />

different tissues of four commercial important fish species with<br />

various body weights, feeding habits and habitats. This is to<br />

investigate the growth related changes in the level of metals in<br />

fish tissues. Secondly, to find out the depuration pattern of metals<br />

by the tissues, sewage input in the sewage fed ponds was<br />

temporarily stopped for a period of six months. Samples of<br />

water, soil and fish tissues were analyzed before and after the<br />

experimental period. Difference in body metal level in fish<br />

provided a picture of the amount of metal depurated by tissues, in<br />

the relatively uncontaminated environment.<br />

As fish, forms the major food for the people in this part of<br />

the country, attempt has been taken to reduce metal body burden<br />

by reducing the sewage input of the system. This would reduce<br />

the background level of metals that allowed the fish to excrete<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 514<br />

ISSN 2250-3153<br />

the accumulated ones. Metal bioaccumulation depends on the<br />

difference in uptake and depuration that varies with metals and<br />

fish species (Tawari-Fufeyin and Ekaye, 2007). Fish differing in<br />

food habit and its position in the tropic level show marked<br />

variation in depuration of metals. So different species with<br />

various body weights were chosen to determine the size related<br />

depuration pattern as younger fish have higher metabolic rate<br />

than the older ones.<br />

II. SITE OF STUDY<br />

The study was carried out in a sewage-fed farm ―The East<br />

Kolkata Fisherman‘s Cooperative Society‖, situated by the<br />

Eastern Metropolitan Bypass near the Kasba connector (22 o 30<br />

N; 88 o 25 E), West Bengal, India. The farm, a part of the East<br />

Kolkata Wetlands, covers an area of 44.55 hectares supporting<br />

about 109 sewage-fed ponds. Here five sewage fed ponds were<br />

chosen for experiment that nursed four commercially important<br />

species , such as Labeo rohita Cuvier (a column feeder), Catla<br />

catla Valenciennes (a surface planktivore ) , Cirrhinus mrigala (<br />

benthic fish) and Oreochromis nilotica Oken which is an exotic<br />

omnivore , ubiquitous in the derelict waters (Jayaram,1981) .<br />

Two different body weights (50g and 800g) of all the species<br />

were chosen for analyses.<br />

III. MATERIALS AND METHODS<br />

Fish were regularly collected from the sewage-fed ponds for<br />

quantitative analysis of the metals. These were dissected and the<br />

different tissues like muscles, liver, kidney, gills, skin and<br />

intestine were wiped dry and weighed accurately to 1g each for<br />

acid digestion. A modified wet digestion procedure was used to<br />

prepare biological samples for the determination of copper, lead,<br />

zinc and cadmium following the procedure of Chernoff (1975).<br />

Samples of fish tissues were taken in hard glass test tubes, and 5<br />

ml of conc. HNO3 acid was added to one gram of the sample, and<br />

left for overnight digestion at room temperature. The mixture<br />

was placed in a hot plate at 85 + 5 o C and 5 ml (3: 2, Conc.<br />

Sulfuric acid: Perchloric acid) was then added to it. The digestion<br />

was carried out until it turned into a pale transparent solution.<br />

The mixture was cooled and filtered through an acid soaked filter<br />

paper and was adjusted to the required volume, with distilled<br />

water. Metal levels in water and soil were determined by<br />

standard methods of APHA , (1998) and Nafde, et al., (1998)<br />

respectively. The concentrations were detected in atomic<br />

absorption spectrophotometer (Varian AA.575).<br />

Based on total amount of the sample taken, the actual<br />

concentration was calculated, and results were expressed in g/g.<br />

A standard reference material checked the accuracy of<br />

