International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
By
(A registered society under Society Act 1864)
Regional Office – North India
332 B, Race Course Valley, Near Police Lines, Race Course
Dehradun (Uttarakhand)
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Advisory Board
• Prof. Rattan K. Datta, (Ex. Advisor – Govt. of India, Ex. President Information Technology Science Congress).
• Prof. R. S. Tyagi, Deputy Director & Head, Computer Facility, All India Institute of Medical Sciences, New Delhi.
• Dr. Chander Mohan, Director, Directorate of Science and Technology, Delhi.
• Prof. P. K. Mittal, Dean – Research and Development, Graphic Era University, Dehradun.
• Prof. Pramod Kumar, Director, GCTI, Kanpur.
• Prof. Dhermendra Kumar, Head, Department of Computer Science, Guru Jhembeshwer University, Hisar.
• Prof. J. P. Saini, UP Technical University, Lucknow.
• Prof. K. K. Pandey, Director – Engineering, Tirthankar Mahaveer University, Moradabad.
• Prof. S. D. Samantray, Head, Department of Computer Science, College of Technology, G. B. Pant University of Agriculture and Technology, Pantnagar.
Chief Editor
Er. Manish Pandey
Associate Professor and Head, Department of Computer Science and IT Dev Bhoomi Institute of Technology for Women, Dehradun
Editorial Board
Er. Ruchir Gupta
Assistant Professor, Department of Electronics Engineering MJP Ruhilkhand University, Bareilly
Er. Akhilesh Sharma
Assistant Professor, Department of Electronics Engineering Apex Institute of Technology, Bilaspur, Rampur
Er. Nidhi Sethi
Assistant Professor, Department of Information Technology Dev Bhoomi Institute of Technology, Dehradun
Dr. Anita Parihar
Professor & Head in the department of English. DSB Campus
Kumaon University. Nainital
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Index
Sr. No. Name of the Paper Author and Affiliation Page No. 1. E-COMMERCE: A Need
of Corporate World
1. Akash Saxena, Sunderdeep College of
Engineering, Gaziabad (UP).
2. Kapil Gupta, Accenture, Bangalore - 560066
2. Applications of Data
Mining in Healthcare
System
1. Manish Pandey, Associate Professor, Dev
Bhoomi Institute of Technology for Women,
Dehradun, (Uttarakhand)
3. A Traditional Development
Life Cycle Methodology
for Customer-Agent Based
Model Development
1. Komal Chandra Joshi, Lecturer, Shriram
Institute of Management & Technology,
Kashipur (USN), Uttarakhand
4. Wireless Communications
– A Review
1. Pramod Kumar Joshi, Lecturer, Amrapali
Institute, Haldwani, Nainital, Uttrakhand.
2. Sadhana Rana, Lecturer, Amrapali Institute,
Haldwani, Nainital, Uttrakhand
5. Note on Vorticity Unsteady
Conducting Dusty Flow
through the Annular Space
between two Circular
Cylinder in Presence of a
Transverse Magnetic Filed
1. P.K. Mittal, Professor & Head, Department of
Mathematics, Graphic Era University,
Dehradun.
2. M.P. Singh, Professor & Head, Department of
Mathematics, K.L.D.A.V. P.G. College,
Roorkee.
3. Alok Darshan Kothiyal, Department of
Mathematics, Graphic Era University,
Dehradun
6. Small Remedies: Bold and
Assertive Women
1. Prabha Pant, Assistant Professor, Department
of Humanities & Social Science. GB Pant
University of Agriculture and Technology,
Pantnagar.
2. Anita Parihar, Professor & Head in the
department of English. DSB Campus. Kumaon
University. Nainital.
7. Problematizing Issues
about Home, Homeland,
Diaspora and
Belongingness in the
Works of Uma
Parmeswaran
1. Shweta Arora, Lecturer, Apex Institute of
Technology, Bilaspur, Rampur (UP).
2. Anita Parihar, Professor and Head,
Department of English, DSB Campus,
Kumaon University, Nanital.
8. Studies on Clarification of
Apple Juice
1. Prity Pant, College of IT and Management,
Haldwani, Uttarakhand
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
E-COMMERCE: A Need of Corporate World
Akash Saxena1, Kapil Gupta
2
1Sunderdeep College of Engineering, Gaziabad (UP)
2Accenture, Bangalore - 560066
An Introduction of E-Commerce:
E-Commerce (Electronic Commerce) can be defined as a Method by which the modern business companies
can exchange their information, Products, services via an electronic device. This methodology decreases the
cost of product while improves the quality and services .The Key factor of e-commerce is that, it reduces the
paper work and increases automation. For Example EDI (Electronic data interchange).
For the efficient use of e-commerce following infrastructure is required.
• Common business services for facilitating the sending and receiving process.
• Message and information distribution as a means of sending and receiving Information.
• Multimedia contents & network publishing for creating a product and a medium to communicate about it.
• The information superhighway is that, which provides a highway along with all e-commerce may travel.
• Technical standards, for dictating the nature of information publishing transmitting the electronic
document across the entire network, multimedia and network protocol.
• Public policy to govern the issues like universal access, information pricing and privacy issues.
• Two pillars of e-commerce business supporting all e-commerce applications.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Electronic data interchange is electronic data transfer from computer to another, such as Purchase order,
shipping notice, receiving advices and other standard business correspondence between trading partners. EDI
can be used to transmit financial information and payments in electronic forms when it is used for effective
payment. EDI is usually referred to as financial EDI and electronic fund transfer (EFT).
Edi Layered Structure:
EDI architecture specifies four layers.
1. Semantic layer
2. Standard layer
3. Transport layer
4. Physical layer
Semantic layer describes the business application that is driving EDI for an application. This layer translates
the request for quotes, price quotes, purchase orders, acknowledgements and invoices. EDI standard layer
shows EDI standards and EDI standards specify business form Structure to extent influence content seen in
application service layer. EDI transport layer relates with non electric activity of transferring business from
one company to other company. The business can be transferred using regular postal services or FAX. EDI
physical layer, EDI document is more complex than simply sending messages or sharing files through a
network. Some EDI documents are more structured than e-commerce and typically manipulate or processed
more than e-mail messages by sending and receiving soft wares.
EDI physical layer, EDI document is more complex than simply sending messages or sharing files through a
network. Some EDI documents are more structured than e-commerce and typically manipulate or processed
more than e-mail messages by sending and receiving soft wares.
Benefits of EDI:
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
The use of EDI eliminates the problems associated with traditional flow of information. With the help of EDI
now a days marketing became fast. The delay in association with making documents is reduced, so company
can make accounts and other important documents and can exchange with different trading partners. The
main benefit is time required to re-enter data is saved. And if data is not re-entered at each step in the
process, labour cost can be reduced. And also time delay can be reduced and there is more clarity in the
information flow. The other advantage in the use of EDI is that it generates functional acknowledgement,
whenever an EDI message is received and it is electronically transmitted to the sender. The
acknowledgement states that the message is received.
The area in which EDI are most suited:
EDI is most suitable in the following areas.
• EDI is most suited in those corporations where there is a large volume of repetitive standard actions
performed.
• EDI is most suited in those areas where trading partners requests for paperless exchange of documents.
• EDI is most suited in corporations where operational time is constant.EDI plays a big role in companies
where clients want fast acknowledgement and fast delivery.
• With the help of EDI, productivity also will improve. Because if information processing is fast, then
company can get more orders.
EDI Actions:
EDI can automate the information flow and facilitate the management of business process. EDI transactions
for purchase orders, shipment and payments are follows.
Purchase
Order Delivery
Purchaser Request Finance Department Automated Finance Department
Order EDI Computer
Confirm
Purchaser Dept. EDI Computer Sales Department
Shipping Dept
Inventory, Godown Receiving Dept. Managing Dept.
Product
Delivery
Step1: Purchase order will be sent from buyers computer to seller’s computer.
Step2: Purchase order confirmation will be sent by seller’s computer to buyer’s computer.
Step3: Seller’s computer sends goods booking request to transport company’s computer.
Step4: Booking confirmation will be sent by transport company’s computers to the selling company’s
computer.
Step5: Advance ship notice will be sent by the selling company’s computer to buyer’s computer.
Step6: Transport company’s computer will send status to selling company’s Computer.
Step7: Receipt advice will be sent by the buyer’s company’s computer to selling Company’s Computer.
Step8: Invoice will be sent by seller’s computer to buyer’s computer.
Step9: Payment will be sent by the buyer’s computer to seller’s computer.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Electronic Payment System and E-Commerce:
Payment is an integral part of any transaction process. It claims, debits, credits of various company’s
individuals, banking sector and non banking sector are not balanced if the transaction of payment is delayed
then the entire business system will be affected .Hence an important fact of e-commerce is to provide fast
and secure payment, settlement of credit and debit claims, but the problem is that how the purchaser will pay
for goods and services and what currency he will pay as the medium of exchange.
Everyone agrees with the aspect that payment and settlement process is a most important factor in the fast
moving electronic commerce environment. If we are using payment methods such as cash, checks, drafts or
bill of exchange, these methods are not most suited for e-business. Therefore some advance methods are
needed in modern business to meet the emerging demand of e-commerce. But these new payment systems
must be secured and a low processing cost can be wide global. Modes of payments may be Credit cards,
Debit cards, Smart cards, EFT, E-money (e-cash, e-wallet).
Types of Electronic Payment System:
Electronic payment system is a high profile system. Nowadays it is preferred in banking, health care, retail,
online marketing and in government sector, where money needs to change hands. Organizations need to
deliver products and services more cost effective and to provide a high quality and fast service to customer,
then this method is more effective. A technology emerged in early 1970s, was electronic fund transfer
(EFT).The EFT can be defined as “Any transfer of fund through an electronic device, computer,
communication instrument or magnetic tape, so as to order to credit or debit an account”.
Working on EFT can be divided into three categories:
1. Banking and financial Management:
- large scale or whole-sale payments
- small scale or retail payments
- Home banking
2. Retail payments:
- Credit cards (master cards, visa)
- Private label cards
- Change cards
3. Online E-commerce payments:
• Token based payment systems
- E-cash
- E-checks
• Credit card based payment system (Encrypted credit cards for www, Third party
authentication number.)
Digital Token Based Electronic Payment System
“Electronic tokens” is a new financial instrument, in the form of electronic money or cash/checks .Electronic
tokens are designed as electronic analogs of different forms of payment supported by a financial institutions.
There are three types of Electronic tokens:
Cash or real-time: Transaction will be settled with exchange of electronic like electronic cash.
Debit or prepaid: Person will pay in advance for the privilege of accessing information. Smart cards and
electronic purses are the example of prepaid payment system.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Credit or post paid: In the case of post- paid first of the server authenticates the customer and verifies with
bank that funds are adequate before purchasing. Electronic checks and credit/debit cards are example of post
paid mechanism.
Modes of payment:
E-Cash
A new concept came in the area of online payment system is electronic cash (e-cash). E-cash gives security
and privacy with computerized convenience. E-cash having some extra characteristics that makes it good
alternative for payment system over network. E-cash has some special properties: monetary values, inter
operatively, and security. E-cash is based on cryptographic system called “Digital Signatures”.
Electronic Checks:
Electronic checks are another form of electronic tokens. They are developed to accommodate the many
individual and entities, that prefer to pay on credit or through the way other than cash. In this mechanism
buyer must be registered with a third party account server before they are able to write electronic checks. The
accounting server works as a billing service. If buyer is registered then buyer can contact the sellers of goods
and services. After transaction the buyer sends the checks to the seller using e-mail or by other transport
methods. After transition of goods and services the following step will be performed
Step1: Buyer’s sends a check to seller.
Step2: After receiving check seller sends it to the accounting server for verification.
Step3: Accounting server verifies the digital signature using authentication scheme.
Step4: After verification accounting server sends the check to bank for payment.
