<?xml version='1.0' encoding='UTF-8'?><rss version='2.0'><channel><title>Volume 4 Number 2 (February 2017)</title>
		<link>http://ijaers.com/</link>
		<description>Open Access international Journal to publish research paper</description>
		<language>en-us</language>
		<date>February 2017</date><item>
		<title>Comparative study of AODV with malicious environment and the USOR</title>
		<description>By the performance analysis of two protocols AODV and USOR implemented in ns2 we made a comparison between them. USOR is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that USOR can well protect user privacy against both inside and outside attackers. Successful implementation of unlinkability and unobservability property of USOR not only has satisfactory performance compared to AODV, but also achieves stronger privacy protection than the existing systems when in the malicious environment. Usage of the stronger encryption techniques in unobservable protocol makes the more data secure. In this paper we are going to compare the protocols AODV and USOR. The performance of the network mainly refers by using the packet delivery function and the over head of the packet to reach the destination. Here we are analyze overhead and packet delivery function of the two protocols and made the comparison between them.</description>
		<link>http://ijaers.com/detail/comparative-study-of-aodv-with-malicious-environment-and-the-usor-2/</link>
		<author>Dr K Butchi Raju</author>
		<pdflink>http://ijaers.com/uploads/issue_files/1 IJAERS-FEB-2017-10-Comparative study of AODV with malicious environment and the USOR.pdf</pdflink>
                
		</item><item>
		<title>Recycling of Coal Power Fly Ash Mineral Particulate to Modify Microhardness and Tensile properties of Epoxy Polymer</title>
		<description>This project aims to convertas receivedfly ash from coal power station, as a recycled, superior and cheap materialas filler in epoxy matrix used to make carbon fibre reinforced composites in structural and infrastructural applications. Epoxy resin has excellent adhesion to other materials, has chemical and heat resistance and alsogood to excellent mechanical properties, with very good electrical insulation. Diglycidal ether of bisphenol A- (DGEBA)is the chosen resin and cycloaliphatic polyamine is the chosen hardener.
Tensile specimens were cured at 120 Cofor2 hours. The fly ash class F has been used was supplied by Cement Australia, Brisbane.The fly ash was added to the epoxy as0, 10, 20, 30, 40 &amp; 50 wt% proportion, using hand mixing then poured carefully into silicone rubber mould with tensile dog-bone shape cavity inside. 
A 60 % increase in yield strength was observed with 10 % FA addition.  This fits with some models of particle inclusion in matrix materials. 
Vickers micro-hardness studies undertaken at 300 g, 500 g and 1000 g loads and it was seen that indicated that the microhardness was superior at 300 gm load. As microhardness results; 30 wt% and 50 wt% fly ash-epoxy noted some increase in microhardness with fly ash addition.
</description>
		<link>http://ijaers.com/detail/recycling-of-coal-power-fly-ash-mineral-particulate-to-modify-microhardness-and-tensile-properties-of-epoxy-polymer-2/</link>
		<author>Shahad Ibraheem, Sri Bandyopadhyay</author>
		<pdflink>http://ijaers.com/uploads/issue_files/2 IJAERS-JAN-2017-47-Recycling of Coal Power Fly Ash Mineral Particulate to Modify.pdf</pdflink>
                
		</item><item>
		<title>Evaluation Metrics for e-Government System and Services</title>
		<description>Many e-Government services till date have been created based on the existing services and own understandings, rather than based on citizenâ€™s need and interests. Very little data is available about local government officials and citizenâ€™s want and need. The proposed study will analyze the use of IT and e-Governance practices, develop &amp; document the conceptual model of e-Govt, define components, component attributes, and the component relationships for each model. The model will be based on the citizenâ€™s viewpoint which is expected to be quite different from a model based on a government agencyâ€™s viewpoint.</description>
		<link>http://ijaers.com/detail/evaluation-metrics-for-e-government-system-and-services-2/</link>
		<author>Rahul Kaushal</author>
		<pdflink>http://ijaers.com/uploads/issue_files/3 IJAERS-JAN-2017-57-Evaluation Metrics for e-Government System and Services.pdf</pdflink>
                
		</item><item>
		<title>Study on Chemical Treatments of Jute Fiber for Application in Natural Fiber Reinforced Composites (NFRPC)</title>
		<description>Research and studies on the use of natural ï¬bers as replacement to man-made ï¬ber in ï¬ber-reinforced composites have increased and opened up further industrial possibilities. Natural ï¬bers have the advantages of low density, low cost, biodegradability, recyclable, low pesticide and thus environmentally friendly. However, the main disadvantages of natural ï¬bers in composites are the poor compatibility between ï¬ber and matrix and the relative high moisture sorption. Therefore, chemical treatments are considered in modifying the ï¬ber surface properties. In this paper, the different chemical modiï¬cations and treatments on jute ï¬bers for use in natural ï¬ber-reinforced composites are reviewed. Chemical treatments including alkali, permanganate treatments and others are discussed. The chemical treatment of ï¬ber aimed at improving the adhesion between the ï¬ber surface and the polymer matrix may not only modify the ï¬ber surface but also increase ï¬ber strength. Water absorption of composites is reduced and their mechanical properties are improved.</description>
		<link>http://ijaers.com/detail/study-on-chemical-treatments-of-jute-fiber-for-application-in-natural-fiber-reinforced-composites-nfrpc-2/</link>
		<author>Engr. Ojukwu Martins chubuike, Chukwunyelu Christian Ebele, Engr. Ilo Fidelis Ifeanyi, Ekwueme Solomon Okwuchukwu, Orizu Eziafa Festus</author>
		<pdflink>http://ijaers.com/uploads/issue_files/4 IJAERS-OCT-2016-39-Study on Chemical Treatments of Jute Fiber for Application in Natural.pdf</pdflink>
                
		</item><item>
		<title>A Survey on Data control from sender using cloud computing</title>
		<description>To store data more efficiently in cloud security must also be taken into considerations. When certain information is stored in Cloud, it actually means that it resides outside an organizationâ€™s structure bounds. This results in loss of data and information which leads to low cost security issues that, reduces adoption of Cloud computing techniques. This paper surveys mainly on data-centric access control with enriched role-based quality focusing security as a target, protecting user information despite the Cloud service provider that holds it. It also deals with identity based encryption and proxy re-encryption techniques to protect the authorization model.</description>
		<link>http://ijaers.com/detail/a-survey-on-data-control-from-sender-using-cloud-computing-2/</link>
		<author>I.Subhashree, S.Swetha, S.Vanmathi, Muthukumarasamy.S</author>
		<pdflink>http://ijaers.com/uploads/issue_files/5 IJAERS-FEB-2017-3-A Survey on Data control from sender using cloud computing.pdf</pdflink>
                