determination. Comparison between metal concentrations in the<br />

tissues of the fish with various body weights were performed by<br />

One Way Analysis of Variance, ANOVA (Gomez and Gomez,<br />

1984). Statistically significant differences were observed in the<br />

mean metal values of tissues and were evaluated at p


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong> 515<br />

ISSN 2250-3153<br />

excretion (McCarter and Roch, 1983). Within the cells, metals<br />

bound to this protein are incorporated into liposome, which are<br />

excreted through an electrochemical gradient that further<br />

facilitates metal uptake in a contaminated environment.<br />

However, when the capacity of the cell exceeds,<br />

histopathological changes may appear. Depuration process<br />

however may not always recover the lesions caused by chronic<br />

metal exposure.<br />

When sewage input in the ponds was stopped, rapid clearance<br />

of copper was observed from all the tissues excepting from the<br />

liver and intestine (Fig. 1, 2) .This suggests multiple elimination<br />

routes of the metal including urinary, branchial and faecal.<br />

Depuration rate from liver and intestine was very low especially<br />

in the benthic species due to the availability of the food borne<br />

metal from the sediment. Besides, the liver being a storage organ<br />

actively removes accumulated metals from the other tissues.<br />

According to the spill over theory, part of the accumulated metal<br />

in liver is depurated through bile, which is reabsorbed through<br />

the intestinal mucosa. Thus, intestinal mucosa has been observed<br />

to concentrate considerable amount of copper from where the<br />

excretion rate is very slow. Intestine forms the ultimate<br />

depository of metals that is taken through food hence C. mrigala<br />

and O. nilotica accumulate higher amount of copper in this<br />

organ. (Olowu et al., 2010)<br />

Results reveal that, younger C. mrigala accumulates higher<br />

levels of lead, the rate of which subsequently falls with chronic<br />

exposure in a polluted system (Fig. 3, 4). In the other species,<br />

lead rises only moderately with body weight. Gills and skin of<br />

catla also store the metal where the elimination rate is very slow.<br />

Generally, lead accumulation in tissues is proportional to the<br />

ambient concentration, (Tao et al., 1999) but the rate of its<br />

depuration is dependent on the overall body concentration<br />

(Schulz-Balder, 1974). Muscles of L. rohita and O nilotica shows<br />

higher depuration rate of the metal after six months. Liver and<br />

kidney of C. catla , O . nilitica and C. mrigala tend to retain the<br />

metal. However, from the hepatic tissue bile helps in elimination<br />

of the sulfhydryl reactive metals especially lead and cadmium<br />

through the formation of metal-glutathione complexes.<br />

Dissolved and particulate metals are usually absorbed through<br />

passive diffusion or carrier mediated transport over the gill<br />

epithelium. These are also absorbed through skin and food. Zinc<br />

accumulates maximally in the gills especially in the surface<br />

residing C. catla. Normoxic condition of the surface water<br />

probably pumps the available metal, which continues to<br />

accumulate in its gills (Hughes and Floss, 1978). Kidney and<br />

gills act as both storage and depuration sites. Although<br />

considerable release of zinc was observed in the fish under study<br />

(excepting younger benthic fish) yet kidney is hardly considered<br />

as an excretory organ for metals in teleost.<br />

Zinc content in the tissues is positively correlated with body<br />

weight of C. catla and L. rohita possibly due to the breakdown of<br />

their regulatory mechanism with continuous exposure in<br />