Transfer the Electronic Cheque
Buyer Seller
Forward for
Authentication
Deposit Cheque
Bank Accounting Server
Credit Card-Based Electronic Payment System:
Credit card is a new mechanism in the area of electronic payment system. In this process if consumer wants
to purchase a product or services then simply he can send the credit card details to service provider that is
involved in the credit card organization that will handle this payment system. The credit card payment on on-
line network can be divided into three categories.
• Payment using plain credit card details: In this method of payment a consumer can exchange the
unencrypted credit card over a public network such as telephone line or the internet.
• Payment using encrypted credit card details: In this payment system credit CSRD details will be
encrypted before sending them out.
• Payment using third party verification: This method provides the security on payment system. A third
party verifies the credit card details; a company collects and approves payments from one client to
another client. After verification a credit card transaction for total accumulated amount is completed.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Digital Wallet:
Digital wallets are originally developed to facilitate peer to peer transaction processing. Digital wallets third
party credit card processing providers enable merchants to accept credit Card payments indirectly, using
stored consumer funds, previously loaded on to digital wallet account.
Digital wallet third party credit card processing is an ideal merchant account alternative, avoiding the hassle
and high initial expenses, for startup business, business with a lower credit card acceptance turnover, or for
merchants with low ticket sales.
Pay Pal
Pay pal services allow users to send money and bills to anyone with e-mail. Electronic money (known as
electronic cash, electronic currency, digital currency, digital money, digital cash) refers to money which
exchanged only on network, the internet and digital value stored value system. Electronic fund transfer
(EFT) and direct deposit are examples of electronic money.
Pay pal was founded in 1998, Pay Pal is an eBay company which enables any individual or business with an
e-mail address to securely, easily and quickly send and receive payment online. Pay pal’s service builds on
the existing financial infrastructure of bank accounts and credit cards and utilizes the world’s most advanced
proprietary prevention system to credit a safe, global, real time payment solution. Pay Pal lets you accept
credit cards, banks transfers, debit cards, and more-at some of the lowest costs in the industry.
Epilogue: It is clear from the above mentioned statements that EDI transactions and modes of payment
system are a boom in the coming future, because electronic payment system provides security, time saving,
easy to handle facility. Therefore it is expected that in near future it will replace all the traditional method
involved. It is a challenge in front of us that how this revolutionary technology in the field of E-commerce
can be adopted in our Indian entrepreneurs, so that we can keep the pace with the developed countries.
Different companies involved in E-commerce have opened a massive opportunities for the entrepreneurs to
reach the door of the users of e-commerce.
Reference: [1] Agarwal, Harnessing Internet Power, the electronic times dated Nov. 3, 2005.
[2] Bhattacharya B.,E-commerce ,Strategy, Technologies and application. Tata McGraw Hill, New
Delhi.
[3] Bhatia B.S. and Gurcharan Singh,E-commerce- skirting the issues,the Indian Journal of
Commerce,Jan.-Jun. 2002.
[4] Chandra Manideep “taking the big step on line E-commerce its transaction procedure” Indian Journal
of Accounting, Dec.2002.
[5] Dewan Bhusan ,(2002) Managing Information Technology vikash publishing house pvt. Ltd. New
Delhi.
[6] Gavini Augustine , P. Rekha, impact of E-commerce on industry perceptions,The Indian Journal of
Commerce,Oct.-Dec.,2001.
[7] Jones Graham (1997) how to use the Internet,Jaico publishing house, Mumbai.
[8] Kalakota Ravi, Whinston, Andrew B.,(2004) electronic commerce, Manager’s Guide, Pearson
Education pvt. Ltd. Delhi.
[9] Maji M.M., electronic commerce: challenges and prospects ,The Indian Journal of Commerce,vol. 54
no. 4.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
[10] Sundram ,U.S. Shanmuga,E-commerce in the new millennium, the Indian Journal of
Commerce,Oct.-Dec, 2001.
[11] Verma Krishna Kumar-commerce: Demand of corporate world, Prabandh Journal of Management
Education & research-June 2006.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Applications of Data Mining in Healthcare System
Manish Pandey
Associate Professor, Dev Bhoomi Institute of Technology for Women
Dehradun (Uttarakhand)
Abstract:
Data mining has been applied with success to different fields of human endeavor, including marketing,
banking, customer relationship management, engineering and various areas of science. However, its
application to the analysis of medical data has until recently been relatively limited. This is particularly true
of practical applications in clinical medicine which may benefit from specific data mining approaches that
are able to perform predictive modeling, exploit the knowledge available in the clinical domain and explain
proposed decisions once the models are used to support clinical decisions. The widespread availability of
new computational methods and tools for data analysis and predictive modeling requires medical informatics
researchers and practitioners to systematically select the most appropriate strategy to cope with clinical
prediction problems.
The goal of predictive data mining in clinical medicine is to derive models that can use patientspecific
information to predict the outcome of interest and to thereby support clinical decision-making. Predictive
data mining methods may be applied to the construction of decision models for procedures such as
prognosis, diagnosis and treatment planning, which may be embedded within clinical information systems.
This paper illustrates data mining will enable clinicians and managers to find valuable new patterns in data,
leading to potential improvement of resource utilization and patient health. As the patterns are based on
recent clinical practice, they represent the ultimate in evidence-based care. This paper briefly introduces the
Clementine data mining system, which incorporates advanced machine learning technologies that extract
complex interrelationships and decision-making rules from the data.
Over the last few years, the term ‘data mining’ has been increasingly used in the medical literature. Decision
support systems (DSS) can now use advanced technologies such as On-Line Analytical Processing (OLAP)
and data mining to deliver advanced capabilities. This paper presents a clinical decision support system
which combines the strengths of both OLAP and data mining. It provides a rich knowledge environment
which is not achievable by using OLAP or data mining alone. In particular, the collection of methods known
as ‘data mining’ offers methodological and technical solutions to deal with the analysis of medical data and
construction of prediction models.
Introduction:
New computational techniques and information technologies are needed to manage these large repositories
of biomedical data and to discover useful patterns and knowledge from them. In particular, knowledge
management, data mining, and text mining techniques have been adopted in various successful biomedical
applications in recent years. Knowledge management techniques and methodologies have been used to
support the storing, retrieving, sharing, and management of multimedia and mission-critical tacit and explicit
biomedical knowledge. Data mining techniques have been used to discover various biological, drug
discovery, patient care knowledge, patterns using selected statistical analyses, machine learning, and neural
networks methods. Text mining techniques have been used to analyze research publications as well as
electronic patient records. Health care generates mountains of administrative data about patients, hospitals,
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
bed costs, claims, etc. Clinical trials, electronic patient records and computer supported disease management
will increasingly produce mountains of clinical data. This data is a strategic resource for health care
institutions. In this paper, we give a methodological review of data mining, focusing on its data analysis
process and highlighting some of the most relevant issues related to its application in clinical medicine. We
limit the paper’s scope to predictive data mining whose methods are methodologically ripe and often easily
available and may be particularly suitable for the class of problems arising from clinical data analysis and
decision support.
The Clinical Data Warehouse should:
• Investigate innovative ways to address the problems of handling large volumes of patient data;
• Improve communications and data capture between disparate databases and complex medical
machinery via electronic linking;
• Integrate and display data in a way that would facilitate the ability of clinicians to recognize new
disease patterns.
All these have prompted the nee for intelligent data analysis methodologies, which could discover useful
knowledge from data. The term KDD refers to “knowledge discovery in databases”. Data mining is a
particular of step in the process, involving the application process, such as data preparation prior knowledge,
and proper interpretation of the results of KDD systems that useful knowledge is derived from the data.
KDD systems incorporate theories, algorithms, and methods from all these fields. Many successful
applications have been reported from varied sectors such as marketing, finance, healthcare, insurance,
banking, manufacturing, and telecommunications. Databases theories, applications and tool provide the
necessary infrastructure to store, access and manipulate data.
Health care generates mountains of administrative data about patients, hospitals, bed costs, claims, etc.
Clinical trials, electronic patient records and computer supported disease management will increasingly
produce mountains of clinical data. This data is a strategic resource for health care institutions.
Literature Review:
Our review covered three areas: On-Line Analytical Processing (OLAP), Application of data mining in
healthcare and, Data Mining and Knowledge Discovery in Databases (KDD). It is revealed that organizations
generally use OLAP rather than OLTP to build DSS [14, 32- 33, 31, 28]. The trend now is to employ the
combination of all the three approaches. Jonathan et al. [16] used data mining to identify factors contributing
to prenatal outcomes as well as quality and cost of prenatal care. Margaret et al. [18] explored the use of
artificial neural networks to predict length of hospital stay and its effectiveness in resource allocation. There
was very little discussion on the use of data mining in decision support. Hedger [15] used an advanced data
mining system to evaluate healthcare utilization costs for GTE’s employees and dependents. He also
explored the use of IDIS (Intelligence Ware) to discover factors leading to success or failure in back
surgeries. Literature on data warehouse [5, 31, 30], OLAP [9, 14, 22, 27], data mining [7, 12, 19] and data
warehouse and OLAP integration [26, 32, 33] abounds. Bansal et al. [1] used recurrent neural networks to
predict sales forecast for a medical company. Parsaye [20] examined the relationship between OLAP and
data mining and proposed an architecture integrating OLAP and data mining and discussed the need for
different levels of aggregation for data mining. Han [10, 12] explained the need for different levels of
aggregation for pattern analysis and focused his work on OLAP mining.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Probabilistic and Statistical Models
Probabilistic and statistical analysis techniques and models have the longest history and strongest theoretical
foundation for data analysis. Although it is not rooted in artificial intelligence research, statistical analysis
achieves data analysis and knowledge discovery objectives similar to machine learning. Popular statistical
techniques, such as regression analysis, discriminant analysis, time series analysis, principal component
analysis, and multi-dimensional scaling, are widely used in biomedical data analysis and are often considered
benchmarks for comparison with other newer machine learning techniques.
Clinical Data Complexity:
Analysis data structures in clinical projects do not completely conform to normalization in real life for many
reasons. Main reasons are attributed to the way programmers and statisticians use the data at that stage to
create the reports and the nature and the source of data. Normalization, as discussed in the previous section,
makes the task of updating and modification in the original data tables easier as it eliminates duplication of
information. However, the main place of update and modification of data is the original CDBS and not the
analysis database. The other important reason is that statistical programming needs not the completely
normalized structure in the analysis data structure. This will pose an extra overhead of combining data sets to
create meaningful and workable data sets for the production of Tables and Listings. Thus, it leads to
normalization and de-normalization at the same time. Also, it is better to keep some basic information such
as visit number, visit date, etc. in every analysis data set.
Data Mining for Health care:
Because of their predictive power, data mining techniques have been widely used in diagnostic and health
care applications. Data mining algorithms can learn from past examples in clinical data and model the
oftentimes non-linear relationships between the independent and dependent variables. The resulting model
represents formalized knowledge, which can often provide a good diagnostic opinion. Classification is the
most widely used technique in medical data mining. Dreiseitl et al. [6] compare five classification algorithms
for the diagnosis of pigmented skin lesions. Their results show that logistic regression, artificial neural
networks, and support vector machines performed comparably, while k-nearest neighbors and decision trees
performed worse. This is more or less consistent with the performances of these classification algorithms in
other applications [36]. Classification techniques are also applied to analyze various signals and their
relationships with particular diseases or symptoms. Data mining is also used to extract rules from health care
data. For example, it has been used to extract diagnostic rules from breast cancer data [17]. The rules
generated are similar to those created manually in expert systems and therefore can be easily validated by
domain experts. Data mining has also been applied to clinical databases to identify new medical knowledge
[24].
Objectives:
The following objectives have been identified for Clinical Research Data Warehouse:
• Automated Reporting providing continuous stream snapshot readings from all the attached monitors
and equipment.
• Remote Viewing of the monitors and equipment.
• Central Repository for Data Collection.
• Seamless Movement of Patient Records.
• Ability to generate a Discharge Letter.
• Access to Historical Data for research and analysis purposes.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
• Reports and futuristic analysis.
