price : rs 250/- january - june, 2017 volume: v issue: i 2017.pdf · [ 1 ] rai journal of...

46
Volume: V Issue: I Price : Rs 250/- January - June, 2017 AQUATIC PLANTS WITH REFERENCE TO POLLUTION CONTROL • Dr. Soumen Sarkar, J.J.S.Degree College, Mihijam (SKMU), Jamtara, Jharkhand, India BIODIVERSITY PARK: AN INNOVATIVE APPROACH FOR GREEN ENVIRONMENT • Dr. Arbind kumar Singh, Jamtara College, Jamtara, Jharkhand, India APPLICATION OF LAPLACE - MELLIN TRANSFORM FOR CRYPTOGRAPHY • Mampi Saha, Ranchi University, Ranchi, Jharkhand, India SECURITY OF CRITICAL DATA IN DATABASE – AN OVERVIEW • Naulesh Kumar, Vidya Memorial Institute of Technology, Ranchi, Jharkhand, India STATUS OF CHEMICAL POLLUTANTS IN GROUND WATER IN DHANBAD (JHARKHAND) • Rakesh Ranjan, J.J.S.Degree College, Mihijam (SKMU), Jamtara, Jharkhand, India INTERNET OF THINGS (IoT): AN INTRODUCTION • Shamama Anwar, Department of Computer Science and Engineering, BIT Mesra, Ranchi, Jharkhand, India SIMULATION OF GAS TURBINE AT OFF DESIGN CONDITION • Ravi Prakash Vishwakarma, JIT Barabanki Uttar Pradesh, India • Ashish Kumar Mishra, Babasaheb Bhimrao Ambedker University, Lucknow, India ANALYSIS OF SENSITIZATION IN AUSTENITIC STAINLESS STEEL WELDED JOINT • Viranshu Kumar Singh, NIFFT, Ranchi, Jharkhand, India www.jru. edu.in [RAI J. TECH. RES. INNOV.]

Upload: others

Post on 22-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 1 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Volume: V Issue: I

Price : Rs 250/-

January - June, 2017

AQUATIC PLANTS WITH REFERENCE TO POLLUTION CONTROL • Dr. Soumen Sarkar, J.J.S.Degree College, Mihijam (SKMU), Jamtara, Jharkhand, India

BIODIVERSITY PARK: AN INNOVATIVE APPROACH FOR GREEN ENVIRONMENT • Dr. Arbind kumar Singh, Jamtara College, Jamtara, Jharkhand, India

APPLICATION OF LAPLACE - MELLIN TRANSFORM FOR CRYPTOGRAPHY

• Mampi Saha, Ranchi University, Ranchi, Jharkhand, India

SECURITY OF CRITICAL DATA IN DATABASE – AN OVERVIEW

• Naulesh Kumar, Vidya Memorial Institute of Technology, Ranchi, Jharkhand, India

STATUS OF CHEMICAL POLLUTANTS IN GROUND WATER IN DHANBAD (JHARKHAND)

• Rakesh Ranjan, J.J.S.Degree College, Mihijam (SKMU), Jamtara, Jharkhand, India

INTERNET OF THINGS (IoT): AN INTRODUCTION

• Shamama Anwar, Department of Computer Science and Engineering, BIT Mesra, Ranchi, Jharkhand, India

SIMULATION OF GAS TURBINE AT OFF DESIGN CONDITION

• Ravi Prakash Vishwakarma, JIT Barabanki Uttar Pradesh, India • Ashish Kumar Mishra, Babasaheb Bhimrao Ambedker University, Lucknow, India

ANALYSIS OF SENSITIZATION IN AUSTENITIC STAINLESS STEEL WELDED JOINT • Viranshu Kumar Singh, NIFFT, Ranchi, Jharkhand, India

ww

w.j

ru.e

du

.in

[RAI J. TECH. RES. INNOV.]

Page 2: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 2 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

THE EDITORIAL TEAM

Editor-in-Chief

• Dr. Piyush Ranjan, Jharkhand Rai University, Ranchi, Jharkhand, India

Editor

• Prof. Sudhanshu Maurya, Jharkhand Rai University, Ranchi, Jharkhand, India

Associate Editors

• Dr. Shraddha Prasad, Jharkhand Rai University, Ranchi, Jharkhand, India• Dr. Vikas Kumar Sinha, Jharkhand Rai University, Ranchi, Jharkhand, India• Prof. Anupama Verma, Jharkhand Rai University, Ranchi, Jharkhand, India• Dr. Prakash Kumar, Jharkhand Rai University, Ranchi, Jharkhand, India• Prof. Sumit Pandey, Jharkhand Rai University, Ranchi, Jharkhand, India• Prof. Ved Prakash Singh, Jharkhand Rai University, Ranchi, Jharkhand, India• Prof. Shweta Singh, Jharkhand Rai University, Ranchi, Jharkhand, India

Advisory Board

• Dr. Anwar Ahmed Khan, Ex-VC, Ranchi University, Ranchi, Jharkhand, India• Prof. Uday Kumar Nakka, Sree Chaitanya Institute of Technological Sciences, Andhra Pradesh, India• Mr. C K Mani, LOGCHAIN INDIA, India• Mr. Sudhir Kumar Thakur, HEC Ltd., Ranchi, Jharkhand, India• Dr. D K Jha, Birsa Agriculture University, Ranchi, Jharkhand, India• Mr. Ashutosh Akhauri, Founder, Being Zero, Hyderabad, India• Mr. Sujesh Sahay, Director, PT.IMR Mining Services, Surabaya, Indonesia• Prof. S N Singh, Ranchi University, Ranchi, Jharkhand, India• Dr. Renu Verma, BBA Bihar University, Bihar, India

Editorial Board

• Prof. Sachin Sharma, Aryans Group of College, Chandigarh, India • Dr. Binod K Singh, University of Petroleum & Energy Studies, Dehradun, Uttarakhand, India• Prof. Rupesh Jha, University of Padova,Italy• Prof. Aashish Mishra, B.B. Ambdekar University,Central University, Lucknow, India• Dr. Noopur Goel, Veer Bahadur Singh Purvanchal University, Jaunpur, Uttar Pradesh, India• Prof. Mahuya Deb, Guahati University, Guahati, Assam, India• Prof. Jyoti Kapoor, Tulsi College of Education for Women, Ambala, Haryana, India• Dr. Vijay Kumar Verma, Delhi University, Delhi, India• Dr. Vandana Verma, Delhi University, Delhi, India• Dr. Narendra Kumar Rana, Senior Consultant (Hydrology), Gurgaon, Haryana, India

Page 3: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 3 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

EDITOR’S DESK

Dear Readers,

It gives me immense pleasure to release Volume V, Issue I of RAI JOURNAL OF TECHNOLOGY

RESEARCH & INNOVATION (RJT), a bi-annual journal of Jharkhand Rai University, Ranchi. RAI

JOURNAL OF TECHNOLOGY RESEARCH & INNOVATION (RJT), calls Research Scholars,

Engineers, Academicians, Scientists, Industrial professionals and Researchers from all over the country

to submit their unpublished original quality work for inclusion in our issue. All submissions are

reviewed and evaluated based on originality, technical research, and relevance to journal contributions.

RJT highly welcomes theoretical, technical, research, as well as empirical papers from all

areas of research, technology, innovation and emerging trends. All the accepted articles are published

in the upcoming issue of the journal. We broadly cover research work on next generation cutting

edge technologies and effective marketing strategies. Writing a research paper is a skill and RAI

JOURNAL OF TECHNOLOGY RESEARCH & INNOVATION (RJT), has the team of Scientists

and Academicians who are dedicated to help, learn and improve that skill by providing guidance for

writing high quality research papers. In depth evaluation of each research paper is a prime focus of

every member of RAI JOURNAL OF TECHNOLOGY RESEARCH & INNOVATION Reviewer

Panel, ensuring the novelty in each research manuscript being published. This journal aims to cover the

scientific research in a broader sense and not publishing a niche area of research facilitating researchers

from various verticals to publish their papers. It is also aimed to provide a platform for the researchers

to come up with neo dynamics of technologies and sciences, enabling them to continue further.

Finally, from learning the process of editing the journal, assigning reviewers and giving

feedback to the authors, I understand the daunting prospect behind one’s manuscript publication. But

not at the expense of demoralizing the authors, while submitting the papers. The improvement areas are

pointed out through review process, which, I am sure this helps in enriching the research papers.

This edition of our Journal is in the hands of our distinguished readers whom we value most. I

invite your opinion and suggestions so that we can better its quality in the publication of later issue.

Wishing you good luck!

(Prof. Sudhanshu Maurya)

Editor

[email protected]

Page 4: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 4 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

CONTENTS

AQUATIC PLANTS WITH REFERENCE TO POLLUTION CONTROL ............................................................. [5] • Dr. Soumen Sarkar, J.J.S.Degree College, Mihijam (SKMU), Jamtara, Jharkhand, India

BIODIVERSITY PARK: AN INNOVATIVE APPROACH FOR GREEN ENVIRONMENT .............................. [9] • Dr. Arbind kumar Singh, Jamtara College, Jamtara, Jharkhand, India

APPLICATION OF LAPLACE - MELLIN TRANSFORM FOR CRYPTOGRAPHY ........................................ [12] • Mampi Saha, Ranchi University, Ranchi, Jharkhand, India

SECURITY OF CRITICAL DATA IN DATABASE – AN OVERVIEW............................................................... [18] • Naulesh Kumar, Vidya Memorial Institute of Technology, Ranchi, Jharkhand, India

STATUS OF CHEMICAL POLLUTANTS IN GROUND WATER IN DHANBAD (JHARKHAND) ................... [24] • Rakesh Ranjan, J.J.S.Degree College, Mihijam (SKMU), Jamtara, Jharkhand, India

INTERNET OF THINGS (IoT): AN INTRODUCTION ..................................................................................... [28] • Shamama Anwar, Department of Computer Science and Engineering, BIT Mesra, Ranchi Jharkhand, India

SIMULATION OF GAS TURBINE AT OFF DESIGN CONDITION ................................................................. [32] • Ravi Prakash Vishwakarma, JIT, Barabanki Uttar Pradesh, India

• Ashish Kumar Mishra, Babasaheb Bhimrao Ambedker University, Lucknow, India

ANALYSIS OF SENSITIZATION IN AUSTENITIC STAINLESS STEEL WELDED JOINT ........................... [38] • Viranshu Kumar Singh, NIFFT, Ranchi, Jharkhand, India

Page 5: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 5 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

AQUATIC PLANTS WITH REFERENCE TO POLLUTION CONTROL

*Assistant Professor, J.J.S.Degree College, Mihijam (SKMU), Jamtara (Jharkhand)

*Dr. Soumen Sarkar

ABSTRACTThe qualitative and quantitative analysis of water is the basic and most important step to reveal the nature of a specific environmental problem. The problem of water pollution has certainly been a great cause behind a number of diseases among rural and urban habitants. Innumerable diseases coming out of water pollution have ruined the health of rural people indeed. The present paper deals with the study of pollution torrent aquatic plants growing in and around Jamtara district in the state of Jharkhand. The work is based on compilation and documentation of 32 aquatic and semi aquatic plants belong to 22 families. A field survey of the research site was carried out regularly to know the floristic features consisting of habitat, botanical name, vernacular name, family and their brief description. Some of the flora can be commonly used for removal of pollutants from the water bodies and can be cited as boon for the aquatic environment as well as human civilization.