contaminated system. Juvenile fishes maintain higher proportion<br />

of this metal from their plantonic diet (Fig. 5, 6). However, in the<br />

two benthic species, the metal rises only slightly with body<br />

weight and after six months, these show very slow depuration<br />

rate. Zinc is retained in C. catla even in the uncontaminated<br />

environment. Mucus in gills and skin helps in considerable<br />

removal of metals..<br />

Cadmium concentration keeps low and constant in all the fish<br />

species under study and body concentration reflects its level in<br />

the environment (Ekeanyanwu et al., 2011). The uptake of the<br />

metal is non-linear, and is not correlated with the body weight of<br />

fish (Bohn and McElroy, 1976) .This complements our findings<br />

(Fig. 7, 8). In spite of this low bioaccumulation potential, the<br />

metal shows a high concentration factor and its average<br />

concentration in fish tissue rise above the mean international<br />

level.<br />

After six months, lead and zinc levels were reduced<br />

considerably than their initial value in the fish tissues while<br />

excretion rate of cadmium was low. Metal is excreted gradually<br />

in a metal free environment (Harrison and Klaverkamp, 1989).<br />

However, fish shows retention of lead and cadmium in the<br />

kidney and zinc in the gills.<br />

In general, muscular depuration is normally higher as binding<br />

proteins are present in only low levels in these tissues. However,<br />

after six months only copper and lead levels decreased below the<br />

set international standard, in the muscle. ( According to WHO<br />

standards , Maximum Permissible Limit for metals in the fish<br />

tissues are copper 20, lead 2 , zinc 45 and cadmium 0.3.) .<br />

Retention of metals in fish tissues, even at lower ambient<br />

environmental metal concentration is due to their binding in the<br />

non-exchangeable or slowly exchangeable pools of the body.<br />

Adjusting metal uptake and depuration are the primary means of<br />

maintaining metal homeostasis that occurs naturally for essential<br />

elements. This control is less evident for non-essential ones as<br />

lead and cadmium show lower excretory rate even in the<br />

uncontaminated environment. Tolerable dietary intake of metals<br />

exceeded among population consuming large amount of fish<br />

chronically exposed to sewage effluents. Trace metal<br />

contaminated fish from sewage-fed wetlands can predispose<br />

consumers to toxicity so there is a need for constant monitoring<br />

of this stressed environment.<br />

Measures to eliminate metals from commercial fish is a<br />

priority so regulation or temporary stoppage of sewage effluents<br />

in aquaculture ponds can reap positive results to reduce metal<br />

related health hazards for population that depend on fish as the<br />

major source of animal protein. In a contaminated environment<br />

the rate of metal uptake exceeds its excretion but fish exposed to<br />

polluted system, if allowed to stay in a relatively metal free<br />

environment, show a gradual decline of these xenotoxic<br />

substances.<br />

www.ijsrp.org


www.ijsrp.org


www.ijsrp.org


www.ijsrp.org


www.ijsrp.org


www.ijsrp.org


www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

ISSN 2250-3153<br />

Metals Tissues L.<br />

rohita<br />

50g<br />

Table 1: Deputation percentage of metals from the tissues of Fish<br />

L.<br />

rohita<br />

800g<br />

C.<br />

calta<br />

50g<br />

C.<br />

catla<br />

800g<br />

C.<br />

mrigala<br />

50g<br />

C.<br />

mrigala<br />

800g<br />

O.<br />

nilitia<br />

50g<br />

O.<br />

nilitica<br />

800g<br />

Copper Muscle 100 100 100 100 100 100 100 100<br />

Liver 44.08 52.73 47.38 55.30 68 7.15 46.98 27.66<br />

Kidney 100 100 100 100 100 100 100 100<br />

Gills 100 100 100 100 100 100 100 100<br />

