The current issue of the journal read...
All you need to know in order to publish in our journal read...
Here you can submit your paper continue...
If anybody want to get in touch with us or submit article in Reseach Inventy please mail on : Inventy.email@example.com
Vol ||1|| Issue || 12 ||
Key words: Compressive strength, Flexural strength, Hooked end steel fiber, Optimum Value, Steel fiber reinforced concrete, Workability.
. N. Janesan, P. V. Indira and S. Rajendra Prasad, 2010: "Structural behaviour of steel fibre reinforced concrete wall panels in two-way is plane action." Indian concrete journal.
. Rui D. Neves and Joao C. O. Fernandes de Almeida, 2005. "Compressive behaviour of steel fibre reinforced concrete", structural concrete. 2005-06. No. 1.
. Indian standard code of practice for specification for coarse and fine aggregate from natural sources for concrete, IS 383: (1970), Bureau of Indian standards, New Delhi.
. Indian standard code of practice for recommended guidelines for concrete mix design, IS 10262: 2009, Bureau of Indian standards, New Delhi.
. Indian standard code of practice for plain and reinforced concrete IS 456: 2000, Bureau of Indian standards, New Delhi.
Keywords – Management Information System, Blood Bank
 J. Scott Armstrong (1986). "The Value of Formal Planning for Strategic Decisions: A Reply". Strategic Management Journal 7: 183–185.
 Polack, Jennifer (December 2009). "Planning a CIS Education Within a CS Framework". Journal of Computing Sciences in Colleges 25 (2): 100–106. ISSN 1937-4771.
 Hayes, Helen; Onkar Sharma (February 2003). "A decade of experience with a common first year program for computer science, information systems and information technology majors". Journal of Computing Sciences in Colleges 18 (3): 217–227. ISSN 1937-4771. "In 1988, a degree program in Computer Information Systems (CIS) was launched with the objective of providing an option for students who were less inclined to become programmers and were more interested in learning to design, develop, and implement Information Systems, and solve business problems using the systems approach".
 Cohen MA, Pierskalla WP: Management policies for a regional blood bank. Transfusion 1975; 15:58–67
 Cohen MA, Pierskalla WP: Target inventory levels for a hospital blood bank or a decentralized regional blood banking system. Transfusion 1979;19:444–454
Keywords: Bulk Material Handling System, Skills, Return on Investment on Skilling,
. Encyclopedia Britannica
. K. Gopal, Director – Sales. TAKRAF India Pvt. Ltd
. Mike Ogle Material Handling Industry of America
. Pitt-Catsouphes, M., M. A. Smyer, C. Matz-Costa, and K. Kane. 2007. The National Study Report: Phase II of the National Study of Business Strategy and Workforce Development. The Center on Aging & Work/Workplace Flexibility Research Highlight No. 04.http://agingandwork.bc.edu/documents/RH04_NationalStudy_03-07_004.pdf
. Shomnit Sengupta Foie- Grass- like Training
Keywords: Feature Extraction, Feature Integration, Image Retrieval, Image Mining
. A.W.M. Smeulders, et. al. Content-based imageretrieval at the end of the early years, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 12,2000, pp. 1349.
. Castelli, V. and Bergman, L. D., Image Databases: Search and Retrieval of Digital Imagery, 2001, John Wiley & Sons, Inc.
. Craig Nevill-Manning (Google) and Tim Mayer (Fast). Anatomy of a Search Engine, Search Engine Strategies Conference, 2002.
. Daubechies, I., Ten Lectures on Wavelets, Capital City Press, Montpelier, Vermon.t,1992.
. Drimbarean A. and Whelan P.F. Experiments in color texture analysis, Pattern Recognition Letters, 22:2001, 1161-1167.
. Hedman, K.; Stilla, U.; Lisini, G.; Gamba, P. , Road Network Extraction in VHR SAR Images of Urban and Suburban Areas by Means of Class-Aided Feature-Level Fusion, Geoscience and Remote Sensing, IEEE Transactions , vol.48, no.3, pp.1294-1296, March 2010.
. Hui Kong; Audibert, J.-Y.; Ponce, J. , General Road Detection From a Single Image, Image Processing, IEEE Transactions , vol.19, no.8, pp.2211-2220, Aug. 2010.
Keywords - Bot , Botnet, Conficker, Crypto-Pan, Botnet defense.
 S. Shin and G. Gu. "Conficker and Beyond". In Proceedings of 2010 Annual Computer Security Applications Conference (ACSAC), Dec. 2010.
 SRI-International. An analysis of Conficker C. http://mtc.sri.com/ Conficker/addendumC/.
