Volume 3, Issue 6

Volume 3, Issue 6

June, 2018

Review Article

1. Manufacturing of fluid container using bio-composite material

The need for renewable fiber-reinforced composites has never been as prevalent as it currently is. Natural fibers that are available in abundance in nature and can easily be produced offer properties such as strength as much as plastic, biodegradability and cost reduction. The aim of manufacturing the container is to find an alternative to materials that are not biodegradable. Fibers that have been used in the following research are of agave leaf. The results have been obtained to see whether container manufactured is safe to store fluid such as water.

Published by: Niranjan Gunnal, Onkar Shinde, Ajay Gujar, Aditya Yadav, Parag MaratheResearch Area: Bio-Composite Material

Organisation: Dr. D. Y. Patil School of Engineering, Pune, MaharashtraKeywords: Agave leaf, Bio-composite material, Fluid container

Others

2. Implementation of multi-criteria decision-making method for the selection of magnesium alloy to suit automotive application

In global competitive Environment demand of automotive industry and demand for automotive parts of the vehicle is increasing day by day for the fulfillment of customer need. The selection of suitable material plays an important role in product development for customer satisfaction. Due to wrong selection of material, increase the cost of the product as well as product failure. A better method is more important for selection of material. Due to increasing scenario in the manufacturing of automotive parts, there should be the selection of best material for manufacturing of automotive parts. In this present work, there is a selection of Mg Alloy in the automobile industry. For the proper selection of Mg alloy a TOPSIS, COPRAS, MOORA, ELECTRE and SAW Method is applied and then finally ranked the best magnesium alloy. In this proposed research work, five Method is compromised and select the best Mg alloy

Published by: Amar Soni, Diplesh Gautam, Ashutosh DwivediResearch Area: Multi-criteria Decision Making

Organisation: Vindhya Institute of Technology and Science, Satna, Madhya PradeshKeywords: MG alloy, TOPSIS, Copras, Moora, Electre, Saw, Material selection

Research Paper

3. Some investigations on EDM based hybrid machining process of metal matrix composite

The famous proverb “the necessity is the mother of invention” is highly appropriate in present manufacturing paradigm. In new age, the technology is continually becoming more advance exponentially. The advanced materials are required in many technological fields. In manufacturing many engineering components, there is requirement of materials which has high strength at high temperature, good resistance to chemical degradation, good resistance to wear and having low density. Advanced materials such as superalloys and metal matrix composites satisfy these requirements. But machining of these materials with conventional machining is difficult and sometimes impossible task. Unconventional machining processes (UMPs) such as electric discharge machining, electrochemical machining, ultrasonic machining, laser beam machining, electron beam machining etc have been developed by people to machine these materials. The performance of these AMPs can further be enhanced by hybridizing it with other conventional and unconventional processes Electric discharge abrasive surface grinding (EDDSG) is such a Hybrid UMP which can be used for machining of advanced materials. EDDSG combined EDM and conventional grinding process in a scientific way. In the present work hybrid metal matrix composite is chosen to perform numerous experiments using EDDSG. Variables were peak current, pulse-on time, sensitivity and grit number of abrasive to study the effect of control factors on material removal rate and average surface roughness. Multiple regression method has been used to develop the model for material removal rate and average surface roughness. Further, optimization has been done to achieve best performances using AI tools.

Published by: Anupam Shrivastava, Diplesh Gautam, Ashutosh DwivediResearch Area: Electric Discharge Machining

Organisation: Vindhya Institute of Technology and Science, Satna, Madhya PradeshKeywords: EDDSG, Optimization, Regression analysis, Surface roughness, Material removal rate

Technical Notes

4. CFD analysis for rate of cooling of heat sink for CPU

This paper uses CFD to identify a cooling solution for a desktop computer. In this modern world speed determines everything especially desktop PC, CPU have been popular. The computer revolution is growing rapidly in almost every field. CPU is the electronic components, which produces a lot of heat that reduces the performance. In this study the forced convection cooling of heat sinks mounted on CPU are investigated. The design is based on total chassis power dissipation. This represents significant power dissipation for the chassis components (Main processor chip, other chipsets North bridge heat sink and South bridge heat sink) the main processing chip has fin attachments (heat sink) over it for heat dissipation. There are many designs of heat sink to improve the efficiency, few heat sink designs are selected and analyzed, which would be give the maximum heat dissipation. There are many ways of cooling such as air cooling, heat pump cooling. The modified fin geometry with air cooling which is more effective and economic, since the water cooling requires water pump, a separate cooling system for coolant and a separate flow circuit. The air cooling is attained by using a cooler fan above the heat sink fins. The effect of heat dissipation and heat sink geometries are numerically analyzed by computational fluid dynamics software and fluent. The best heat sink design is selected and modified so as to attain the maximum heat dissipation. The design is able to cool the chassis with one case fan and the power supply fan. A ducted 80×60 mm CPU heat sink is able to meet the CPU temperature specification. System level design improvements were made to provide better cooling for AGP and PCI cards.