		</item><item>
		<title>Dark Matter and Dark Energy due to Photons that Attract or Repel Each Other</title>
		<description>The Through a simple model we study the possibility of photon with mass and charge that can produce an attractive or repulsive force at galactic distances. The main source of the dark energy can be provided by the non-vanishing photon mass during the period of dark radiation of the Universe. A simple analysis shows that the non-vanishing photon mass of the order of   is consistent with the current observations.  For distances separating nearby galaxies dominates the force of Newtonian attraction between photonic masses (Dark Matter). For distant galaxies dominates the repulsive electrical force between photon charges (Dark Energy). </description>
		<link>http://ijaers.com/detail/dark-matter-and-dark-energy-due-to-photons-that-attract-or-repel-each-other-2/</link>
		<author>Souza de Assis, H. Torres-Silva</author>
		<pdflink>http://ijaers.com/uploads/issue_files/6 IJAERS-FEB-2017-12-Dark Matter and Dark Energy due to Photons that Attract or Repel Each Other.pdf</pdflink>
                
		</item><item>
		<title>A Survey on Mobile Phone Authentication</title>
		<description>In modern days, gadgets are essential part of everyday lives and they enable to access a variety of ubiquitous services. Recently, the availability of these ubiquitous and mobile services has increased due to the different form of access provided by mobile devices, such as Bluetooth and Wi-Fi. In the same trend, the typologies of vulnerabilities exploiting these services and communication channels have boosted as well. Therefore, the presence of malware in mobile platform can seriously impact the end users privacy and security, reducing the end users trust in performing mobile access to its network services. In this, an authentication mechanism is based on screen brightness which prevents and increases security against side channel attacks.</description>
		<link>http://ijaers.com/detail/a-survey-on-mobile-phone-authentication-2/</link>
		<author>T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena</author>
		<pdflink>http://ijaers.com/uploads/issue_files/7 IJAERS-FEB-2017-8-A Survey on Mobile Phone Authentication.pdf</pdflink>
                
		</item><item>
		<title>Development of Moisture Prediction Model for Tea using Electrical Impedance Spectroscopy</title>
		<description>Moisture is the most essential parameter for tea leaves for storage and consumption stage as it affects the physical and chemical aspects of tea leaves with which it relates the stability and freshness the tea leaves for a long time. The most essential parameter which affects the quality of tea leaves is moisture for post harvesting, processing, storage and transport. The main aim of this study is to development procedure for moisture content measurements of fresh tea leaves using measurement acquired by electrical properties. Method This relation is obtained the frequency range within between 100 kHz to 300 MHz and moisture content ranges between 2%-75%. A good relation between moisture content and correlate with variations in electrical properties viz. IZI, Ñ²z, R, Cp, Cs has been observed by partial least square regression technique. Result Moisture prediction model was developed by applying electrical properties and that the new technique it was observed more accuracy obtained using a single parameter as compared with that moisture measurement. Conclusion the model which is developed can evaluated with in performance the moisture content a commercial moisture meter which is expected.</description>
		<link>http://ijaers.com/detail/development-of-moisture-prediction-model-for-tea-using-electrical-impedance-spectroscopy-2/</link>
		<author>Arti Sharma, Baban Kumar Bansod, Ritula Thakur</author>
		<pdflink>http://ijaers.com/uploads/issue_files/8 IJAERS-JAN-2017-67-Development of Moisture Prediction Model.pdf</pdflink>
                
		</item><item>
		<title>Effect of 'Pushkaram' Activities on Quality of Krishna River Water - A Study Based On Determination of Residual Chlorine</title>
		<description>The present study is aimed at evaluating the quality of Krishna river water before and after the â€˜Pushkaramâ€™ celebrations organized in and around Vijayawada, Andhra Pradesh, India during 11th to 24th August 2016. These celebrations generally involve activities that significantly pollute water. The study was carried out by collecting water samples before and after the period mentioned above at different locations where celebrations were organized. In order to analyze the samples, breakpoint chlorination technique was used apart from the determination of various quality parameters of water samples using both volumetric and instrumental methods of analysis. The study indicates that there is significant effect of the activities of pushkaram celebrations on the quality of water in spite of many measures taken by the concerned authorities.</description>
		<link>http://ijaers.com/detail/effect-of-pushkaram-activities-on-quality-of-krishna-river-water-a-study-based-on-determination-of-residual-chlorine-2/</link>
		<author>D. Sarada Kalyani, C. L. Monica, Z. Vishnuvardhan, N. Murali Krishna</author>
		<pdflink>http://ijaers.com/uploads/issue_files/9 IJAERS-FEB-2017-18-Effect of Pushkaram Activities on Quality of Krishna River Water.pdf</pdflink>
                
		</item><item>
		<title>Military Reconnaissance Robot</title>
		<description>In todayâ€™s world Indian border military force facing a huge destruction especially in border. Tensions rise between nuclear neighbors after deadly raid on army base close to disputed border. All the military organizations takes the help of military robots to carry  risky jobs that cannot be handled manually by soldier. A great development in military robots when compare to military robots in earlier time. In this proposal, we make use of Robotic vehicle which helps to enter an area of higher risks, move and place wherever the object wants to go. Security systems uses sensor to detect intrusion. Vision based system is accurate and can be more reliable. Vision based machine learning system will be a good deal to this problem. Using the machine learning algorithm technique, motion detection is first done, if there is any detection, a bounding box will be made on that spot and then human recognition algorithm takes place. If the intruder match with the database of known personal data of the soldiers which was already stored by the officials. If there is no match in database, it will take a snapshot of the unknown intruder and with the help of internet or sat-link it will sends it to the server. From the server an alarm triggers using relay or buzzers and the snapshot will be sent to the soldiers nearby with the accurate distance using gps tracking system.</description>
		<link>http://ijaers.com/detail/military-reconnaissance-robot-2/</link>
		<author>Mrs.N.S.Usha, S. Priyadharshini, K.Rohinee Shree,  P. Sabari Devi, G.Sangeetha</author>
		<pdflink>http://ijaers.com/uploads/issue_files/10 IJAERS-FEB-2017-20-Military Reconnaissance Robot.pdf</pdflink>
                