Keywords: Aquatic plants, Pollution, Jamtara, Jharkhand, Heavy metals

1. INTRODUCTION

Knowledge of the qualitative and quantitative composition of water is the first step to reveal the nature of the particular environmental problem. One of the most important environmental areas is the quality of life giving water. The present paper deals with the selection of pollution tolerant aquatic plants growing in the water environment of Jamtara district in Jharkhand state. The systematic analysis was carried out which has revealed the presence of 32 aquatic and semi-aquatic plants comprising both monocots and dicots. The collected species have been documented and arranged alphabetically depicting the available local names, family, and mode of pollination, flowering periods, dominance and distributional pattern. The following species are found to grow abundantly in this locality, e.g. Ceratophyllum demersum, Eichhoruia crassipes, Hydrilla verticillata, Nymphaea mouchali, Nymphoides indicum, Pistia stratiotes, Utricularia flexuosa, Vallisneria spiralis and different species of Cyperus. Plants like Pistia stratiotes, Eichhornia crassipes and Hydrilla verticillata have already proved to be as Hg (II) and Cr (VI) accumulators. These plants can be utilized for removal of the heavy metal pollutants from the polluted water bodies without endangering the lives of other flora and fauna. It may be concluded that these aquatic plants, which employ solar energy, can be utilized for the scavenging of heavy metals from waste water for water purification.

Water is one of our basic natural resources. It is essential for life in both the biochemical and biophysical senses and its influences are both internal and environmental. It is not only the most abundant single substance in the biosphere but probably is the most remarkable as well. The water environment can generally be characterized as a dilute, aqueous solution, containing a large variety of organic and inorganic chemical species, dissolved and in suspension, and including a variety of plant and animal life.

Page 6: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 6 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

2. MATERIALS AND METHODS

3. RESULTS AND DISCUSSIONS

Jamtara district lies between 23°10′ and 24°05′ north latitudes and 86°30′ and 87°15′ east longitudes. It is located at a lower altitude of Chhotanagpur Plateau. The present work is a part of regular visit of the research sites, preferably at the interval of 15 – 20 days for collection and identification of plants for further study. During the survey, samples were collected, photographed and identified as per the rules and guidelines of Botanical Survey of India. They were dried and preserved by using standard herbarium techniques. Botanical names, common names, families, and floral characters were also recorded. Some stress was given on their ethno-medicinal and economic importance also.

During the present work, total 32 aquatic plants with pollution torrent properties were studied which were belonging to 22 families but these under mentioned 16 plants belonging to 15 families were most abundant in the studied areas which have been listed below:

S.No Botanical Name ( Family )

Local Name

Habitat Plant description

1. Oxalis corniculata(Oxalidaceae )

Amrul,Tinpatta

Marginal

Small , prostrate or sub - erect trailing herb ,rooting at the nodes, leaves trifoliate petiolate , leaflets obovate , emarginated sparsely hairy , flowers soliatary , yellow in simple umbel , stamens 10 , alternately long and short , connate at the base.

2.Oldenlandia corymbosa(Rubiaceae)

Khetpapra Marginal

Annual , glabrous and prostrate herb ; dichotomously branched , rooting at the nodes ; leaves linear , lanceolate ; flowers white , 1 or 2 at each node ; capsules didynamous , seeds angular.

3.Hygrophila auriculata(Acanthaceae)

Kullikhara Marginal

Erect marshy and annual undershrubs with axillary spines; stem angular in young stage; leaves sessile, oblong, lanceolate with long sharp spines at each node; flowers bright blue or bluish purple.

4. Alternanthera sessilis(Amaranthaceae)

Gurundi Marginal

Prostrate , glabrous herbs with roots at the nodes ; leaves elliptic , linear and oblong ; flowers white , shining in small axillary clusters ; tepals almost equal ; stamens 3 – 5,alternating with staminodes;utricles obcordate , compressed and one seeded.

5.Ranunculus scleratus (Ranunculaceae)

Jaldhania Marginal

Erect, annual herb, glabrous, stem succulent, hollow deeply furrowed. Leaves simple, sessile, radial, reniform, long, petiolate , tri-partite. Flowers small, white or yellowish white numerous and terminal. Calyx reflexed. Petals oblong with a basal pit or scale. Stamens indefinite.

6.Ammannia baccifera(Lythraceae )

Dadmari Marginal

Annual , erect , glabrous , marshy herb ; stem quadrangular and hard ; leaves opposite , decussate almost sessile , lamina narrow at the base ; flowers deep red in dense axillary cyme ; sepals 4 , petals minute or absent , stamens 4 ; fruits globose and irregularly dehiscing.

Page 7: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 7 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

7.Spillanthes acmella ( Asteraceae )

Akarkara Marginal

Herb with long week stems creeping at the base. Sometimes erect or ascending; leaves simple, petiolate , opposite , ovate ; pretty yellow heads with very prominent centre.

8.Eclipta prostrate ( Asteraceae )

Bhingraj Marginal

Prostrate or ascending annual herb ; often rooting at nodes ; stem hairy ; leaves opposite , sessile , oblong – lanceolate or linear – lanceolate , entire or serrate ; heads white , heterogamous ; pappus usually absent.

9.Rumex dentatus( polygonaceae)

Jangli palak Marginal

Erect , annual herbs , 20 to 25 cm high ; leaves oblong , obtuse, petiolate ; flowers green in leafy or leafless whorls ; perianths in 2 whorls ( 3 + 3) , toothed.

10.Ipomea aquatica (Convolvulaceae)

Kalmisag Immersed

Floating or trailing, amphibious herbs, rooting at the nodes stems fistula and soft. Leaves elliptic or ovate-oblong, flowers pale pink with a dark purple eye, solitary or 2-5 flowered peduncled cymes. Sepals unequal. Petals funnel shaped. Capsules globose.

11.Nymphoides indicum (Menyanthaceae)

Kumudni Immersed

Rooted, rhizomatous, floating herbs. Leaves leathery, orbicular-peltate; veins arising from the base of lamina, flowers dimorphic, white with yellow centre, in clusters at the base of the petiole. Sepals and petals both ovate lanceolate. Capsules subglobose. Seeds numerous.

12.Centella asiatica( Apiaceae )

ThankuniGotakola

Immersed

Creeping herbs with long roots at nodes; stems slender, creeping stolons, green in colour ; leaves long stalked , petioles long ; flowers minute , white or pinkish white in compound umbels ; fruits globose, seeds brown and oblong.

13.Ludwigia adscendens(Onagraceae)

Labangi ImmersedLong stem with obovate leaves, flowers whitish or pale creamy coloured , sepals lanceolate, seeds smmoth.

14.Utricularia aurea( Lentibulariaceae )

Jhangi Submerged

Stolons much branched and submerged ; leaves simple , whorled at top and spiral along the stem, segments filiform , small sub–globose bladder at the base of each pinna ; flowers yellow , in 3 to 8 flowered serial recemes , petals 2 ; capsules globose seeds narrowly winged.

15.Eichhornia crassipes (Pontederiaceae)

Jalkumbhi FloatingLeaves smooth glossy bright green, broad and large, flowers violet blue, roots free and fibrous.

16.Marselia quadrifolia(Marseliaceae)

Susni saag MarginalRhizomes branched at leaf base, leaves showing circinate venation, petioles long and week with 4 leaflets of equal size.

Page 8: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 8 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

4. CONCLUSION

REFERENCES

Aquatic plants play very significant role in removing pollution and making our environment green and clean. They should not be regarded only as weedy floras but they are also significant in the field of medicines and for so many purposes. The most invasive and troublesome weed Eichhornia crassipes has vast property to absorb heavy metals and they can be used in biogas production and for reducing pollution.

1. Bhowmik et al (2013), “ Ethno-medicinal and phytochemical screening of some hydrophytes and marsh plants of Tripura.”

2. Bornette G. & Pujalon S.(2011), “Response of aquatic plants to abiotic factors: a review.”Haines ( 1978),“ Botany of Bihar and Orissa.”

3. Kulshrestha SK (2005), “Biodiversity conservation of Fresh water ecosystem in India.”

4. Naskar ( 1990) , “ Aquatic and semi-aquatic plants of lower Ganga delta.”

5. Verma S. & Khan JB.( 2014), “Biodiversity assessment of Aquatic plants in Jhunjhunu district of Rajasthan , India.”

Page 9: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 9 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

BIODIVERSITY PARK: AN INNOVATIVE APPROACHFOR GREEN ENVIRONMENT

*Jamtara College, Jamtara (Jharkhand)

*Dr. Arbind Kumar Singh

ABSTRACTThe present paper deals with innovative and sustainable approach of green environment with reference to conservation of biodiversity and by creation of biodiversity Park. Biodiversity is an urgent need of today and tomorrow. It encompasses not only ecosystems population and species but the different subunits of species, each possessing unique characteristic attributes. Protection and conservation of biodiversity is not only a matter of emotion or aesthetics but it is very important for human as well as the entire ecosystem. We have already lost many species that once flourished in this environment. If not properly conserved, the present biodiversity will be drastically reduced in the face of the rapid development that is taking place. The monitoring of biodiversity is an important aspect to realize the sign of changes. But such a monitoring cannot be done without creating a database of flora and fauna of the areas concerned. Biodiversity Park would serve the objectives of all the above issues in future. The main objective of such kind of park is to conserve the biodiversity of the specific area and to maintain the genetic stock available therein. In biodiversity Park, special thrust is also to be given for the conservation of rare, threatened and endangered species. The present work compiles aims and objectives of establishing a biodiversity park and its importance for the whole arena of universe.

Keywords: Biodiversity, Biodiversity Park, Conservation

1. INTRODUCTION

Biodiversity is the variability among living organisms including terrestrial, marine and aquatic ecosystems and the ecological complexes. This includes diversity within species, between species and of ecosystem. It forms the foundation of the vast array of ecosystem services that critically contribute to all human beings. Biodiversity is important in human managed as well as natural ecosystems. It is the foundation of ecosystem services to which mankind is intimately linked. The term ‘biological diversity’ or ‘biodiversity’ refers to the variety of life on Earth. It denotes to the wide variety of ecosystems and living organisms as animals, plants, their genes and habitats. The earth and evolution processes are very ancient phenomena. The concept of biodiversity has its origin in the threshold of 1970. It is crucial for the functioning of ecosystems like oxygen, food, fresh water, fertile soil, medicines, shelter, protection from storms and floods, stable climate and recreation.