Skin 100 100 100 100 100 100 100 100<br />

Intestine 59.88 62.63 54.18 60.53 40.38 39.29 69.00 20<br />

Lead Muscle 58.88 61.35 31.07 48.15 55.58 28.95 73.96 58.63<br />

Liver 56.70 49.25 29.73 42.81 37.92 21.32 35.90 24.83<br />

Kidney 49.06 52.14 29.38 31.75 46.09 21.71 31.85 22.51<br />

Gills 44.43 51.94 26.61 16.74 58.19 23.73 64.01 35.08<br />

Skin 52.13 56.70 22.18 30.23 61.44 31.24 28.61 46.80-<br />

Intestine 38.75 48.85 22.86 54.13 52.33 25.36 20.22 25.41<br />

Zinc Muscle 44.42 58.14 30.78 18.89 51.36 54.04 63.32 44.08<br />

Liver 31.77 51.04 11.89 20.16 35.93 47.53 53.65 25.86<br />

Kidney 19.33 44.51 36.70 29.76 55.31 39.10 71.00 37.76<br />

Gills 12.54 27.06 14.22 8.73 27.24 39.73 33.43 44.11<br />

Skin 16.00 19.71 31.17 27.62 42.80 32.49 59.14 55.26<br />

Intestine 05.80 16.89 31.69 26.30 40.91 47.34 59.61 36.93<br />

Cadmium Muscle 40.17 35.97 22.28 40.22 35.99 38.59 35.58 36.67<br />

Liver 40.72 58.26 35.89 46.94 34.47 32.92 42.86 48.33<br />

Kidney 41.78 30.06 43.77 43.62 37.97 35.04 21.20 42.53<br />

Gills 43.97 24.54 44.32 59.53 31.66 20.27 39.89 40.05<br />

Skin 31.67 28.48 48.72 35.19 35.61 34.16 33.14 43.14<br />

Intestine 10.82 28.12 43.75 50.37 35.70 34.78 44.88 52.63<br />

Values are expressed in percentage<br />

Table 2: Concentration of Metals in Water and Sediment<br />

Copper Lead Zinc Cadmium<br />

Fresh water * Trace Trace Trace Trace<br />

Sewage Water * 10.97±<br />

2.87<br />

Sewage Water, after six months.<br />

*<br />

93.33 ±<br />

9.39<br />

2.11 ±0.07 17.79±<br />

1.88<br />

16.44±<br />

5.59<br />

3.99±<br />

0.74<br />

Pond sediment.* 41.00± 5.00 32.00± 2.18 60.80<br />

±9.11<br />

Pond Sediment , after six<br />

months. *<br />

*Mean ± SD of 5 different observations<br />

37.00±<br />

3.44<br />

28.11±<br />

2.99<br />

56.00±<br />

4.07<br />

2.23±<br />

0.74<br />

0.79±.01<br />

3.48± 1.11<br />

3.14±0.99<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

ISSN 2250-3153<br />

ACKNOWLEDGMENT<br />

Appreciation is due to The CSIR, New Delhi for their financial<br />

support and the Principal, Lady Brabourne College, Kolkata.<br />

REFERENCES<br />

[1] Aderinola, O.J., Clarke, E.O. Olarinmoye. O.M., Kusemiju V. and<br />

Anatekhai , M.A.. 2009. Heavy Metals in Surface Water, Sediments, Fish<br />

and Perwinkles of Lagos Lagoon. American-Eurasian J. Agric. & Environ.<br />

Sci., 5 (5): 609-617.<br />

[2] Ambedkar, G. and Muniyan, M. 2011. Accumulation of metals in the five<br />

commercially important freshwater fishes available in Vellar River, Tamil<br />

Nadu, India. Archives of Applied Science Research, 3 (3): 261-264.<br />

[3] APHA. 1998. Standard Methods for the Examination of Water and<br />

Wastewater. 20th Ed., American Public Health Association, New York,<br />

USA.<br />

[4] Authman , M.M.N. 2008. Oreochromis nilotica as a Biomonitor of Heavy<br />

Metal Pollution with emphasis on potential risk and relation to some<br />

biological aspects. Global Veterinaria 2(3): 104-109.<br />

[5] Bohn, A. and McElroy, R.O. 1976. Trace metals (As, Cd, Cu, Fe and Zn) in<br />

Arctic Cod, Boreogadus saida and selected zooplankton from Strath cona<br />

sound, Northern Baftin Island. J. Fish Res. Bd. Can. 33: 2836-2840.<br />

[6] Chernoff , B. 1975. A method for wet digestion of fish tissue for heavy<br />

metal analyses. Trans. Am. Fish. Soc. 4 : 803-804.<br />

[7] Ekeanyanwu, C.R., C. A. Ouguiya , and O.F. Etienajirhevwe . 2011.<br />

Trace metal distribution in fish tissues, bottom sediments and water from<br />

Okumeshi River in Delta state, Nigeria. Fish and Periwinkles of Lagos<br />

Lagoon. American-Eurasian J. Agric. & Environ. Sci., 5 (5): 609-617.<br />

[8] Gomez, K.A. and Gomez, A.A. 1984. Statistical Procedures for<br />

Agricultural Research, 2nd ed. Wiley / Interscience , New York.<br />

[9] Harrison, S.E. and Klaverkamp, J.F. 1989. Uptake elimination of and tissue<br />