 B. Stock, M. E. Jan Goebel, F. C. Freiling, and T. Holz. Walowdac Analysis of a Peer-to-Peer Botnet. In Proceedings of European Conference on Computer Network Defense (EC2ND), Nov. 2009.
 B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of ACM CCS, Nov. 2009.
 M. S. Techcenter. Conficker worm. http://technet.microsoft.com/en-us/ security/dd452420.aspx.
 Verisign. The Domain Name Industry Brief. http://www.verisign.com/domain-name-services/domain-information-center/domain-name-resources/domain-name-report-sept09.pdf.
 D. Watson. Know Your Enemy: Containing Conficker.http://www.honeynet.org/papers/conficker.
 Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldzmidt, and T. Wobber. HowDynamic are IP Addresses? In Proceedings of ACM SIGCOMM, Aug.2007.
 Y. Xie, F. Yu, K. Achan, R. Panigraphy, G. Hulte, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In Proceedings of ACM SIGCOMM, Aug. 2008.
 J. Xu, J. Fan, M. H. Ammar, and S. B. Moon, "Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme," in IEEE International Conference on Network Protocols (ICNP), 2002.
Keywords – Finite element modeling, Modal analysis, Transient analysis, Vibrations.
. Archer, J.S "Natural Vibration Modal Analysis" National Aeronautics and Space Administration, September 1968, http://www.zerognews.com
. Z. Wu, W. Zhou, H. Li, "Modal Analysis for Filament Wound Pressure Vessels Filled With Fluid", Composite Structures, 2010, pp 1994–1998.
. M. H. Toorani, A. A. Lakis, "Shear Deformation in Dynamic Analysis of Anisotropic Laminated Open Cylindrical Shells Filled With Oor Subjected to a Flowing Fluid", Computer Methods in Applied Mechanics and Engineering 2001, pp 4929-4966.
. A. Di Carluccio, G. Fabbrocino , E. Salzano, G. Manfredi, "Analysis of Pressurized Horizontal Vessels Under Seismic Excitation", The 14th World Conference on Earthquake Engineering , 2008, pp 12-17.
. Stephen Tiernan, Martin Fahy, "Dynamic FEA Modeling of ISO Tank Containers", Journal of Materials Processing Technology, 2002, pp126–132.
When there is no saddle interval, applying the dominance principle, we determine the value of the
game for the interval valued fuzzy game matrix by reducing the size of the given matrix.
Key Words: Dominance, fuzzy game, interval arithmetic, interval valued matrix.
 Loganathan.C and Annie Christi.M.S, Fuzzy Game Value of the Interval Matrix, International Journal of Engineering Research and
Applications, Vol: 2, Issue 5, (2012).
 Madhumangal Pal and Prasun K. Nayak, Solutions of m n Rectangular Fuzzy Games by dominance, (2004).
 Porchelvi.T and Stephen Dinagar D, Fuzzy Dominance Principle, International journal of Algorithms, Computing and Mathematics,
Volume 3, (2010).
 Van Neumann and Morgenstern.O, Theory of games and Economic Behaviour, Princeton. N.J. Princeton University press, (1944).
Biodiesel is a cleaner burning fuel than diesel and a suitable replacement. It is made from non-toxic, biodegradable, renewable resources, such as new and used cooking oil and non edible oil. In this study oil sources were obtained from the seeds of Ricinus commonis, Cocos nucifera, Brassica juncea, Arecaceae Elaels, Helianthus annus Linn, Madhuca longifolia, Pongamia pinnata oils. Biofuel Characteristics such as free fatty acid content, Iodine value, saponification value, cetane number, energy value and density were studied. Productions of Fatty Acid Methyl Ester by Transesterification of oil samples were recovered. The results validate that all these samples are can used as sources for biodiesel production.
Key Words: Biodiesel, saponification value, cetane number, Transesterification.
. D. P. Geller and J. W. Goodrum, Effects of specific fatty acid methyl esters on diesel fuel lubricity, Fuel, 83(17–18), 2004, 2351–2366.
. 2. P. D. Tyagi and K. K. Kakkar, Non-conventional vegetable oils. New Delhi: Batra book Service; 1991.
. K. Manickam and S. Sadasivam, Fundamental of Biochemistry analysis, 1984.
. J. V. Gerpen, Cetane Number Testing of Biodiesel, Journal of the American Oil Chemists' Society, 67(9), 2004, 565-571.
. R. P. S. Katwal and P. L. Soni, Biofuels: an opportunity for socioeconomicdevelopment and cleaner environment, Indian Forester, 129(8), 2003, 939–949.
. K. A. Krisnangkura, simple method for estimation of Cetane index of vegetable oil methyl esters, Journal of American Oil Chemical Society, 63, 1986, 552–563.