		</item><item>
		<title>Email Analysis for Community Detection - Multi-User Perspective</title>
		<description>Email classification has the capacity to group emails and user as community which is based on communication arrangement. Personalized network is used to understand the behavior of each user in an email and it analyze the various or different aspect of community structure e.g. the person who is having the same likeliness in a various social relations. The proposed system extracts single user or multi user from the email corpus using statistical analysis. This methodology uses a multi-user personalized email community detection method and tracks the email user it should be grouped. It also depends on their structural and semantic intimacy. Multi-user personalization concept used to find out the structure of community with fuzzy information i.e., an incomplete set of email details. The interactions are visualized as social graphs.</description>
		<link>http://ijaers.com/detail/email-analysis-for-community-detection-multi-user-perspective-2/</link>
		<author>S. Karthika, P. Saranya</author>
		<pdflink>http://ijaers.com/uploads/issue_files/11 IJAERS-FEB-2017-17-Email Analysis for Community Detection - Multi-User Perspective.pdf</pdflink>
                
		</item><item>
		<title>Experimental Study on Strength Characteristics of Self Curing Concrete with Cement Replacement by Fly Ash</title>
		<description>Curing is an important process in construction. It regulates the strength properties of concrete. More water (with the domestic usage quality)is required for the curing process in construction. Large quantity of water is required in construction only in the curing stage. During the curing process, large amount of water is wasted as evaporation.  Scarcity of water around the globe gives insufficient quantity and inefficient quality of water for domestic purpose. In this situation, water for curing purpose is a joke. For this many experiments are done on self curing concrete. Self curing agents like polyethylene glycol etc., is used in concrete. These agents retard the water loss from concrete, so that sufficient amount of water (poured at the time of mixing of concrete) is retarded and sufficient for curing of concrete in later stages. Polyethylene Glycol-400 is used in this experiment as a self curing agent. It is a harmless polymer and easily available in laboratory chemical suppliers and its effectiveness is very high even in the small quantities. The effectiveness of PEG-400 is high up to 0.5% of weight of cement. Many experiments are done on conventional concrete to convert into self curing concrete without any replacement of fly ash. Now-a-days fly ash is used as a cement substitute.  
The objective of the present experimental study is to analyse the possibility of using fly ash in the place of cement in self curing concrete up to 30% (because is code-10262:2009 gives fly ash replacement in concrete up to 20%).
This experimental study was carried out on the three mixes-conventional mix, self curing concrete mix with PEG-400 (0.3%of weight of cement as constant),self curing concrete with replacement of cement by fly ash up to 30% with PEG-400 (at 0.3% of weight of cement is taken as constant).
The obtained results are describing the comparisons between the strength characteristics of the conventional concrete specimen with curing, self curing concrete with no fly ash without curing and self curing concrete with fly ash ( in place of cement upto30%by weight) without curing. These results are taken at constant proportions of self curing agent, i.e.PEG-400 (0.3% by weight of cement).
</description>
		<link>http://ijaers.com/detail/experimental-study-on-strength-characteristics-of-self-curing-concrete-with-cement-replacement-by-fly-ash-2/</link>
		<author>P. Manzoor, Dr. E. Arunakanthi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/12 IJAERS-FEB-2017-14-Experimental Study on Strength Characteristics of Self Curing Concrete with Cement Replacement by Fly Ash.pdf</pdflink>
                
		</item><item>
		<title>Cloud Based Vehicle Parking System for Anonymous Place Using Internet of Things</title>
		<description>The intention of our project is to create a smart parking system for smart cities and malls to find a parking space that is well suited to their respective aspects.  That is, it can help in finding either the nearest spot or the best one.  Thus the algorithm increases the efficiency of the cloud based system and hence develops a network architecture based on internet of things.  We have also successfully implemented the proposed system in the real world.</description>
		<link>http://ijaers.com/detail/cloud-based-vehicle-parking-system-for-anonymous-place-using-internet-of-things-2/</link>
		<author>R.Murugan, Rene V.V.Sundar, B. Ravinder Choudry, Mrs.L.Sudha, Mrs.K.B.Aruna</author>
		<pdflink>http://ijaers.com/uploads/issue_files/13 IJAERS-FEB-2017-19-Cloud Based Vehicle Parking System for Anonymous Place Using Internet of Things.pdf</pdflink>
                
		</item><item>
		<title>Dynamic and Static Gesture Recognition System Using Moments</title>
		<description>Gesture recognition is the novel idea to enhance the signs recognition of those who have speech and hearing disability .Our project discusses an improved method for gesture recognition .The algorithm extracts the gestures from the video given to it and it detects the hand  using HSV skin color segmentation in the intent to eliminate the other  parts of the body and detect only hands .It distinguishes between static  and dynamic gestures and extracts the appropriate feature vector .We used  SPHINX parser to form word from set of letters. We strive to enhance the reliability and efficiency by using faster static gesture recognition algorithm.</description>
		<link>http://ijaers.com/detail/dynamic-and-static-gesture-recognition-system-using-moments-2/</link>
		<author>Rajvardhan Thakare, Parvez Khan Pathan, Meghana Lokhande, Neha Waje</author>
		<pdflink>http://ijaers.com/uploads/issue_files/14 IJAERS-JAN-2017-22-Dynamic and Static Gesture Recognition System Using Moments.pdf</pdflink>
                
		</item><item>
		<title>A Review: Polygon Filling Algorithms Using Inside-Outside Test</title>
		<description>In computer graphics we have many polygon filling algorithms. In this paper I review scan line polygon filling algorithms using inside-outside test, boundary fill algorithm and flood fill algorithm. Scan line filling algorithm, finds an intersection of the scan line with polygon edges and inside-outside test is used to find the inside and outside region of a polygon. Boundary fill is a recursive algorithm. This paper has a review on various polygon filling algorithms.</description>
		<link>http://ijaers.com/detail/a-review-polygon-filling-algorithms-using-inside-outside-test-2/</link>
		<author>Nisha, Sapna Varshney</author>
		<pdflink>http://ijaers.com/uploads/issue_files/15 IJAERS-FEB-2017-11-A Review Polygon Filling Algorithms Using Inside-Outside Test.pdf</pdflink>
                
