SEARCH

Found 5779 related files. Current in page 1

2006 cadillac sts location of coolant temperature sensor

Omaxe Connaught Place - Add a touch in luxury

Omaxe Connaught Place is modern commercial launch by the Omaxe Group at sector Beta II in Greater Noida. Omaxe CP offers retail shop,office space at a very happening location of Greater Noida.

Alkaline Polygalacturonases from Thermotolerant Pectinolytic Bacteria from Diverse Sources

Diverse pectin rich sources like food dumps, food waste waters, spoiled fruits, vegetables and alkaline soils were screened for alkaline bacterial pectinolytic isolates by enrichment culturing and ruthenium red plate assay. Six different bacterial isolates with higher zones of pectin hydrolysis from the source food waste waters were selected and tested for polygalacturonase production at room temperature and at neutral pH. Two isolates as Bacillus sp 2 and Bacillus sp 3 with higher polygalacturonase activity were studied for their response to alkaline, thermophilic production. Polygalacturonase production was highest for Bacillus sp 3 at an alkaline pH of 10.5, a thermophilic temperature of 60°C, an agitation speed of 200 rpm and an inoculum size of 2%. It showed an enzyme production of 890 U/ml. Selected Bacillus sp 3 was both alkaline and thermophilic and had a short fermentation cycle with good polygalacturonase production. Alkaline polygalacturonase could have ample application

Composition Dependent Study of AC conductivity in AsSe samples

The room temperature AC conductivity σ(ω) of amorphous AsSe samples with various compositions have been measured in the 103 -106 Hz frequency range. The results indicate that ac conductivity is proportional to  n with n=0.89±.01 in the 103 –106 Hz frequency range. Consideration of different models for the frequency –dependent conductivity leads to thermally activated hopping as the most likely process.

Effects of Procurement Regulations on Efficiency of the Procurement of Foodstuffs in Public Secondar

The study was to investigate the effect of procurement regulations on the efficiency of procurement food in public secondary schools in Kenya. The quality of foodstuffs characterized procurement of food in this study. The research study aimed to establish the effects of procurement regulations on quality of foodstuffs in public secondary schools in Kenya. From 2006, all public institutions were required to adhere to the Public Procurement and Disposal Regulations which details the procedures to be followed. How this affected the procurement of foodstuffs in schools was not clear and this is what this study sought to find out .The study was conducted through descriptive research design. Purposive sampling was used to select the sample which consisted of a population of public secondary schools. The data was collected in the month of November 2013 using questionnaires. The respondents were 74 with each school producing 2 respondents; the principal and school accounts officer.

Prolonging Life of Heterogeneous Wireless Sensor Network using Clustering Algorithm

The Wireless Sensor Network(WSN) is a network consist of many number of distributed sensor nodes. They are the main entity to be consider. WSN is used to provide many real world solution to certain problems. There are many applications in various fields like home, medical, military, etc. Sensor nodes sense the events for particular area and pass the information to base station from where human can get the data. Sensor nodes of WSN have limited capabilities in terms of battery life as well as data storage. In designing wireless sensor network the main issue is energy dissipation. Many routing protocols have been developed to decrease the power consumption of sensor node so that the life time of whole WSN can be increased. And now a days its become most important task to balance the energy of sensor nodes and manage it in proper way so that its could be beneficial for whole network. There are many hierarchical and location based routing protocols. Here in this paper, we have proposed one

Warning System for European Redmite Using Beta Model

European red mite is a serious problem of apple in Himachal Pradesh .At present more than 80 % orchards have been found infested with European red mite. It sucks cell sap from leaves which resulted into poor quality of fruits. Present studies were undertaken to see the effect of environmental factors e.g. temperature and relative humidity on the buildup of mite population in the apple trees at RHRS, Mashobra. The predicted optimum temperature and relative humidity was calculated by using Beta model is 21.45oC and <85% respectively. Since from the last few years regional observation and experimental database on prediction of pest attack on crop about infection index correspondence to above mentioned environmental parameters was prepared using software Microsoft EXCEL. After that from collected data a mathematical prediction model was developed using the MATLAB as software tool. A generalized form of Beta model was provided to best fit in the data. The value of R2 we observed for eggs

Mathematical Modeling of Degree of Thermal Oxidation of Edible Oil as a Function of Induction Temper

This study was conducted for the Modeling of Degree of Thermal Oxidation of Blended Refined Edible Oil (80% sunflower and 20% Soya bean Oil) in respect to Induction Temperature at various different fixed Induction Times. In this, different models have been developed for Peroxide Value of edible oil for different fixed time (0-120) minutes, within the Temperature range of 120 – 200 0C with interval of 5 0C

Improved Security in WSNs with Quantum Logic Gates and Quantum Teleportation

Recent developments in technology have made possible the widespread deployment of small, low power and dense wireless networks, known as wireless sensor networks which collect and disseminate environmental data. In such networks communications can be easily monitored and hence data transmission and reception between the nodes must be encrypted using a secret key. Furthermore, the distribution of secret key used in encryption of data in a very large network is a cause for the reduced efficiency of the network. The scheme of using quantum teleportation as a mechanism to distribute quantum data over a sensor network offers huge advantage over traditional methods. In this paper an EPR-Pair scheme is implemented in terms of quantum gates to achieve higher degree of immunity from eavesdropping of malicious nodes.

Lifetime Maximization in Heterogeneous wireless Sensor Networks using Multipath Routing Technique

In wireless sensor Networks security is one of the important problems we are facing. To provide redundancy management for heterogeneous wireless sensor networks (HWSNs) utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. In this paper use a Multipath Routing, it is the routing technique of using multiple alternative paths through the network. The objective of redundancy management of multipath routing minimizes the energy loss and gain in reliability, timeliness and security to maximize the system lifetime. Here a voting based intrusion detection algorithm used to detect and evict malicious nodes. We plan to explore more extensive malicious attacks for packet dropping and bad mouthing attacks with implications to energy reliability and security, and investigate Intrusion detection and multipath routing based acceptance protocols to react to these attacks.

Lifetime Maximization in Heterogeneous wireless Sensor Networks using Multipath Routing Technique

In wireless sensor Networks security is one of the important problems we are facing. To provide redundancy management for heterogeneous wireless sensor networks (HWSNs) utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. In this paper use a Multipath Routing, it is the routing technique of using multiple alternative paths through the network. The objective of redundancy management of multipath routing minimizes the energy loss and gain in reliability, timeliness and security to maximize the system lifetime. Here a voting based intrusion detection algorithm used to detect and evict malicious nodes. We plan to explore more extensive malicious attacks for packet dropping and bad mouthing attacks with implications to energy reliability and security, and investigate Intrusion detection and multipath routing based acceptance protocols to react to these attacks.

Tags: Education,

« previous  123456789