This paper deals with the application of nano technology in the pyro industries located in Sivakasi. This paper also gives
information about the geography, history, location of industries, pyro powder manufacturing companies, application of SEM, ball mill
present in Sivakasi. Sivakasi is one of the most mega industrial centres present in India. Sivakasi is also called as Kutti Japan due to
the enormous amount of industries present in the heart of the city. It is one of the important holy places present in the country. It is
having hot climate throughout the day. Nowadays, due to El - Niño the climate conditions were changed. There is an abundant rainfall
in the summer season also. This paper is useful for the students to study about the pyro industries present in sivakasi and the
applications of nano technology in the pyro industries present in the city. Hereafter, the pyro industries using the nano technology for
the improvement of the quality and performance of the fireworks present in Sivakasi shall also be called “Nano pyro industries” and
the city can also be called as “Nano Pyro Industrial City”. Pyro industries are present in the city due to the low annual rainfall and the
dry climate present in the city throughout the year. The land in Sivakasi is also called as “Sulphur land” due to the heavy temperature
in the city. Nowadays, the trend is changed due to the climatic changes caused by El – Niño. In the year 2015, the summer season in
sivakasi was converted into rainy season by the climatic changes caused by the unstable changes in the winds from the Bay of Bengal.
Para la actividad sólo debes leer el capítulo 3 (pg. 63-84), aunque es recomendable que lea todo lo que pueda.
Actividad: Basándose en el texto, escriba en breve sobre las diferencias y similitudes entre la economía, la ecología y la economía ecológica.
Para la actividad sólo debes leer el capítulo 3 (pg. 63-84), aunque es recomendable que lea todo lo que pueda.
Actividad: Basándose en el texto, escriba en breve sobre las diferencias y similitudes entre la economía, la ecología y la economía ecológica.
National Engineers' Day: Honoring The Nation's Buildersthinkwithniche
Every year on September 15, India celebrates National Engineers Day to commemorate the birth anniversary of Bharat Ratna Shri Mokshagundam Visvesvaraya, one of the country's best engineers. This day is observed to recognize the dedication of all engineers who have made significant contributions to the country's growth and development.
This ppt is prepared for the purpose of my academics. This ppt is about the problems faced by the Sivakasi Crackers company from the Chinese crackers and the solutions are also provided to them to counter that. The ppt also contains the history of crackers.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
More Related Content
Similar to Applications of Nano Technology in Pyro Industries located in Sivakasi
National Engineers' Day: Honoring The Nation's Buildersthinkwithniche
Every year on September 15, India celebrates National Engineers Day to commemorate the birth anniversary of Bharat Ratna Shri Mokshagundam Visvesvaraya, one of the country's best engineers. This day is observed to recognize the dedication of all engineers who have made significant contributions to the country's growth and development.
This ppt is prepared for the purpose of my academics. This ppt is about the problems faced by the Sivakasi Crackers company from the Chinese crackers and the solutions are also provided to them to counter that. The ppt also contains the history of crackers.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Applications of Nano Technology in Pyro Industries located in Sivakasi
1. International Journal of Science and Engineering Applications
Volume 4 Issue 4, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 203
Applications of Nano Technology in Pyro Industries
located in Sivakasi
D. Edison Selvaraj
Dept. of EEE
Panimalar Engineering College
Chennai, India
edisonsivakasi@gmail.com
S. Geethadevi
Dept. of EEE
Aurora Scientific and
Technological Institute
Uppal, Hyderabad, India
C. Pugazhendhi Sugumaran
Division of High Voltage
Engineering, College of
Engineering, Guindy
Anna University, Chennai
India
J.Ganesan
Dept. of EEE
Sree Sowdambika College of
Engineering
Aruppukottai, India
M. Rajkumar
Dept. of EEE
Dhanalakshmi Srinivasan College
of Engineering and Technology
Mamallapuram
Chennai, India
Abstract: This paper deals with the application of nano technology in the pyro industries located in Sivakasi. This paper also gives
information about the geography, history, location of industries, pyro powder manufacturing companies, application of SEM, ball mill
present in Sivakasi. Sivakasi is one of the most mega industrial centres present in India. Sivakasi is also called as Kutti Japan due to
the enormous amount of industries present in the heart of the city. It is one of the important holy places present in the country. It is
having hot climate throughout the day. Nowadays, due to El - Niño the climate conditions were changed. There is an abundant rainfall
in the summer season also. This paper is useful for the students to study about the pyro industries present in sivakasi and the
applications of nano technology in the pyro industries present in the city. Hereafter, the pyro industries using the nano technology for
the improvement of the quality and performance of the fireworks present in Sivakasi shall also be called “Nano pyro industries” and
the city can also be called as “Nano Pyro Industrial City”. Pyro industries are present in the city due to the low annual rainfall and the
dry climate present in the city throughout the year. The land in Sivakasi is also called as “Sulphur land” due to the heavy temperature
in the city. Nowadays, the trend is changed due to the climatic changes caused by El – Niño. In the year 2015, the summer season in
sivakasi was converted into rainy season by the climatic changes caused by the unstable changes in the winds from the Bay of Bengal.