The word “biodiversity” is a contracted form of the term ‘biological diversity’. The Convention on biological diversity defines biodiversity as: “the variability among living organisms from all sources including, inter alia, terrestrial, marine and other aquatic ecosystems and the ecological complexes of which they are a part; this includes diversity within species, between species, and of ecosystems.”

Thus, biodiversity includes genetic variation within species, the variety of species in an area, and the variety of habitat types within a landscape. Biological diversity is of fundamental importance to the functioning of all natural and human-engineered ecosystems, and by extension to the ecosystem services that nature provides free of charge to human society. Living organisms play central roles in the cycles of major elements (carbon, nitrogen, and so on) and water in the environment, and diversity specifically is important in that these cycles require numerous interacting species.

Page 10: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 10 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Loss of biodiversity not only reduces the availability of ecosystem services but also decreases the ability of species, communities, and ecosystems to adapt to changing environmental conditions. Biodiversity is nature’s insurance policy against disasters. Some people also include human cultural diversity as part of the earth’s biodiversity. The variety of human cultures represents numerous social and technological solutions to changing environmental conditions.

Biodiversity Parks are unique landscapes of wilderness where ecological assemblages of native species in the form of biological communities are recreated and maintained over few hundred hectares of degraded or marginal lands. In other words, Biodiversity Parks are nature reserves that harbor natural heritage of the area and have conservation, educational and cultural values and enhance the quality of environment in urban centers. The underlying principle of the Biodiversity Park is to recreate self sustaining ecosystems with native flora and fauna characteristic of the area for enhancing the quality of urban environment

2. ROLE OF BIODIVERSITY PARK

Biodiversity Park is nothing but the effort to make balance between the nature and the mankind. As it is clear that the most important factor behind extinction and disappearance of any flora and fauna is human population and such kind of unbalance has disturbed the whole ecological and biological world. Biological diversity is a precious usual resource intended for the continued existence of mankind, a slow decrease of which might consequence inside vanishing of class economic worth in the direction of the person contest. The imperfect protection resources obtainable have to be listening carefully tactically on top of opportunities probable toward give way the most conservation advantage. Conserving biodiversity is concerned with restoring the equilibrium between humans and atmosphere.

The Biodiversity Park has been established keeping in view so many points regarding conservation of flora and fauna. Some of the important roles of Biodiversity Park are as:

• It serves as nature reserve for the conservation of natural heritage of the city.

• It enhances the quality of urban environment.

• It serves as hub for education, cultural and conservation activities.

• It connects biodiversity to the city and people.

• It promotes eco-tourism.

• It creates livelihood for local communities.

• It serves as living laboratory for understanding the ecological processes and functions.

• It buffers the local weather and serves as sink for Carbon-di-oxide and urban pollutants and serves as adaptation to climate change.

• It preserves the rare endemic and threatened plant and animal species of the area.

Page 11: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 11 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

3. AIMS AND OBJECTIVES

4. DISCUSSION AND CONCLUSION

REFERENCES

The establishment and development of a biodiversity park has some aims and objectives. Such kind of park is not only the centre of recreation but also the centre of conservation of all kinds of flora and fauna including the extinct and endangered one. Some of the important aims for development of Biodiversity Park are as:

• To conserve the genetic stock available at the existing site of the park

• To select the species of rare, threatened and endangered plants of Jharkhand /India whose population has dwindled considerably in their natural habitat and are likely to get extinct, if suitable conservation measures are not taken immediately

• To establish a Botanical Garden for public awareness and environmental education with special emphasis to economically important and endangered species of the region

• To compile the relevant data to prepare and publish “Green Book” for the species which have been conserved and multiplied successfully in the botanical garden of the park

• To provide a suitable research/education ground for the local public, students and researchers in order to understand the biodiversity of Jharkhand and the local ecosystem

Biodiversity Park has been the necessity and integral part of our environment for proper functioning and existence of ecological world. Biodiversity is the heritage of nature and it should be conserved both for welfare of the human population in particular and the natural environment in general. The establishment of Biodiversity Park is one of the innovative and positive approaches to promote the conservation of natural resources in urban matrix. Due to increasing industrialization, human population, overgrazing and urbanization, the biological diversity needs strong management strategies and the establishment of Biodiversity Park is one of the strongest efforts in this field. It is necessary for protection, conservation, propagation and extension of the genetic resources of the ecosystem. It needs technical and other important inputs too. A biodiversity park must have plants and propagules of different species, collected from all the parts keeping in view that they are also the integral part of this atmosphere. Much more stress should be given on the endangered and threatened species.

1. C.R.Babu (2012), “Biodiversity Parks : An Innovative approach for conservation of natural heritage and enhancement of quality of urban environment”. Centre for environmental management of degraded ecosystem.

2. Chaudhury, K. (2008). Diversity and Phytosociological Analyses of North Andaman Forests with Special Reference to RS and GIS, Ph.D thesis submitted to University of Calcutta.

3. Champion, H. G. and Seth, S. K. 1968. Revised forest types of India, Govt. of India Publication, and New Delhi.

4. Cardinale, B. J. 2011, Biodiversity improves water quality through niche partitioning. Nature 472, 86–89.

5. Jharkhand Biodiversity Board project, 2012.

6. R.K.Sahu (1992), “Megabiodiversity of India”.

Page 12: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 12 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

APPLICATION OF LAPLACE - MELLIN TRANSFORM FOR CRYPTOGRAPHY

*Department of Mathematics, Ranchi University, Ranchi, Jharkhand

*Mampi Saha

ABSTRACTEvery living thing needs protection. In India, we are facing various types of crimes. Among which, cyber crime is becoming very challenging task for all over the world. Many software companies makes various application to protect our data or information from hackers . According to survey in 201, there were around 13,301 cases of cyber crime reported in the country but in 2015 we already have over 3,00,000 cases and it’s increasing 300% in 3 years. So, it is very important to secure the internet and other form of electronic communications such as sending private emails, mobile communications, Pay-TV, transmitting financial information, security of ATM cards, computer passwords etc, which touches on many aspects of our daily lives. In this paper, we discuss the application of Laplace - Mellin transformation for cryptography.

Keywords: Cryptography, Data encryption, Applications to coding theory and cryptography, Algebraic coding theory, Laplace - Mellin transforms

1. INTRODUCTION

2. DEFINITION

‘Cryptography is the art of achieving security by enclosing messages to make them non – readable’. Some common terms belonging to the process of Cryptography are as below:

• Plain text: The original message, which written by user.

• Cipher text: It is the coding form of plaintext.

• Encryption: The process of obscuring information to make it unreadable without special knowledge.

• Decryption: The process of converting cipher text into plaintext.

• Cryptography: The art of devising the cipher.

2.1 Laplace Transformation: The Laplace Transformation has a long history of development. It is defined by the Pierre Simmon Marquis De Laplace. The Laplace Transformation is very effective device in Mathematic, Physics and other branches of science which is used to solving problem.

Let be the function of variable , . Laplace Transformation is defined as

Page 13: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 13 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

3. MAIN RESULTS

where, is Kernel of the Laplace Transformation .Where s is the parameter, . The inverse of Laplace Transformation is defined by

2.2 Mellin Transformation: This Transformation was introduced first time when Riemann studied famous Zeta function. But R.H Mellin gave its systematic formulation of the transformation. Also he developed its theories and field of application.

Let be any function defined on variable, where m belongs . The Mellin Transformation is defined as

where, is Kernel of the Transformation of Mellin Transformation; is the parameter, . The inverse of Mellin Transformation is defined by

2.3 Some Results for Laplace and Mellin Transform

3.1 EncryptionWe consider standard expansion

Where, is a constant and is an Euler number, we take .

Page 14: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 14 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

E0 = 1E2 = −1E4 = 5E6 = −61E8 = 1385E10 = −50521E12 = 2702765E14 = −199360981E16 = 19391512145E18 = −2404879675441

We allocated 0 to ‘a’ and 1 to ‘b’ then ‘z’ will be 25, A to Z take 26 to 51, Space bar takes code 52, and last number 0 to 9 takes 53 to 62. Now we start coding, let given message ‘E Crime16’. First convert it in secret code, like

We take function as:

First, take Laplace - Mellin Transform both sides:

Page 15: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 15 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Where,

We assume and the quotient and reminder of the term of above series , where n=1,2,3,….

So, code states be change in

Put the value of Euler number, calculated all value and at last take mod 63 with all entries.

We changed all remainder to positive:

Hence the message ‘E Crime16’ converted into ‘pzCr94ejx’.

Page 16: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 16 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

THEOREM 1.1: is the term of plaintext for , it convert into cipher text with keys , for by using Laplace- Mellin transform.

The function which we take,

3.2 Decryption

We have received message as ‘pzCr94ejx’ which is equivalent to

Our assumption function is of Euler numbers (it’s is alternative series), so we should change 2nd, 4th, 6th and 8th terms to negative, then we get-

We take inverse Laplace – Mellin Transform (first, we take inverse Laplace transform and after reducing equation we again take inverse Mellin transform ) , then above equation become

Hence the message change cipher text to plain text.

THEOREM 1.2: is the term of cipher text for , it convert into plain text with keys

, for by using Laplace- Mellin transform.

The function which we take

Where

Where

Page 17: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 17 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

4. CONCLUSION

In the proposed work, a new cryptographic scheme has been introduced using Laplace-Mellin transform and the key is the number of multiples of mod ‘n’. Therefore it is very difficult for an eyedropper to trace the key by any attack.

REFERENCES

1. Barr T.H. – Invitation to Cryptography, Prentice Hall, 2002.

2. Blakley G.R. –Twenty years of Cryptography in the open literature, Security and Privacy May 1999, Proceedings of the IEEE Symposium, 9-12.

3. Debnath L, Bhatta D. Integral Transforms and Their Applications, Chapman and Hall/CRC, First Indian edn., 2010.

4. G. Naga Lakshmi, Ravi Kumar B. and Chandra Sekhar A. – A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2(12), 2011, 2515-2519.

5. Hiwarekar A.P.- A new method of Cryptography using Laplace transform, International Journal of Mathematical Archive-2(12), 2012, 1193-1197.

6. Hiwarekar AP. A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive 2013; 4(2): 208-213.

7. Hiwarekar AP. Application of Laplace Transform for Cryptographic Scheme. Proceeding of World Congress on Engineering 2013; II, LNCS, 95-100.

8. Hiwarekar AP. New Mathematical Modeling for Cryptography. Journal of Information Assurance and Security, MIR Lab USA, 2014; 9: 027-033.

9. Overbey J, Traves W, Wojdylo J. On the Keyspace of the Hill Cipher, Cryptologia, 2005; 29: 59-72.

10. Ramana BV. Higher Engineering Mathematics,Tata McGraw-Hills, 2007.

11. Saeednia S. How to Make the Hill Cipher Secure. Cryptologia 2000; 24: 353-360.

12. Stallings W. Cryptography and network security, 4th edition, Prentice Hall, 2005.

13. Stallings W. Network security essentials: Applications and standards, first edition, Pearson Education, Asia, 2001.

14. Stanoyevitch A. Introduction to cryptography with mathematical foundations and computer implementations, CRC Press, 2002.

