The document summarizes some results on comparing the growth properties of maximum terms of compositions of entire functions.
It defines key concepts like order and lower order of entire functions. It presents three lemmas relating the maximum terms of compositions to the maximum terms of their factors. The main result is Theorem 1, which states that for entire functions f and g where f has positive lower order and g has positive lower order, the ratio of the maximum terms of their composition to that of f approaches infinity as r approaches infinity. This provides a comparison of the relative growth rates of the maximum terms.
This document discusses organizing structures for understanding the category of modules Mod-R over a ring R. It describes how the Zariski spectrum constructed from R gives insight into Mod-R, and defines the rep-Zariski spectrum ZarR of R using indecomposable pure-injective R-modules. It then constructs a sheaf of categories LDefR over ZarR to associate a "categoried space" to R, providing more structure than just considering injective R-modules. Finally, it notes an equivalence between small abelian categories and deinable categories.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
1. The coordinates of point M are (2, -3) and the gradient of the straight line MN is -2.
2. The coordinates of point N could be determined based on the information provided about point M and the gradient of line MN.
3. Find the y-intercept of the straight line PQ in Diagram 15.
This document discusses arrays and strings in Java. It covers one-dimensional and two-dimensional arrays, ArrayLists, methods for arrays like sort() and binarySearch(), and enum types. For strings, it explains string methods such as equals(), compareTo(), concat(), substring(), replace(), toUpperCase(), and indexOf(). It also covers StringBuffers and StringBuilders.
GROUPOIDS, LOCAL SYSTEMS AND DIFFERENTIAL EQUATIONSHeinrich Hartmann
This document discusses groupoids, local systems, and their relationships to differential equations on manifolds. Some key points:
1) Groupoids generalize groups by allowing multiple objects and isomorphisms between them. Representations of groupoids correspond to local systems on manifolds.
2) Local systems on a manifold X are sheaves of vector spaces that are locally isomorphic to a constant sheaf. They correspond to representations of the fundamental groupoid of X.
3) Vector bundles with connections on a Riemann surface B are equivalent to local systems on B. Global sections of bundles generate differential equations, whose solutions can be studied via the bundle's local system or groupoid representation.
Characteristics of Feed grizzly
1.Smooth vibration
2.Reliable operation
3.Long service life
4.Low noise
5.Low power consumption
6.Easy to adjust
7.Simple structure
8.Easy to install
9.Light weight
10.Small volume
11.Simple maintenance
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
This document discusses organizing structures for understanding the category of modules Mod-R over a ring R. It describes how the Zariski spectrum constructed from R gives insight into Mod-R, and defines the rep-Zariski spectrum ZarR of R using indecomposable pure-injective R-modules. It then constructs a sheaf of categories LDefR over ZarR to associate a "categoried space" to R, providing more structure than just considering injective R-modules. Finally, it notes an equivalence between small abelian categories and deinable categories.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
1. The coordinates of point M are (2, -3) and the gradient of the straight line MN is -2.
2. The coordinates of point N could be determined based on the information provided about point M and the gradient of line MN.
3. Find the y-intercept of the straight line PQ in Diagram 15.
This document discusses arrays and strings in Java. It covers one-dimensional and two-dimensional arrays, ArrayLists, methods for arrays like sort() and binarySearch(), and enum types. For strings, it explains string methods such as equals(), compareTo(), concat(), substring(), replace(), toUpperCase(), and indexOf(). It also covers StringBuffers and StringBuilders.
GROUPOIDS, LOCAL SYSTEMS AND DIFFERENTIAL EQUATIONSHeinrich Hartmann
This document discusses groupoids, local systems, and their relationships to differential equations on manifolds. Some key points:
1) Groupoids generalize groups by allowing multiple objects and isomorphisms between them. Representations of groupoids correspond to local systems on manifolds.
2) Local systems on a manifold X are sheaves of vector spaces that are locally isomorphic to a constant sheaf. They correspond to representations of the fundamental groupoid of X.
3) Vector bundles with connections on a Riemann surface B are equivalent to local systems on B. Global sections of bundles generate differential equations, whose solutions can be studied via the bundle's local system or groupoid representation.