		</item><item>
		<title>The Consumption Function in an Islamic Context: General Modeling Framework</title>
		<description>In this paper, more attention will be given to mathematical formulation and econometric modeling of economic phenomena on the basis of Islamic rules and regulations the first component of the demand, namely, the consumption function in the Islamic context will be targeted.</description>
		<link>http://ijaers.com/detail/the-consumption-function-in-an-islamic-context-general-modeling-framework-2/</link>
		<author>Lakhyar Zouhair</author>
		<pdflink>http://ijaers.com/uploads/issue_files/16 IJAERS-JAN-2017-61-The Consumption Function in an Islamic Context General Modeling Framework.pdf</pdflink>
                
		</item><item>
		<title>Optimal Imperfection of Reactive Powder Concrete Slabs under Impact Load </title>
		<description>Optimization of imperfect reactive powder concrete slabs under impact load is the aim of the current study, the study adopts to investigate the optimal imperfection to decrease the maximum dynamic deflection which affects negatively on structures. Optimization by using Modified Hooke-Jeevs method of imperfect slabs has been adopted in three cases according to the required variables, optimal thickness, optimal thickness-length and optimal thickness-length-imperfection. The results show that the optimal ratio of imperfect reactive powder concrete slab thickness to the one of its dimension is equal to (0.049) whereas the optimal ratio of imperfection to the thickness of slab is equal to (0.785) . The current study adopted preparing designable table which is considered informative for any future designs. </description>
		<link>http://ijaers.com/detail/optimal-imperfection-of-reactive-powder-concrete-slabs-under-impact-load-2/</link>
		<author>Ali Adnan Al Zahid</author>
		<pdflink>http://ijaers.com/uploads/issue_files/17 IJAERS-FEB-2017-34-Optimal Imperfection of Reactive Powder Concrete Slabs under Impact Load.pdf</pdflink>
                
		</item><item>
		<title>FPGA based Security Login System using GSM with OTP Generation</title>
		<description>Security of system is major concern in this age of high-tech infrastructure. In todayâ€™s materialistic world, security holds an in dispensable place. Security in every aspect is highly desirable may be at home or at office etc. as thefts and robberies are increasing day by day. To overcome this security threat, a security system has been proposed using GSM technology, by generating One Time Password and implementing in FPGA. As FPGAs offer all of the features needed to implement most complex designs. This security system activates, authenticates and validates the user and then unlocks the system. This project attempts to create security login systemwhere the user is granted access if he enters the correct predefined password and is denied access if he enter the wrong password. When password is entered GSM gets activated and send SMS to userâ€™s mobile phone, after authentication random OTP is generated and should be verified such that the system gets accessed. In every 3 minutes   this OTP verification code will change and is valid for 3 minutes.  The outcome of each and all would be available in the LCD of the Spartan 3E board. VHDL codes are used to design this system using Xilinx ISE 9.2i.</description>
		<link>http://ijaers.com/detail/fpga-based-security-login-system-using-gsm-with-otp-generation-2/</link>
		<author>Samiksha Subba, Bhawana Dahal, Nirmal Rai, Rochan Banstola, Suman Das, Surya Prakash Tamang</author>
		<pdflink>http://ijaers.com/uploads/issue_files/18 IJAERS-FEB-2017-42-FPGA based Security Login System using GSM with OTP Generation.pdf</pdflink>
                
		</item><item>
		<title>Investigating of Mechanical Properties of Mortars Based on Fly Ash and Blast Furnace Slag Activated with Alkali</title>
		<description>Alkali activated mortars obtained from granulated blast furnace slag and fly ash were used instead of Portland cement by activating with alkali. Sodium silicate and sodium hydroxide were activated blast furnace slag and fly ash. Mortar samples were prepared 40x40x160 mm as prismatic samples according to TS EN 196-1 and they were cured at room temperature.  Compressive and flexural strength of the mortar samples including blast furnace slag and fly ash were investigated by experimenting.</description>
		<link>http://ijaers.com/detail/investigating-of-mechanical-properties-of-mortars-based-on-fly-ash-and-blast-furnace-slag-activated-with-alkali-2/</link>
		<author>Ozer Sevim, Ahmet Filazi, Baran Toprak, Saruhan Kartal</author>
		<pdflink>http://ijaers.com/uploads/issue_files/19 IJAERS-FEB-2017-31-Investigating of Mechanical Properties of Mortars Based on Fly Ash.pdf</pdflink>
                
		</item><item>
		<title>Retrieval of Anomaly Details Using Vehicle Number Plate Identification for Traffic Guards</title>
		<description>The ascent in number of vehicles makes different issues in regular daily existence. Arranging such substantial number of vehicles and transportation are intricate and tedious assignment. This paper centers over the above issue. This framework will consequently perceive the number plate of vehicles. The perceived number plate takes after the given strides: 1.To catch continuous picture of number plate. 2. To fragment and perceive characters at the server. 3. Perceived tag is shown on the graphical UI and furthermore put away in database alongside time and date for further utilize. 4. Book the complaint against the anomaly. The different methodologies for the issue are contemplated as takes after.</description>
		<link>http://ijaers.com/detail/retrieval-of-anomaly-details-using-vehicle-number-plate-identification-for-traffic-guards-2/</link>
		<author>Narendra Rao.J, Monish.S, Prabhu.K, Mrs. Usha N.S</author>
		<pdflink>http://ijaers.com/uploads/issue_files/20 IJAERS-FEB-2017-32-Retrieval of Anomaly Details Using Vehicle.pdf</pdflink>
                
		</item><item>
		<title>Evaluation of Routing Protocols in Ad Hoc Networks</title>
		<description>Ad hoc networks are comprised of a group of workstations or other wireless devices which communicate directly with each other to exchange information without centralized control or established infrastructure. In recent years, several routing protocols have been proposed for ad hoc networks and prominent among them are DSR, AODV and TORA. This survey paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis. The objective is to make observations about how the performance of these protocols can be improved by using the quality assurance metrics.</description>
		<link>http://ijaers.com/detail/evaluation-of-routing-protocols-in-ad-hoc-networks-2/</link>
		<author>Surbhi Dhiman </author>
		<pdflink>http://ijaers.com/uploads/issue_files/21 IJAERS-FEB-2017-38-Evaluation of Routing Protocols in Ad Hoc Networks.pdf</pdflink>
                