Keywords: Ball Mill, Nano Powder, SEM, Pyro Industries
1. INTRODUCTION
This introduction chapter has three sub divisions:
1. A brief History and Geography of Sivakasi
2. A History of Industries in Sivakasi
3. A brief of Pyro industries in a Sivkasi
motors were widely used in fans, centrifugal pumps, blowers,
lifts, cranes, hoists and so on. The efficiency of the induction
motor depends upon the insulation used. For motors, the
enamel was used for three purposes: impregnation, coating
and adhesion. The efficiency of the induction motor can be
increased by adding the nano fillers with the enamel which
was used as coating for the windings of the motor. In this
paper, the efficiency of the normal three phase squirrel cage
induction motor and the Al2O3 nano filled enamel coated three
phase squirrel cage induction motor was analyzed and the
results were compared with each other [1].
1.1 A brief History and Geography of
Sivakasi
Sivakasi has a history of more than 600 years. Its story starts
from the 14 th century. Kaasi is a place where every devout
Hindu is expected to visit once in their lifetime. Apart from
that there are two other Kasi's in India - Tenkasi (meaning the
Southern Kaasi) located near Courtallam, close to Kerala and
Sivakasi (Kaasi of Siva) located at South of Madurai. It is
interesting to note how Sivakasi came to be called so. The
story starts as follows. Between 1428 and 1460 AD, King
Harikesari Parakkirama Pandian then King of Tenkasi ruled
the southern region of Madurai, with his capital at Tenkasi.
He wanted to construct a temple for LORD SIVA at his place.
Therefore he went to Kasi Varanasi and worshiped Lord Siva
there and brought a Sivalingam from there. While returning to
his place with the prized Linga a few miles past Madurai, he
took rest under a groove of Vilva trees. The cow which
carried Sivalingam, refused to move and also the King's wife
(the Princess) attained puberty that night, which prohibited the
carrying of the Linga to Tenkasi. He found that it was hard to
2. International Journal of Science and Engineering Applications
Volume 4 Issue 4, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 204
reach Tenkasi in time, to install the Sivalingam and he
realised that the wishes of Lord SIVA were different from his
own As events thus overtook auspicious time for the already
proposed plan of consecrating the Linga at Tenkasi, the king
reverentially placed the Linga in the place where he had
halted and proceeded to Tenkasi. The place which was
sanctified by the "Sivalinga brought from Kasi", henceforth
came to be called Sivakasi. Later on King Pandia and King
Thirumalai Naicker did a lot for this temple, named it "KASI
VISWANATHA SWAMY" Temple [1]. The period of
construction was between 15th and 16th century. Aanaiappa
Gnani reconstructed this temple. Under the rule of King
Naickers, the temple was developed more. In 1659, the
Ratham (the chariot) was constructed by Muthu Veerappa
Naicker. The Title Name 'KUTTY JAPAN' was given by
Mr.Jawaharlal Nehru (First Prime Minister of INDIA) to
Sivakasi. 'Kutty' in Tamil means Mini. So Kutty Japan, means
Mini Japan. During early 1960's India was under great famine
and lots and lots of people are unemployed and it was the
time, the people of Sivakasi came in hand in hand with each
other to promote themselves without expecting any aid from
the Government and stood on their own to achieve self reliant,
high industrial growth rate (especially Matches, Fireworks,
Printing and sub industries related to those industries). Until
1985 Sivakasi was a part of Ramanathapuram District. When
Ramanathapuram District was trifurcated Sivakasi became a
part of Virudhunagar District. It is 70Kms south of Madurai.