Characteristics of Feed grizzly
1.Smooth vibration
2.Reliable operation
3.Long service life
4.Low noise
5.Low power consumption
6.Easy to adjust
7.Simple structure
8.Easy to install
9.Light weight
10.Small volume
11.Simple maintenance
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Propel Industries is a group company of OPEL group located in South India. It manufactures crushing equipment such as jaw crushers, cone crushers, and vertical shaft impactors. Propel started as a joint venture with an Italian firm and has grown to become a leading manufacturer of mining and material handling equipment in South India. It has received awards from major customers for its products and services. Propel aims to expand globally while ensuring social, environmental and legal responsibilities.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
nternational Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Design Modification of Failure Mode Effect Analysis of Vibrating Feeder used ...ijsrd.com
Vibratin feeder technology is common in material handling applications in numerous industries. This review paper examines a problem with fatigue in the support structure of a specific type of vibrating feeder. It also reviews the theory behind vibrating feeder technology and considerations that engineers who design them need to be aware of. The finite element method is used to replicate a fatigue problem in the support structure and various design configurations are then analyzed to reduce the risk of the conditions that caused the fatigue. The results are reviewed and recommendations are made to improve the design and modify the component dimensional parameters vibrating feeder.
The document describes the features and specifications of a heavy-duty aggregate screen. It details the reinforced plate and liner construction, dual eccentric drive system, oil-bath bearings, tension rail design, and other components that enable it to withstand heavy loads and require low maintenance. The screen can accommodate different media types on its modular deck sections and has adjustable eccentric weights to control the vibration level.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
A vibrating feeder conveys material through a trough or pan by imparting vibrational motion. There are two main types - direct force exciter and unbalanced motor. The direct force exciter uses rotating unbalanced weights to generate transverse and longitudinal vibration. Capacity is calculated based on material density, flow area, velocity, and inclination. Motor power is determined by vibrating weight, amplitude, RPM, and locked rotor torque ratio. Vibrating feeders are used to convey material from bins or hoppers in a controlled flow.
This document is a 15 sheet engineering drawing for a steel hopper structure. It includes a title block with project information, various views and sections of the structure, and a table identifying 26 items with descriptions and dimensions. The structure is to be fabricated from steel beams, plates, and other structural sections according to the specifications and tolerances provided.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Propel Industries is a group company of OPEL group located in South India. It manufactures crushing equipment such as jaw crushers, cone crushers, and vertical shaft impactors. Propel started as a joint venture with an Italian firm and has grown to become a leading manufacturer of mining and material handling equipment in South India. It has received awards from major customers for its products and services. Propel aims to expand globally while ensuring social, environmental and legal responsibilities.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
nternational Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Design Modification of Failure Mode Effect Analysis of Vibrating Feeder used ...ijsrd.com
Vibratin feeder technology is common in material handling applications in numerous industries. This review paper examines a problem with fatigue in the support structure of a specific type of vibrating feeder. It also reviews the theory behind vibrating feeder technology and considerations that engineers who design them need to be aware of. The finite element method is used to replicate a fatigue problem in the support structure and various design configurations are then analyzed to reduce the risk of the conditions that caused the fatigue. The results are reviewed and recommendations are made to improve the design and modify the component dimensional parameters vibrating feeder.
The document describes the features and specifications of a heavy-duty aggregate screen. It details the reinforced plate and liner construction, dual eccentric drive system, oil-bath bearings, tension rail design, and other components that enable it to withstand heavy loads and require low maintenance. The screen can accommodate different media types on its modular deck sections and has adjustable eccentric weights to control the vibration level.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
A vibrating feeder conveys material through a trough or pan by imparting vibrational motion. There are two main types - direct force exciter and unbalanced motor. The direct force exciter uses rotating unbalanced weights to generate transverse and longitudinal vibration. Capacity is calculated based on material density, flow area, velocity, and inclination. Motor power is determined by vibrating weight, amplitude, RPM, and locked rotor torque ratio. Vibrating feeders are used to convey material from bins or hoppers in a controlled flow.