distribution of dietary and aqueous cadmium by rainbow trout ( Salmo<br />

gairdneri Richardson ) and whitefish ( Caregonous clupeifomes Mitchill )<br />

. Environ. Toxicol . Chem. 8: 87-97.<br />

[10] Hughes, G.M. and R. Floss. 1978. Zinc treatment of the gills of rainbow<br />

trout (S. gairdneri) after treatment with zinc solutions under normoxic and<br />

hypoxic conditions. J. Fish. Biol. 13: 717-728.<br />

[11] Jayaram, K.C. 1981. The freshwater Fishes of India. A Handbook.<br />

Zoological Survey of India , Calcutta. pp : 116-131.<br />

[12] Jezierska, B. and Witeska, M. G. 2006.The Metal Uptake and<br />

Accumulation In Fish Living in Polluted Waters. Soil and Water Pollution<br />

Monitoring, Protection and Remediation. I. Twardowska et al Ed<br />

Springer. pp: 3–23.<br />

[13] Kundu, N., Pal, M. and Saha , S. 2008. East Kolkata Wetlands: A resource<br />

Recovery system through productive activities. In the Proceedings of Taal<br />

2007 . The 12 th world Lake Conference: pp: 868-881.<br />

[14] McCarter , J.A. and Roch, M. (1983). Hepatic metallothionein and<br />

resistance to Cu in juvenile coho salmon. Comp. Biochem. Physiol. 74C:<br />

133-137.<br />

[15] Moriarty, F., Hanson, H.M. and Freestone, P. 1984. Limitation of body<br />

burden as an index of environmental contamination of heavy metal in fish<br />

Cottus gobio L. from the River Ecclesbourne, Derbyshire. Environ. Pollut.<br />

Ser. A 34: 297-320.<br />

[16] Nafde, A.S., Kondawar, V.K. and Hasan. M.Z . 1998. Precision and<br />

accuracy control in the determination of heavy metals in sediment and water<br />

by atomic absorption spectrophotometry . JIEAM. 25:83-91.<br />

[17] Olowu , R. A. , Ayejuyo , O. O. , Adewuyi , G. O. , Adejoro , I. A.<br />

,Denloye, A. A. B. , Babatunde A. O. and Ogundajo , A. L. 2010 .<br />

Determination of Heavy Metals in Fish Tissues, Water and Sediment from<br />

Epe and Badagry Lagoons, Lagos, Nigeria. E-Journal of Chemistry. 7(1),<br />

215-221.<br />

[18] Schulz, B.M. (1974). Lead uptake from sea water and food and lead loss in<br />

common mussel , Mytitus edulis. Mar. Biol., 25: 177-193.<br />

[19] Tao, S., Liang, T. Cao, J. Dawson, R.W. and Liu, C. 1999 . Synergistic<br />

effect of Cu and Pb uptake by Fish. Ecotoxicol. Environ. Saf. 44: 190-<br />

195.<br />

[20] Tawari-Fufeyin, P. and Ekaye , S. A . 2007. Fish species diversity as<br />

indicator of pollution in Ikpoba River , Benin City, Nigeria. Rev. Fish Biol.<br />

Fisheries. 17:21-30.<br />

[21] WHO. 1992. Environmental Health Criteria, No. 134, Environmental<br />

Aspects, Geneva WHO.<br />

AUTHORS<br />

**Prof. Samir Banerjee (M.Sc. Ph.D.)<br />

Aquaculture Research Unit, Department of Zoology,<br />

University of Calcutta,<br />

35, Ballygange Circular Road, Kolkata- 700017.<br />

Mobile number - 9331021567<br />

samirbancu@gmail.com<br />

Correspondence Author: *Dr Paulami Maiti (M.Sc. Ph.D.)<br />

Lady Brabourne College,<br />

P 1/ 2 , Suhrawardy Avenue,<br />

Park Circus, Kolkata – 700017.<br />

Mobile number - 967437345<br />

paulamim262@gmail.com<br />

www.ijsrp.org


International Journal of Scientific and Research Publications, Volume 2, Issue 6, June <strong>2012</strong><br />

ISSN 2250-3153<br />

www.ijsrp.org

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!