15. Sudhir K. Pundir and Rimple – Theory of Numbers, Pragati Prakashed, 2006.

Page 18: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 18 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

SECURITY OF CRITICAL DATA IN DATABASE – AN OVERVIEW

*Vidya Memorial Institute Of Technology, Tupudana, Ranchi, Jharkhand

*Naulesh Kumar

Today, it is imperative for enterprises to know which specific threats they are trying to protect against and take stringent measures to address those threats. A networks to bring complete data privacy to the enterprise has been proposed in this paper. With this Network Data Secure Platforms, organizations can protect critical data from both internal and external threats, and ensure compliance with legislative and policy mandates for security. Data Secure features a dedicated security appliance and specialized software that enables organizations to encrypt data in applications and databases. Using the proposed technique organizations can protect critical data from both internal and external threats, and ensure compliance with legislative and policy mandates for security. The administrators are encouraged to focus on developing key management and administrative policies for their organizations that will provide maximum security.

Keywords: Database, Network Data Security, Encrypt, Security

1. INTRODUCTION

In current scenario number of problem arises with the security of documents, files and important data. So, there is a need to have a technique to protect the documents and which avoids the unauthorized access of data in an unsecure communication environment.

There are various techniques which are used to keep the data confidential from hackers. Some of these are passwords, cryptography and biometrics. Passwords are not so good for this task due to their low entropy. Biometrics technique produces harmful effects on the human beings and it is too costly. For these above problems cryptography is the best solution for security. A plaintext is a message to be communicated in a secret way. Encryption is the process of creating a cipher text (hidden data) from a plaintext and decryption is the reverse process of encryption, where cipher text is converted into plaintext. The study of encryption and decryption is called cryptology and cryptography is the application of them. For encode, a plaintext changes the plaintext into a series of bits or numbers alpha-numeric may be used which include A to Z and 0 to 9 values. The most common method of encoding a message these days is to replace it with its ASCII value, which is an 8 bit representation for each symbol. The process of decoding turns bits or numbers back into plaintext is called decryption. Cryptography is best method to protect data and Important files from unauthorized parties. It is the science of writing the data in secret code and about the design and analysis of mathematical techniques that is enables secure communication in the presence of millions adversaries.

ABSTRACT

Page 19: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 19 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

2. OBJECTIVES

3. RESEARCH METHODOLOGY

For achieving the data security encryption is the most effective way everywhere and everyplace where security is need. The process of hiding the contents of a message in such a way that the original information is recovered only through a decryption process is called encryption. The purpose of Encryption is to prevent unauthorized parties from viewing crucial information. An encryption occurs when the data is passed through some substitute technique like shifting technique, table references or mathematical operations. A different form of data is generated through these processes. The unencrypted data is called plaintext and the encrypted data is called cipher text. This represents the original data in a difference form. Encryption key is use to encrypt the original message which depend upon key based algorithms.

There are two general categories for key based Encryption algorithm first one is called Symmetric Encryption (SE) which uses a single key to encrypt the message and decrypt the message. Second is Asymmetric Encryption (AE) which uses two different keys a public key to encrypt the message, and a private key to decrypt the message. There are several different types of key based Encryption algorithms such as DES, RSA, PGP, Elliptic curve but all of these algorithms depend on high mathematical manipulations.

As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations to begin encrypting data inside the enterprise. KUMARNET offers breakthrough solutions that make it practical to encrypt critical data, and ensure it’s secured throughout an organization. With this Data Secure Platforms, organizations can better ensure that they are compliant with legislative and policy mandates for security, and eliminate the risks of a breach. KUMARNET Data Secure Platforms deliver comprehensive security capabilities:

• Encrypt critical data in Web servers, application servers, and databases.

• Ensure all access to critical data is carefully managed, logged, and controlled.

• Administer keys and policies in a secure, centralized fashion.

• Ensure security processing is highly scalable and reliable.

Data Secure encrypts data in the database at the column level, and can be used to secure such information as credit card numbers, social security numbers, passwords, account balances, and email addresses. Data Secure significantly streamlines the administrative tasks involved in database encryption—it automates much of the configuration and implementation process and it can be deployed without any disruption to the applications tied to the database. The KUMARNET Data Secure Platform is comprised of three components:

• The Data Secure appliance, a dedicated hardware system,

• The Network-Attached Encryption (NAE) Server, which runs on the Data Secure appliance.

• The KUMARNET NAE Connector, software that is installed on the Web, application, or database server.

The NAE Connector features standards-based cryptographic interfaces that allow the protection of user-defined data through integration of security functions at the business logic layer. These small software components are installed on each database that has a need to interface with the Ingrian appliance, and they initiate encrypt and decrypt operations.

3.1 Database Integration Process

Page 20: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 20 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

4. ANALYSIS AND INTERPRETATION

4.1 How it Works

Integrating the Data Secure platform in your existing database infrastructure is a straightforward, automated process. The NAE Connector component outlined above consists of complete code to manage a seamless interaction between the database and the Data Secure platform. The Data Secure appliance features a secure, Web-based user interface that walks administrators through a step-by-step configuration process and, once parameters have been set, even automates the installation of the required NAE Connector software on the database. Once installed and configured, the NAE Connector dynamically generates all the necessary stored procedures and functions to:

• Encrypt and decrypt data on demand from inside the database.

• Migrate data from plaintext to cipher text and change the database schema to accommodate encrypted columns.

• Rotate cryptographic keys.

• Automate subsequent encrypt and decrypt operations.

• Authenticate users so that only authorized users are able to access sensitive data.

This transparent integration means that you can continue using your existing SQL statements without having to modify them. And, more importantly, you do not have to write any of the logic to perform encrypt or decrypt operations from your database. Following is a high-level diagram outlining how the solution is deployed.

Relational database

Fig 1: High Level View of Implementation with KUMARNET Data Secure Platforms

Connector

Page 21: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 21 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

The diagram above shows a Web server accessing an application server, which is making a call to a database to access sensitive data. The NAE Connector is installed in the database and the sensitive data is stored in encrypted format within the database. The user who requests the sensitive data must have permission within the database to make a request to the NAE Connector. That user must also have access to the requested key on the NAE Server. If either of the conditions above is not met, then the user is not given access to the sensitive data. If the user is authorized to use the requested key for decryption, then the NAE Server performs the decrypt operation on the sensitive data. The decrypted data is then passed back to the database. The Data Secure appliance is the physical device where cryptographic operations and key management operations are performed. Different hardware platforms provide varying capabilities for performance and FIPS compliance. The NAE Server and all cryptographic keys reside on this hardened security system.

4.2 How Does Data Get Encrypted?

Before implementing Data Secure in your enterprise, your sensitive data is most likely being stored as plaintext, so the logical question is: how do you migrate plaintext data into encrypted format? The process is straightforward, and, as mentioned above, KUMARNET automates this process through the Data Secure appliance’s GUI. To illustrate the simplicity of the process, take social security numbers as an example. If you have a table called CUSTOMER that stores sensitive customer data like names, addresses, and social security numbers, you might want to encrypt the social security numbers. Your original CUSTOMER table might look like this:

SQL> select * from CUSTOMER;

Table 2.1. Sensitive Data Is Stored In the Column SSN.

NAME SSN ADDRESS CITY STATE ZIP

Ranjan 123456789 Ranchi Ranchi Jharkhand 835220

Nitin Mohan ABC246809 Delhi Delhi Uttar Pradesh 110030

N.Kumar BIT1018-04 Belly Rd. Patna Bihar 800001

Raj kiran HCL04CS16 Kakinara Andhra Andhra 630032

The first step in the process of securing your sensitive data is to identify what data you want to secure and where that data resides. In this example, social security numbers are stored in a column called SSN. Once you have identified the sensitive data, you can configure KUMARNET to automate this data protection process. During the first step, KUMARNET renames the table in which the sensitive data resides; the table must be renamed so that a view can be created later with the same name as the original table.

In the next step, KUMARNET creates a temporary table and exports the sensitive data to that temporary table. Notice in Figure 4 below that SSN is the only column exported to the temporary table from the original table. The Row_ID column is added automatically and used later when returning the encrypted data back to the original table. The values in the column that held the sensitive data in the CUSTOMER_ENC table (remember—the CUSTOMER table was renamed) are set to null to avoid any data conversion issues that might arise when changing the data type in a later step.

Page 22: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 22 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Before Ingrian can populate the original column with encrypted data, it must modify the column size and data type because encrypted data is predictably larger than plaintext data, and most likely, your social security numbers are stored as some sort of integer or character data type. Although KUMARNET gives you the option to store your encrypted data in Base64 encoded format, it is recommended that you store your encrypted data in binary (the default choice during configuration) because binary data is smaller than Base64 encoded data and there is less overhead with binary because the system does not have to encode and decode data with every encrypt or decrypt operation.

Once the column is modified, KUMARNET can migrate the sensitive data back into the CUSTOMER_ENC table. Before the data is imported back into the CUSTOMER_ENC table, however, the NAE Connector sends the data to the NAE Server, where the data is encrypted. The NAE Server returns the encrypted data to the NAE Connector, which then inserts the encrypted data into the CUSTOMER_ENC table.

SQL> select *from CUSTOMER_ENC;

NAME SSN ADDRESS CITY STATE ZIP

Ranjan [B@ 388993 Ranch Ranchi Jharkhand 835220

NitinMohan [B@ b8f82d Delhi Delhi Uttar Pradesh 110030

N.Kumar [B@ 1d04653 Belly Rd. Patna Bihar 800001

Rajkiran [B@b8f82d kakinara Andhra Andhra 630032

4.3 How Do You Automate Subsequent Updates and Inserts?

Once your table and column are able to accommodate encrypted data, KUMARNET automates encryption and decryption of data by creating a view, triggers, and stored procedures that are generated during configuration to work with the NAE Connector. In this way, properly authenticated applications outside the database can continue to query and update the same database tables as before. The NAE Connector remains transparent to outside applications, and, more importantly, the amount of code changes necessary to integrate the NAE Connector is minimal. When sensitive data is accessed, the view is instantiated by the database and populated with decrypted data from the CUSTOMER_ENC table. Because the view has the same name as the original table, all SQL statements that reference the encrypted data can function regularly without modification. Likewise, triggers trap all the inserts and updates executed on the view. If an insert statement is detected, a new insert statement is generated based on the original insert values. The social security number in this case is encrypted before insertion into the base table. Similarly, when an update statement is executed, a new update statement is generated to update the base table.