This document is a 15 sheet engineering drawing for a steel hopper structure. It includes a title block with project information, various views and sections of the structure, and a table identifying 26 items with descriptions and dimensions. The structure is to be fabricated from steel beams, plates, and other structural sections according to the specifications and tolerances provided.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewIJERD Editor
Reinforced concrete frame buildings are becoming increasingly common in urban India. Many such
buildings constructed in recent times have a special feature – the ground storey is left open for the purpose of
parking, i.e., columns in the ground floor do not have any partition walls (of either masonry or
Reinforced concrete) between them. Such buildings are often called open ground storey buildings. The
relative horizontal displacement in the ground storey is much larger than storeys above it. The total horizontal
earthquake force it can carry in the ground storey is significantly smaller than storeys above it. The soft or weak
storey may exist at any storey level other than ground storey level. The presence of walls in upper storeys
makes them much stiffer than the open ground storey. Still Multi storey reinforced concrete buildings are
continuing to be built in India which has open ground storeys. It is imperative to know the behavior of
soft storey building to the seismic load for designing various retrofit strategies. Hence it is important to
study and understand the response of such buildings and make such buildings earthquake resistant based
on the study to prevent their collapse and to save the loss of life and property.
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsIJERD Editor
This Research work was done to find out the impact of AMS 4928 standard heat treatment on
Selective Laser Melted (SLM) Ti-6Al-4V Grade 23 alloy. Ti-6Al-4V Grade 23 is an Extra Low Interstitial
version of Ti alloy with lower impurities and is α+β type alloy at room temperature. SLM is one type of method
in Additive Manufacturing based on Powder bed system. Each powder layer of few microns is coated and a laser
beam is scanned to melt the metal powder according to the specification of the part and subsequently moved
downwards layer by layer. The test coupons were first heat treated according to the above mentioned standard.
The tensile testing and the microstructural analysis were done to compare the results with that of mentioned in
the AMS 4928.The yield stress andPercentage elongation in the test coupons achieved are better than the
minimum requirement by AMS 4928 standard. Coarse lamellar grain structures were obtained with no
continuous network of alpha at prior beta grain boundaries.
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...IJERD Editor
Evaporation is one of treatment alternatives of waste water from condensation of vapour in flue gas
or from flue gas scrubber system of an incinerator. The waste water contains tar and heavy metals which are
toxic and must be separated, before discharged to environment or recycled. Due to the relatively low efficiency
of the evaporation process, a combination of the evaporation-absorption process is developed to increase the
efficiency. The aim of this research is to study the separation efficiency of tar from the tar-water mixture from
organic fraction incineration of garbage by evaporation-absorption process, and compared it with the
evaporation process. The evaporation process was performed by evaporating the waste water directly, while the
evaporation-absorption process was carried out by evaporating the waste water before it had been mixed with
palm oil as an absorbent. The results showed that the efficiency to separate the heavy tar of the evaporation
process was 73.27% compared to the combination of evaporation-absorption that was 98.82%. Meanwhile, for
the separation of the light tar, the efficiencies of both process types were almost the same. This system can be
integrated with the incinerator for the treatment of flue gases and waste water generated from the burning of
organic fraction of MSW
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...IJERD Editor
This document describes a content-based video retrieval system that extracts features from videos and uses those features to retrieve matching videos from a database. The system first segments videos into frames, applies optical character recognition (OCR) to extract text and automatic speech recognition (ASR) to extract keywords. It then extracts additional low-level visual features like color, texture and edges. All the extracted keywords and features are stored in a database. When a query video is input, the same features are extracted and used to search the database for similar videos. The results are then re-ranked based on the user's past viewing history to personalize the results. The system is evaluated on a database of 15 videos and is able to retrieve matching videos
Planar Internal Antenna Design for Cellular Applications & SAR AnalysisIJERD Editor
This paper presents a new design of direct-fed Multi band printed Planar Internal Antenna (PIA), for
cellular applications. The PIA antenna is composed of ground plane, meander radiating strip and two other
parasitic strips are printed on a common substrate. The designed antenna has been simulated in CST
environment. The simulated results for the resonant frequency, return loss, radiation pattern and gain are
presented and discussed. The bandwidths for three resonance achieved on the basis of -6 dB return loss.These
Bandwidths can be utilized for GSM 900, GSM 1800, GSM 1900, LTE 2300 and Bluetooth/WLAN as an
acceptable reference in mobile phones applications. Further the antenna was placed in proximity to the SAR
head on CST environment. The simulated results of SAR analysis are presented in this paper with acceptable
range.