Fig: Proposed Model for Clinical Data Warehouse
Conclusion:
The use of data mining has focused on evidence-based patterns from previous patient treatment. In all
likelihood, the absence of automated discovery of patterns would leave many questions unasked. These
questions, if asked, would benefit not only the resource utilization for patient treatment, but also the health of
the patient. Further work can be done to enhance the system. For example, features can be added to allow
doctors to query data cubes on business questions and automatically translate these questions to
multidimensional queries. The model can also include complex data objects, spatial data and multimedia
data. Besides decision tree, the use of other data mining techniques can also be explored.
References:
[1] Bansal, K., Vadhavkar, S., and Gupta, A., Neural Networks Based Data Mining Applications for Medical
Inventory Problems, International Journal of Agile Manufacturing, 2(1), 187-200, 1998.
[2] Bill, G. F., Huigang, L. and Kem, P. K., Data Mining for the Health System Pharmacist. Hospital
Pharmacy, 38(9), 845- 850, 2003.
[3] Blake, C.L. & Merz, C.J., UCI Repository of Machine Learning Databases, University of California,
Department of Information and Computer Science, 1998.
Available:http://www.ics.uci.edu/~mlearn/MLRepository.html
[4] David K. and Daniel O'Leary, Intelligent Executive Information Systems. IEEE Expert, 11(6), 30-35,
Dec. 1996.
[5] Donald, J.B., John, W.F., Alan, R.H., James, S., Healthcare Data Warehousing and Quality Assurance,
IEEE Computer,56-65, 2001, December.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
[6] Dreiseitl, S., Ohno-Machado, L., Kittler, H., Vinterbo, S., Billhardt, H., Binder, M. (2001). “A
Comparison of Machine Learning Methods for the Diagnosis of Pigmented Skin Lesions,” Journal of
Biomedical Informatics, 34, 28-36.
[7] Fayyad, U., Gregory, P.-S. and Smyth, P., From Data Mining to Knowledge Discovery in Databases, AI
Magazine, 37(3), 37-54, 1996.
[8] Fong, A.C.M, Hui, S.C., and Jha, G., Data Mining for Decision Support, IEEE IT Professional, 4(2), 9-
17, March/April, 2002.
[9] George, C., OLAP, Relational and Multidimensional Database Systems, Acm Sigmod Record, 25(30),
64-69, Sept. 1996.
[10] Han, J., Chiang, J.Y., Chee, S., Chen, J., Chen, Q., Cheng, S. & et al., DBMiner: A System for Data
Mining in Relational Databases and Data Warehouses, Proceedings of the 1997 Conference of the Centre for
Advanced Studies on Collaborative research, Ontario, Canada, 1-12, November, 1997.
[11] Han, J., Kamber, M., Data Mining Concepts and Techniques, San Diego, USA: Morgan Kaufmann
Publishers, pp. 294-296.
[12] Han, J., OLAP Mining: An Integration of OLAP with Data Mining, Proceedings of 1997 IFIP
Conference on Data Semantics (DS-7), Leysin, Switzerland, 1-11, 1997, October.
[13] Hripcsak, G. (1993). “Monitoring the Monitor: Automated Statistical Tracking of a Clinical Event
Monitor,” Computers and Biomedical Research, 26(5), 449-466.
[14] Helen, H. and Peter, H., Using OLAP and Multidimensional Data for Decision Making, IEEE IT
Professional, 44-50, 2001, October.
[15] Hedger, S.R., The Data Gold Rush, Byte, 20(10), 83-88, 1995.
[16] Jonathan, C.P., Lobach, D.F., Goodwin, L.K., Hales, J.W., Hage, M.L. and Hammond, W.E., Medical
Data Mining: Knowledge Discovery in a Clinical Data Warehouse, Proceedings of the American Medical
Informatics Association Symposium, Philadelphia, United States of America, 101-105, 1997.
[17] Kovalerchuk, B., Vityaev, E., and Ruiz, J. F. (2001). “Consistent and Complete Data and ‘Expert’
Mining in Medicine,” in Cios, K. J. (Ed.), Medical Data Mining and Knowledge Discovery, New York,
USA: Physica-Verlag.
[18] Margaret, R.K., Kevin, C.D., and Ida, A., Data Mining in Healthcare Information Systems: Case Study
of a Veterans' Administration Spinal Cord Injury Population, Proceedings of the 36th Hawaii International
Conference on System Sciences (HICSS'03), Hawaii, United States of America, IEEE Computer, 159-167,
2002.
[19] Ming-Syan, C., Jiawei, H. and Philip, S.Y., Data Mining: An Overview From a Database Perspective,
IEEE Transactions on Knowledge and Data Engineering, 8(6), 866-883, 1996, December.
[20] Parseye, K., OLAP and Data Mining: Bridging the Gap. Database Programming and Design, 10, 30-37,
1998.
[21] Palaniappan, Sellappan, Chua Sook Ling Clinical Decision Support Using OLAP With Data Mining,
IJCSNS International Journal of Computer Science and Network Security, 290 VOL.8 No.9, September
2008.
[22] Panos, V., and Timos, S., A Survey on Logical Models for OLAP Databases. ACM Sigmod Record,
28(4), 64-69, Dec.1999.
[23] Philip Baylis, Better health care with data mining, SPSS white paper1999 SPSS Inc. WPDMHC-0699.
[24] Prather, J. C., Lobach, D. F., Goodwin, L. K., Hales, J. W., Hage, M. L., and Hammond, W. E. (1997).
“Medical Data Mining: Knowledge Discovery in a Clinical Data Warehouse,” in Proceedings of the AMIA
Annual Symposium Fall 1997, 101-105.
[25] Raymond P.D., Knowledge Management as a Precursor Achieving Successful Information Systems in
Complex Environments. Proceedings of SEARCC Conference 2004, 127-134, Kuala Lumpur, Malaysia.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
[26] Ralph, K. and Margy, R., The Data Warehouse Toolkit. The Complete Guide to Dimensional Modeling
(2nd ed.), Canada: John Wiley & Sons, Inc, 2002.
[27] Robert, S.C., Joseph, A.V. and David, B., Microsoft Data Warehousing: Building Distributed Decision
Support Systems, London: Idea Group Publishing, 1999.
[28] Sarwagi, S., Explaining Differences in Multidimensional Aggregate, Proceedings of the 25th
International Conference on Very Large Data Bases, Scotland, United Kingdom, 42-53, September, 1999.
[29] Sellappan, P., Chua, S.L., Ng, Y.H., Ng, Y.M., Healthcare Information Services - The Application
Service Provider (ASP) Model, Proceedings of SEARCC Conference 2004, Kuala Lumpur, October, 2004.
[30] Shim, J.P., Warkentin, M., Courtney, J.F., Power, D.J., Ramesh, S., and Christer, C., Past, Present and
Future of Decision Support Technology, Elsevier Science B. V., 33, 111-126, 2002.
[31] Surajit, C., Umeshwar, D., and Ganti, V., Database Technology for Decision Support Systems, IEEE
Computer, 34(12), 48-55, Dec. 2001.
[32] Surajit, C. and Umeshwar, D., An Overview of Data Warehousing and OLAP Technology, ACM
Sigmod Record,26(1), 65-74, 1997.
[33] Torben, B.P. and Christian, S.J., Multidimensional Database Technology, IEEE Computer, 34(12), 40-
46, 2001, December.
[34] Usama, M. F., Data Mining and Knowledge Discovery: Making Sense Out of Data, IEEE Expert, 20-25,
1996, October.
[35] Usama F., Data Mining and Knowledge Discovery in Databases: Implications for Scientific Databases.
Proceedings of the 9th International Conference on Scientific and Statistical Database Management (SSDBM
’97), Olympia, WA., 2-11, 1997.
[36] Yang, Y. and Liu, X. (1999). “A Re-examination of Text Categorization Methods, in Proceedings of the
22nd Annual International ACM Conference on Research and Development in Information Retrieval
(SIGIR’99), 1999, pp. 42-49.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
A Traditional Development Life Cycle Methodology for Customer-Agent Based Model
Development
Komal Chandra Joshi
Lecturer, Shriram Institute of Management & Technology,
Kashipur (USN), Uttarakhand
Abstract:
In a Traditional Development System of Kumaon culture people face lot of problem while developing the
Traditional system in the form of Agent based Model in this paper we are following the TDLC Methodologies
and a Traditional Development Life Cycle (TDLC) Methodologies, which is providing a means of planning and
executing a wide variety of software development efforts, ranging from traditional custom application
development to rapid application development using prototyping. As the development of Agent Based
Models (ABM) [1] takes its place in the list of capabilities of custom software development companies, a
variation on the traditional SDLC will be needed to control the process. This paper presents a methodology
for the development of an Agent Based Model by including some facts of Kumaon folk dances, defining the
phases, activities and deliverables of the process, and provides some insights and comments on favorable
circumstances for the application of an ABM.
Introduction:
Traditional Development Life Cycle (TDLC) methodologies are mechanisms to assure that software systems
meet established requirements and also sometimes fall short in the new e-business software environment.
These methodologies impose various degrees of discipline to the software development process with the goal
of making the process more efficient and predictable. In response to this problem, so called “light” TDLC
methodologies have recently been developed and put to use. They are considered light because of the
reduced documentation and managerial effort required. For the purpose of discussion in this paper, TDLC
methodologies are divided into two groups (traditional and lightweight). Along the way the size and
complexity of the projects we will find ourselves facing a problem of structure and organization that is the
precise parallel of the issues that have always faced computer application development projects, namely,
how to manage and control the Traditional systems development life cycle (TSDLC). In response to this
problem, so called “light” TDLC methodologies have recently been developed and put to use. In this
discussion, methods such as Adaptive Software Development (ASD), Agile Software Process (ASP),
Crystal, Feature Driven Development (FDD), Rational Unified Process (RUP), and others were explored.
The paper concluded with a summary of lightweight TDLC methods along with recommendations for their
use.
The Business & Technical Study for TSDLC:
The Kumaon is enriched with local traditions but least technical advancement like the early efforts in a de-
regulating traditional system, we are in the early stages of investigation of the nature and capability of
ABM's by following the major and minor fields (as the fields taken in the table, given below) of local
traditions, and in our ability to build them effectively and efficiently. By the end of the decade, business
management, information systems, and biological concepts and technologies will converge around a
common view of how change happens in this modernizations relay race.” Whether ABM's will indeed fulfill
their promise of a whole new generation of systems that are able to adapt themselves to the environment by
following our local traditions. The business case requirements:
. Business Case Outline, Executive Summary, Project Purpose, Schedule, Risk Assessment
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
· Current Process, Future Process, Technology Assessment, Verification
· Change Analysis, Cost Estimate, Cost/Benefit Analysis
Now Technically it is Implementing an enterprise application lifecycle management system is very different
from giving your developers a new version control system to put their source code in. Application Lifecycle
Management (ALM) [10] encompasses the processes and tools employed at all stages of development: from
project inception and requirements gathering to deployment and maintenance. It is my observation that the
developers of ABM's are often writing “Programs”, and the customers are often expecting “Programming
System Products”, and the lack of some fundamental best practices within the project sometimes delays the
discovery of this miscommunication until it has escalated into a major problem. Project planning, work plan
development, project team training, scheduling, requirements gathering, module design and testing, data
architecture development, training and implementation, all are traditional areas of focus, and deserve the
attention of the ABM developer. ABM model development project has all of the old issues, plus some new
ones, and that will be the key to our ongoing success is educating our customer are linked with the traditional
system portals.
Methodologies:
The need for methodology to control the ABM development process emerged immediately with the first few
major assignments in my involvement with the discipline. It was not, and is not, an effort to control the
creative process of the developer, but to align that process with the expectations of the customer, a customer
who is used to doing business like web portal or else, a certain way as it relates to controlling software
projects.