As it is mentioned above, the process to migrate plaintext data to encrypted format is quite simple when using the NAE Connector; furthermore the process can be completely automated through the use of triggers, views, and stored procedures, all of which are created and Installed by the Data Secure appliance during configuration. What’s most important is that the integration is completely transparent to applications that interface with your sensitive data. Before deploying Data Secure, your sensitive data sits in the clear in your databases. After deploying Data Secure, your sensitive data is encrypted, and applications can continue interacting with sensitive data using the same SQL statements; however, instead of interacting directly with that sensitive data, the application servers are actually interacting with a view of the data in Relational Database.

Page 23: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 23 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

4.4 Output of Java Program

Output of the java program is shown below in Command Prompt.

Fig 2: Output of the data (SSN) in Encrypted and Decrypted form.

5. APPLICATIONS AND FUTURE WORK

Cryptography is utilized in various applications and environments. The specific utilization of encryption and the implementation of TDEA will be based on many factors particular to the computer system and its associated components. In general, cryptography is used to protect data while it is being communicated between two points or while it is stored in a medium vulnerable to physical theft or technical intrusion (e.g., hacker attacks). In the first case, the key must be available at the transmitter and receiver simultaneously during communication. In the second case, the key must be maintained and accessible for the duration of the storage period. This Network brings complete data privacy to the enterprise. Data Secure features a dedicated security appliance and specialized software that enables organizations to encrypt critical data in applications and databases.

REFERENCES

1. Fundamentals of Network Security, Eric Maiwald, Dreamtech publication

2. Cryptography and Network Security Principle and Practice, Stalling William

3. Data Communications and Networking, Behrouz A. Forouzans.

4. Starting Out with Oracle covering Database, John Day Craig,Van Slyke

5. Internet & JAVA Programming, R.Krishnamoorthy, S.Prabhu

Internet Resources.

1. http://ieee.org

2. http://csrc.nist.gov/encryption/aes

Page 24: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 24 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

STATUS OF CHEMICAL POLLUTANTS IN GROUNDWATER IN DHANBAD (JHARKHAND)

*Department of Chemistry, JJS Degree College, S.K.M. University, Dumka, Jharkhand**Department of Chemistry, A.N. College,S.K.M. University, Dumka, Jharkhand

* Rakesh Ranjan

**Dr. Sanjeev Kumar Sinha

Ground water containing dissolved ions and toxic metals beyond the permissible limit is harmful and not suitable for drinking and other purposes. Coal mining by open cast method or by underground operations generates huge quantity of waste water which affects the ground water quality. A regular monthly monitoring of ground water from 10 sampling stations in Dhanbad area and its average annual estimation give a details picture of the pollution status. The C.O.D. Value at one sampling site near Lodna Bazar showed a higher than the desirable value. The excess quantity of iron is considered on nuisance. The parameters such or pH, total dissolved solids, turbidity, alkalinity, hardness, chlorides, sulphates, phosphates, iron etc. was analyzed. The estimated parameters were compared with the WHO standard and water quality was addressed using water quality index. The changes in quality of ground water are reported from all the mining areas of Dhanbad in response to pollution from coal based effluents. Thus, periodic monitoring of ground water quality of this area is necessary to access its suitability for drinking and other domestic purposes.

Keywords: Tolerance, pH, B.O.D., C.O.D., TDS, WHO, Turbidity

1. INTRODUCTION

Water is one of the “Elixir of life”. Clean water is one of the basic necessities for sustaining life on the earth. Probably due to this reason, most of the civilization took shape on the bank of rivers. But development of civilization has got its own implications on the quality of water. Due to urbanization and industrialization, the rivers, streams and other water bodies are now being used as reservoir of domestic as well as industrial waste. The situation is so grave that even the ground water has also deteriorated in its quality. A proper management of water resource is not possible unless a regular and proper monitoring of water is done.

The water resource is greatly needed to bring about essential changes in physical and chemical characteristics of the raw material till the final product is formed. During this process various types of pollutants are also formed which come out of the industry in the form of efficient. Damodar basin is world famous for its coal mining. Coal mining by open cast method or by underground operations generates huge quantity of waste water which affects the water quality of nearby water bodies.

It is found that coal possess some inorganic impurities such as pyrites (FeS2), marcarite, hamerite (MnS2) and siderite which generally produces sulphuric acid and other soluble salts after coming in contact with air and moisture. This results into formation of Acid Mine Drainage (AMD) which deteriorates the quality of ground water. AMD also contain several dissolved inorganic constituents. The high concentration of dissolved constituents is due to two different processes:

• The oxidation of metallic sulphides results into high concentration of Iron, Manganese, Zinc, Copper, Lead and Arsenic.

• The silicates and bedrocks dissolve in acid and produces high concentrations of Aluminum, Silica, Calcium, Magnesium, Sodium and potassium.

ABSTRACT

Page 25: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 25 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

2. MATERIALS AND METHODS

2.1 Study Area

Studied area is Dhanbad Coalfield which situated in Eastern India at the heart of Damodar Valley mainly along the northern bank of the river. It is situated about 260 km Northwest of Kolkata in the state of Jharkhand. The pollutants produced by other coal based industries such as coal washeries, coke oven plants, thermal power plants are of diverse type. The coal washeries remove inorganic impurities of coal and reduce the moisture contents. The technique utilizes the difference between the density of coal minerals and the associated minerals. Coal is separated from the impurities on the basis of differential density. Suspended coal particles, oil and grease, and flocculating agents are generated as major pollutant of water.

2.2 Water Sampling

Ground water was collected from 10 sampling station in Dhanbad area during the month from January to December representing season i.e. autumn, summer, monsoon, and winter. It is seen that proper and full proof sampling is most important for accurate assessment of concentration of different pollutant present in ground water. The sample should be represented you in nature and its quantity should be easy to be transferred to laboratory and easy for analysis.

2.3 Preservation

For each sampling station, the water samples were filtered (0.45 m membrane filter, Milliporte) and stored in acid washed polypropylene bottles. In the same way, cleaning of plastic water and plastic bags was carried out by socking in 5% (v/v) HNO3 for 24 hours and then rinsing with milli-Q water. Water sample taken for analyses of cations were preserved by acidification with 2 M HNO3 acid. The total dissolved solids (TDS), electrical conductivity (EC); redox potential (ORP), dissolved oxygen (DO) and pH were measured at the site within a few hours of collection of samples using a portable Cyber.

2.4 Laboratory Method for water analysis

The physicochemical character of ground water for different sampling station was done according to the standard method given by Welch (1952), NEER (1981), APHA (1992). Thus, according to the above said the pH value of water is determined with the help of Lovibon pH comparator disc. The temperature of the water is measured by thermometer. The dissolved oxygen (DO) is measured by electrometric measurement of oxygen diffusion across a membrane and alkali iodide azide methods. Bio-chemical Oxygen Demand (BOD) is determined by incubating the sample for 5 days at 20° C in a BOD incubator.

Chemical Oxygen Demand (COD) test was also conducted. The total solid of the sample is measured by evaporation at 100° C in a water bath followed by gravimetric procedure. Total Suspended Solids (TSS) was also measured through whatman filtered paper. Total Dissolve Substance (TDS) is also calculated. In relation to this, contents of Iron, Fluoride, Chromium was also measured. Lastly, the most probable number (MPN) test was also conducted as per standard method (APHA, 2000).

Page 26: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 26 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Table 1. Physicochemical analysis of ground water at different sampling station in Dhanbad

3. RESULT AND DISCUSSION

A general survey of ground water of the coalfield and regular monitoring of the quality of water is thus most essential because it reflects monthly monitoring of ground water from nearly hundred stations of coalfield and its average annual estimation gives a details picture of pollution status.

The pH of water varied from 6.3 to 8.6 which are slightly alkaline in nature and within permissible limit at all sampling stations. The D.O. value however presents an undesirable picture. The BOD level at different sampling stations showed a trend well within permissible limit. Only several stations selected showed higher BOD value. The COD value at a station showed a higher than the desirable value water bodies at Lodna. The total suspended solid varied from 120 mg/l to 2963 mg/l. The range of total suspended solid varied from 3mg/l to 3986 mg/l. In the same way, the range of total dissolve solid varied between 50 mg/l to 9395 mg/l in different sampling stations.

Page 27: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 27 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

It is found that hardness of water in most of the area was much more than the permissible limit. This was because of high concentration of dissolve in organic salt. This makes the water unsuitable for various domestic purposes. The most serious aspect of pollution which was noticed at almost all stations is a very high MPN value of coliform bacteria which has made the groundwater of whole cola belt unsuitable for drinking. It has its implication in the form of various water borne diseases such as cholera, jaundice, gastrointestinal etc.

In the mine areas of Dhanbad, the main source of water includes the mine water. The ground water is mainly utilized for domestic needs and to a limited extent for irrigation and industrial purposes. The ground water abstraction is mainly through dug wells, bore wells, dug cum bore wells and filter point wells are also used for ground water abstraction in a very limited area. Main problem of water is in Dhanbad urban area comprising of Dhanbad municipal area, Jharia area, Jorapokhar, Pathardih, Jamadoba, Bhuli and Katras. Against the demand of 35.18 million gallons per day of water supply is only 17 million gallons per day. There is shortage of 18.18 million gallons per day. In summer season, scarcity of water is in alarming proportion. Maithon water supply scheme can be a good substitute for supplying surface water to Dhanbad urban areas.20 million gallons of water per day can be supplied from Maithon dam. One training programme on Rain Water Harvesting and artificial recharge to Ground water was organized at Central Mining research institute (CMRI) campus, Dhanbad.

4. CONCLUSION

REFERENCES

1. Bokuniewicz, H. B. & Zeitlin, M. J. Characteristics of the groundwater seepage into Great South Bay (Spec. Rep. No. 35, Marine Sciences Research Center, State University of New York, 1980).

2. Water Pollution Control Fed 60, 2494 (1978)

3. R. K. Tiwary, T.P.N. Singh and S.K. Ghosh (1984) : Quality of mine water in Dhanbad Jharia Coalfied. J. Env Health , Vol. XI , 25-28

4. Jha, S.K. and P.K. Mishra(1995) status of ground water pollution in Jharia Coalfield, J. Ecotoxical Environ. Monit (in press)

5. APHA, (1992) standard method for examination of water and waste water.

6. McCarter N (1990) grass crop as aquatic weed control agent.

7. River pollution in India and its management K Gopal, A Agarwal – 2003

8. Water Pollution : Causes, Effects and control by P.K. Goel

9. Prasad , N (1973) “ Geomorphic sub regions of the Barakar basin, Indian Geographical Studies. Patna, pp. 50-57

10. Damodar Valley Corporation (1978) DVC its flood control capacity past, present and future.

11. Central water and power commission (1969) Regulation Manual Damodar Valley Reservoir (Reprinted 1980).

12. Boyle, J.R. (1988) “Mining and Reclamation of a Central fluoride forested wetland a case study” U.S. Bur. Mines Inf. Cir no 9199, pp 22.