		</item><item>
		<title>Lethal Concentration of Carbonate OF Ca as a Function of the Osmotic Potential of the Solution in Sunflower (Heliantusannuus L.)</title>
		<description>In order to know the effect of CaCO3 in solution, sunflower seedlings cv. Victoria, an experiment was completely randomized, where five concentrations of calcium carbonate were evaluated to determine the lethal concentration (LC50), pH and EC of the solution under laboratory conditions in the Universidad Tecnologica de Tehuacan, to simulate of excess Ca++ in the soils or nutrient solution. The results indicate, the LC50 was 62.8 mg CaCO3 L-1, so maximum values for pH, EC and calcium absorption, They were achieved at concentrations of 120 and 160 mg L-1 of CaCO3. This work can be concluded, Sunflower can absorb the high levels of calcium and used as an alternative, for remediation of agricultural soils affected hard water and Ca++ salts. </description>
		<link>http://ijaers.com/detail/lethal-concentration-of-carbonate-of-ca-as-a-function-of-the-osmotic-potential-of-the-solution-in-sunflower-heliantusannuus-l-2/</link>
		<author>Jose Alberto Escalante-Estrada, Alejandro Morales-Ruiz, Juan Manuel Loeza-Corte, Arturo Olivar-Hernandez, Brandon Emmanuel Rosales-Morales, Edgar Josanine Vargas-Ramirez, Ernesto Diaz-Lopez</author>
		<pdflink>http://ijaers.com/uploads/issue_files/22 IJAERS-JAN-2017-31-Lethal Concentration of Carbonate OF Ca as a Function of the Osmotic.pdf</pdflink>
                
		</item><item>
		<title>Enhancing the surge margin of a Centrifugal Compressor with different Blade Tip Geometry</title>
		<description>The reliability operation for small fuel cells and hybrid fuel cell with gas turbine requires centrifugal compressor surge prevention. This study concerns a high speed centrifugal compressor stage with different blade tip geometries. The investigations were performed with unsteady three-dimensional, compressible flow simulations. A novel parameterization method has been developed to alter the tip geometry of an impeller blade. Different tip geometries are investigated includes flat tip blade, main blade winglet, main and splitter blade winglet and finally pressure side grooved tip. The performance and internal flow results are presented at surge, design and near choke points. The conclusion is that the tip geometry has a significant effect on the compressor performance and the operation stability at lower flow rates. The pressure ratio and surge margin for the blades with winglet have been improved, and decreased for the grooved tip geometry. More uniform flow at impeller outlet with winglet blade. The use of winglet tip displaces the tip leakage vortex away from the blade and weakening the impingement effect. The winglet tip reduces the aerodynamic losses by unloading the tip section, reducing the leakage flow rate and turning the leakage flow in a more stream wise direction.</description>
		<link>http://ijaers.com/detail/enhancing-the-surge-margin-of-a-centrifugal-compressor-with-different-blade-tip-geometry-2/</link>
		<author>Ibrahim Shahin</author>
		<pdflink>http://ijaers.com/uploads/issue_files/23 IJAERS-FEB-2017-7-Enhancing the surge margin of a Centrifugal Compressor with different Blade Tip Geometry.pdf</pdflink>
                
		</item><item>
		<title>Combustion and Emission Analysis of Mahua and Jujube Biodiesel Blends as Fuel in a CI Engine</title>
		<description>This present study on biodiesel blends shows the performance, emission and combustion characteristics of the DI diesel engine, which is been run independently on direct diesel fuel, 20% blending of zizipus jujbe methyl ester (ZJME20), and 20% blending of mahua methyl ester (MME20) with diesel. In this study, the tested fuels were obtained by catalytic transesterification process. Based on the experimental results, MME20 is favorable for less HC, CO, and smoke density than diesel and ZJME20. Based on the  brake thermal efficiency and specific fuel consumption, MME20 is better when compared with ZJME20. The result also showed momentous improvement in the heat releasing rate due to the better performance characteristic of MME20.</description>
		<link>http://ijaers.com/detail/combustion-and-emission-analysis-of-mahua-and-jujube-biodiesel-blends-as-fuel-in-a-ci-engine-2/</link>
		<author>Mohammed Shamim, C. Syed Aalam, D. Manivannan, Piyush Kumar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/24 IJAERS-FEB-2017-29-Combustion and Emission Analysis of Mahua and Jujube Biodiesel Blends.pdf</pdflink>
                
		</item><item>
		<title>Enhancement Adsorption of Heavy Metal from Recovered Base Oil using Zeolite and kaolinite by Phase Transfer Catalyst and anionic surfactants-Part 2</title>
		<description>Recovery of used lubricating oil by extraction produced organic sludge and recovered base oil. This oil has metallic content such as magnesium, nickel, vanadium, iron, and zinc. In this study, the recovered base oil was treatment by using adsorption process to remove heavy metals Zeolite and kaolinite were used as an adsorbent with and without additives. The parameters investigated include contact time, amount of zeolite, and amount of the additive. The results showed that there is a synergism between zeolite and anionic additive, further more ash removal was higher than that in the prescience of the cationic additive. The optimum removal obtained were 98% and 92 % with anionic and the cationic additive respectively, while in case of kaolinite 87% and 82% respectively. is The most influential parameter affecting ash removal was the concentration of additives and time of adsorption. The results were discussed according to adsorption isotherm of heavy metals on phase transfer catalyst or the anionic additive in pore diameter of zeolite. The results showed that, viscosity increased from 30 cst for used lube oil to 68 cst while the density decreased from 912 to 900 kg/m3 and the pour point from -2 to âˆ’8.5 Â°C. The purification oil can be used again after distilled to light naphtha and middle distillate.</description>
		<link>http://ijaers.com/detail/enhancement-adsorption-of-heavy-metal-from-recovered-base-oil-using-zeolite-and-kaolinite-by-phase-transfer-catalyst-and-anionic-surfactants-part-2-2/</link>
		<author>Dr. Noura Elmehbad</author>
		<pdflink>http://ijaers.com/uploads/issue_files/25 IJAERS-JAN-2017-44-Enhancement Adsorption of Heavy Metal from Recovered Base Oil using Zeolite.pdf</pdflink>
                