Intelligent learning management system startersIJERD Editor
learning management system (lms) is increasingly gaining popularity in the academic community as
a means of delivering e-learning contents. Simply placing lecture notes and videos among other contents on
lmss do not particularly train the best. This situation could be improved with intelligent tutoring systems (itss)
integration into preferred lms to make it more adaptive and effective, through enhanced student participation
and learning. This work aims, therefore, to create a starter model and a model java its integrated preferred lms.
The its integrated lms starter model was proposed through augmentation and a fluid iterative cycle of
awareness, suggestion, development, evaluation and conclusion. Known open/inexpensive, tried and tested
popular lmss were evaluated at cms matrix site, and complemented. Java its integrated moodle (preferred),
employing certain architectural framework of its integrated lms, was created following the spiral model of
software development
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) techniqueIJERD Editor
In order to increase power system stability and reliability during and after disturbances, power grid
global and local controllers must be developed. SCADA system provides steady and low sampling density. To
remove these limitation PMUs are being rapidly adopted worldwide. Dynamic states of power system can be
estimated using EKF. This requires field excitation as input which may not available. As a result, the EKF with
unknown inputs proposed for identifying and estimating the states and the unknown inputs of the synchronous
machine.
Experimental Study of Material Removal Efficiency in EDM Using Various Types ...IJERD Editor
The machining process in electrical discharge machining (EDM) consists of a melting process and a
removal process. A region of the workpiece surface heated by the discharge plasma is melted and a portion of
the melted region is removed from the workpiece body. The rest of the melted region remains on the workpiece
surface and re-solidified as a white layer. In previous research, to evaluate the removal ability, a ratio of the
removal volume to the melted volume is defined as the material removal efficiency.
In this study, the material removal efficiency was investigated to develop an understanding of the
machining mechanism in EDM. As a result of experiments, it is found that the material removal efficiencies
show almost the same value, whereas the removal volume varies with the type of dielectric oil or the discharge
duration. To advance the study about the machining mechanism in EDM, the simulation for the workpiece
temperature distribution, considering the effect of the type of dielectric oil or the discharge duration, should be
conducted further
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...Aleksey Savkin
The Strategy Implementation System offers a structured approach to translating stakeholder needs into actionable strategies using high-level and low-level scorecards. It involves stakeholder analysis, strategy decomposition, adoption of strategic frameworks like Balanced Scorecard or OKR, and alignment of goals, initiatives, and KPIs.
Key Components:
- Stakeholder Analysis
- Strategy Decomposition
- Adoption of Business Frameworks
- Goal Setting
- Initiatives and Action Plans
- KPIs and Performance Metrics
- Learning and Adaptation
- Alignment and Cascading of Scorecards
Benefits:
- Systematic strategy formulation and execution.
- Framework flexibility and automation.
- Enhanced alignment and strategic focus across the organization.
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
Easily Verify Compliance and Security with Binance KYCAny kyc Account
Use our simple KYC verification guide to make sure your Binance account is safe and compliant. Discover the fundamentals, appreciate the significance of KYC, and trade on one of the biggest cryptocurrency exchanges with confidence.
Starting a business is like embarking on an unpredictable adventure. It’s a journey filled with highs and lows, victories and defeats. But what if I told you that those setbacks and failures could be the very stepping stones that lead you to fortune? Let’s explore how resilience, adaptability, and strategic thinking can transform adversity into opportunity.
Storytelling is an incredibly valuable tool to share data and information. To get the most impact from stories there are a number of key ingredients. These are based on science and human nature. Using these elements in a story you can deliver information impactfully, ensure action and drive change.