Sivakasi is a black soil plains region. The soils are of poor
productivity and are mainly black loamy soil (locally known
as (Karisal). Cotton, pulses, oilseeds and millets, which do not
require much irrigation, are the main crops grown. The
climate of the Sivakasi is semi-arid tropical monsoon type. It
has a high mean temperature and a low degree of humidity.
The temperatures range from 20° C to 37° C. April, May and
June are the hottest months of the year. Sivakasi receives
scanty rainfall with an annual average of 812 mm. The South
West monsoon which sets in June and lasts till August brings
scanty rain. The bulk of the rainfall is received during the
North East monsoon in the months of October, November and
December. Vembakottai Reservoir supplies the drinking water
to Sivakasi.
1.2 A History of Industries in Sivakasi
Like JAPAN (world leader in Electronics), Sivakasi is leader
for Printing, Fireworks, Safety matches Production. So the
name was given to Sivakasi. This happened only because of
the people of Sivakasi, who are more dedicated committed to
hard work and their togetherness to achieve attitude. The key
behind this success story of each and every Sivakasians is
"QUALITY with QUANTITY, HARD WORK &
Commitment to work, and Attitude of Togetherness. Hats off
especially to the Nadar Community whose contributions are
lot to this achievement. Like Ayya Nadar, Graha Durai Nadar,
Shanmuga Nadar, KAKA Kaliappa Nadar. In 1922 Mr.
P.Ayya Nadar and Mr. A.Shanmuga Nadar went to Calcutta
and learnt the art of safety matches manufacture. Next year
they established the company ‘The South India Lucifer Match
Industry’. It was the starting point of the modern
industrialized Sivakasi which caters safety matches, fireworks
and printing to the whole India. In turn, Sivakasi
Contributes 80 % of India's Total Safety Matches
Production
Contributes 90 % of India's Total Fireworks
Production
Contributes 60 % of India's Total Offset Printing
Solutions.
Is one of the high Sales / Excise / Customs Duty
paying town.
Is 100 % employment achieved town (which is
among a few towns in India rather world)
In Short, Sivakasi is a big industrial centre in Virudhunagar
district of Tamilnadu state in India and well known all over
India for its fireworks, safety matches and printing. Sivakasi
is one of the highest Sales / Excise / Customs Duty paying
towns in India. Enterprising and work conscious people of
Sivakasi have made it one of the leading industrial towns of
India in short span of time. Sivakasi is the town in India
where unemployment does not exist. On witnessing the
industriousness of Sivakasi people. Pandit Jawaharlal Nehru,
the first Prime Minister of India optly nick named Sivakasi as
"Mini Japan" (“Kutty Japan" in Tamil and "Chotta Japan" in
Hindi). Sivakasi is India’s fireworks hub. 90% of India's
fireworks is produced in Sivakasi. A not only firework,
Sivakasi is the hub of safety matches and offset printing
solutions also. 80% of India's safety matches are produced in
Sivakasi and 60% of India's offset printing solutions is
produced in Sivakasi [2].