Page 28: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 28 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

INTERNET OF THINGS (IoT): AN INTRODUCTION

*Department of Computer Science and Engineering, BIT Mesra, Ranchi, Jharkhand

* Shamama Anwar

The Internet of Things is an emerging topic of technical, social, and economic significance which has found a variety of applications in different fields. At the same time, however, the Internet of Things raises significant challenges that could stand in the way of realizing its potential benefits. The paper provides an insight into the basic definition of Internet of Things, its application, implementation and challenges faced in its realization

Keywords: Ubiquitous computing, IoT, Human Computer Interaction

1. INTRODUCTION

2. APPLICATIONS

Ubiquitous computing is a term that was given by Mark Weiser. It is an emerging concept in computer science where computing can be done anytime and anywhere. These types of computing can occur using any device, at any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses. The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, networks, mobile protocols, location and positioning and new materials. Since, real world objects are involved; it is also known as physical computing or the Internet of Things. This concept will provide a breakthrough in the field of artificial Intelligence and Human Computer Interaction (Vermesan & Friess, 2013).

The internet which first began with desktop computers and then evolved to laptops, tablets and mobile phones is now going a step further and extending to real world everyday objects. The physical items can now be controlled remotely from anywhere. Apart from the field of computer science it is also finding applicability in different fields like business, economy, agriculture, healthcare, etc. At the same time, however, the Internet of Things raises significant challenges which could adversely affect its applicability. Hacking of Internet-connected devices, surveillance concerns, and privacy fears already have captured public attention. Technical challenges still remain a major concern for developing IoT based applications.

• Smart Homes: Developing smart homes has caused a revolution in designing residential homes. The smart home products would save energy, time and money. A Smart Home would enable the owner to control house hold jobs at the house even from a remote location. For example, switching on the air conditioner or heaters minutes before reaching home, switching on / off the lights, controlling the washing machine, etc. Although such smart homes have been implemented but the cost of establishing such homes is still a major restriction that limits its usage (Lueth, 2016).

ABSTRACT

Page 29: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 29 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

3. IoT IMPLEMENTATION

• Wearable Devices: Wearable devices include wrist watches or glasses that are installed with sensors and software which collect and analyze data. Companies like Google and Samsung have invested heavily in building such devices. These devices broadly cover fitness, health and entertainment requirements. A major challenge for developing such systems are that it should be light weight, small in size and should have very low power consumption (Kashyap, 2016).

• Traffic Monitoring: Vehicles should be capable of optimizing its operation, fuel consumption, pollution control, maintenance and comfort of passengers. A breakthrough will be achieved if such smart traffic could be developed as it would drastically reduce road accident causalities. By installing sensors and using web applications, citizens can also find free available parking slots across the city.

• Industrial Internet: Industrial Internet is the new buzz in the industrial sector, also termed as Industrial Internet of Things (IIoT). It is empowering industrial engineering with sensors, software and big data analytics to create brilliant machines. IIoT holds great potential for quality control and sustainability. Applications for tracking goods, real time information exchange about inventory among suppliers and retailers and automated delivery will increase the supply chain efficiency.

• Smart Cities: Smart city is another buzzword gaining immense interest from the public. Smart surveillance, automated transportation, smarter energy management systems, water distribution, urban security and environmental monitoring all are examples of internet of things applications for smart cities. It will solve major problems faced by the people living in cities like pollution, traffic congestion and shortage of energy supplies etc. Products like cellular communication enabled Smart trash will send alerts to municipal services when a bin needs to be emptied (Lueth, 2016).

• Agriculture: With the continuous increase in world’s population, demand for food supply is extremely raised. Governments are helping farmers to use advanced techniques and research to increase food production. Smart farming is one of the fastest growing field in IoT. Farmers are using meaningful insights from the data to yield better return on investment. Sensing for soil moisture and nutrients, controlling water usage for plant growth and determining custom fertilizer are some simple uses of IoT (Kashyap, 2016).

• Healthcare: The concept of connected healthcare system and smart medical devices bears enormous potential not just for companies, but also for the well-being of people in general. Research shows IoT in healthcare will be massive in coming years. IoT in healthcare is aimed at empowering people to live healthier life by wearing connected devices. The collected data will help in personalized analysis of an individual’s health and provide tailor made strategies to combat illness (Kashyap, 2016).

IoT implementations use different technical communications models, each with its own characteristics. Four common communications models include: Device-to-Device, Device-to-Cloud, Device-to-Gateway, and Back-End Data-Sharing (Vermesan & Friess, 2013). These models highlight the flexibility in the ways that IoT devices can connect and provide value to the user. Further, for the IoT to function three major components are required: Devices, Communication Network and Computing and Storage machines. IoT platforms connect the sensors and data network to one another, integrating with back-end applications to provide insight into large volumes of data. For example, healthcare with IoT networks can trigger an alarm automatically when a device with a particular sensor, senses something wrong with the person wearing it.

Page 30: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 30 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Fig 1: Device to Device Connection

Fig 2: Device to Cloud Communication

Fig 3: Device to gateway communication model

Fig 4: Back end data sharing model

Page 31: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 31 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

4. IoT CHALLENGES

The major concerns related to IoT are (Rose, Eldridge, & Chapin, 2015):

• Infrastructure: The availability of high end infrastructure is essential for implementing IoT. The devices and the wireless network should be reliable for actual realization.

• Physical location: As the Internet of Things is strongly rooted in the physical world, the notion of physical location and position are very important, especially for finding things, but also for deriving knowledge. Therefore, the infrastructure has to support finding things according to location.

• Security and Privacy: Major security concerns include identification, confidentiality, integrity, authentication and authorization. With the increase in hacking incidents, the IoT application to be developed should be reliable.

• Network Issues: The widespread use of IoT depends on the wireless network it uses for communication. The networking challenges need to be addressed to enable using the technology efficiently.

REFERENCES

1. Kashyap, S. (2016, August 26). 10 Real World Applications of Internet of Things (IoT) – Explained in Videos. Retrieved

from https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-

internet-of-things-iot/

2. Lueth, K. L. (2016). IoT Analytics. Retrieved from iot-analytics.com: https://iot-analytics.com/10-internet-of-things-

applications/

3. Mattern, F. F. (2010). From the Internet of Computers to the Internet of Things. Informatik-Spektrum, 107 - 121.

4. Rose, K., Eldridge, S., & Chapin, L. (2015, October). The Internet of Things: An Overview. Retrieved from www.

internetsociety.org: https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151014_0.pdf

5. Vermesan, O., & Friess, P. (2013). Internet of Things - Converging Technologies for Smart Environments and Integrated

Ecosystems. In O. Vermesan, & P. Friess, 10 Real World Applications of Internet of Things (IoT) – Explained in Videos.

River Publishers.

Page 32: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 32 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

SIMULATION OF GAS TURBINE AT OFF DESIGN CONDITION

*Mechanical Engineering Department, JIT Barabanki Uttar Pradesh, India** UIET, BBAU, Lucknow, Uttar Pradesh, India

*Ravi Prakash Vishwakarma

**Ashish Kumar Mishra

The gas turbine engine is a complex assembly of a variety of components that are designed on the basis of aero-thermodynamic laws. The design and operation theories of these individual components are complicated. The complexity of aero-thermodynamic analysis makes it impossible to mathematically solve the optimization equations involved in various gas turbine cycles. Manufacturers and designers of gas turbine engines became aware that some tools were needed to predict the performance of gas turbine engines especially at off design conditions where its performance was significantly affected by the load and the operating conditions. Also it was expected that these tools would help in predicting the performance of individual components, such as compressors, turbines, combustion chambers, etc. A mathematical modeling using computational technique was considered to be the most economical solution. The first part of this work presents a discussion about the gas turbine modeling approach. The second part includes the gas turbine component matching between the compressor and the turbine which can be met by superimposing the turbine performance characteristics on the compressor performance characteristics with suitable transformation of the coordinates. The last part includes the gas turbine computer simulation program and its philosophy.

Keywords: Gas turbine, engine performance, design

1. INTRODUCTION

A turbine is any kind of spinning device that uses the action of a fluid to produce work. Typical fluids are: air, wind, water, steam and helium. Windmills and hydroelectric dams have used turbine action for decades to turn the core of an electrical generator to produce power for both industrial and residential consumption. Simpler turbines are much older, with the first known appearance dating to the time of ancient Greece.

The name “gas turbine” is somewhat misleading, because to many it implies a turbine engine that uses gas as its fuel. Actually a gas turbine has a compressor to draw in and compress gas (most usually air); a combustor (or burner) to add fuel to heat the compressed air; and a turbine to extract power from the hot air flow. The gas turbine is an internal combustion (IC) engine employing a continuous combustion process. This differs from the intermittent combustion occurring in Diesel and automotive IC engines. Because the origin of the gas turbine lies simultaneously in the electric power field and in aviation, there have been a profusion of “other names” for the gas turbine. For electrical power generation and marine applications it is generally called a gas turbine, also a combustion turbine (CT), a turbo-shaft engine, and sometimes a gas turbine engine. For aviation applications it is usually called a jet engine, and various other names depending on the particular engine configuration or application, such as: jet turbine engine; turbojet; turbofan; fanjet; and turboprop or prop jet (if it is used to drive a propeller).

ABSTRACT

Page 33: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 33 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

2. BACKGROUND

2. RESULTS AND DISCUSSION

In an aircraft gas turbine the output of the turbine is used to turn the compressor (which may also have an associated fan or propeller). The hot air flow leaving the turbine is then speeded into the atmosphere through an exhaust nozzle to provide thrust or propulsion power.

The smallest jets are used for devices such as the cruise missile, the largest for future generations of commercial aircraft. The jet engine is a turbofan engine, with a large diameter compressor-mounted fan. Thrust is generated both by air passing through the fan (bypass air) and through the gas generator itself. With a large front area, the turbofan generates peak thrust at low (takeoff) speeds making it most suitable for commercial aircraft. A turbojet does not have a fan and generates all of its thrust from air that passes through the gas generator. Turbojets have smaller front areas and generate peak thrusts at high speeds, making them most suitable for warrior aircraft.

In non-aviation gas turbines, part of the turbine power is used to drive the compressor. The remainder, the “useful power”, is used as output shaft power to turn an energy conversion device such as an electrical generator or a ship’s propeller.

Such units can range in power output from 0.05 MW (Megawatts) to as high as 240 MW. Heavier weight units designed specifically for land use are called industrial or frame machines. Although aero derivative gas turbines are being increasingly used for base load electrical power generation, they are most frequently used to drive compressors for natural gas pipelines, power ships and provide peaking and intermittent power for electric utility applications. Peaking power supplements a utility’s normal steam turbine or hydroelectric power output during high demand periods .Such as the summer demand for air conditioning in many major cities.

The output of the new methodology presented in this work is illustrated graphically in Figs.1 and 2, which show complete typical performance characteristics of a centrifugal compressor and complete typical performance characteristics of a radial turbine, respectively.