		</item><item>
		<title>Energetic Diffusion in ternary sets of Ge-Se-In Chalcogenide Glasses</title>
		<description>The composition dependence of energetic parameter (A) in two sets of Ge-Se-In glasses, namely, Ge10Se90-xInx (x = 5, 10, 15, 20) and Ge15Se85-xInx (x = 0, 5, 10, 15, 20) have been studied by using rigidity percolation theory and bond constraints theory. Parameter (A) shows a local maxima at  = 2.67. The results are discussed on the basis of the topological and rigidity theory exhibited by covalent network glasses. The relative sensitivity of parameter (A) to these phenomena discussed.</description>
		<link>http://ijaers.com/detail/energetic-diffusion-in-ternary-sets-of-ge-se-in-chalcogenide-glasses-2/</link>
		<author>Amba Prasad Gangwar, A.K.Saxena, Saurabh Kumar Tiwari</author>
		<pdflink>http://ijaers.com/uploads/issue_files/26 IJAERS-FEB-2017-24-Energetic Diffusion in ternary sets of Ge-Se-In Chalcogenide Glasses.pdf</pdflink>
                
		</item><item>
		<title>Computational Investigation of Furnace Wall for Silica Ramming Mass with FDM</title>
		<description>Furnaces are useful for melting different materials for casting process. In this research paper, we had done advanced heat transfer analysis of induction furnace wall made of silica ramming mass using explicit finite difference method. We have divided actual geometry of furnace refractory wall into 14 elements and 24 nodes. We have derived explicit finite difference equations for all 24 nodes. We have calculated temperature distribution and thermal stress distribution for all different nodes with respect to time. We have plotted graphs for maximum temperature v/s time and maximum stress v/s time. We found that results indicate the effect of thermal fatigue in the induction furnace wall for silica ramming mass. The analysis is very helpful in understanding how thermal fatigue failure of refractory wall happens. </description>
		<link>http://ijaers.com/detail/computational-investigation-of-furnace-wall-for-silica-ramming-mass-with-fdm-2/</link>
		<author>Prof. Nirajkumar C Mehta, Dr. Dipesh D Shukla</author>
		<pdflink>http://ijaers.com/uploads/issue_files/27 IJAERS-FEB-2017-35-Computational Investigation of Furnace Wall for Silica Ramming Mass with FDM.pdf</pdflink>
                
		</item><item>
		<title>Elliptic-Curves Cryptography on High-Dimensional Surfaces</title>
		<description>We discuss the use of elliptic curves in cryptography on high-dimensional surfaces. In particular, instead of a key exchange protocol written in the form of a bi-dimensional row, where the elements are made up with 256 bits, we propose a Diffie-Hellman key exchange protocol given in a matrix form, with four independent entries each of them constructed with 64 bits. Apart from the great advantage of significantly reducing the number of used bits, this methodology appears to be immune to attacks of the style of Western, Miller, and Adleman, and at the same time it is also able to reach the same level of security as the cryptographic system presently obtained by the Microsoft Digital Rights Management. A nonlinear differential equation (NDE) admitting the elliptic curves as a special case is also proposed. The study of the class of solutions of this NDE is in progress.</description>
		<link>http://ijaers.com/detail/elliptic-curves-cryptography-on-high-dimensional-surfaces-2/</link>
		<author>Alberto Sonnino, Giorgio Sonnino</author>
		<pdflink>http://ijaers.com/uploads/issue_files/28 IJAERS-FEB-2017-66-Elliptic-Curves Cryptography on High-Dimensional Surfaces.pdf</pdflink>
                
		</item><item>
		<title>Visible Surface Detection Algorithms: A Review </title>
		<description>In computer graphics, there are many surface detection algorithms. When we view a picture containing non-transparent objects and surfaces, then we cannot see those objects from view which is behind from objects closer to eye. We must remove these hidden surfaces to get a realistic screen image. The identification and removal of these surfaces is called Hidden-surface problem. In this paper I review some visible surface detection algorithms like Z buffer method, Area subdivision method, Scan line method etc.</description>
		<link>http://ijaers.com/detail/visible-surface-detection-algorithms-a-review-2/</link>
		<author>Nisha</author>
		<pdflink>http://ijaers.com/uploads/issue_files/29 IJAERS-FEB-2017-41-Visible Surface Detection Algorithms- A Review.pdf</pdflink>
                
		</item><item>
		<title>Estimation of Soil Erosion and Net Sediment Trapped of Upper-Helmand Catchment in Kajaki Reservoir Using USLE Model and Remote Sensing & GIS Technique</title>
		<description>Soil erosion is a serious problem and greatest destroyer to land cover management and resources of the Upper-Helmand river basin catchment. The Upper-Helmand river basin catchment covers an area of 46,793 square kilometers. In the present study, Universal Soil Loss Equation (USLE) model with Remote Sensing and Geographical Information System (GIS) techniques have been used to estimate soil erosion risks and sediment yield at the Upper-Helmand catchment outlet (Kajki reservoir). Potential soil erosion and magnitude are determined in the catchment. Using USLE model, soil erosion map has been prepared and presented, which will be helpful for conservational and management practices to reduce soil erosion and its yield into the reservoir. It is also found that the average soil erosion from the catchment is 4.48ton/ha/year and corresponding sediment yield trapped at the Kajaki reservoir. </description>
		<link>http://ijaers.com/detail/estimation-of-soil-erosion-and-net-sediment-trapped-of-upper-helmand-catchment-in-kajaki-reservoir-using-usle-model-and-remote-sensing-gis-technique-2/</link>
		<author>Khan Mohammad Takal, S.K. Mittal, Jyoti Sarup</author>
		<pdflink>http://ijaers.com/uploads/issue_files/30 IJAERS-FEB-2017-27-Estimation of Soil Erosion and Net Sediment Trapped of Upper-Helmand.pdf</pdflink>
                