1.3 A brief of Pyro industries in Sivakasi
Sivakasi is the natural choice for fireworks production. Low
rain fall and a dry climate prevailing in the Sivakasi area
contribute to unabated production. What could have been
consumed in three hours of the Diwali Day came to be
produced in 300 days, almost with overtime jobs throughout
the year. In Sivakasi the first fireworks industry was started in
the early 20th century. Having achieved a measure of success
in Safety Matches, Colour Matches and Star Matches, Mr. A
Shanmuga Nadar and Mr. Iya Nadar ventured upon the
making of sparklers –then the most popular item in the Small
Fireworks family, which were at the time imported from the
UK and Germany. The germinal seed for the making of
modern family Fireworks or Small Fireworks was planted in
the year 1934 when the Central Excise Duty on Matches was
promulgated. Until the outbreak of World War II in 1939,
there were only a handful of factories in Sivakasi, Trichur and
rimjalakuda in Kerala State. From 1938 to 1944 the import of
fireworks and firecrackers was obstructed by war. This
shortage gave a fillip to the indigenous industry, which was in
its infancy. During the year 1940, the Indian Explosives Rules
were enacted whereby a system of licensing was introduced
for manufacture, possession and sale. Thus came to be set up
in the year 1940 the first organized factory with several
precautions and safety measures. The shortage in the market
helped these, then seasonal, factories to work even during off-
season and build up stocks. With World War II coming to an
end and the gateway for import of raw materials having been
reopened, the indigenous industry enlarged itself. Not only the
existing factories broadened their efforts, there came into
existence several new units, of which National Fireworks,
Kaliswari Fireworks and Standard Fireworks were prominent
in the year 1942. These three factories started marketing their
products throughout the length and breadth of India. These
were later supplemented by new units at the average of 10 per
year. What started as I or 2 factories in 1923, rose to 3 in
1942, and by the year 1980 the number of factories had risen
to 189. By the end of 2011 the total number of factories was
850 in Sivakasi alone. Sivakasi is known throughout the world
for fireworks production. 90% of India’s fireworks is
produced here. The fireworks industry in Sivakasi is worth
between Rs 2000-6000 crore. The market for fireworks is
3. International Journal of Science and Engineering Applications
Volume 4 Issue 4, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 205
likely to grow at the rate of 10% per annum. There are nearly
850 fireworks factories giving direct employment to about
40,000 workers and about 4 lakh indirect such as paper tube
making, wire cutting, box making in the country side.
Fireworks in Sivakasi also produce Military Weapons training
items. They are used for training in armed forces. Some
airports are using Sivakasi rocket to scare away birds to avoid
bird hits of aircrafts.
2. APPLICATIONS OF ALUMINIUM
POWDERS IN PYRO TECHNOLOGY
Aluminium powders are used in pyro industries for the
manufacture of
Heavy Crackers
Garland Crackers
Wheels
Heavy Volcanoes
Aerial Display Fireworks
Pyrotechnic Aluminium powders are manufactured by Sri
Kaliswari Metal Powders Private Limited, Sivakasi. They are
the leading manufacturers of the following products:
Aluminium powders,
Aluminium paste,
Aluminium oxide powder,
Ferro aluminium powder,
Air atomized aluminium powder,
Pyrotechnic aluminium powder,
Cellular concrete aluminium powder and
Aluminium paste in MTO, naphtha, toluene &
xylene bases,
Aluminium oxide powder,
Industrial metal powder
3. MANUFACTURING PROCESSES
INVOLVED IN METAL POWDER
COMPANIES
The following processes are carried out in this manufacturing
company:
Pyrotechnic Aluminium Powder or foil is propelled
into a charging bin along with grease
The milling process is carried out in the ball mill
After a pre-determined time, the powder is
pneumatically driven into a cyclone
In the cyclone, the heavier particles get separated
and are returned to the ball mill for further milling.
SEM analysis of prepared powders
3.1 Ball Milling
Ball mill is an efficient tool for grinding many materials into
fine powder. The ball mill is used to grind many kinds of
mine and other materials. It is widely used in chemical
industry. There are two ways of grinding: dry process and the
wet process [2]. The ball mill is key equipment for regrinding.