Industrial Tech SW: Category Renewal and CreationChristian Dahlen
Every industrial revolution has created a new set of categories and a new set of players.
Multiple new technologies have emerged, but Samsara and C3.ai are only two companies which have gone public so far.
Manufacturing startups constitute the largest pipeline share of unicorns and IPO candidates in the SF Bay Area, and software startups dominate in Germany.
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
1. International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 10 (June 2012), PP.56-64
www.ijerd.com
Some Comparative Growth Properties of Entire Functions with
Zero Order as Defined by Datta and Biswas
Sanjib Kumar Datta1, Tanmay Biswas2, Soumen Kanti Deb3
1
Department of Mathematics, University of Kalyani, Kalyani, Dist-Nadia, PIN- 741235, West Bengal, India.
2
Rajbari, Rabindrapalli, R. N. Tagore Road, P.O. Krishnagar, Dist-Nadia, PIN- 741101, West Bengal, India.
3
Bahin High School, P.O. Bahin, Dist-Uttar Dinajpur, PIN- 733157, West Bengal, India.
Abstract—In this paper we compare the maximum term of composition of two entire functions with their corresponding left
and right factors.
AMS Subject Classification (2010): 30D35, 30D30.
Keywords— Entire function, maximum term, composition, growth.
I. INTRODUCTION, DEFINITIONS AND NOTATIONS
Let f be an entire function defined in the open complex plane . The maximum term (r , f ) of
f a n z n on z r is defined by (r , f ) max ( an r n ) . To start our paper we just recall the following
n 0
n 0
definitions.
Definition 1 The order f and lower order f of an entire function f is defined as follows:
log [ 2] M (r , f ) log [ 2] M (r , f )
f lim sup and f lim inf
r log r r log r
where
log [ k ] x log(log [ k 1] x) for k 1,2,3,... and log [ 0] x x.
If f then f is of finite order. Also f 0 means that f is of order zero. In this connection Liao and
Yang [2] gave the following definition.
Definition 2 [2]Let f be an entire function of order zero. Then the quantities * and *f
f of an entire function f are
defined as:
log [ 2] M (r , f ) log [ 2] M (r , f )
* lim sup
f and *f lim inf .
r log [ 2] r r log [ 2] r
Datta and Biswas [1] gave an alternative definition of zero order and zero lower order of an entire function in the
following way:
Definition 3 [1] Let f be an entire function of order zero. Then the quantities ** and *f* of f
f are defined by:
log M (r , f ) log M (r , f )
** lim sup
f and *f* lim inf .
r log r r log r
Since for 0 r R,
(r , f ) M (r , f )
R
( R, f ) {cf .[4]} 1
Rr
it is easy to see that
56
2. Some Comparative Growth Properties of Entire Functions with Zero Order as....
log [ 2] (r , f ) log [ 2] (r , f )
f lim sup , f lim inf
r log r r log r
log [ 2] (r , f ) log [ 2] (r , f )
* lim sup
f , *f lim inf
r log [ 2] r r log [ 2] r
and
log (r , f ) log (r , f )
** lim sup
f , *f* lim inf .
r log r r log r
In this paper we investigate some aspects of the comparative growths of maximum terms of two entire functions
with their corresponding left and right factors. We do not explain the standard notations and definitions on the theory of
entire function because those are available in [5].
II. LEMMAS
In this section we present some lemmas which will be needed in the sequel.
Lemma 1 [3] Let f and g be two entire functions withg (0) 0. Then for all sufficiently large values of r ,
1 1 r
(r , f g ) ( ( , g ) g (0) , f ).
4 8 4
Lemma 2 [3] Let f and g be two entire functions. Then for every 0 and 0 r R,
R
(r , f g ) ( ( R, g ), f ).
1 R r
Lemma 3 [1] Let f and g be two entire functions such that f and g 0. then fog .
III. THEOREMS
In this section we present the main results of the paper.