(a) Traditional Methodologies for TDLC:
When we had no methodologies or formal guidelines for developing systems, data processing was an art
rather than a science. If the process was an art, the practitioners were definitely artists. The systems analysts
gathered customer requirements and gave them to the programming staff, Although Six Sigma had not
become part of the business vocabulary, and the goal of an SDLC was one of the Six Sigma tenets: the desire
to reduce variation. In its simplest form, an SDLC divides the software development process into a number
of clearly defined phases, each of which is further divided into steps. Because the phases were viewed as
sequential steps, with the output from one phase becoming the input to the next, a traditional SDLC was
often called “a waterfall.” And, like water flowing over a precipice, the underlying premise of the waterfall
approach to system development was that all motion was forward. Once a phase was completed, there was
no returning to it. Exhibit 1.1 shows the phases in a typical traditional SDLC.
[11]Exhibit 1.1, Traditional SDLC (The Waterfall)
Project Initiation → System Analysis → System Design →
Construction → Testing and Quality Assurance → Implementation
So after following these steps we can convert the traditional system especially the folk dances of Kumaon
region in the tabular form like:
Elementary Table of Folk Dances:
A table View of Traditional Database of Kumaon traditional Dances:
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Sr.
No.
Name of
Dance
Meaning Dress and
Supporting
Instruments
Occasion Method
1 Jhora This word
basically is
“Joda” which, in
Hindi, relates to
“Jhukna” (bow
down) or
“Jhoolna” (to
swing). In
Kumaoni it is
very common to
pronounce the
sound
J as Jh.
Salwar, Suit,
Sari
Jhaanch,
Hurka
Navratras,
Nandadevi
In this all the dancers form a circle
by holding one another’s hand and
swing with fast moment’s feet while
singing along with their head bowed
down. Also these songs are named
such as these are also sung by
dividing the entire singing dancing
group in two parts and are also sung
in pairs.
Participation of a minimum of 5-6
and maximum of dancers upto 150-
200. Initially gents sing the first line
of the song and then the groups of
ladies repeat it while dancing.
2 Chanchari
The word
“Chaunchari” is
related to the
word “Charchari”
in Sanskrit
Colorful and
different style
of dresses
Jhaanch,
Hurka,
Manjeera,
Vinai
Uttarayni ‘Chanchari’ is also sung in question
answer form between two singers.
Two semicircles – one formed by
ladies and other by gents are joined
to make a full circle. ‘Chanchari’ is
the oldest form of ‘Jhora’ and is still
called so in Nainital. The foot
movement is comparatively slow in
it and also ascend and descend of
musical notes is a bit different.
3 Chapeli
The word
‘Chapeli’ is a
combination of
the word ‘Chpp’
(‘Chay’ in
Sanskrit) and
‘Ali’. ‘Chpp’ or
‘Chay’ means
‘Khyaipan’ or
‘Khispr Gati’.
A male
dressed as
lady has now
replaced the
female. In his
one hand and
a handke-
rchief
Hurka,Vinai,
Kasen ke
Thali, Jhach,
Kchangara,
Damau
Festivals,
fairs and
marriages
In this we have one main singer, one
dancer and a group of singers. In
earlier days the dancer used to be a
female. The male and the female
used to enact love scene. A male
dressed as lady has now replaced the
female. This is a dance of a loving
couple. Being the dance of a lover of
beauty or an admirer it is called as
“Chapeli”. Grabbing an opportunity
during the fair, the young admirer of
beauty joins the dance with the
mirror in his one hand and a
handkerchief in the other. In this the
male and female singers sing in
question answer form to rely to each
other’s question and in case of
argument they ignore the question
and go in their own ways. It includes
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
on “Hurka” singer also. “Chapeli” is
also sung in “Cholia” dance. These
depict description of beauty,
persuasion, humour and
comradeship.
(b) Lightweight Methodologies for TDLC [8]:
In response to traditional approaches to software development, new lightweight methodologies have
appeared. A high percentage of software development efforts have no process and might best be described as
a chaotic “code and fix” activity. Light SDLC techniques are a compromise between no process and too
much process. . These are Adaptive Software Development (ASD), Agile Software Process (ASP), Crystal,
Feature Driven Development (FDD), and Rational Unified Process (RUP). And few we are discussing here:
ASP: The Agile Software Process (ASP) [2] was first proposed at the 1998 International Conference on
Software Engineering in Kyoto Japan. Unlike traditional software process models based on volume, the ASP is
time-based and quickly delivers software products. The model accomplishes this by integrating lightweight
processes, modular process structures, and incremental and iterative process delivery. The ASP methodology
offers five major contributions to the field. These include:
1. A new process model with a time-based inaction mechanism.
2. A software process model that provides evolutional delivery.
3. A software process architecture that integrates concurrent and asynchronous processes.
4. A process-centered software engineering environment.
5. Experience and lessons learned from the use of ASP for the five-year development of a large-scale
software system.
However, ASP is a complex process and is therefore more vulnerable to disruption than are other lightweight
and traditional SDLC methodologies. Benefits of the ASP process are its ability to efficiently manage large-scale
software development efforts [3].
Crystal: The Crystal family of lightweight SDLC methodologies is the creation of Alistair Cockburn. Crystal is
comprised of more than one methodology because of Cockburn’s belief that differing project types require
differing methodologies. Project types are classified along two lines: the number of people on the
development team and the amount of risk (e.g. a 30 person project that is at risk to lose discretionary money
requires a different methodology than a four person life-critical project). Crystal methodologies are divided
into color-coded bands [6]. “Clear” Crystal is the smallest and lightest. “Yellow”, “Orange”, “Red”, “Maroon”,
“Blue”, and “Violet” follow for use with larger groups using more complex methodologies. Each color has
its own rules and basic elements. Each methodology is as light as possible and is tuned to the current project
using techniques developed by Cockburn. These techniques are based on the following four principles:
1. Use larger methodologies for larger teams.
2. Use denser methodologies for more critical projects
3. Interactive, face-to-face communication is most effective.
4. Weight is costly.
For example, Crystal “Clear” is the lightest band and is suitable for use with development teams of up to six
people. Rules for this band are [6]:
1. Required roles are sponsor, senior designer, designer, and user.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
2. There is only one team.
3. Software is delivered through quality assurance every three months.
4. Fewer work products are required.
5. Work product templates, coding style, and other standards are determined by the team.
6. Individual techniques are determined by the individual and the team.
Finally, Crystal methodologies are based on the premise that people issues can easily determine a project’s
results [6]. Software development methodologies should recognize this and take the characteristics of people
into account.
FDD: Feature Driven Development (FDD) is a model-driven short-iteration software development process
[5]. The FDD process starts by establishing an overall model shape. This is followed by a series of two-week
“design by feature, build by feature” iterations. FDD consists of five processes: develop an overall model,
build a features list, plan by feature, and design by feature, and build by feature. There are two types of
developers on FDD projects: chief programmers and class owners [5]. The chief programmers are the most
experienced developers and act as coordinator, lead designer, and mentor. The class owners do the coding.
One benefit of the simplicity of the FDD process is the easy introduction of new staff. FDD shortens learning
curves and reduces the time it takes to become efficient.
Finally, the FDD methodology produces frequent and tangible results. The method uses small blocks of user-
valued functionality.
RUP: The Rational Unified Process (RUP) works well with cross-functional projects [4]. Published by
Rational Software, RUP contains six best practices: manage requirements, control software changes, develop
software iteratively, use component-based architectures, visually model, and verify quality. RUP is a process
framework and can be used in either a traditional (e.g. waterfall style) or a lightweight manner. The process
was designed for developers that have to use RUP, but would prefer to use XP.
Finally, although RUP was originally intended to help manage software projects, its flexible design makes it
applicable to large e-business transformation projects [4].
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
[9].
These models are often viewed as cumbersome, bureaucratic, and unsuited to the rapid pace of many
software development projects. This discussion was followed by a review of new lightweight SDLC
methodologies. Lightweight methodologies were developed to efficiently manage software projects
subjected to short timelines and excessive uncertainty and change.
Conclusion:
By the discussing the entire system I have taken the example of our tradition of Kumoan region and from
that obviously, what I have presented here is the framework of a methodology. My motivation for
developing it is that the lack of its existence has on occasion caused difficulty and miscommunication
between an customer and a developer. It seems that the larger and more important the opportunity, the more
likely that issues would arise between the customers technical community and the developer and sometimes
dampening the momentum of the effort.
And we have seen different methodologies and the best use of a methodology, in my opinion, is not simple
as a time pass, in which every step must be observed, but as a library, from which those things that are
important to the effort at hand are extracted. Traditional SDLC methodologies are often regarded as the
proper and disciplined approach to the analysis and design of software applications. Lightweight
methodologies on the other hand are a compromise between no process and too much process. These new
methods were developed to efficiently manage software projects in a short timelines. Nine types of
lightweight SDLCs are Adaptive Software Development (ASD), Agile Software Process (ASP), Crystal,
Feature Driven Development (FDD), and Rational Unified Process (RUP) etc. Strengths of these new light
methodologies include their simpler processes and easier acceptance by developers who are only familiar
with code and fix techniques. In addition, these lightweight SDLCs aid developers in thinking clearly about
the end products they are creating. Disadvantages include their inability to handle large development teams.
Lightweight methodologies are most appropriate when there are uncertain and volatile requirements,
responsible and motivated developers, and customers who wish to become involved. On the other hand,
lightweight methods are inappropriate with teams of more than fifty and/or the project has a fixed scope.
These methodologies I discussed here because between taking the data and designing process (according
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
waterfall model) while traditional system developing into a proper application forms (Agent Based), the
number of lightweight methodologies can be used.
References:
[1] A Systems Development Life-Cycle Methodology For Agent-Based Model Development , R. L. SIPE,
New Science Partners, Houston , Texas
[3] Aoyama, M. (1998b). Web-based agile software development. IEEE Software, 15(6), 56-65.
[4] Bloomberg, J. (2001, January). Using the RUP for Enterprise e-business Transformation. WaveBend
Solutions.
[5] Coad, P. (1999). Feature-Driven Development. Object International. Retrieved April 8,2001,
from the World Wide Web: http://www.togethersoft.com/jmcu/chapter6.PDF.
[6] Cockburn, A. (2000, July/August). Selecting a project's methodology. IEEE Software, 17(4), 64-71.
[7] DISS 725 – System Development: Research Paper 1, SDLC on a Diet, by Ronald G. Wolak
[8] North, Michael, 2002, “The ABMS Paradigm”, Proceedings from “Capturing Business Complexity with
Agent-Based Modeling and Simulation: Useful, Usable and Used Techniques”.
[9] Use Cases and Implementing Application Lifecycle Management Systems, Paul Bowden MKS Systems.
[10]Software development life cycle ...en.wikipedia.org/wiki/Software_development_process
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Wireless Communications – A Review
Pramod Kumar Joshi1, Sadhana Rana
2
1,2
Lecturer, Amrapali Institute, Haldwani, Nainital, Uttrakhand
[email protected], [email protected]
Abstract: Wireless communications are everywhere. People around the world regularly send and receive messages
wirelessly, that is, transmitted through the air. Three types of wireless communications include wireless
messaging services, wireless Internet access points and global positioning systems. People use mobile
phones, PDAs, and other mobile devices to access text messaging, instant messaging, and picture messaging
services.Through text messaging services, users send and receive short text messages, which usually consist
of fewer than 300 characters. Wireless instant messaging is an Internet communications service that allows a
wireless mobile device to exchange instant messages with one or more mobile device or online personal
computers. Users send graphics, pictures, video clips, sound files, and short text messages with picture
messaging services.
In many public locations, people connect to the Internet through a wireless Internet access point using mobile
computers and devices. A global positioning system (GPS) is a navigation system that consists of one or
more earth-based receivers that accept and analyze signals sent by satellites in order to determine the
receiver’s geographical location, according to Shelly and Cashman (How a GPS Works). A GPS receiver is a
handheld, mountable, or embedded device that contains an antenna, a radio receiver, and a processor. Many
mobile devices, such as a mobile phones and PDAs, have GPS capability .