In order to match the turbine with the compressor, Figs 1 and 2 have to be reproduced by introducing the matching parameter [m˙ N/d2cPo1]. The transformation is shown in Figs.3 and 4. For the compressor it is worth noting that the constant speed lines were shifted apart, nevertheless the trends stay the same. For the turbine, the trend of the constant speed lines has changed. The reason is because the turbine inlet temperature T03 is not constant along any constant speed line while for the compressor case; the compressor inlet temperature T01 is constant. The graphs between Pressure ratio and Mass flow rates is shown in Figs 5 and 6.

Fig.1: Centrifugal compressor performance

Page 34: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 34 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Fig.2: Radial turbine performance

Fig.3: Transformation of Centrifugal compressor

Fig.4: Transformation of Radial turbine

Page 35: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 35 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Fig.5: Pressure ratio

Fig.6: Mass flow

4. CONCLUSION

It can be concluded from the output whether the gas turbine engine is operating in a region of adequate compressor and turbine efficiency. Matching technique proposed in the current work used to develop a computer simulation program, which can be served as a valuable tool for investigating the performance of the gas turbine at off-design conditions. Also, this investigation can help in designing an efficient control system for the gas turbine engine of a particular application including being a part of power generation plant.

Modeling, matching, and simulation of a gas turbine engine for power generation have been presented. A computer program for simulating a gas turbine engine has been developed that can satisfy the necessary matching conditions analytically and, thus, achieve matching between the various components in order to produce the equilibrium running line. Representing the data for this line either in the form of lookup tables or an equation is known as modeling; solving that equation with the help of a computer is computer simulation. Thus, modeling and simulation together satisfy all energy and mass balances, all equations of state of the working fluids, and the performance characteristics of all components.

Page 36: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 36 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Table1. Calculated parameters within the specified working range of 42000 rpm

Table 2. Calculated parameters within the specified working range of 42000 rpm

# Matching Parameter

r (pressure ratio)

Turbine Speed ηc

1 0.0413 3.483 0.242 83

2 0.0387 3.58 0.2132 83.2

3 0.0359 3.585 0.1954 81.8

4 0.0331 3.597 0.1776 80.8

5 0.03 3.61 0.1599 79.5

# Wt Wnet Fuel/Air Ratio m.f

1 296.79 28.55 0.00611 0.01095

2 374.59 118.74 0.01143 0.01921

3 415.78 172.66 0.01596 0.02488

4 45.72 228.08 0.02205 0.03169

5 493.48 283.08 0.03036 0.0395

# ηt T02 T03 T04 Wc

1 82 436.82 651.97 508.69 268.24

2 84.5 439.48 840 647.02 255.85

3 84.7 443.17 1000 769.1 243.12

4 82.8 445.58 1210.52 936.02 227.64

5 80 448.7 1493.34 1165.4 210.4

# ηgt SFC τc τt τnet

1 6.37 0.7699 203.39 225.04 21.65

2 15.1 0.3464 194 284.04 90.04

3 16.95 0.3327 184.35 315.27 130.92

4 17.57 0.3481 172.61 345.55 172.94

5 17.48 0.3861 159.54 374.19 214.65

Page 37: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 37 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

REFERENCES

1. Chappel, M. S., and Cockshutt, E. P., 1974, Gas Turbine Cycle Calculations: Thermodynamic Data Tables for Air and

Combustion Products for Three Systems of Units, NRC No.14300, Ottawa.

2. Cohen, H., Rogers, G. F. C., and Saravanamuttoo, H. I. H., 1996, Gas Turbine Theory, 4th Edition, Longman, London.

3. Ainley, D. G., and Mathieson, G. C. R., 1957, A Method of Performance Estimation for Axial-Flow Turbines, Aeronautical

Research Council.

4. Kurzke, J., 1996, “How to Get Component Maps for Aircraft Gas Turbine Performance Calculations,” ASME paper

96-GT-164.

5. Gordon, S., and McBride, B., 1994, Computer Program for Calculation of Complex Chemical Equilibrium Compositions

and Applications NASA Reference Publication 1311, Vols. I and II, Lewis Research Center, Cleveland, Ohio.

6. Horlock, J. H., Watson, D.T., and Jones, T.V. (2001), “Limitations on Gas Turbine Performance Imposed by Large

Turbine Cooling Flows, ASME J. Eng. Gas Turbines Power, Vol.123, pp. 487-493.

7. Breikin, T. V., Herbert, I. D., Kim, S. K., Reghunath, S., Hargrave, S. M., Thompson, H. A., and Fleming, P. J. (2006),

“Staged combustion control design for aero engines”, control engineering practice 14, 387-396, Elsevier.

8. Walsh, P., and Fletcher, P., 1998, “Gas Turbine Performance,” 1st Edition, Blackwell Science Ltd., London, pp. 175–185,

200, 215.

9. Bhinder, F. S., and Mango, O. I. K., 1995, “A Parametric Study of the Combined Power and Power _CPP_ Plant for

Generating Electricity,” ASME Turbo Cogeneration. Vienna.

10. Horlock, J. H., 1997, “Aero-Engine Derivative Gas Turbines for Power Generation: Thermodynamic and Economic

Perspectives,” ASME J. Eng. Gas Turbines Power, 119_1_, pp. 119–123.

11. Horlock, J. H., 1995, “Combined Power Plants: Past, Present and Future,” ASME J. Eng. Gas Turbines Power, 117_4_,

pp. 608–616.

12. Sehra Arun, K., and Jr. Whitlow Woodrow (2004), “Propulsion and power of 21st century”.

Page 38: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 38 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

ANALYSIS OF SENSITIZATION IN AUSTENITIC STAINLESS STEEL WELDED JOINT

*Department of Material and Metallurgical Engineering, National Institute of Foundry & Forge Technology, Ranchi, Jharkhand

*Viranshu Kumar Singh

An experimental study was carried out to study the influence of sensitization on the microstructure and mechanical properties of gas tungsten arc welded (GTAW) 304L stainless steel (SS) joints. Austenitic stainless steel 304L was sensitized when normalized between 450°C-850°C and held for short soaking times of 1/2–2hrs. Flat plate of dimension 500x100x5mm is used for the experiment. Weld joints and base metal were normalized at 750°C, 850°C and 1000°C for 0.5h, 1h and 2h respectively. Tensile strength, Impact strength and Micro hardness of the sensitized sample has been investigated to find out the effect of sensitization on mechanical properties of stainless steel 304L. Tensile strength, Impact strength and Micro hardness of the sensitized sample has been evaluated by using tensile testing (UTM) machine, Charpy Impact testing machine and Viker’s micro hardness testing machine. Microstructure evaluations of sensitized sample were analyzed by Optical microscopy. The results of this investigation indicate that the tensile strength is maximum at weld joints normalized at 750°C but remarkably decreased as the temperature was increased while the yield strength did not notably changed. The Charpy impact energy and micro-harness showed higher value at weld joints normalized at 750°C but remarkably decreased as the temperature was increased. The microstructures of sensitized samples indicate that heat treated weldments are more sensitized than untreated weldments specifically, weldments treated at 850°C with a 2 h holding time and then cooled in air are the most sensitized.

Keywords: Microstructure, Micro hardness, Normalization, Sensitization, Tensile Strength.

1. INTRODUCTION

Sensitization refers to the breakdown in corrosion resistance due to depletion of chromium by the formation, growth, and precipitation of chromium rich carbide particles in the grain boundaries where the steel encounters temperatures in the range of about 450 °C to around 850 °C, most notably in the HAZ of a weld. In addition to the loss in corrosion resistance due to chromium depletion, weld sensitization also causes a loss of fracture toughness due to the fracture path provided by the complex carbides within and along HAZ grain boundaries [1]. Typically, the Cr carbide is Cr-enriched M23C6, in which M represents Cr and some small amount of Fe. Within the sensitization temperature range carbon atoms rapidly diffuse to grain boundaries, where they combine with Cr to form Cr carbide. Because of Cr carbide precipitation at the grain boundary, the areas adjacent to the grain boundary are depleted of Cr. These areas become anodic to the rest of the grain and hence are preferentially attacked in corrosive media, resulting in inter-granular corrosion. It was also observed that deformation prior to welding or strain during cooling can enhance sensitization, this is perhaps due to the fact that dislocations can increase the carbide nucleation rate and the diffusion rate [2]. The sensitization below the sensitization temperature range is termed low temperature sensitization (LTS). The pre-existing tiny carbide particles were observed to grow in size when failed components were investigated; this was accompanied by severe chromium depletion from adjacent grain boundaries [3].

ABSTRACT

Page 39: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 39 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

2. EXPERIMENTAL TECHNIQUES

2.1 Material and Heat Treatment

The material used in this study was austenitic stainless steel AISI 304L. Nine Plates of 5 mm thickness and dimensions of 250 mm (length) × 125 mm (width) was used for the GTAW process and the filler wire was 304L SS electrode of 3.0 mm diameter. Table 1 shows the chemical composition of the base and the filler material used. Before start welding, the material was cleaned to remove rust, dust, oil, moisture etc. During welding the welding current and welding speed were varied to obtain different heat inputs and one end of the plate was fixed. The welding current which is used in this study was varied from 120A to 200A and the voltage was kept at approx. 30V. After compared the tensile strength, impact strength, micro hardness samples welded at lowest heat input was found to be the best among all the welded samples and base metal. Therefore, 210 A current was selected for welding for samples which is used for sensitization studies. One sample of SS 304L, 250 mm long, 500 mm wide and 6 mm thick was prepared by using same parameters and procedure as mentioned above. Nine set of samples were extracted from the welded plate and sensitized by heat treatment (normalization) by varying the temperature

and soaking time. Temperatures used for normalization are 750⁰C, 850⁰C and 1000⁰C. The soaking times for normalization are 1/2hour, 1 hour, and 2 hours. Samples were sensitized at six different time and temperature combinations. Heat treatment was done in muffle furnace, all the 12 specimens (9 tensile specimens + 9 specimens for microstructure and microhardness+9 specimens for impact) taken from a plate welded at 210A and normalized by heat treatment.

Table1. Chemical composition of the base metal and the filler electrode (in wt. %) used in these investigations.

C Mn Si Cr Ni P S MoBase metal (304L) 0.03 1.1 0.4 17 8 - - -

Filler electrode (304L) 0.02 1.2 0.9 18 9 0 0 0.7

2.2 Mechanical Testing

The specimens for tensile testing, micro hardness testing and micro structural studies were taken from the weld pads. Three specimens were machined out from the weld pads each tensile, hardness and impact specimen size was prepared in accordance with ASTM E08 standards. The specimens were tested on a servo hydraulically controlled digital tensile testing machine of 400 KN capacities. Micro hardness of different zones of the weldments was measured using Vickers’s micro hardness testing machine with a load of 0.5 kg. Impact strength was measured using Charpy impact testing machine.