Theorem 1 Let f and g be two entire functions with 0 *f* ** and g 0 . Then for any A 0,
f
log (r , f g )
lim .
log (r A , f )
r
Proof. In view of Lemma 1 we obtain for all sufficiently large values of r ,
1 1 r
log (r , f g ) log{ ( ( , g ), f )}
4 8 4
1 r
i.e., log (r , f g ) (*f* ) log{ ( , g )} O(1)
8 4
r
i.e., log (r , f g ) (*f* ) log ( , g ) O(1)
4
g
r
i.e., log (r , f g ) ( ) **
f O(1) . (2)
4
Again from the definition of ** we have for arbitrary positive and for all sufficiently large values of r ,
f
log (r A , f ) A( ** ) log r .
f (3)
Therefore it follows from (2) and (3) for all sufficiently large values of r that
57
3. Some Comparative Growth Properties of Entire Functions with Zero Order as....
g
r
( ) **
O(1)
log (r , f g )
f
4
log (r A , f ) A( ** ) log r
f
log (r , f g )
i.e., lim .
r log (r A , f )
This completes the proof.
Remark 1 If we take g 0 instead of g 0 in Theorem 1 and the other conditions remain the same, then in the line
of Theorem 1 one can easily verify that
log (r , f g )
lim sup ,
r log (r A , f )
where A 0.
Remark 2 Also if we consider 0 *f* or 0 ** instead
f of 0 *f* ** in Theorem 1 and the
f
other conditions remain the same, then in the line of Theorem 1 one can easily verify that
log (r , f g )
lim sup ,
r log (r A , f )
where A 0.
Theorem 2 Let f and g be two an entire functions such that 0 *f* and 0 g g . Then
log (r , f g )
lim ,
r log [ 2 ] ( r A , g )
where A 1,2,3... .
Proof. Since g is the order of g , for given and for all sufficiently large values of r we get from the definition of
order that
log [ 2] (r A , g ) A( g ) log r . (4)
Now we obtain from (2) and (4) for all sufficiently large values of r that
g
r
(*f* ) O(1)
log (r , f g ) 4
. (5)
log [ 2] (r A , g ) A( g ) log r
As g 0 , the theorem follows from (5) .
Remark 3 If we take 0 ** instead of 0 *f* in Theorem 2 and the other conditions remain the same, then
f
in the line of Theorem 2 one can easily verify that
log (r , f g )
lim sup ,
r log [ 2] (r A , g )
where A 1,2,3... .
58
4. Some Comparative Growth Properties of Entire Functions with Zero Order as....
Remark 4 Also if we consider 0 g . or 0 g . instead of 0 g g . in Theorem 2 and the
other conditions remain the same, then in the line of Theorem 2 one can easily verify that
log (r , f g )
lim sup ,
r log [ 2] (r A , g )
where A 1,2,3... .
Theorem 3 Let f and g be two an entire functions such that 0 f f . and g* . Then
*
log [ 2] (r , f g )
lim sup 0,
r log (r A , f )
where A 1,2,3... .
Proof. By Lemma 2 and Lemma 3 we get for all sufficiently large values of r that
R
log [ 2] (r , f g ) log [ 2] ( ( R, g ), f ) O(1)
Rr
R
i.e., log [ 2] (r , f g ) ( f ) log ( R, g ) O(1)
Rr
i.e., log (r, f g ) ( f ) log ( R, g ) O(1)
[ 2]
i.e., log [ 2] (r, f g ) ( f )( g* ) log R O(1).
*
(6)
Again from the definition of f we have for arbitrary positive and for all sufficiently large values of r,
log [ 2] (r A , f ) A( f ) log r
i.e., log (r A , f ) r
A( f )
. 7
Therefore it follows from (6) and (7) for all sufficiently large values of r that
log [ 2] (r , f g ) ( f )( g ) log R O(1)
**
A( )
. (8)
log (r A , f ) r f
As f 0 , the theorem follows from (8) .
Remark 5 If we take 0 f or 0 f instead of 0 f f in Theorem 3 and the other
conditions remain the same, then in the line of Theorem 3 one can easily verify that
log [ 2] (r , f g )
lim inf 0,
r log (r A , f )
where A 1,2,3... .
