+ All Categories
Home > Documents > (A registered society under Society Act 1864) Regional ...ittonline.co.in/IJTT/papers/JTT_...

(A registered society under Society Act 1864) Regional ...ittonline.co.in/IJTT/papers/JTT_...

Date post: 06-Sep-2018
Category:
Upload: dinhtram
View: 214 times
Download: 0 times
Share this document with a friend
44
International Journal of Technical Teachers (IJTT); May-2010 Institution of Technical Teachers (ITT), India www.ittonline.co.in , Copy Right © IJTT – 2010 By (A registered society under Society Act 1864) Regional Office – North India 332 B, Race Course Valley, Near Police Lines, Race Course Dehradun (Uttarakhand)
Transcript

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

By

(A registered society under Society Act 1864)

Regional Office – North India

332 B, Race Course Valley, Near Police Lines, Race Course

Dehradun (Uttarakhand)

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Advisory Board

• Prof. Rattan K. Datta, (Ex. Advisor – Govt. of India, Ex. President Information Technology Science Congress).

• Prof. R. S. Tyagi, Deputy Director & Head, Computer Facility, All India Institute of Medical Sciences, New Delhi.

• Dr. Chander Mohan, Director, Directorate of Science and Technology, Delhi.

• Prof. P. K. Mittal, Dean – Research and Development, Graphic Era University, Dehradun.

• Prof. Pramod Kumar, Director, GCTI, Kanpur.

• Prof. Dhermendra Kumar, Head, Department of Computer Science, Guru Jhembeshwer University, Hisar.

• Prof. J. P. Saini, UP Technical University, Lucknow.

• Prof. K. K. Pandey, Director – Engineering, Tirthankar Mahaveer University, Moradabad.

• Prof. S. D. Samantray, Head, Department of Computer Science, College of Technology, G. B. Pant University of Agriculture and Technology, Pantnagar.

Chief Editor

Er. Manish Pandey

Associate Professor and Head, Department of Computer Science and IT Dev Bhoomi Institute of Technology for Women, Dehradun

Editorial Board

Er. Ruchir Gupta

Assistant Professor, Department of Electronics Engineering MJP Ruhilkhand University, Bareilly

Er. Akhilesh Sharma

Assistant Professor, Department of Electronics Engineering Apex Institute of Technology, Bilaspur, Rampur

Er. Nidhi Sethi

Assistant Professor, Department of Information Technology Dev Bhoomi Institute of Technology, Dehradun

Dr. Anita Parihar

Professor & Head in the department of English. DSB Campus

Kumaon University. Nainital

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Index

Sr. No. Name of the Paper Author and Affiliation Page No. 1. E-COMMERCE: A Need

of Corporate World

1. Akash Saxena, Sunderdeep College of

Engineering, Gaziabad (UP).

2. Kapil Gupta, Accenture, Bangalore - 560066

2. Applications of Data

Mining in Healthcare

System

1. Manish Pandey, Associate Professor, Dev

Bhoomi Institute of Technology for Women,

Dehradun, (Uttarakhand)

3. A Traditional Development

Life Cycle Methodology

for Customer-Agent Based

Model Development

1. Komal Chandra Joshi, Lecturer, Shriram

Institute of Management & Technology,

Kashipur (USN), Uttarakhand

4. Wireless Communications

– A Review

1. Pramod Kumar Joshi, Lecturer, Amrapali

Institute, Haldwani, Nainital, Uttrakhand.

2. Sadhana Rana, Lecturer, Amrapali Institute,

Haldwani, Nainital, Uttrakhand

5. Note on Vorticity Unsteady

Conducting Dusty Flow

through the Annular Space

between two Circular

Cylinder in Presence of a

Transverse Magnetic Filed

1. P.K. Mittal, Professor & Head, Department of

Mathematics, Graphic Era University,

Dehradun.

2. M.P. Singh, Professor & Head, Department of

Mathematics, K.L.D.A.V. P.G. College,

Roorkee.

3. Alok Darshan Kothiyal, Department of

Mathematics, Graphic Era University,

Dehradun

6. Small Remedies: Bold and

Assertive Women

1. Prabha Pant, Assistant Professor, Department

of Humanities & Social Science. GB Pant

University of Agriculture and Technology,

Pantnagar.