2.3 Microstructural Examination

In order to observe the micro structural changes that take place during welding, corresponding to each heat input combination; specimens were machined out from the weld pads. The samples were ground and polished with successively fine emery papers (1/0, 2/0, 3/0 and 4/0). After polishing with emery papers, all the samples were subsequently polished on velvet cloth using alumina slurry and finally using diamond paste (1 μm) using Hiffin chloride as lubricant. The mirror polished samples were then deep etched with Kalling’s reagent (5 g CuCl2, 100 ml HCl and 100 ml C2H5OH) to observe the microstructure.

Page 40: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 40 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

3. RESULTS AND DISCUSSION

3.1 Microstructural and Metallographic Analysis Of Specimen Normalizing At 750⁰C

Figs 1(a-c) shows the photographs of the specimen’s heat treated at 750⁰C and held at the soaking time for 1/2

hr, 1hr, and 2hrs respectively. Chromium depleted zones could be seen here but negligible in the sample soaked

for 30mins but increased when shocking time increased. Table 2 shows the Macro and microstructural details of

the weld joints normalizing at 750⁰C.Tensile, impact strength and micro hardness was found to be decreases with

increasing soaking time and normalization temperature.

Fig 1. Optical photograph showing the microstructure of sample heated to 7500C and held for (a) 30mins (b) 1hr (c) 2hrs.

Fig 2. Optical photograph showing the microstructure of Sample heated to 850⁰C and held for (a) 30mins (b) 1hr (c) 2hrs

Table 2. Mechanical testing result of the weld joints normalizing at 750⁰C.

Description Tensile Strength MPa

Yield Strength MPa

Micro-hardness HV

Impact Strength KJ/mm2

7500 C for 30 min. 750.78 443.48 246 1.4

7500 C for 1 hour. 736.76 477.023 235 1.287500 C for 2 hour. 732.13 497.196 232 1.2

3.2 Microstructural and Metallographic Analysis of Specimen Normalizing at 850⁰ C.

Figs 2(a-c) shows the photographs of the specimen’s heat treated at 850⁰C and held at the soaking time for 1/2hr, 1hr and 2hrs respectively. Chromium depleted zones could be seen here but increases when shocking time increased. Pattern followed by mechanical properties of samples sensitized at 850⁰C resembles with the samples sensitized at 750⁰C. Tensile strength, micro hardness and impact strength had decreased when temperature and normalizing time increased. Table 3 shows the Macro and micro structural details of the weld joints normalizing at 850⁰C. Tensile, impact strength and micro hardness was found to be decreases with increasing soaking time and normalization temperature.

Page 41: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 41 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

3.3 Microstructural and Metallographic Analysis of Specimen Normalizing at 1000⁰C.

Fig. 3 shows the photographs of specimens heat-treated at 1000⁰C. Carbide precipitates could be seen here but negligible in sample soaked for 30 minutes and very less carbide precipitates in sample soaked for 120 minutes, with increasing temperature and exposer time Carbide precipitates are negligible that are due to desensitization which is clearly visible in fig. 3 (C).Table 4 shows the Macro and microstructural details of the weld joints normalizing at 1000⁰C. At 10000 C, sensitization was observed at 30 minute soaking time and desensitization was observed at 1 and 2 hrs soaking time. Tensile and Impact strength of normalized 304L stainless steel was also observed to increases with increasing soaking time and normalization temperature but hardness is decreases due to desensitization.

Table 3. Mechanical testing result of the weld joints normalizing at 850⁰C.

Table 4. Macro and microstructural details of the weld joints normalizing at 1000⁰C.

Description Tensile Strength MPa

Yield Strength MPa

Micro-hardness HV

Impact strength KJ/mm2

8500 C for 30 min. 742.63 463.56 234 2.6

8500C for 1 hour. 736.711 452.63 260 2.5

8500C for 2 hour. 722.04 462.15 242 1.9

Fig 3. Optical photograph showing the microstructure of sample heated to 10000 C and held for (a) 30 mins. (b) 1hr (c) 2hrs.

Description Tensile Strength MPa

Yield Strength MPa

Micro-hardness HV

Impact strength J/mm2

10000C for 30 min. 742.63 463.56 235 1.84

10000C for 1 hour. 736.711 452.63 227 2

10000C for 2 hour. 722.04 462.15 225 2.2

Page 42: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 42 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

REFERENCES

1. Atanda P, Fatudimu A and Oluwole O., 2010. Sensitization study of Normalized 316L Stainless Steel. J Minerals and

Materials Characterization and Engg, volume 9 No.1: pp13-23.

2. K.H. Lo, D. Zeng, C.T. Kwok., 2011. Effects of sensitisation-induced martensitic transformation on the tensile behaviour

of 304 austenitic stainless steel. Materials Science and Engineering, volume a, pp 1003–1007.

3. H.-E. Bühler, L. Gerlach, O. Greven, W. Bleck. 2003. The electrochemical reactivation test (ERT) to detect the susceptibility

to intergranular corrosion, Corrosion. Science. Volume 45, pp 2325–2336

4. Young-Pyo Kim et al., 2001. Fatigue crack growth and Fracture toughness properties of 304 stainless steel pipeline for

LNG transmission. Materials Science and Engineering, volume 78, pp 351 -7.

5. M.G. Fontana., 1999. Corrosion Engineering, third ed, M cGraw Hill, New York. Wasnik D.N, Kain V, Samajdar

I, Verlinden B and De P.K., 2012, controlling grainboundary energy to make austenitic stainless steel resistance to

intergranular stress corrosion cracking, ASM Int. volume 12, pp 402- 407.

6. Rahul Unnikrishnan, K.S.N.Satish Idury, T.P. Ismail, Alok Bhadauria, S.K.Shekhawat, Rajesh K. Khatirkar, Sanjay

G. support. 2014. Effect of heat input on meterological properties of 304L austenitic stainless steel weldments.

Corrosion. Science, volume 10, pp 10-23.

7. Parag M. Ahmedabadi,Vivekanand Kain, Bhupinder Kumar Dangi, I. Samajdar., 2013, Role of grain boundary nature

and residual strain in controlling sensitization of type 304 stainless. Corrosion Science, volume 66, pp 242– 255.

8. Mohd Warikh Abd Rashid, Miron Gakim, Zulkifli Mohd, Rosli, Mohd Asyadi Azam,A.kermanpur, M.Shamanian,

V.Esfahani-Yeganesh.,2012, Formation of Cr23C6 during the Sensitization of AISI 304 Stainless Steel and its Effect

to Pitting Corrosion. Corrosion. Science, volume 42, pp 9465-9477.

9. Pilar De Tiedra, Óscar et al., 2011, study the degree of sensitization by EPR test in Resistance spot welding joints of

stainless steel. Corrosion. Science, volume 53, pp 1563–1570.

4. CONCLUSION

SS 304L was observed to go into Sensitization when heated to 750⁰C and 850⁰C for 30, 60 and 120 minutes. All the three welds showed good joint strength but best results were achieved under condition of lowest heat input (2.2 kJ/mm) in terms of tensile strength and micro hardness obtained viz. 747.70 MPa and 250 HV respectively as compared to 787.40 MPa and 253 HV of the base metal. Tensile strength was found to be decreases with increasing normalization time and temperature. With increasing normalization temperature and time hardness and impact strength of the sensitized samples also decreased. At 1000⁰C, sensitization was observed at 30 minute soaking time and desensitization was observed at 1 and 2 hrs soaking time. When sensitization time and temperature increased carbide precipitation at grain boundary also increased and due to carbide precipitation ductility of material is reduced.

Page 43: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 43 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

CALL FOR PAPERS

RAI JOURNAL OF TECHNOLOGY RESEARCH AND INNOVATION

Volume: V Issue: I I

Important Dates

Deadline for Paper Submission: 15th November, 2017

Completion of Editorial Review: 15th December, 2017

Completion of Final Review: 20th December, 2017

Publication: December 2017

GUIDELINES FOR AUTHORS

“Rai Journal of Technology Research and Innovation” aims at publishing the finest peer-reviewed research in all fields of science and technology on the basis of its originality, importance, interdisciplinary interest, timeliness, accessibility, elegance and surprising conclusions. The journal will serve for the advancement and dissemination of knowledge in all fields of Science and Technology.

The Articles / Research Papers / Case Studies should reach us before deadline for paper submission date taking into account the following guidelines:(1) Authors are requested to submit a soft-copy using MS-Word. (2) The paper must be typed in 12-point font in Times New Roman on A-4 size paper in double space with margins of 1.5 inches on all sides. (3) The article should not exceed 4000 words. (4) The abstract should be between 150-200 words outlining the purpose, scope and conclusion of the paper.

The authors should follow “The Harvard Reference System” (also known as author-date system) for citing the references used in this manuscript.

Submission of a manuscript signifies it has neither copyrighted, published, submitted nor accepted for publication elsewhere. All submission should include a title page containing the title of the paper, full names and affiliations complete postal and electronic address, phone and fax numbers, an abstract and a list of keywords.

[While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors nor can the publisher accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained

herein. JRU and the editors are not responsible for claims made in the article published in the journal.]

Page 44: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 44 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

ISSN 2321 3213

RAI JOURNAL OF TECHNOLOGY RESEARCH & INNOVATION (RJT)

Subscription Form

Subscription Rate/Journal Period Hard Copy (INR) 1 Year 500 2 Years 1000 3 Years 1500

I/We would like to subscribe to “RAI JOURNAL OF TECHNOLOGY RESEARCH & INNOVATION (RJT)” journal.

Please tick (√ ) the relevant option Period Number of Years Subscription Amount (INR) 1 Year 2 Years 3 Years

Payment

Enclosed is the Crossed Cheque*/DD No. _________________________ dated _____________ drawn

on __________________________________________ (Specify Bank) favoring “Jharkhand Rai

University” for Rupees ______________________ payable at Ranchi.

Name and Address of the Subscriber

Name: Mr. / Ms. / M/s.: _____________________________________________________from

(Institute/College/ University Name):_______________________________________________________

Address for Communication: _____________________________________________________________

_____________________________________________________________________________________

__________________City________________State_________________________PIN_______________

Tel.:_______________________Mobile: ___________________ E-mail: _________________________

Date: ____________ Signature of the Subscriber ______________________

Note: Cash transactions are not permitted.

Kindly Correspond to:

Editor

Rai Journal of Technology Research & Innovation

JHARKHAND RAI UNIVERSITY

Kamre, Ratu Road Ranchi – 835222

Tel: +91 9693296660; E-mail: [email protected]

Page 45: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 45 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Page 46: Price : Rs 250/- January - June, 2017 Volume: V Issue: I 2017.pdf · [ 1 ] Rai Journal of Technology Research & Innovation January 2017, Vol. V Issue I Volume: V Issue: I Price :

[ 46 ]

Rai Journal of Technology Research & Innovation

January 2017, Vol. V Issue I

Published by :Jharkhand Rai University, Ranchi

Printed by :Kailash Paper Conversion Pvt. Ltd., Ranchi

Production : Mr. Arindip Diwan | Designer : Mr. Soumik Mitra