Remark 6 Also if we take ** . instead of g* . in Theorem 3 and the other conditions remain the same, then in
g
*
the line of Theorem 3 one can easily verify that
log [ 2] (r , f g )
lim inf 0,
r log (r A , f )
where A 1,2,3... .
59
5. Some Comparative Growth Properties of Entire Functions with Zero Order as....
Theorem 4 Let f and g be two an entire functions such that 0 *f* ** and g* 0. Then
f
*
log (r , f g ) f g
** **
lim sup ,
r log (r A , f ) A **
f
where A 1,2,3... .
Proof. Suppose 0 min{*f* , g* }.
*
Now from Lemma 1 we have for a sequence of values of r tending to infinity that
1 1 r
log (r , f g ) log{ ( ( , g ), f )}
4 8 4
1 r
i.e., log (r , f g ) (*f* ) log{ ( , g )} O(1)
8 4
1 r
i.e., log (r , f g ) (*f* ) log (*f* ) log ( , g ) O(1)
8 4
r
i.e., log (r , f g ) (*f* )( g* ) log O(1)
*
4
i.e., log (r, f g ) ( f )( g ) log r O(1) .
** **
(9)
So combining (3) and (9) we get for a sequence of values of r tending to infinity that
log (r , f g ) ( f )( g ) log r O(1)
** **
log (r A , f ) A( ** ) log r
f
log (r , f g ) f g
** **
i.e., lim sup .
r log (r A , f ) A **
f
This completes the proof.
Remark 7 Under the same conditions of Theorem 4 if *f* ** ,then
f
log (r , f g ) g
**
lim sup .
r log (r A , f ) A
Remark 8 In Theorem 4 if we take ** 0 instead of g* 0 and the other conditions remain the same then it can be
g
*
shown that
log (r , f g ) f g
** **
lim inf .
r log (r A , f ) A **
f
In addition if *f* ** , then
f
log (r , f g ) g
**
lim inf .
r log (r A , f ) A
Remark 9 Also if we consider 0 *f* or 0 ** instead
f of 0 *f* ** in Theorem 4 and the
f
other conditions remain the same, then one can easily verify that
60
6. Some Comparative Growth Properties of Entire Functions with Zero Order as....
log (r , f g ) g
**
lim sup .
r log (r A , f ) A
Theorem 5 Let f and g be two an entire functions such that 0 ** g* and ** 0. Then
g
*
f
log (r , f g ) f g
** **
lim sup ,
r log (r A , g ) A g*
*
where A0.
Proof. Let us choose in such a way that 0
min{ ** , ** }.
f g
Now from Lemma 1 we have for a sequence of values of r tending to infinity that
1 1 r
log (r , f g ) log{ ( ( , g ), f )}
4 8 4
1 r
i.e., log (r , f g ) ( ** ) log{ ( , g )} O(1)
f
8 4
1 r
i.e., log (r , f g ) ( ** ) log ( ** ) log ( , g ) O(1)
f f
8 4
r
i.e., log (r , f g ) ( ** )(** ) log O(1)
f g
4
i.e., log (r, f g ) ( f )( g ) log r O(1) .
** **
(10)
Also we have for all sufficiently large values of r,
log (r A , g ) A( g* ) log r .
*
(11)
Therefore from (10) and (11) we get for a sequence of values of r tending to infinity that
log (r , f g ) ( f )( g ) log r O(1)
** **
log (r A , g ) A( g* ) log r
*
log (r , f g ) f g
** **
i.e., lim sup .
r log (r A , g ) A g*
*
This proves the theorem.
Remark 10 Under the same conditions of Theorem 5 if ** g* ,
g
*
then
log (r , f g ) f
**
lim sup .
r log (r A , g ) A
Remark 11 In Theorem 5 if we take *f* 0. instead of ** 0. and the other conditions remain the same then it can
f
be shown that
log (r , f g ) f g
** **
lim inf ,
r log (r A , g ) A g*
*
In addition if ** g* , then
g
*
61
7. Some Comparative Growth Properties of Entire Functions with Zero Order as....
log (r , f g ) f
**
lim inf .
r log (r A , g ) A
Remark 12 Also if we consider 0 ** or 0 g* instead of 0 ** g* in Theorem 5 and the
g
*
g
*
other conditions remain the same, then one can easily verify that
log (r , f g ) f
**
lim sup .
r log (r A , g ) A
Theorem 6 Let f and g be two an entire functions such that 0 *f* ** and g* 0. Then
f
*
log (r , f g ) f g
** **
lim sup ,
r log (r A , f ) A*f*
where A 1,2,3... .