Published by: S. Lakshmanan, Ashok SaravananResearch Area: Engineering

Organisation: Gnanamani College of Technology, Namakkal, Tamil NaduKeywords: Forced cooling of the heat sink, CPU, Computational fluid dynamics

Research Paper

5. Darker side of plea bargaining: The worldwide scenario with future perspectives

Plea bargaining or plea agreement in criminal jurisprudence is an agreement or bargaining between prosecution and defendant. The defendant gives off his right to free trial and pleads guilty. It leaves both the parties better off. In simple term in a criminal case, plea bargaining is an agreement between prosecution and defendant on the basis of concession from prosecution. The plea bargaining mainly is of two types i.e. sentence bargaining and charge bargaining. In sentence bargaining, the defendant pleads guilty to a lesser sentence than prescribed. But in charge bargaining defendant pleads guilty to a lesser charge framed on him. Two other types of bargaining are there in use i.e. fact bargaining and count bargaining. In former, the bargaining is about the facts of the case. Defendant pleads guilty on condition that some facts which incriminate him are to be deleted in the trial. But in later, the bargaining is about the head or count of charge. It is beneficial that it helps to reduce the burden on trial courts, save exchequers money, fasten judicial system and provide arid from the lengthy judicial processes. The major flaw which is involved & inherent in plea bargaining is that it is used against poor and innocents. The current review provides a detailed information about the pros and cons of plea bargaining and the steps which have to be included in the current justice system to make the improvement.

Published by: Hari KishanResearch Area: Law

Organisation: Faculty of Law, University of Delhi, Chhatra Marg, DelhiKeywords: Malimath committee, Unfair trials, National accountability ordinance, VOCA, Coercive bargain, Aaron swartz

Research Paper

6. Lipid-lowering effect of aqueous leaf extract of Carica papaya on alloxan monohydrate induced male diabetic albino mice

Carica papaya leaf is considered extensively in the indigenous system of medicine as an antidiabetic agent. The current investigation focuses attention on the lipid-lowering property of the aqueous extract of Carica papaya leaves on chemically induced diabetes in albino mice. The lipid parameters studied are plasma total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), high-density lipoprotein cholesterol (HDL-C), very low-density cholesterol (VLDL-C), triglyceride (TG) and phospholipids (PL). The aqueous extract of C. papaya (250 mg/kg) reduced the total cholesterol of normal mice from 92.69±2.14 to 78.92±2.01 mg/dl 8 weeks after oral administration of the extract (P<0.05). It also significantly lowered triglycerides level from 168.32±2.17 to 115.43±4.34 mg/dl, and lowered phospholipids level in diabetic mice from 126.00±2.25 to 89.86±2.38 mg/dl.

Published by: Renu Kumari Sinha, Dr. Raghbendra Pratap, Dr. Manish Chandra VarmaResearch Area: Zoology

Organisation: University of Zoology, Tilka Manjhi Bhagalpur University, Bhagalpur, BiharKeywords: Carica papaya alloxan monohydrate, Diabetes mellitus, Hyperlipidemia

Research Paper

7. Preparation Methods and Thermal Performance of Hybrid Nanofluids

Hybrid nanofluid is another nanotechnology liquid that is blended by scattering two distinctive nanoparticles into customary thermal exchange liquid. As of late, analysts have demonstrated that mixture nanofluids can viably substitute the convectional coolant particularly those working at high temperatures. In this paper an extensive writing on the combination of half and half nanoparticles, cross breed nanofluid and thermal execution of mixture nanofluid have been incorporated and checked on.

Published by: A. Nagarajan, J. Sunil, W. AnishResearch Area: Mechanical Engineering

Organisation: V V College of Engineering, Tirunelveli, Tamil NaduKeywords: Hybrid nanofluid, thermal conductivity, nanofluid.

Case Study

8. Dietary management and challenges in a malnourished short bowel syndrome patient– A case report

We here present a rare case of the Dietary Management and Challenges in a malnourished short bowel syndrome patient. Nutritional rehabilitation with a novel dietary approach needed to improve the patient’s nutritional outcomes is narrated in this case report.