It is widely used for the cement, the silicate product glass,
ceramics and etc. Here Aluminium trioxide nano material is
synthesized by using ball mill to convert micro particles to
nano particles.
The pulverisetie 6 planetary monomill is universally
applicable for quick dry or wet grinding of
inorganic and organic samples for analysis, auality
control, materials.
The sample material is crushed and disintegrated in
a grinding bowl by grinding balls.
The grinding balls and the material in the grinding
bowl are acted upon by the centrifugal forces due to
the rotation of the grinding bowl about its own axis
and due to the rotating supporting disc.
As a frictional effect, the grinding balls running
along the inner wall of the grinding bowl, and
impact effect, the balls impacting against the
opposite wall of the grinding bowl.
3.2 SEM Analysis of Alumina powders used
in Pyro Industries
Scanning electron microscopy uses a focused high energy
electron beam to image the surface of a variety of samples and
collect information on morphology and elemental composition
[3]. A scanning electron microscope is a highly versatile tool
and can be used to study biological specimens, geological
materials, nano particles, circuit boards, and many other
sample types [7]. A SEM consists of an electron gun, focusing
lenses, stage or specimen holder, and several types of
detectors. The electron gun contains a heated metallic
filament, usually tungsten, which provides the source of
electrons. These electrons are accelerated toward an anode
plate and then focused by condenser lenses and an objective
lens. A deflector coil causes the focused electron beam to be
scanned across the surface in a raster pattern [4].
There are two types of electron microscope – the scanning
electron microscope (SEM) and the scanning transmission
electron microscope (STEM). The samples must be
conducting (in order to accelerate electrons into the sample)
and hence a biological sample must have a gold layer
deposited on its surface if it is to be investigated by SEM or
STEM. In the STEM, the sample is a very thin specimen and
contrast within the image is due to the spatial variations in
intensity of the transmitted electron beam through the
specimen, as the beam is raster scanned over the specimen. In
SEM, the image may be produced in a number of ways from
variations in the intensity of secondary electrons back–
scattered from the specimen through to X-ray emission
produced by inelastic collisions of the primary beam with
bound electrons in the specimen [6]. The idea that gave rise to
the electron microscope is that, just as light is refracted and
focused by an optical lens, the electron, due to its charge, will
produced Cambridge Instruments Ltd.
The electrons are emitted by an incandescent cathode source,
accelerated towards more positive grids through either
electrostatic or magnetic field lens onto an object. The
specimen is supported on a very thin film to minimize the
scattering of the electrons as they pass through the sample.
Depending on the thickness and composition of the object, the
electron beam experiences different attenuation as a function
of position. The beam travels through two more lenses before
being imaged onto a fluorescent screen (in original models) or
photographic plate or directly onto a scintillator placed on the
face of a photomultiplier tube or a CCD device [5].
(A scintillator is a semi-transparent material, which emits a
flash of light when a charged particle traverses it) The spatial
resolution of this type of microscope is determined by the
wavelength associated with the electrons and this wavelength
may be 100,000 times smaller than optical wavelengths at the
typical accelerating voltages used in electron microscopy.
Figures 1 – 3 show the SEM images before ball mill whereas
figures 4 – 6 show the SEM images after ball mill of alumina
powders used in Pyro industries [8].
4. International Journal of Science and Engineering Applications
Volume 4 Issue 4, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 206
Figure 1
Figure 2
Figure 3
Figures 1 - 3 SEM analysis before ball mill
Figure 4
Figure 5
Figure 6
Figure 4 – 6 SEM Analysis after ball mill
5. International Journal of Science and Engineering Applications
Volume 4 Issue 4, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 207
4. PROBLEMS FACED BY INDUSTRIES
IN SIVAKASI
The most important problems faced by the pyro industries
present in Sivakasi are
1. Introduction of china crackers in Indian Market caused
some decrease in the manufacture of pyro products and selling
of pyro products.