Introduction:
Wireless communication is the transfer of information over a distance without the use of electrical
conductors or " [wire] s". The distances involved may be short (a few meters as in television remote control)
or very long (thousands or even millions of kilometers for radio communications). When the context is clear
the term is often simply shortened to "wireless". Wireless communications is generally considered to be a
branch of [telecommunications]. It encompasses various types of fixed, mobile, and portable [two way radio]
s, [cellular telephone] s, [personal digital assistant] s (PDAs), and [wireless network] ing. Other examples of
wireless technology include [GPS] units, [garage door openers and or garage doors] , wireless [computer
mice] , [keyboard] s and [headsets] , [satellite television] and cordless [telephone]
Background: In the history of [wireless technology], the demonstration of the theory of [electromagnetic wave] s by
[Heinrich Rudolf Hertz] in 1888 was important. The theory of electromagnetic waves were predicted from
the research of [James Clerk Maxwell] and [Michael Faraday] . Hertz demonstrated that electromagnetic
waves could be [transmitted] and caused to travel through space at straight lines and that they were able to be
[received] by an experimental apparatus. The experiments were not followed up by Hertz and the practical
applications of the wireless communication and remote control technology would be implemented by
[Nikola Tesla] .
Wireless:
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Wireless operations permits services, such as long range communications, that are impossible or impractical
to implement with the use of wires. The term is commonly used in the telecommunications industry to refer
to telecommunications systems (e.g., radio transmitters and receivers, remote controls, computer networks,
network terminals, etc.) which use some form of energy (e.g. [radio frequency] (RF), [infrared] light, [laser]
light, visible light, acoustic energy, etc.) to transfer information without the use of wires. Information is
transferred in this manner over both short and long distances.
Wireless communication The term "wireless" has become a generic and all-encompassing word used to describe communications in
which electromagnetic waves or RF (rather than some form of wire) carry a signal over part or the entire
communication path.
Common examples of wireless equipment in use today include:
• Professional LMR (Land Mobile Radio) and SMR (Specialized Mobile Radio) typically used by
business, industrial and Public Safety entities
• Consumer Two Way Radio including FRS (Family Radio Service), GMRS (General Mobile Radio
Service) and Citizens band ("CB") radios
• The Amateur Radio Service ( Ham radio )
• Consumer and professional Marine VHF radios
• Cellular telephones and pagers: provide connectivity for portable and mobile applications, both personal
and business.
• Global Positioning System (GPS): allows drivers of cars and trucks, captains of boats and ships, and
pilots of aircraft to ascertain their location anywhere on earth.
Applications of Wireless networking: Wireless networking (i.e. the various flavors of unlicensed 2.4 GHz WiFi devices) is used to meet a variety
of needs. Perhaps the most common use is to connect laptop users who travel from location to location.
Another common use is for mobile networks that connect via satellite. A wireless transmission method is a
logical choice to network a LAN segment that must frequently change locations. The following situations
justify the use of wireless technology:
- To span a distance beyond the capabilities of typical cabling,
- To avoid obstacles such as physical structures, EMI, or RFI,
- To provide a backup communications link in case of normal network failure,
- To link portable or temporary workstations,
- To overcome situations where normal cabling is difficult or financially impractical, or
- To remotely connect mobile users or networks.
Applications may involve [point-to-point communication] , [point-to-multipoint communication],
[broadcasting] , [cellular network] s and other [wireless network] s.
Applications of wireless technology
Security systems Wireless technology may supplement or replace hard wired implementations in security systems for homes
or office buildings.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Television remote control Modern televisions use wireless (generally infrared) remote control units. Now radio waves are also used.
Cellular telephony (phones and modems)
Perhaps the best known example of wireless technology is the [cellular telephone] and [modems]. These
instruments use radio waves to enable the operator to make phone calls from many locations world-wide.
They can be used anywhere that there is a cellular telephone site to house the equipment that is required to
transmit and receive the signal that is used to transfer both voice and data to and from these instruments.
Wi-Fi Wi-Fi is the trademark for the popular wireless technology used in home networks, mobile phones, video
games and other electronic devices that require some form of wireless networking capability. In particular, it
covers the various IEEE 802.11 technologies (including 802.11a, 802.11b, 802.11g, and 802.11n). Wi-Fi
technologies are supported by nearly every modern personal computer operating system, most advanced
game consoles, laptops, smartphones and many printers and other peripherals.
Wireless energy transfer
Wireless energy transfer is a process whereby electrical energy is transmitted from a power source to an
electrical load that does not have a built-in power source, without the use of interconnecting wires.
Categories of wireless implementations, devices and standards:
• Radio communication system.
• Broadcasting.
• Amateur radio.
• Land Mobile Radio or Professional Mobile Radio: TETRA, P25, OpenSky, EDACS, DMR, dPMR.
• Communication radio.
• Cordless telephony: DECT (Digital Enhanced Cordless Telecommunications).
• Cellular systems:0G, 1G, 2G, 3G, Beyond 3G (4G), Future wireless.
• List of emerging technologies.
• Short-range point-to-point communication : Wireless microphones, Remote controls, IrDA, RFID
(Radio Frequency Identification), Wireless USB, DSRC (Dedicated Short Range Communications),
EnOcean, Near Field Communication.
• Wireless sensor networks : ZigBee, EnOcean; Personal area networks, Bluetooth, Ultra-wideband
(UWB from WiMedia Alliance).
Wireless security
It is the prevention of unauthorized access or damage to computers using [wireless] networks. [Wireless]
networks are very common, both for organizations and individuals. Many laptop computers have [wireless
card] s pre-installed. The ability to enter a network while mobile has great benefits. However, wireless
networking has many security issues. [Hackers] have found wireless networks relatively easy to break into,
and even use wireless technology to crack into wired networks. As a result, it's very important that
enterprises define effective wireless security policies that guard against unauthorized access to important
resources.
The risks to users of wireless technology have increased as the service has become more popular. There were
relatively few dangers when wireless technology was first introduced. Crackers had not yet had time to latch
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
on to the new technology and wireless was not commonly found in the work place. However, there are a
great number of security risks associated with the current wireless protocols and [encryption] methods, and
in the carelessness and ignorance that exists at the user and corporate IT level. Cracking methods have
become much more sophisticated and innovative with wireless. Cracking has also become much easier and
more accessible with easy-to-use [Windows] -based and [Linux] -based tools being made available on the
web at no charge
Wireless access point
In [computer networking] , a wireless access point ( WAP or AP ) is a device that allows wireless
communication devices to connect to a [wireless network] using [Wi-Fi], [Bluetooth] and related standards.
The WAP usually connects to a [wired network], and can relay data between the wireless devices (such as
computers or printers) and wired devices on the network.
Prior to [wireless networks] , setting up a computer network in a business, home, or school often required
running many cables through walls and ceilings in order to deliver network access to all of the network-
enabled devices in the building. With the advent of the Wireless Access Point, network users are now able to
add devices that access the network with few or no new cables. Today's WAPs are built to support a standard
for sending and receiving data using radio frequencies rather than cabling. Those standards, and the
frequencies they use are defined by the [IEEE]. Most WAPs use [IEEE 802.11] standards.
Common WAP Applications
typical corporate use involves attaching several WAPs to a wired network and then providing wireless access
to the office [LAN] . Within the range of the WAPs, the wireless end user has a full network connection with
the benefit of mobility. In this instance, the WAP functions as a gateway for clients to access the wired
network.
A [Hot Spot] is a common public application of WAPs, where wireless clients can connect to the [Internet]
without regard for the particular networks to which they have attached for the moment. The concept has
become common in large cities, where a combination of [coffeehouse] s, libraries, as well as privately owned
open access points, allow clients to stay more or less continuously connected to the Internet, while moving
around. A collection of connected Hot Spots can be referred to as a [lily-pad network] .
The majority of WAPs are used in [Home wireless networks] . Home networks generally have only one
WAP to connect all the computers in a home. Most are [wireless router] s, meaning [converged device] s that
include a WAP, router, and often an ethernet switch in the same device. Many also converge a broadband
modem. In places where most homes have their own WAP within range of the neighbors' WAP, it's possible
for technically savvy people to turn off their encryption and set up a [wireless community network] , creating
an intra-city communication network without the need of wired networks.
A WAP may also act as the network's arbitrator, negotiating when each nearby client device can transmit.
However, the vast majority of currently installed [IEEE 802.11] networks do not implement this, using a
distributed pseudo-random algorithm called [CSMA/CD] instead.
Wireless Access Point vs. Ad-Hoc Network
Some people confuse Wireless Access Points with [Wireless Ad-Hoc networks] . An Ad-Hoc network uses a
connection between two or more devices without using an access point: the devices communicate directly.
An Ad-Hoc network is used in situations, such as for a quick data exchange, or for a Multiplayer LAN game,
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
because it is easy to set up and does not require an access point. Due to its peer-to-peer layout, Ad-Hoc
connections are similar to [Bluetooth] ones, and are generally not
ecommended for a parmanent installation. [Internet access] via [Ad-Hoc networks] , using features like
Windows' [Internet Connection Sharing] , may work well with a small number of devices that are close to
each other, but Ad-Hoc networks don't scale well. Internet traffic will converge to the nodes with direct
internet connection, potentially congesting these nodes. For internet-enabled nodes, Access Points have a
clear advantage, being designed to handle this load.
Limitations:
One [IEEE 802.11] WAP can typically communicate with 30 client systems located within a [radius] of 100
m. However, the actual range of communication can vary significantly, depending on such variables as
indoor or outdoor placement, height above ground, nearby obstructions, other electronic devices that might
actively interfere with the signal by broadcasting on the same frequency, type of [antenna] , the current
weather, operating [radio frequency] , and the power output of devices. Network designers can extend the
range of WAPs through the use of [repeater] s and [reflector] s, which can bounce or [amplify] radio signals
that ordinarily would go un-received. In experimental conditions, wireless networking has operated over
distances of several [kilometer].
Most jurisdictions have only a [limited number of frequencies] legally available for use by wireless
networks. Usually, adjacent WAPs will use different frequencies to communicate with their clients in order
to avoid [interference] between the two nearby systems. Wireless devices can "listen" for data traffic on
other frequencies, and can rapidly switch from one frequency to another to achieve better reception.
However, the limited number of frequencies becomes problematic in crowded downtown areas with tall
buildings using multiple WAPs. In such an environment, signal overlap becomes an issue causing
interference, which results in signal dropage and data errors. Wireless networking lags behind wired
networking in terms of increasing [bandwidth] and [throughput] . While (as of 2004) typical wireless devices
for the consumer market can reach speeds of 11 Mbit/s ( [megabit] s per second) ( [IEEE] [802.11b] ) or 54
Mbit/s ( [IEEE] [802.11a] , [IEEE] [802.11g] ), wired hardware of similar cost reaches 1000 Mbit/s (
[Gigabit Ethernet] ). One impediment to increasing the speed of wireless communications comes from [Wi-
Fi] 's use of a shared communications medium, so a WAP is only able to use somewhat less than half the
actual over-the-air rate for data throughput. Thus a typical 54 MBit/s wireless connection actually carries
[TCP/IP] data at 20 to 25 Mbit/s. Users of legacy wired networks expect faster speeds, and people using
wireless connections keenly want to see the wireless networks catch up.
Wireless access has special [security] considerations. Many wired networks base the security on physical
access control, trusting all the users on the local network, but if wireless access points are connected to the
network, anyone on the street or in the neighboring office could connect. The most common solution is
wireless traffic encryption. Modern access points come with built-in encryption. The first generation
encryption scheme [WEP] proved easy to crack; the second and third generation schemes, [WPA] and
[WPA2] , are considered secure if a strong enough [password] or [passphrase] is used.
Some WAPs support hotspot style authentication using [RADIUS] and other [authentication server] s. For
example, [DD-WRT] v24 supports [Chilisoft] hotspot authentication which separates the WLAN from the
hard wired LAN so that your guests cannot browse the local wired network.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Environmental concerns and health hazard:
“In recent times, there have been increased concerns and research linking usage of wireless communications
with poor concentration, memory loss, nausea, premature senility and even cancer. Questions of safety have
been raised, citing that long term exposure to electromagnetic radiation of the sort emitted by wireless
networks may someday prove to be dangerous.”
References:
[1] The SINTEF Group, The Foundation for Scientific and Industrial Research at the Norwegian Institute of
Technology
[2] "Wireless Communication". sintef.no. Retrieved on 2008-03-16.