Published by: Jayalakshmi K, Ramesh S, Manimegalai BResearch Area: Nutrition And Dietetics

Organisation: Christian Medical College, Vellore, Tamil NaduKeywords: Short bowel syndrome, Semi elemental formula, Nutrition care

Review Article

9. Enhancing cloud security by analyzing venerability of cloud server in D-Dos attack

Cloud computing is the future of computing industry and it is believed to be the next generation of computing technology. Among the major concern in cloud computing are data integrity and privacy. Clients require their data to be safe and private from any tampering or unauthorized access. Various algorithms and protocols (MD5, AES, and RSA-based PHE) are implemented by the various components of this model to provide the maximum levels of integrity management and privacy preservation for data stored in public cloud such as Amazon S3. The impact of algorithms and protocols used to ensure data integrity and privacy is studied to test the performance of the proposed model. Nowadays more and more services and applications are emerging on the Internet, exposing sensitive electronic data on the internet has become easier. Web services cause’s personal data to be cached, copied, and archived by third parties, often without our knowledge or control. To provide confidentiality and privacy is very important today to enterprises and other users to use cloud services. Cloud is becoming a dominant computing platform. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers and maintain data venerability in the cloud. The major problem in clouds are load balancing and sharing the data with the particular user. In our project will propose a job scheduling and attribute base data sharing.

Published by: Vilas Rambhau BodkheResearch Area: Cloud Security

Organisation: Wainganga College of Engineering and Management, Nagpur, MaharashtraKeywords: Cloud security, Cloud server, DDos Attack, Enhancing cloud security, Analyzing venerability of cloud server

Research Paper

10. Statistics – A vast field to study and to explore

The role of statistics is very useful in every field of knowledge. Statistics make the data in a simple form and it is easy to understand. It present information into a meaningful form. The term “statistics “is derived from the Latin word “STATUS” Which means ‘for the state’. It is hardly possible to find a human activity where statistics are not used. Statistics used by government, industries, astronomy, biologist, Mathematician, and by other areas. Statistics is important because today we live in the information world. We use statistics to analyze the things in an easy way. Statistics mostly used by researcher like me. Researcher use statistics to collect relevant data. Statistics help in different fields. That's why all of us use statistics in our daily life with the help of statistics we present information easily and quickly. Farmers use statistics in their daily life they use statistics to know what amount of crops are grown this year in comparison to previous year. Education- money spends on girls in comparison to boy’s education? For making a comparison we use Statistics. Statistics has its own Significance in promoting as well as in helping at the time of odds, Statistics are not just numbers and facts. You know, things like 4 out of 5 dentists prefer a specific toothpaste. Instead, it’s an array of knowledge and procedures that allow you to learn from data reliably. Statistics allow you to evaluate claims based on quantitative evidence and help you differentiate between reasonable and dubious conclusions. That aspect is particularly vital these days because data are so plentiful along with interpretations presented by people with unknown motivations. Statisticians offer critical guidance in producing trustworthy analyses and predictions. Along the way, statisticians can help investigators avoid a wide variety of analytical traps. When analysts use statistical procedures correctly, they tend to produce accurate results. In fact, statistical analyses account for uncertainty and error in the results. Statisticians ensure that all aspects of a study follow the appropriate methods to produce trustworthy results. These methods includes: Producing reliable data, analyzing the data appropriately, drawing reasonable conclusions.

Published by: Anushri PandeyResearch Area: Management Studies And Science

Organisation: Indore Institute of Law, Indore, Madhya PradeshKeywords: Statistics, Status, Methodology, Concept, Importance

Research Paper

11. Right to information – an effective tool against corruption or just an illusion

The Right to Information Act is not a general law it is a unique set of rules having an uncommon nature in respect to rest of the laws or acts. Right to information has been made with an objective of proper transparency that provides a proper understanding of a topic in which an individual is interested. The basic objective of the right to information is to curb the issues that come during the regime of a government or any authorized body. We often express our views on the work done by the government or the actions taken by them. in old times people or citizens may only discuss at a guessing that was based on an individual’s sense of understanding or opinions, but the situation changed after the enforcement of right to information act, now you can discuss the issues as you have right to know and be aware of the action and the concept at which the proclamation is based. Proper transparency to the beneficiaries (public) from the acts of the ruling body is a need of the hour. As the corruption is at its peak, proper eradication of such big issue is important and right to information is one of the most influential and an important one. It has been made with an objective of transparency and eradication of corruption and more related topics, but this theme also comes with a sign of question marks whether it really goes as its objective are? Right to information is a fundamental right, that makes it different from other sets of acts, it is been guaranteed as per article 19 and 21 of the constitution of India. It is the part of the fundamental right to freedom of speech and expression recognized by the constitution of India and various Supreme Court decisions. It plays a major role in the attainment of economic, social and political rights of an individual as well as the community at large. Covering all the areas and sections of the countries it has been an effective tool in the recent years. Right to information is effective at each and every part of India. However, it can be said without any hesitation that India has finally woken up to realize that right to information is a key component in the attainment of all the required goals of the nation.