Proof. From the definition of *f* we have for arbitrary positive and for all sufficiently large values of r,
log (r A , f ) A( ** ) log r .
f (12)
Again by Lemma 2 it follows for all sufficiently large values of r that
R
log (r , f g ) log ( R, g ), f O(1)
Rr
R
i.e., log (r , f g ) ( ** ) log ( R, g ) O(1)
Rr
f
i.e., log (r, f g ) ( f ) log ( R, g ) O(1)
**
i.e., log (r, f g ) ( ** )( g* ) log R O(1).
f
*
(13)
Now combining (12) and (13) we get for all sufficiently large values of r,
log (r , f g ) ( f )( g ) log R O(1)
** **
log (r A , f ) A( ** ) log r
f
log (r , f g ) f g
** **
i.e., lim sup .
r log (r A , f ) A*f*
This completes the proof.
Similarly we may state the following theorem without proof for the right factor g of the composite function
f g:
Theorem 7 Let f and g be two an entire functions such that ** and 0 ** g* . Then
f g
*
log (r , f g ) f g
** **
lim sup ,
r log (r A , g ) A**g
where A 1,2,3... .
Remark 13 Under the same conditions of Theorem 6 if *f* ** ,
f then
62
8. Some Comparative Growth Properties of Entire Functions with Zero Order as....
log (r , f g ) g
**
lim sup .
r log (r A , f ) A
Remark 14 In Theorem 6 if we take ** 0 instead of g* 0 and the other conditions remain the same then it can be
g
*
shown that
log (r , f g ) f g
** **
lim inf ,
r log (r A , f ) A*f*
In addition if *f* ** , then
f
log (r , f g ) g
**
lim inf .
r log (r A , f ) A
Remark 15 If we take 0 *f* or 0 ** instead
f of 0 *f* ** in
f Theorem 6 and the other
conditions remain the same, then one can easily verify that
log (r , f g ) g
**
lim inf .
r log (r A , f ) A
Remark 16 Under the same conditions of Theorem 7 if ** g* , then
g
*
log (r , f g ) f
**
lim sup .
r log (r A , g ) A
Remark 17 In Theorem 7 if we take *f* instead of ** and the other conditions remain the same then it can be
f
shown that
log (r , f g ) f g
** **
lim inf ,
r log (r A , g ) A**g
In addition if ** g* , then
g
*
log (r , f g ) f
**
lim inf .
r log (r A , g ) A
Remark 18 If we take 0 ** or 0 g* instead
g
*
of 0 ** g* in
g
*
Theorem 7 and the other
conditions remain the same, then one can easily verify that
log (r , f g ) f
**
lim inf .
r log (r A , g ) A
63
9. Some Comparative Growth Properties of Entire Functions with Zero Order as....
REFERENCES
[1]. S.K. Datta and T. Biswas, On the definition of a meromorphic function of order zero, Int. Math. Forum, Vol.4,
No. 37(2009) pp.1851-1861.
[2]. L. Liao and C. C. Yang, On the growth of composite entire functions, Yokohama Math. J., Vol. 46(1999), pp. 97-
107.
[3]. A. P. Singh, On maximum term of composition of entire functions, Proc. Nat. Acad. Sci. India, Vol. 59(A), Part I
(1989), pp. 103-115.
[4]. A. P. Singh and M. S. Baloria, On maximum modulus and maximum term of composition of entire functions,
Indian J. Pure Appl. Math., Vol. 22(1991), No 12, pp. 1019-1026.
[5]. G. Valiron, Lectures on the general theory of integral functions, Chelsea Publishing Company (1949).
64