		</item><item>
		<title>Factors Affecting the Innovation and Competitiveness in Kurdistan Region of Iraq Construction Industry</title>
		<description>Innovation is the process of creating and implementing new ideas for the community, while competitiveness is the ability of a firm to provide the community standard quality services at competitive costs.
Creativity and innovation have always been recognized as the foundation of success of any organization, as is the case for the construction industry worldwide. However, without taking the competitiveness in consideration, the prosperity process would be difficult.
Over the past decade, the construction industry has been grown dramatically in Iraq, especially in northern region of the country. To keep the industry firms on the success path by way of making them innovative and competitive, examining factors affecting innovation and competitiveness is crucial. With this aim, this research is conducted so as to identify the factors influencing innovation and competitiveness of the firms.
Literature review about innovation and competitiveness was reviewed to identify the factors affecting the innovation and competitiveness of construction projects. Pilot study of the questionnaire was achieved by a scouting sample. A questionnaire survey was conducted and 43 factors were identified, categorized into 7 groups of dimensions: 1) input, 2) driver, 3) barriers, 4) enabler, 5) impact, 6) competitiveness, and 7) firmâ€™s need of innovation. 150 questionnaires were distributed on local construction firms. 85 questionnaires were received (57%). 
Four hypotheses addressing the improvements of firmâ€™s project performance and their competitive advantages are developed, a conceptual framework explaining the developed hypotheses are designed, ended up with recommendations to improve innovation, competitiveness and performance of construction projects in Kurdistan Region of Iraq.
</description>
		<link>http://ijaers.com/detail/factors-affecting-the-innovation-and-competitiveness-in-kurdistan-region-of-iraq-construction-industry-2/</link>
		<author>Sevar Neamat, Ibrahim Yitmen</author>
		<pdflink>http://ijaers.com/uploads/issue_files/31 IJAERS-FEB-2017-28-Factors Affecting the Innovation and Competitiveness in Kurdistan Region.pdf</pdflink>
                
		</item><item>
		<title>Channel Modeling and Analysis for Radio Wave Propagation in Vehicular Ad Hoc Network</title>
		<description>VANET is the basic technology of Vehicle Infrastructure Integration (VII). Vehicular Ad Hoc Network (VANET) is the network that is connecting a vehicle to the infrastructure (V2I) and vehicle to vehicle (V2V) via wireless manner to convey the information between them. Therefore analyzing influence such channels on the VANET system performance is crucial. This paper is conducted to model and analyze the channel for radio wave propagation with considering free space, two ray ground reflection and single knife edge diffraction. The received power, path loss and effect state of the communication sides whether is in moving stable are discussed. The direction of moving of the vehicles and location of obstacles are also taken into account for calculating the received power and path loss.</description>
		<link>http://ijaers.com/detail/channel-modeling-and-analysis-for-radio-wave-propagation-in-vehicular-ad-hoc-network-2/</link>
		<author>Raghda Nazar Minihi, Haider M. AlSabbagh</author>
		<pdflink>http://ijaers.com/uploads/issue_files/32 IJAERS-FEB-2017-39-Channel Modeling and Analysis for Radio Wave.pdf</pdflink>
                
		</item><item>
		<title>Weldability and Post Weld Heat Treatment of T23 Boiler Grade Steel</title>
		<description>T23 is a low alloy ferritic steel used for boiler super heater and re-heater tubes and water panels in complex fuelled power plants as they exhibit superior high temperature strength and creep behaviour compared to other low alloy ferritic steels. T23 steel is in bainitic structure which holds greater toughness than tempered martensite and also they possess increased resistance to thermal fatigue. With the help of T23 steel, the weight and piping component of the boiler can be reduced. The microstructure of the weldment without proper Post Weld Heat Treatment (PWHT) was not in equilibrium state which led to the secondary hardening during subsequent exposure at high temperature. So there occurred a significant increase in hardness due to non-tempered weld joints and decrease in toughness. Therefore, Post Weld Heat Treatment for T23 steel is necessary. Using Tungsten Inert Gas (TIG) process, the T23 steel was welded under suitable welding parameters (welding current, voltage and shielding gases). A study was done to know the effect of Post Weld Heat Treatment on T23 steel and also the influence of welding parameters. Hardness of T23 steel was measured. The heat treated specimen is examined through Optical microscope and Scanning Electron Microscope. Finally it was noticed that the Post Weld Heat Treatment has enhanced the mechanical properties as well as the metallurgical arrangement of the T23 steel.</description>
		<link>http://ijaers.com/detail/weldability-and-post-weld-heat-treatment-of-t23-boiler-grade-steel-2/</link>
		<author>M.Mohandas Pravin kumar, M.Deepak Kumar, V.Karthik</author>
		<pdflink>http://ijaers.com/uploads/issue_files/33 IJAERS-FEB-2017-37-Weldability and Post Weld Heat Treatment of T23 Boiler Grade Steel.pdf</pdflink>
                
		</item><item>
		<title>Privacy Preserving Mining on Vertically Partitioned Database</title>
		<description>This system allows multiple data owners to outsource their data in a common could. This paper mainly emphases on privacy preserving mining on vertically partitioned database. It provides an even solution to protect data ownerâ€™s raw data from the other data owners. To achieve secure outsourcing technique, the system proposes a cloud-aided frequent itemset mining solution. The run time in this system is one order higher than non-privacy preserving mining algorithms.</description>
		<link>http://ijaers.com/detail/privacy-preserving-mining-on-vertically-partitioned-database-2/</link>
		<author>Anupama K, Grace Priya Shalini S, Mani.A</author>
		<pdflink>http://ijaers.com/uploads/issue_files/34 IJAERS-FEB-2017-48-Privacy Preserving Mining on Vertically Partitioned Database.pdf</pdflink>
                
		</item><item>
		<title>Computational Analysis of Heat Transfer through Fins with Different Types of Notches</title>
		<description>The Engine is one of the important component in an automobile which is subjected to high temperature and thermal stresses. In order to cool the engine the fins are another component which are used to dissipate the heat from the Engine. Fins are generally used to increase the heat transfer rate from the system to the surroundings. By doing computational flow analysis on the engine cooling fins, it is helpful to know about the heat dissipation rate and the Principle implemented in this project is to increase the heat transfer rate, so in this analysis, the fins are modified by putting different types of notches and are of same material. The knowledge of efficiency and effectiveness of the fins are necessary for proper designing of  fins. The main objective of our analysis is to determine the flow of heat at various notches available and the analysis is done by using ANSYS â€“ CFD Fluent software. </description>
		<link>http://ijaers.com/detail/computational-analysis-of-heat-transfer-through-fins-with-different-types-of-notches-2/</link>
		<author>K. Sathishkumar, K. Vignesh, N. Ugesh, P. B. Sanjeevaprasath, S. Balamurugan</author>
		<pdflink>http://ijaers.com/uploads/issue_files/35 IJAERS-FEB-2017-57-Computational Analysis of Heat Transfer through Fins.pdf</pdflink>
                