Published by: Saket PandeyResearch Area: Legal Studies And Research

Organisation: Indore Institute of Law, Indore, Madhya PradeshKeywords: RTI, Effects, Working, Impact over corruption, Issues, Solution, Overview

Others

12. Public-private partnerships in urban solid waste management: A review

This paper is on Public-Private Partnerships (PPP) in Solid waste management. After the bubonic plague in 1994, India tried to improve on its Solid Waste Management. The magnitude of funds required for in this area cannot be financed by the public sector alone. The private sector, therefore, has to play a major role in this sector. This paper followed the following trajectory in the understanding PPP in Solid Waste Management. First, it gives an overview of SWM in India, Second it talks about how the concept changed over time. Third, it gives the rationale for PPP in SWM. Fourth, it also issues and the different kinds of projects under SWM. Finally, it discusses the key considerations and conclusion.

Published by: Tumpa DeyResearch Area: Public Private Partnerships

Organisation: Institute of Management Technology, Hyderabad, TelanganaKeywords: Solid waste management, Public-private partnerships

Research Paper

13. Marginalization and Oppression of African American Women

African Americans have had to face many obstacles to get their standing today. First, their forefathers were brought to American colonies as slaves in 17th and 18th centuries. Then, they continued slavery for generations being treated like animals, discriminated, oppressed and marginalized. The present paper makes an attempt to study the marginalized life of colored women in Alice Walker’s novel The Color Purple and Toni Morrison’s Beloved. Being colored women, both Walker and Morrison have the advantage of portraying what it is to be a woman of color in the society. It is obvious that their slave ancestors and the years of struggle for woman rights give them the opportunity to create life-like characters in their novels. Alice Walker’s novel The Color Purple is based on a black community. She was the first major writer to make a full-fledged attack on patriarchal domination within the black community itself. Celie, a fourteen-year-old protagonist is a slave in her own home and in her own community. She is almost completely voiceless but her letters enable her to break the silence secretly that is normally imposed on her. It is a story about personal transformation and empowerment of oppressors especially black women. By reading the novel one can understand that by fighting against adversity, one can examine identity, discover selfhood and become free from the bondage of oppressive. Toni Morrison’s novel Beloved offers a painfully compelling, detailed account of slave humiliation and oppression. It tells the story of a mother, Sethe who is a black slave female formerly suffers from slavery, racism, violence, and rape. The novel describes the incessant burning, emotional conflict in the consciousness of Sethe. The horrors of slavery lead Sethe to commit an act of violence against her child. Though Sethe justifies the murder as her way of sending her children to a better existence this justification does no good to Sethe psychologically. Thus, she restores her human dignity as well as her child’s and denies the right of the whites to possess her family as slaves. The novels The Color Purple and Beloved are set in post-slavery. They are saturated with violence and other forms of oppressive behavior towards women. The women in the novels bear gender, class and racial discrimination which are often expressed through violence and sexual abuse.

Published by: G. M. MadhaviResearch Area: African American Literature

Organisation: Rayalaseema University, Kurnool, Andhra PradeshKeywords: African Americans, Racial discrimination, Gender, Colour, Slave humiliation, Oppression

Case Study

14. Endodontic and esthetic rehabilitation of a discoloured non-vital young permanent tooth- A case report

The purpose of this case report is to present the treatment of immature necrotic discolored permanent incisor with the use of apical plugs of mineral trioxide aggregate (MTA) for apexification and walking bleach technique to remove discoloration. With this technique, MTA mixture is used to create an artificial stop against which to condense gutta-percha in pulpless teeth with open apices. The report of this case confirms that MTA acts an apical barrier and can be considered as an effective material to support regeneration of apical tissue in immature necrotic teeth. The present article reports the successful bleaching of discolored non-vital, endodontically treated tooth with good prognosis

Published by: Dr. Vertika GuptaResearch Area: Dentistry

Organisation: Hind Institute of Medical Sciences, Lucknow, Uttar PradeshKeywords: MTA, Apexification, Non-vital tooth bleaching

Review Article

15. Smart materials in dentistry: A review

Smart materials have revolutionized many areas of dentistry. The quest for an ideal restorative material leads to the discovery of a newer generation of materials in dentistry called the smart materials. These materials are called smart as they can be altered in a controlled fashion by stimulus such as stress, temperature, moisture, pH, electric or magnetic field. Some of them are biomimetics and can mimic the natural tooth structures such as enamel and dentin. These materials hold a promising future in terms of improved efficiency and reliability and mark the beginning of a new era that is Smart Dentistry.