. K. J. Harrington, Chemical and physical properties of vegetable oil esters and their effect on diesel fuel performance, Biomass, 9, 1986, 1–17.
A dye-decolorizing bacterium strain was isolated from activated sludge of a textile printing wastewater treatment plant of Perundurai. The strain was identified as Alcaligenes sp. AA09 based on Gram staining and sequence analysis of 16S rDNA gene. Alcaligenes sp. AA09 decolorized more than 90% of the azo dye reactive red BL within 24 h under aerobic condition at pH 7.0 and temperature 250C with 50-200mg/l dye concentration. A 60Kd NADH/NADPH-dependent, oxygen sensitive, soluble cytosolic enzyme, azoreductase was responsible for degradation of reactive red BL azo dye. The bacterial dye degradation was confirmed by analysis of the degraded products using TLC and GC-MS analysis.
Key Words: Biodegrdation, Reactive Red BL, Aerobic, Decolorization, Azo dyes, Azoreductase, phytotoxicity
. Resmi C. Senan & T. Emilia Abraham, Bioremediation Of Textile Azo Dyes By Aerobic Bacterial Consortium, Biodegradation, 15, 2004, 275–280. . Adedayo, S. J. C. W.A. Taylor And M.Y. Anderso, Decolourization And Detoxification Of Methyl Red By Aerobic Bacteria From A Wastewater Treatment Plant, World Journal Of Microbiology & Biotechnology, 20, 2004, 545- 550.
. Hong, Y. And J. Guo, Reduction And Partial Degradation Mechanisms Of Naphthylaminesulfonic Azo Dye Amaranth By Shewanella Decolorationis S12, Applied Microbial Biotechnology, 75, 2007, 647-654.
. Husseiny Sh. M, Biodegradation Of The Reactive And Direct Dyes Using Egyptian Isolates, Journal Of Applied Sciences Research, 4, 2008, 599-606.
. Guo, J, J. Zhou, And D. Wang, A Novel Moderately Halophilic Bacterium For Decolorizing Azo Dye Under High Salt Condition, Biodegradation, 19, 2008, 15-19.
Mobile Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. Ad Hoc routing protocols can be divided into two categories: table-driven (proactive schemes) and on-demand routing (reactive scheme) based on when and how the routes are discovered. In Table-driven routing protocols each node maintains one or more tables containing routing information about nodes in the network whereas in on-demand routing the routes are created as and when required. The table driven routing protocols is Destination Sequenced Distance Vector Routing protocols (DSDV).The on-demand routing protocols are Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR).Here we compare these protocols different parameters such as packet delivery fraction, good put(average throughput),energy consumed( in Joules) and the no of forwardline used and compare the performance of these routing protocols using NS2 environment.
Key Words: MANET, DSDV, AODV, DSR, NS2
 Kapil Suchdeo, Durgesh Kumar Mishra, "Comparison of On-Demand Routing Protocols" 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, 978-0-7695-4062-7/10 ,2010 IEEE
 Nor Surayati, Mohamad Usop, Azizol Abdullah"Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment" IJCSNS International Journal of Computer Science and Network Security, 9, No.7, July 2009.
 David B. Johnson, "Routing in Ad hoc Networks of Mobile Hosts", Proc IEEE Workshop on Mobile Computing Systems and Applications.
 Elizabeth M. Royer, Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", Proc. IEEE, 1999.
 Runcai Huang, Yiwen Zhuang, Qiying Cao "Simulation and Analysis of Protocols in Ad Hoc Network", 2009 International Conference on Electronic Computer Technology, 978-0-7695-3559-3/09 ,2009 IEEE.
A novel process combining Electrochemical Oxidation and Biosorption treatment was presented for Nitrobenzene abatement. The electrochemical oxidation was investigated batch-wise in the presence of NaCl (2g L-1) electrolyte with lead as anode and copper as cathode electrodes. The conditions were optimized using response surface methodology (RSM), which result in 76.4% reduction of COD was found to be maximum and the optimum conditions were satisfied at current density 3.56 A dm-2, time 3 hours, flow rate 40 L hr -1, volume 9 L occur at minimum power consumption of 30.3 kWhr / kg COD. It is followed by biosorption treatment in the presence of biosorbents such as maize and rice stems at 15 g L-1. From this study it was observed that the maximum % of COD reduction was 97.7 % for the optimized time 4 days and volume 6 L for pretreated effluent containing nitrobenzene.
Key Words: Biosorption, COD reduction, Electrochemical, Maize & Rice stem.
 Hartter, D. R. (1985). The Use And Importance Of Nitroaromatic Chemicals In The Chemical Industry. In Toxicity Of Nitroaromatic Compounds. Chemical Industry Institute Of Toxicology Series (Ed. D. E. Rickert), Pp. 1-13. Hemisphere Publishing Corp.: Washington, D.C.