[3] ATIS Telecom Glossary 2007". atis.org. Retrieved on 2008-03-16.
[4] Story, Alfred Thomas (1904). A story of wireless telegraphy, New York, D. Appleton and Co..
[5] Heinrich Rudolf Hertz". chem.ch.huji.ac.il. Retrieved on 2008-03-16.
[6] Römer, Kay; Friedemann Mattern (December 2004). "The Design Space of Wireless Sensor Networks".
IEEE Wireless Communications 11 (6): 54–61. doi:10.1109/MWC.2004.1368897.
http://www.vs.inf.ethz.ch/publ/papers/wsn-designspace.pdf.
[7] Thomas Haenselmann (2006-04-05). "Sensornetworks". GFDL Wireless Sensor Network textbook.
Retrieved on 2006-08-29.
[8] Hadim, Salem; Nader Mohamed (2006). "Middleware Challenges and Approaches for Wireless Sensor
Networks". IEEE Distributed Systems Online 7 (3): 1. doi:10.1109/MDSO.2006.19.
http://dsonline.computer.org/portal/pages/dsonline/2006/03/o3001.html. art. no. 0603-o3001.
[9] WirelessHART Standard Approved and Released
[10] RFC 4944 - Transmission of IPv6 Packets over IEEE 802.15.4 Networks
[11] TinyOS Community Forum || An open-source OS for the networked sensor regime
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Note on Vorticity Unsteady Conducting Dusty Flow through the Annular Space
between two Circular Cylinder in Presence of a Transverse Magnetic Filed
P.K. Mittal1, M.P. Singh
2, Alok Darshan Kothiyal
3
1Professor & Head, Department of Mathematics, Graphic Era University, Dehradun
2Professor & Head, Department of Mathematics, K.L.D.A.V. P.G. College, Roorkee
3Department of Mathematics, Graphic Era University, Dehradun
Abstract:
The present Paper deals with the steady annular flow of an electrically conducting dusty viscoelastic fluid of
Rivlin – Eriksen model with inner and outer cylinders moving axially with the velocities increasing
exponentially with time in the presence of transverse magnetic field. The influence of the parameter M, 1f ,
and β on the vorticity distribution of the conducting dusty gas 1ζ and of dust particles 2ζ , has been studied
numerically and graphically.
Introduction:
The fundamental equation of motion of Saffman [8], for the laminar flow of a dusty gas, Mitra [2]
considered the unsteady dusty viscous flow of gas through the annular space between two concentric co-axial
circular cylinders, when they move with velocity increasing exponentially with time. In the present paper, we
have considered the same problem for an electrically conducting gas suspended with non-conducting small
solid spherical dust particles, in the presence of a uniform transverse magnetic field. Expressions for vorticity
of gas and the rotation of the dust particles have been found and depicted graphically. Some important
conclusions have been drawn from these expressions and graphs.
Mathematical Formulation:
An electrically conducting dusty gas of viscosity µ and electrical conducting σ is contained between two
long co-axial circular cylinders of radii 1r and 2r in presence of an imposed transverse magnetic field of
strength 0B .The inner and outer cylinders are moving with velocities t
e21
1
λµ and t
e21
2
λµ respectively.
We take Z-axis along the axis of cylinders. We choose a cylindrical system (r,θ , z). The flow of the
conducting dusty gas is produced by the motion of the cylinders which move parallel to the z-axis and so
there is no displacement of the conducting dusty gas and dust particles in the direction of the r and θ
respectively. Then the modified Saffman [8] equation for the conducting dust gas and non conducting dust
particles for the present problem are:
zzzzzz u
Buv
kN
r
u
rr
uv
t
u
ρσ
ρ
2
00
2)()
1( −−+
∂∂
+∂∂
=∂
∂ ………………… (1)
Changing it to non-dimensional form by substituting
1
*
r
rr = ,
2
1
*
r
vtt = ,
vr
ruu z
2
1
1* = , v
rvv z 1* =
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
On omitting the asterisks, the dimensional forms of the equations of motion of the conducting dusty gas, and
non-conducting dust particle are:
uMuvfr
u
rr
u
t
u 2
2
2
)()1
( −−+∂∂
+∂∂
=∂∂
………………….. (2)
)( vut
u−=
∂∂
λ …………………. (3)
Where, 2
1
2
10
f
f
v
rkNf ==
ρ. Where
ρ0mN
f = mass concentration of the dust particles,
ρ0mN
f = ,2
1
f=λ , µ
σ.10rBM = = The Hartmann number.
The boundary conditions are:
21.),( 1
λµ etru = at r = 1
21.),( 2
λµ etru = at β==1
21
r
rr (say)
Let us choose the solution of (2) and (3) respectively as.
t
erFu21).(
λ= .…………………….. (4)
t
erGv21).(
λ= ……………………… (5)
On using (4) and (5) , equations (2) and (3), on eliminating v, are combined into a single ordinary differential
equation as:
0.1 2
2
2
=−+ Fndr
dF
rdr
Fd ……………………. (6)
Where,
λλλλλλ
+++++
=2
1
222
1
2
12 )( MMfn …………………….. (7)
Equation (6) is the modified Bessel equation and its solution is.
)()(.)( 00 nrBKnrIArF += …………………….. (8)
Where 0I and 0K denote respectively the modified Bessel function of the first and second kind of order zero.
Also from (3) & (5) we get,
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
)().()(2
1
rFrGλλ
λ+
= …………………… (9)
Thus from (4) and (5), the velocities of the conducting dusty gas and dust particle are respectively.
)]()(.[ 00 nrBKnrIAu += te
21.
λ ……………………. (10)
)]()(.)[( 002
1
nrBKnrIAv ++
=λλ
λ te
21.
λ ……………………. (11)
Applying the boundary condition, the values of A and B from (10) and (11) are obtained as:
)().()().(
)(.)(.
0000
0201
nKnInKnI
nKnrKA
ββµµ
−−
= …………………….. (12)
)().()().(
)(.)(.
0000
0102
nKnInKnI
nInIB
βββµµ
−
−= ……………………. (13)
The vorticity of dusty gas and dust particle are respectively given by,
)](.)(.[ 111 nrKBnrIAn +=ζ te
21.
λ …………………….. (14)
)]()(.[).( 112
1
2 nrBKnrIAn ++
=λλ
λζ t
e21.
λ ……………………. (15)
Numerical Results and Discussion:
Table-1
Vorticity distribution of the conducting dust gas for different values of M with 2
1λ = 0.5, 1f = 0.1, 2f = 0.5, t = 1, 22 =µ , 2=β
r
M
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0
M=0.0 -0.059 0.069 0.375 0.571 0.670 0.670 0.809 0.809 0.930 1.316
M=0.5 -0.096 -0.040 0.025 0.062 0.108 0.108 0.153 0.153 0.239 0.283
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
M=1.5 2.425 2.355 2.388 2.503 2.725 2.910 3.116 3.402 3.618 3.911
Table-2
Vorticity distribution of the conducting dust particle for different values of M with 2
1λ = 0.5, 1f = 0.1, 2f =
0.5, t = 1, 22 =µ , 2=β
r
M
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0
M=0.0 -0.047 0.054 0.030 0.475 0.536 0.536 0.647 0.647 0.744 1.053
M=0.5 -0.077 -0.032 -0.020 0.049 0.086 0.086 0.122 0.122 0.191 0.226
M=1.5 1.940 1.884 1.910 2.002 2.180 2.328 2.493 2.722 2.894 3.129
-0.5
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
0 0.5 1 1.5 2 2.5
Fig.1, The VortiCity profile dust gas
M=0.5
M=0.0
M=1.5
r→
↑1ζ
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
-0.5
0
0.5
1
1.5
2
2.5
3
3.5
0 0.5 1 1.5 2 2.5
Fig.2, The Vorticity profile dusty particle
M=0.0
M=0.5
M=1.5
2ζ
↑
→r
It is clear from the Tables and graphs:
(i) When there is no magnetic field (M=0), there exists a region of no vorticity, i.e., the region of
irrotational motion of dusty gas near the wall of the inner cylinder. Also, nearby it, the rotation of
dust particles also ceases. Beyond that region the vorticity of gas and rotation of particles increases
continuously and steadily.
(ii) As the small magnetic field (M ≤ 1) is applied , the regions of no vorticity and irrotationality of dusty
gas and dust particles shift towards the outer tube.
(iii) When moderately high magnetic field is applied then vorticity of dusty gas and rotation of dust
particles both increase and we can have no region of irrotationality within the tubes.
Thus, removal of dust particles is only possible when there is no magnetic field or avery small magnetic
foield.
References:
[1] Arnold, V. I., Mathematical methods of classical mechanics, Springer, New York (1978).
[2] Mitara, P., Bull. Cal. Math. Soc., 78, 197-205, (1986)
[3] Mittal. P. K., and Raina, Acta Ciencia Indica 21, 2M (1995), 253-263.
[4] Mittal. P. K., and Raina, Acta Ciencia Indica, 33, 2M, 99(1997)
[5] Mittal, P. K., and Mukesh Bijalwan, JNABHA, Vol. 35. 107-115, (2005).
[6] Pal, S. I. Magnetogasdynamics and plasma dynamics, Wien-Springer-Verlag, 34
[7] Ramanaiah, G., Jour. Sci. Engi. Res., XIII, 128
[8] Saffmann, P. G., J. Fluid Mech., 13, 120, (1962).
[9] Sanyal, D. C., and Ghosh, S., Mathematical education, 29, (1987),
[10] Sanyal, D. C., and Bhattacharya, S. Acta Ciencia Indica, XXIVM, No. 3, 249-254, (1998),
[11] Sharma R. G. and Kapur J. P., Acta Ciencia Indica, XII M, No. 3 (1987), 95-100.
[12] Singh, K. K., Indian J. Pure Appl. Math. 8/9, 1129, (1977)
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
[13] Vortex, Yearbook of Science and Technology, McGraw Hill, (1996).
Small Remedies: Bold and Assertive Women Prabha Pant
1, Anita Parihar
2
1Assistant Professor, Department of Humanities & Social Science. GB Pant University of Agriculture and
Technology, Pantnagar.
2Professor & Head in the department of English. DSB Campus. Kumaon University. Nainital.
Abstract:
Shashi Deshpande an eminent writer aims to project a move of conservative, traditional, suppressed & silent
women from tradition to modernity in her novels. In Small Remedies Deshpande has focused bold and
assertive women, who does not care for the societal norms and come out of the four walls of their houses to
excel in their respective fields. The protagonist, Savitribai, is projected as an out and out rebel unlike others
who are pictured as involved in the family affairs. Savitribai is revealed as an educated middle class woman
who comes out of the restricted traditional norms to hone her skill of music to perfection. She concentrates
only in her professional advancement and keeps herself away from the traditional environment and fulfils her
desire to become a great musician.
………………………………………………………………………………………………………………
Shashi Deshpande , a contemporary woman novelist writes about women with a positive attitude in her
novels. She places all her protagonists in a patriarchal society and shows them as suffering women,
rebellious women and as an enlightened woman. Her protagonists belong to the educated middle class who
tries to come out of the restricted relationship to hone their skills to perfection. Deshpande in an interview
with Vanamala Vishwanatha stressed the various relationships that a woman co-exists with. She said:“It is
necessary for women to live within relationships. But if the rules are rigidly laid that as a wife or mother you
do this and no further, then one becomes unhappy. This is what I have tried to convey in my writing”. [13]
The novelist through her characters Jaya, Indu, Sarita,Urmi,and Sumi projects a move from the age old
traditional set up to the modern set up and each rebels to prove her worth. But Savitribai in Small Remedies
stands in contrast to Deshpande’s other protagonists because she is an out and out rebel unlike the others
who are pictured as involved in family affairs. Savitribai is never pictured in such a role and even though she
has a daughter Munni, she is never shown in a parental role. Infact, there is no scene in the whole book
which brings the mother and daughter together. She does not even mention her name once. Further, the other
protagonists pursue a career and are shown in various family relationships but Savitribai is only shown
pursuing her career in music. She had a different bent of mind. Since, childhood she had great fascination for
music. On her insistence she was sent to learn music by her mother but the father was furious, “‘Do you want
your daughter to be one of those women?’” Naturally women who were musicians were looked down upon
during her days. However, as the father was “the head of the family, what he said or did mattered to
everyone” (62) but despite this ban on her ‘‘she never gave up’’ (124). A rebel at heart she tells Madhu how
she had pursued Pandit Kashinath, who being “a traditional man, did not want to encourage her to step out of
her traditional role.” She goes to the extent of telling her, “…it became a curse, my being a Brahmin woman.