Published by: Dr. Vertika GuptaResearch Area: Dentistry

Organisation: Hind Institute of Medical Sciences, Lucknow, Uttar PradeshKeywords: Smart materials, Biomimetics

Review Article

16. Synthesis, characterization and antimicrobial screening of some new pyrazolyl bipyridinyl coumarins

The synthesis of 3-{4'-[1'''-phenyl-3'''-(pyridin-3''''-yl)-1H-pyra-zol-4'''-yl]-2',3''-bipyridin-6'-yl}coumarins (5a-c); 3-{4'-[1'''-phenyl- 3'''-(pyridin-3''''-yl) -1H- pyrazol -4'''-yl ]-2',4''- bipyridin-6'-yl} coumarins (6a-c); 3-{4'-[1'''-phenyl-3'''-(pyridin-4''''-yl)-1H- pyrazol- 4'''-yl]-2', 3''- bipyridin-6' -yl}coumarins (7a-c) and 3-{4'-[1'''-phenyl-3'''-(pyridin-4''''-yl)-1H-pyrazol-4'''-yl]-2',4''-bi-pyridin-6'-yl}coumarins (8a-c) has been carried out by the reaction of 3-(3-(1-phenyl- 3-(pyridin-3-yl)-1H-pyrazol-4-yl)acryloyl)coumarins (1a-c) or 3-(3-(1-phenyl-3-(pyridin-4-yl)-1H-pyrazol-4-yl)acryloyl)coumarins (2a-c) with appropriate 3-pyridoyl methyl pyridinium iodide salt (3) or 4-pyridoyl methyl pyridinium iodide salt (4) in the presence of ammonium acetate in refluxing acetic acid respectively under Krohnke’s reaction condition. The required 3-(3-(1-phenyl-3-(pyridin-3-yl)-1H- pyrazol-4-yl)acryloyl)coumarins (1a-c) and 3-(3-(1-phenyl-3-(pyridin-3-yl)-1H-pyra-zol-4-yl)acryloyl)coumarins (2a-c) were prepared by the reaction of various 3-acetyl coumarins with 1-phenyl-3-(pyridin-3-yl)-1H-pyrazol-4-aldehyde and 1-phenyl-3-(pyridin-4-yl)-1H-pyrazol-4-aldehyde respectively in presence of catalytic amount of piperidine in refluxing ethanol. The 3-pyridoyl methyl pyridinium iodide salt (3) or 4-pyridoyl methyl pyridinium iodide salt (4) were prepared by the reaction of appropriate appropriate acetyl pyridine with iodine in dry pyridine in refluxing toluene. The structures of all the compounds synthesized, have been supported by analytical and spectral data. All the synthesized compounds were screened for their antimicrobial activity.

Published by: Dr Jigar PatelResearch Area: Total Synthesis, Spectroscopy and Antimicrobial Drugs.

Organisation: SSR College of Arts, Science, and Commerce, Silvassa, Dadra and Nagar HaveliKeywords: Coumarins, Pyrazole, Bipyridinyl coumarin, Krohnke reaction, Antimicrobial activity

Research Paper

17. Comparison of vulnerability assessments and penetration testing

The Internet has opened unlimited avenues of opportunity by enabling organizations to conduct business and share information on a global basis. However, it has also brought new levels of security concerns and Cyber threats. It exposes valuable corporate information, mission-critical business applications, and consumer's private information to more risk than before. But the security of IT infrastructure is something that Organizations cannot afford to compromise. Vulnerability Assessment and Penetration Testing (VAPT) helps to assess the effectiveness or ineffectiveness of the security infrastructure installed by the Organizations to remain protected from the emerging Cyber threats. Hence it enables the Organizations to install patches and adopt required security measures to safeguard themselves from possible Cyber attacks.

Published by: Jaspreet KaurResearch Area: Computer Networking

Organisation: Punjabi University, Patiala, PunjabKeywords: Vulnerability assessments, Penetration testing