2. Heavy summer in North India caused low pyro orders from
North Indians to celebrate Diwali with pyro products.
3. Small roads causing frequent traffic in Sivakasi
4. Accidents in Sivakasi due to fireworks causing fear among
the workers to work in pyro industries.
5. Poorly equipped Hospitals for the treatment of persons
affected by fire accidents.
6. Encroachments in roads present in Sivakasi causing heavy
traffic and congestion in the city for the workers and causing
road accidents in the city.
7. Poor infrastructure in the city to handle the road traffic and
persons affected by fire accidents.
8. People are affected by low income for their hard work.
North Indians are replacing the native workers present in
Sivakasi for low wages offered to them.
Government has to take necessary steps to improve the roads,
infrastructure of Sivakasi to avoid road accidents and death
caused by fire accidents during the movement of persons to
the Hospitals. Government has to take necessary steps to
improve the wages to the workers. Government has to extend
the roads, construct flyovers to avoid road accidents and to
avoid traffic in the city.
5. CONCLUSION
This paper has dealt with the important information about the
pyro industries present in Sivakasi. This paper has also
suggested some necessary steps to improve the quality of pyro
industries present in Sivakasi to avoid frequent accidents in
the plants. Workers have to be well equipped with necessary
development programmes and safety equipments to handle the
explosive elements present in the industries. Infrastructure in
Sivakasi has to be improved to avoid traffic, deaths during fire
accidents under their movement to hospitals by the small
roads present in the city. Hospitals should be well equipped
with fire treatment devices and medicines. The nano
technology would improve the quality and performance of
pyro industries present in Sivakasi.
6. REFERENCES
[1] http://www.sivakasionline.com
[2] http://www.kuttyjapan.com
[3] Edison Selvaraj. D, et.al “Estimation of Losses on
3Φ Nano Coated Induction Motor” Applied
Mechanics and Materials Vol.666 (2014) pp. 213-
217 (2014) Trans Tech Publications, Switzerland.
[4] Edison Selvaraj. D, Pugazhendhi Sugumaran. C,
Lieutenant Ganesan. J, Ramathilagam. J, “Analysis
of Dielectric and Thermal Properties of Polyamide
Enamel Filled with Carbon Nano tubes”
International Journal of Nano science, Vol.12,
Issue 3, June 2013.
[5] Edison Selvaraj, D., C. Pugazhendhi Sugumaran,
and A. Sivaprakash "Characterization of
Electrical and Thermal Properties of Enamel
Filled with Carbon Nanotubes", Proceedings of the
Third International Conference on Trends in
Information, Telecommunication and Computing,
Springer New York, 2013.
[6] Selvaraj, D. E., Priyan, S. S., Joshi, M. R.,
Sugumaran, C. P., Kannan, R., Raj, R. A., Kumar,
B. M., Prakash, R., Ganesan, J., Krishnamoorthi, D.,
& Kumar M. R, “A Review on The Nano Fillers
Used for Electrical Apparatuses”, Journal Club for
Electrical Engineering (JCEE), Vol.1, Issue 1, pp 8 -
17, Aug 2014.
[7] Selvaraj, E. D., Priyan, S. S., Joshi, M. R.,
Sugumaran, C. P., Kumar, B. A., Kumar, M. A.,
Kumar, S. A., Khan, A. H., Kannan, R., Ganesan, J.,
Kumar, R., Kumar S. D, “A Review on the
Fabrication Methods Used in Nano Technology for
The Fabrication of Nano Fillers Used in Electrical
Apparatuses”, Journal Club for Electrical
Engineering (JCEE), Vol.1, Issue 1, pp , Aug 2014.
[8] Joshi MR Selvaraj DE, Kumar GS, Mohan BR,
Sugumaran CP, Kumar RM, Ganesan J, “A Lecture
Notes for Understanding the Fundamentals of
Fabrication of Nano Fillers”, Journal Club for
Electrical Engineering (JCEE), Vol.1, Issue 2, pp 1 -
16, Oct 2014.