My belonging to a respectable family.” (130) The caste factor and the family status both stand in her way but
she rebels against these socially imposed barriers and pursues her career. She not only pursues the forbidden
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
career for a Brahmin from a respectable family but also dares to live with a Muslim tabla player Ghulam Ali
and thereby dares to defy convention due to which people are shocked. Madhu realizes that there were
similarities between her father’s lifestyle and that of Savitribai’s but her father’s ways were accepted while
Savitribai’s were shockingly disapproved of:
I see as the real uniting factor between us: both Munni and I were outsiders. In
the conventional society of Neemgaon, where each family had its place marked
out for it according to religion, caste, money, family background, etc., our
families, Munni’s and mine, were difficult to place, not conforming to the
norms. In a sense, neither of us belonged. Munni’s family, with her singer
mother, absent father and another man- a Muslim-sharing the home, was of
course radically, shockingly different. But my father, with his unorthodox
ways, was an oddity in Neemgaon as well. But my father was
accepted…because he was a doctor…. And of course, being a man, he could
get away with much. He could live the way he wanted, without open censure or
disapproval. It was not so with Munni’s mother. As Savitribai Indorekar the
singer- woman, some oddities in her behaviour were permitted, possibly
tolerated, but it didn’t take away the aura of disapproval…. (138 –139).
Savitribai’s father-in-law had a mistress and the family and the society, accepted it. Again Madhu learns
about her father’s mistress from Munni who told her, “‘He goes to a woman’” and another time she put it as
a question to her, “‘Do you know he goes to a woman at night?’” (139) And of course, the Neemgaon society
doesn’t mind. Therefore, Savitribai is revealed as a great rebel as she leaves her husband and in-laws and
lives with a lover and that too a muslim lover. She is least bothered about the society and whether they
approve of her action or not. She was well aware of the social discrimination and cannot accept such
discrimination, which would permit her father-in-law to keep a mistress while she was not permitted to learn
music. Madhu cannot help remarking that her relationship with a muslim must have been “not only
unimaginable, but the height of criminality.”(220) Perhaps a criminal act as a daughter-in-law had to “carry
the weight of the honour of the family, its reputation, its izzat”(220) Savitribai rebelled as a daughter-in-law
and as a woman. Meenakshi Mukherjee has rightly pointed out:
Savitribai-a great ‘rebel who defies the contentious of her time. The feminist
who lived her life on her own terms. The great artists who sacrificed everything
for the cause of her art or the impetuous loves who abandoned a secure married
life in a Brahmin household to live with her Muslim accompanist. (40)
Bai tells Madhu during an interview, “‘sometimes I wished,’” she says “‘that I had been born in one of those
musicians’ families, in which I would naturally have become a singer. In those families, you’re born into the
profession. There is never any problem even for women.’” But at the same time she was aware that even
these women were discriminated against as “they, unlike the men in the same families, were outside the
circle of respectable society, their futures marked out for them, the ordinary life of ordinary women denied to
them because of their birth.”(221) So women born into a higher caste or into a higher class were not the only
ones who suffered. She is well aware of the social norms, which stand as a barrier preventing her from
fulfilling her dream. Once she pulls down this barrier she surges ahead and breaks all social restrictions.
Apart from Savitribai, Madhu narrates about her aunt Leela who is “ahead not only of her generation, but the
next one as well.” (100) A Brahmin widow who marries Joe, a Christian, thus establishing at once her non-
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
acceptance of a society divided on religious lines. This spirit to rebel against the norms of a rigid traditional
society is seen in her when she found the ridiculous treatment of the bangle-woman. As a young woman She
even participated in the Quit India movement, but strongly opposed Gandhiji’s principles of ahimsa and
satyagraha. She believed that there was “something ridiculous about letting oneself be beaten up.”(97) She
resigned from the party when she felt that the party’s reaction to the political situations was not justified.
Leela a social activist also raised her voice against the male party workers when the need arose. She was
bold enough to rebel against male domination. But even after putting in years of hard work for the party, she
was sidelined and could not reach the top of the hierarchy, whereas men who worked under her were
promoted. Once, a widow of a sitting member, was given a ticket for a by-election and this provoked her to
comment, “‘it seems you’re got to become a widow for them to remember that you exist.’” (224) Madhu
writes after learning of Leela’s political struggle , Leela and Savitribai both set aside the social norms and
enter the world dominated by men and disturb the social order. P.G. Joshi has rightly commented:
In marrying her accompanist and Tabla player Ghulam Saab, she decolonises
the patriarchy in more ways than one. Firstly, she is already a married woman
from a respectable Brahmin family of Pune. Secondly, the man she married is a
Muslim. Leela too marries out of her caste and her religion and decolonises the
patriarchy. ( 112-113).
Therefore we see that Leela is found to be busy in her party politics, Savitribai in her music and Madhu in
her writings. All belonged to an educated class, making efforts to rise professionally and in this race ignore
their female traditional roles. Deshpande has concentrated only in the professional advancement of her
protagonists, and has made her protagonist come a long way from the traditional environment .Her women
are rebellious because that is the only way they can achieve what they desire and Savitribai is exemplary of
this.
References:
[1] Deshpande, Shashi. Small Remedies. New Delhi : PenguinBooks, 2000.
[2] Deshpande, Shashi. Interview with Vanamala Vishwanatha, “A Woman's World...All the Way”.
Literature Alive,vol.1,No.3,Dec.1987. 8-14.
[3] Joshi,P.G. " Post-Colonialism and Shashi Deshpande's Novels". Shashi Deshpande's Fiction A Study in
Women Empowerment and Postcolonial Discourse. New Delhi:Prestige, 2003.112-114.
[4] Mukherjee,Meenakshi. “On her own terms” Review of Small Remedies, 2000,.40-42 (The Hindu,
May 07,2000 . http/www.hinduonnet.com.)
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Problematizing Issues about Home, Homeland, Diaspora and Belongingness in the
Works of Uma Parmeswaran
Shweta Arora1, Anita Parihar
2
1Lecturer, Apex Institute of Technology, Bilaspur, Rampur
2Professor and Head, Department of English, DSB Campus, Kumaon University, Nanital
Abstract:
The paper aims to analyze the issues of home, homeland, diaspora and belongingness raised and
problematized by Uma Parmeswaran in her works. Parmeswaran’s works like Trishanku, The Door I Shut
Behind Me, Rootless but Green are the Boulevard Trees, Dear Deedi, My Sister and Sons Must Die and
Other Plays involve dual consciousness: where immigrants are frequently shown shifting back and forth
between Canada and their native land. This double consciousness enables Parmeswaran to portray the state
of homelessness, displacement, exile, marginalization and lack of belongingness being experienced by the
immigrants.
‘Diaspora’ signifies all migrations, settlements, journeys and movements-“voluntary or forcible”-of people
and communities “from their homelands into new regions” (68) across the world, both from the Third to the
First World and vice-versa, from North to South and East to West. The diasporic experience engenders the
pain of uprooting and the unexpected problems of re-settling in an alien world e.g. identity crisis, cultural
conflicts, racial discrimination, yearning for home and homeland, etc. One distinct feature of immigrants is
that they physically live in one country but through memory and imaginations are eternally caught in a state
of nostalgia and “acknowledge that the old country-a nation often buried deep in language, religion, custom
or folklore-always has some claim on their loyalty and emotions,” remarks Robert Cohen (ix). Thus migrants
according to Rushdie, “straddle two cultures….fall between two stools” [10]. The tensions with which
diasporic consciousness is marked have been aptly enlisted by Swaraj Raj:
Curious accretion of a homing desire and a state of homelessness; a state of belonging and the
awareness of not being able to belong;; the contradictory pulls the nostalgic longing for the home left
behind and the desire to feel at home in the new dwelling; and the discrepant centrifugal pull of
staying at the margins of the centre to maintain cultural difference and the centripetal seductions of
assimilation in the adopted culture. (17)
In diasporic imagination ‘home’ remains “a mythic place of origin and of radical lack” and as Avtar Brah
states: “The concept of diaspora places the discourse of ‘home’ and ‘dispersion’ in creative tension,
inscribing a homing desire while simultaneously critiquing discourses of fixed origins” (Barh 192-193).
These issues and tensions have been explored in Parmeswaran’s works from multiple angles. Moreover,
“Home has become such a scattered, damaged, precarious concept in our present travails,” says Rushdie
(East, West 1994), as different people relate differently to this space in different locales and situations, here,
elsewhere and also in imaginary spaces.
Referring to the concept of “home-ness” in diasporic psyche Vijay Mishra remarks that diasporas connect
themselves with the ideas of home and the homeland or ‘desh’ against which the ideas of other lands are
foreign or ‘videsh’ and carry their homelands in the form of a series of objects and fragments of narratives
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
and memories in their heads or in their suitcases, and struggle hard to preserve them in other lands and
cultures (67-68) Parmeswaran makes an effort to recreate through memory the life of the native community
by the use of history, rituals and myths. For instance a cultural gulf between the Indian way of life and the
Canadian life-style comes into existence as Tara’s Mother-in-law is disgusted when she finds “no rangoli
designs on porch steps / To say please come in” (66). Although expecting rangoli, a cultural symbol in the
poem, at the doorstep may seem absurd in an alien country but for an elderly woman, like Tara’s mother-in-
law, who was supposedly born and brought up in India and who had spent the main part of her life there, it
was but natural to nostalgically miss this rich cultural heritage. Rangoli was part of her life and to be
nostalgic about it is but natural. She finds the processed food in Canada unpalatable and so she nostalgically
relives the cooking experience of an Indian kitchen when she tells her son about “The leaping aromas / of
turmeric and green coriander/ and mustard seeds popped in hot oil/ that flavor food, not stink up the air”
(66). She prolongs the nostalgic moment when she complains that Lakshmi, the goddess of wealth and health
will not bless them if they have stale, stored food in cans: “She’ the lotus-seated consort/ of him who
reposes/ on the primeval ocean of milk./You think they’ll bless this food/ three days old/ you store in cans
and ice-cupboard? (66)
Such sensitive migrants are unable to cope with the existential miseries of the foreign land, and refuse to lead
fake versions of life. Feeling homesick, they wish to return home to lead a peaceful life: “Open the window,
son/ And let me go back/ To sun and air/ And sweat and even flies and all/ But not this, not this” (66-67).
Parmeswaran reveals the pangs of displacement, homelessness, unbelongingness and nostalgia for home and
homeland suffered by most of the immigrants in the foreign land. Commenting on this trait of diasporic
existence, Mike Featherstone observes that “the difficulty in handling increasing levels of cultural
complexity, and the doubts and anxieties…often engender ‘the feeling of ‘localism’ in their hearts,” and “the
desire to return home, becomes an important theme” in their psyche, “regardless of whether the home is real
or imaginary, temporary, syncretized, or simulated, or whether it is manifest in a fascination with a sense of
belonging, affiliation, and community attributed to the homes of others” ( 47)
Some migrants like Chaman Lal Dwivedi in Tishanku do not lament or feel the pangs of loss of the
homeland and adapt themselves very well to the requirements of the foreign land. Dwivedi realizes that
“[o]ne must make adjustments.”(77). He comments, “[. . .]At first/ I thought this was rakshasa land/ where
everything is opposite-/ where people monstrously huge/ make night day/ and sleep till noon./ Where women
chase men,/ like Surpanaka of old/ It was difficult at first/ to eat meat and drink liquor-/ But the rishis did
both/ in older days; sruti, word of God,/ Unchangeable, smriti, customs/ that society accretes and sheds/ for
change of times (77). These instances only show acculturation at the social level. But a study of her other
works and her views on assimilation bear out the fact that the writer never intends to show complete
assimilation.