		</item><item>
		<title>Real-Time Face Recognition System Using KPCA, LBP and Support Vector Machine </title>
		<description>With increasing security threats, Biometric systems have importance in different fields. This appears clearly exactly after the rapid development that happened in power of computing. In this paper, the Design and implementation of a real-time face recognition system are presented. In such a system, Kernel principal component analysis (KPCA) and Local binary pattern (LBP) are used as feature extraction methods with the aid of support vector machine (SVM) to work as a classifier. A comparison between traditional feature extraction methods as (PCA and LDA) and a proposal methods are performed as well as a comparison between support vector neural network and artificial neural network classifier are also implemented. Two types of experiments, On-line, and Off-line experiments are done. In the On-line experiment, a new database is created and used. While in the off-line experiment, two types of databases (ORL and YALE) are used to estimate the performance and efficiency of the system. The combinations of these methods together enhances the experimental results in compare with other methods.</description>
		<link>http://ijaers.com/detail/real-time-face-recognition-system-using-kpca-lbp-and-support-vector-machine-2/</link>
		<author>Dr. Firas AL-Mukhtar, Mustafa Zuhaer Nayef AL-Dabagh</author>
		<pdflink>http://ijaers.com/uploads/issue_files/36 IJAERS-FEB-2017-55-Real-Time Face Recognition System Using KPCA, LBP.pdf</pdflink>
                
		</item><item>
		<title>The Factors of Influence towards Knowledge Sharing Among TVET Educators: A Study on TVET Educators within Hulu Langat District</title>
		<description>Similar to other higher education institutions, knowledge sharing among highly skilled instructors and other instructors is important in improving the quality of training and skills development in the Technical Vocational Education and Training (TVET) institutions. In this borderless world, information technology enables knowledge sharing activities to be carried out more efficiently, quickly and widely. Understanding the influencing factors of knowledge sharing activities in TVET institutions is important since a number of failures have been reported due to the lack of awareness in contributing new knowledge. Therefore, this study is conducted to identify the factors that influence knowledge sharing activities among instructors in TVET institutions and to propose a framework to the knowledge sharing activities. A quantitative study involving 96 respondents was conducted and the data that was analysed using multiple regression analysis found that there are four (4) factors that contribute to knowledge sharing activities in TVET institutions: organizational, content, cooperation and technological. The proposed framework is expected to assist in the development of a repository of knowledge sharing among instructors in TVET institutions.</description>
		<link>http://ijaers.com/detail/the-factors-of-influence-towards-knowledge-sharing-among-tvet-educators-a-study-on-tvet-educators-within-hulu-langat-district-2/</link>
		<author>Hanimastura binti Hashim, Hairulliza Mohamad Judi, Tengku Siti Meriam Tengku Wook</author>
		<pdflink>http://ijaers.com/uploads/issue_files/37 IJAERS-FEB-2017-53-The Factors of Influence towards Knowledge Sharing Among TVET Educators.pdf</pdflink>
                
		</item><item>
		<title>Improvement of Quality of Composite Bread by Incorporating Dual Modified Traditional Rice Flour</title>
		<description>Bakery industry is heavily depended on wheat flour due to its favorable properties. This dependency has proven disadvantageous for Bakery industry in countries where wheat cultivation is not possible. Rice flour with necessary modifications could be an ideal candidate to replace or used in combination with imported wheat flour in bakery industry. Traditional rice varieties suits best for obtaining flour since they nutritious and well adapted to the local setup. This study reports the impacts of physio-chemicals modifications of rice flour obtained from four traditional rice varieties grown in Sri Lanka in making of bread. Four traditional rice varieties namely Madatuwalu, Kaluhenati, Panchaperumal and Rathdal were selected and grains were soaked in 0.5M or 1M NaHCO3 solution for one hour followed by dehydration at 100oC for one to two hours. Functional properties of the modified rice flour such as, Water Solubility, Swelling Power and Water Absorption Index were determined. The treatments tested were shown significant effects (p &lt; 0.05) on functional properties of all four flour types. Dipping in 1M NaHCO3 solution for one hour followed by dehydration for two hours at 100oC was the best treatment and Madathuwalu was the highest performing flour type for all the functional properties. Hence, Madathuwalu was selected after the application of best treatment to develop rice flour incorporated composite bread. The results showed that composite bread developed by substituting 40% wheat flour with modified rice flour resulted in the similar sensory attributes to bread developed with 100% commercial wheat flour. </description>
		<link>http://ijaers.com/detail/improvement-of-quality-of-composite-bread-by-incorporating-dual-modified-traditional-rice-flour-2/</link>
		<author>Maheshika Peries, Kolitha Wijesekara, Seneveratne Navaratne</author>
		<pdflink>http://ijaers.com/uploads/issue_files/38 IJAERS-FEB-2017-26-Improvement of Quality of Composite Bread by Incorporating Dual Modified.pdf</pdflink>
                
		</item><item>
		<title>A Review on the Thieno [2,3-c]pyrrole-4,6-dione-based small molecules for Organic Photovoltaic Cells</title>
		<description>Solution processed small molecules have drawn attention from the researcher and give competitive alternative to the polymer counterpart due to their advantages such as well define molecular structure and high purity without batch to batch variation. By incorporating D-A concept for structural framework, the photovoltaic performance of the small molecules had a great progress in recent years. The development of thieno[2,3-c]pyrrole-4,6-dione (TPD) as building block for small molecule Donor-Acceptor (D-A) structural framework had many potential advantages. This feature article reviews summarizes the progress of TPD based small molecules in organic photovoltaic cells.</description>
		<link>http://ijaers.com/detail/a-review-on-the-thieno-2-3-c-pyrrole-4-6-dione-based-small-molecules-for-organic-photovoltaic-cells-2/</link>
		<author>Muhamad Amirul Syafiq Khairuddin, Mohd Sani Sarjadi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/39 IJAERS-FEB-2017-2-A Review on the Thieno [2,3-c]pyrrole-4,6-dione-based small molecules.pdf</pdflink>
                
		</item></channel>
</rss>