 Norvell Nelson, (2002), "Electrochemical Destruction Of Organic Hazardous Wastes", Platinum Metals Review., Vol.46, No.1, Pp.18-23
 Shengrui Wang, Suwen Yang, Xiangcan Jin, Liangke Liu, Fengchang Wu (2010) "Use Of Low Cost Crop Biological Wastes For The Removal Of Nitrobenzene From Water", Desalination, Volume 264, Pp 32-36.
 Sundstrom, D.W. Khel, H.B. And Rerdy, K.A. (1986) " ", Hazardous Waste Hazard Mat, Vol.3, Pp.101.
 Panizza, M. Bocca, P. Cerisola, G. (2000) "Electrochemical Treatment Of Wastewater Containing Polyaromatic Organic Pollutants", Water Research. 2000, Volume 34, Pp. 2601-2605.
 Radha .K.V, Sridevi .V And Kalaivani .K (2009) "Electrochemical Oxidation For The Treatment Of Textile Industry Wastewater", Bioresource Technology., Vol.100, Pp.987–990.
 Rajeshwar .K And Ibanez .J.G (1997), "Fundamentals And Application In Pollution Abatement, Academic Press", San Diego, CA,.
Security in any of the systems turned into a vital issue in this paper we have executed a security component on Medium Access Control layer by Assured Neighbor based Security Protocol to give validation and secrecy of bundles alongside High speed transmission for Ad hoc systems. Here we have partitioned the convention into two distinctive parts. The initial segment manages Routing layer data; in this part we have attempted to execute a conceivable methodology for identifying and separating the pernicious hubs. A trust counter for every hub is resolved which can be effectively expanded and diminished relying on the trust esteem with the end goal of sending the bundles from source hub to destination hub with the assistance of middle hubs. An edge level is additionally foreordained to identify the malevolent hubs. In the event that the estimation of the hub in trust counter is not exactly the edge esteem then the hub is signified 'noxious'. The second a portion of our convention manages the security in the connection layer. For this security reason we have utilized CTR (Counter) approach for validation and encryption. We have reproduced every one of our techniques and plans in NS-2, the aftereffect of which gives a conclusion that our proposed convention i.e. Guaranteed Neighbor based Security Protocol can perform high parcel conveyance against different gatecrashers furthermore bundle conveyance proportion against versatility with low postpones and low overheads.
Key Words: ---
. Farooq Anjum, Dhanant Subhadrabandhu and Saswati Sarkar "Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols" in proceedings of IEEE 58th Conference on Vehicular Technology, 2003.
. Anand Patwardhan, Jim Parker, Anupam Joshi, Michaela Iorga and Tom Karygiannis "Secure Routing and Intrusion Detection in Ad Hoc Networks" Third IEEE International Conference on Pervasive Computing and Communications, March 2005.
. Perkins.C.E, "Ad hoc Networking", Boston, Addison Wesley, 2001.
This Paper comprises of upcoming field of "Web Mining". Web mining is the application of data mining techniques to extract knowledge from web data, including web documents, hyperlinks between documents, usage logs of web sites, etc. In this paper we encompass various Pros and Cons of Web Mining and also represent the similarities and differences between Data Mining and Web Mining. Here we describe some of the recently used Tools used in Web Mining.
Key Words: Web Mining, Data Extraction, Web Usage Mining, Web Content Mining, Web Structure Mining
. A. A. Barfourosh, H.R. Motahary Nezhad, M. L. Anderson, D. Perlis, "Information Retrieval on the World Wide Web and Active Logic: A Survey and Problem Definition", 2002.
. Cooley, R.; Mobasher, B.; Srivastava, J.; "Web mining: information and pattern discovery on the World Wide Web". In Proceedings of Ninth IEEE International Conference. pp. 558 –567, 3-8 Nov. 1997.
. G. Shrivastava, K. Sharma, V. Kumar," Web Mining: Today and Tomorrow", in the Proceedings of 2011 3rd International Conference on Electronics Computer Technology (ICECT), pp.399-403, April 2011
. B. Singh, H.K. Singh, "Web data Mining Research", in the Proceedings of 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1-10, Dec. 2010
. O. Etzioni, "The world wide Web: Quagmire or gold mine. "Communications of the ACM, Vol. 39No. 11, pp. 65 -68, Nov.1996.
. Web mining definition, available: http://en.wikipedia.org/wiki/Web_mining.
. R. Kosala, H. Blockeel "Web mining research: A survey," ACM SIGKDD Explorations, Vol. 2 No. 1, pp. 1 -15, June 2000.