The second generation in the play Rootless but Green are the Boulevard Trees feels that their home is
Canada. This stands in contrast to the first generation immigrants like Sharad who feels that they are rootless
like the Ontario poplars which are not native to Manitoba: “Roots, son, roots. Can we really grow roots
here?” He is apprehensive “they’d dry up one winter” and if “it doesn’t bloom this spring, well, we’ll have to
cut it down. And if an Ontario poplar can’t grow and survive in Manitoba soil, what chance do we have?”
(104). There is a note of hope, however, which surfaces throughout this play; hope projected by the younger
generation immigrants. For instance, Jayant, admits that the immigrants in Canada were “rootless” but he
feels that they should “face it” and he opines that “no one, but no one has roots anywhere because that’s the
way things are in 1979 A.D. But we stand tall, man, and live each day for all it’s godamed worth and ours”
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
(142). It is not an easy task to survive without roots yet he does not mind staying in Canada as long as they
are flourishing in this land. Drawing a parallel with the tree he says, “What does it matter how long it stands?
The point is that it is there, beautiful and green for the length of its life. A day, a hundred thousand days, it is
a question of what we do and are, during that time. This evergreen doesn’t have one Christly use-it isn’t even
good as firewood-but it is there and it is green, it is beautiful.” He gives an example of the surviving trees
“all set up overnight” which were “flourishing like crazy” in “The monstrous new apartment block”. He is
aware that immigration is a global phenomenon and has an individualistic approach to the issue: “Our
people, our old country, dad, there’s no “our people” and no “old country” for anyone in the world any more,
least of all for us. This is our land and here we shall stay” (104). Vithal is furious when Dilip suggests that
they should “try to assimilate” and retorts: Assimilate, my ass. They don’t want us to assimilate. They want
us out. We’ll be squashed like bugs soon [. . .]. They’ve never wanted us and now we are a threat[…].We
have to stay together within and we’ve got to show them that we have as much right here as the pissed-off
whites….Ghettoes is right…look at Jews…only in ghetto can unity thrive […].(117) The status of the
immigrant is clear from what Vithal says. The above brings out the fact that the immigrants of the second
generation have also not assimilated completely because they do not feel a sense of belongingness. By
applying the technique of multiple voices to portray the complex experiences of characters in various
situations, Parmeswaran problematizes the issues of home, homeland, diaspora and belongingness, treating
them not as the fixed but as fluid concepts ever shifting with the changing personality of the subject positions
of individuals and communities in other cultures and communities with the changes in the socio-cultural
scenarios of home and abroad.
Dear Deedi, my Sister: Performance Piece for Voices and Rootless but Green are the Boulevard Trees centre
on discrimination against immigrants in Canada. The characters undergo cultural shock because they have
never faced this kind of racial discrimination in their own country and moreover they have come with dreams
and so this kind of treatment in an alien country puts them under great agony. Sekoni, an immigrant, seated
in a bus, surrounded by fellow passengers ponders over his life in a hostile Canada: “Who are these faceless
people/ among whom my life is oozing away?/ each is so self-assured,/glancing swiftly but completely/
through me, wordlessly asking:/ Why are you here?/ And the bus moves on, and we (65). The chorus of all
the adult speakers at the end of the play Dear Deedi, My Sister also bring out their agonizing state of
immigrants because of cultural shock; they suffer from a sense of isolation, frustration, fear, loneliness and a
sense of intense insecurity: “What we were not told, never guessed,/ Is written on our children’s faces/
Furrowed with tears because of our race,/ Or colour, or tongue that stumbles/ Over words so alien to the
many places/ From which we’ve come. (73)
Some of the Indian migrant characters in her works are shown with an intense desire to create a ‘home’ in
their living space with religious icons. For instance in Trishanku Vithal says: “We shall build our temple/
Here where the Assiniboine/ Flows into the Red./ And I shall bring Ganga,/ As Bhagiratha did of old,/ To
our land/ our Assiniboine/ And the fluteplayer/ Dark as kaya blossom/ Shall dance on the waters of La
Salle.(82) And again in the play Rootless but Green are the Boulevard Trees Vithal echoing his own
namesake says, “[…].We shall build our temple at the confluence of the Red and Assiniboine and then we
shall say Okay, we are ready to assimilate. Not here not now […].” (118) Preserving one’s identity is very
essential in Parmeswaran’s plan of re-rooting in an alien land. Vithal’s view of living in ghettoes is what
Rajen points out is “multiculturalism here” (117) and this is what the writer advocates. Parmeswaran’s view
on the immigrant view fits in very well with Canada’s Multicultural Policy:
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
The situation of a ‘mosaic’ as against ‘a melting pot’ in the U.S.A. makes Canada a better sought-
after destination as compared to America. Canada also occupies a unique position owing to the fact
that it is one of those very few countries that have exhibited much courage in officially putting on
their statute book A Multicultural Policy and A Multicultural Act. In fact, the Policy and the Act are
significant government initiatives aimed at efficient management of their ethno-cultural diversity.
Used prescriptively, multiculturalism in Canada encompasses a relatively coherent set of ideas and
ideals in defense of ‘celebrating diversity’ as a positive, central and valued component of the
Canadian mosaic. The Policy and the Act have emerged due to five hundred years of continuous
immigration to Canada. As a natural consequence of this, preserving of linguistic, cultural and
literary heritage has endowed the Canadian society with a vibrancy and richness that several other
societies lack. (12)
To sum up, portraying through many situations, experiences and ambivalent stands of different characters,
we find that Parmeswaran foregrounds the idea of home not as a fixed site but as a transitional and
ambivalent location where different migrants relate differently to the concept of home, homeland and the
land of adoption as per their situations, settlements and attitudes.
Reference:
[1] Aschcroft, Bill, Gareth Griffiths and Helen Tiffin eds. Key Concepts in Post- Colonial Studies.
Routledge, 1998.
[2] Brah, Avtar. Cartographies of Diaspora: Contesting Identities. Routledge, 1997.
[3] Cohen, Robert. Global Diasporas: An Introduction. UCI, 1997. [4]Dhawan, R.K. “India in Canadian Imagination.” India in Canadian Imagination: A Literary Response. Eds. R.K.
Dhawan, D.K. Pabby & S.S. Sharma. New Delhi: Prestige, 2003.
[5] Featherstone, Mike. “Localism, Globalism, and Cultural Identity.” Global/Local: Cultural Productions
and the Transnational Imaginar. Eds., Wilson and Wimal Dissanayake. Durham: Duke UP, 1996.
[6] Mishra, Vijay. “New Lamps for Old: Diasporas Migrancy Border.” Interrogating Post-Colonialism:
Theory, Text and Context. Eds., Harish Trivedi and Meenakshi Mukherjee. Simla: IIAS, 1996.
[7] Parmeswaran, Uma. “The Door I Shut Behind Me”, “Trishanku”, “Rootless but Green are the Boulevard
Trees” The Door I Shut Behind Me: Selected Fiction, Poetry, Drama. Madras:Affiliated East-West Press,
1990.
[8] Parmeswaran, Uma. “Sons Must Die and Other Plays”, “Meera: A Dance Drama”, “Sita’s Promise: A
Dance Drama”, “Dear Deedi, My Sister: A Performance Piece for Voices” Sons Must Die and Other Plays.
New Delhi: Prestige, 2003.
[9] Raj, Swaraj. “Theorizing Diaspora Poetics and Diaspora Literature.” Perspectives on Diaspora Indian
Fiction in English eds., Tejinder Kaur and N.K Neb. Jalandhar: Nirman, 2005.
[10] Rushdie, Salman. Imaginary Homelands. London: Granta Books, 1999.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
Studies on Clarification of Apple Juice
Prity Pant
College of IT and Management, Haldwani, Uttarakhand
Introduction:
Apple (Malus Pumilia or Malus Sylvestris) is a common fruit grow extensively over the temperate regious of
Northern India. A few verities are cultivated in India in over 1200 hectares (Singh, 1969), of them Red
Delicious is good for table purpose with of excellent quality.
One of the most desirable ways of utilizing is the production of juice from the raw material. In the
conventional process of manufacturing apple juice, the fruits are milled, macerated and the juice is pressed
out through an inverted ram hydraulic press. This extraction of juice from the fruits does not give a clear
juice. Normally, extracted raw juice is treated with enzyme for clarification.
Apple contains considerable amount of pectin which is a valuable byproduct of fruit juice industry. Studies
were carried out to develop an engymatic process by which clear juice could be obtained and at the same
time maximum quantity of pectin could be recovered. Red delicious variety was evaluated for its suitability
for juice preparation.
Material and Methods:
Red delicious variety of apple is purchased from the local market. The fruits were washed in running tap
water and pulped. The pulp was heated to 65° C for 10 minuets and cooled immediately to room
temperature. Potassium metabisulphite was added to the pulp (75 – 100 ppm SO2). Pectin was estimated by
Carre and Hynes Method (1922) as Calcium Pectate. Acidity was determined as Malic Acid by AOAC
(1984). Total soluble solids were recorded as °Brix and the pH determined by digital pH meter. Reducing
sugars were determined by Ranganna (1991) and moisture content by AOAC procedure. Pectinolytic enzyme
concentrate (PEC) was used for juice treatment.
Fruits
Washing
Pulping
Extraction
Juice
Filtration
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © IJTT – 2010
Pasteurization
Physico – Chemical Characteristics of Apple Juice:
°Brix 15
Total Sugar % 10.75
Pectin % 00.33
Acidity % 00.175
pH 4.1
Hydraulic Press Enzyme
% Pomace 59.2 15
% Yield 40.6 86
°Brix 15 15.4
Acidity 0.175 0.22
% Pectin 0.68 nil
Effect of Enzyme Concentration (%) on Yield (%) and Physico – Chemical Composition of Apple
Juice:
Enzyme
Dose
Pomace %
Yield
Pectin in
Pomace %
Filtered
Juice
Yield %
Acidity % ° Brix pH Clarity
Control 40 1.55 28.8 0.175 15.0 4.2 Turbid
0.02 22 0.80 72.5 0.225 15.1 4.1 Moderate
0.04 17 0.75 78.5 0.250 15.1 3.9 Good
0.06 15 0.71 79.0 0.268 15.2 3.9 Good
0.08 14 0.65 81.5 0.290 15.3 3.9 Very Good
0.10 14 0.58 82.0 0.312 15.4 3.8 Very Good
Results and Discussion:
On comparison of characteristics of apple juice obtained by hydraulic press and enzyme treatment yield
increased from 40.6% to 86%, while pomace decreased from 59.2% to 15%. Pectin was obtained 0.86% in
hydraulic press while nil in enzyme treatment juice.
Effect of enzyme concentration on yield and physico – chemical composition of apple juice shows that on
increasing enzyme dose from control to 0.1 pomace yield decreased from 40% to 14%, pectin decreased
from 1.55% to 0.58%, and filtered juice yield increased from 28.8% to 82.0%. Juice clarity was turbid in
control sample while very good in 0.1 enzyme dose.
References:
[1] AOAC 1984. Official Methods of Analysis. 14th
ed., Edited by Sidney Williams. Published by the
association of official analytical chemists, Inc. Arlungton, Virginia 222091, New York.
[2] Carre, M.H. and Hynes, I, Biochemistry Journal.1922, 16, 60.
[3] Ranjeet Singh 1969 in fruits, National Book Trust, New Delhi, India, pp 213.
International Journal of Technical Teachers (IJTT); May-2010
Institution of Technical Teachers (ITT), India
www.ittonline.co.in,
Copy Right © ITT – 2010
[4] Ranganna, R. 1986. Hand Book of Analysis and Quality Control for fruits and Vegitable Products. Tata
Mc. Graw – Hill Publication Co. Ltd., New Delhi, 110012.