2. Anita Parihar, Professor & Head in the

department of English. DSB Campus. Kumaon

University. Nainital.

7. Problematizing Issues

about Home, Homeland,

Diaspora and

Belongingness in the

Works of Uma

Parmeswaran

1. Shweta Arora, Lecturer, Apex Institute of

Technology, Bilaspur, Rampur (UP).

2. Anita Parihar, Professor and Head,

Department of English, DSB Campus,

Kumaon University, Nanital.

8. Studies on Clarification of

Apple Juice

1. Prity Pant, College of IT and Management,

Haldwani, Uttarakhand

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

E-COMMERCE: A Need of Corporate World

Akash Saxena1, Kapil Gupta

2

1Sunderdeep College of Engineering, Gaziabad (UP)

2Accenture, Bangalore - 560066

An Introduction of E-Commerce:

E-Commerce (Electronic Commerce) can be defined as a Method by which the modern business companies

can exchange their information, Products, services via an electronic device. This methodology decreases the

cost of product while improves the quality and services .The Key factor of e-commerce is that, it reduces the

paper work and increases automation. For Example EDI (Electronic data interchange).

For the efficient use of e-commerce following infrastructure is required.

• Common business services for facilitating the sending and receiving process.

• Message and information distribution as a means of sending and receiving Information.

• Multimedia contents & network publishing for creating a product and a medium to communicate about it.

• The information superhighway is that, which provides a highway along with all e-commerce may travel.

• Technical standards, for dictating the nature of information publishing transmitting the electronic

document across the entire network, multimedia and network protocol.

• Public policy to govern the issues like universal access, information pricing and privacy issues.

• Two pillars of e-commerce business supporting all e-commerce applications.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Electronic data interchange is electronic data transfer from computer to another, such as Purchase order,

shipping notice, receiving advices and other standard business correspondence between trading partners. EDI

can be used to transmit financial information and payments in electronic forms when it is used for effective

payment. EDI is usually referred to as financial EDI and electronic fund transfer (EFT).

Edi Layered Structure:

EDI architecture specifies four layers.

1. Semantic layer

2. Standard layer

3. Transport layer

4. Physical layer

Semantic layer describes the business application that is driving EDI for an application. This layer translates

the request for quotes, price quotes, purchase orders, acknowledgements and invoices. EDI standard layer

shows EDI standards and EDI standards specify business form Structure to extent influence content seen in

application service layer. EDI transport layer relates with non electric activity of transferring business from

one company to other company. The business can be transferred using regular postal services or FAX. EDI

physical layer, EDI document is more complex than simply sending messages or sharing files through a

network. Some EDI documents are more structured than e-commerce and typically manipulate or processed

more than e-mail messages by sending and receiving soft wares.

EDI physical layer, EDI document is more complex than simply sending messages or sharing files through a

network. Some EDI documents are more structured than e-commerce and typically manipulate or processed

more than e-mail messages by sending and receiving soft wares.

Benefits of EDI:

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

The use of EDI eliminates the problems associated with traditional flow of information. With the help of EDI

now a days marketing became fast. The delay in association with making documents is reduced, so company

can make accounts and other important documents and can exchange with different trading partners. The

main benefit is time required to re-enter data is saved. And if data is not re-entered at each step in the

process, labour cost can be reduced. And also time delay can be reduced and there is more clarity in the

information flow. The other advantage in the use of EDI is that it generates functional acknowledgement,

whenever an EDI message is received and it is electronically transmitted to the sender. The

acknowledgement states that the message is received.

The area in which EDI are most suited:

EDI is most suitable in the following areas.

• EDI is most suited in those corporations where there is a large volume of repetitive standard actions

performed.

• EDI is most suited in those areas where trading partners requests for paperless exchange of documents.

• EDI is most suited in corporations where operational time is constant.EDI plays a big role in companies

where clients want fast acknowledgement and fast delivery.

• With the help of EDI, productivity also will improve. Because if information processing is fast, then

company can get more orders.

EDI Actions:

EDI can automate the information flow and facilitate the management of business process. EDI transactions

for purchase orders, shipment and payments are follows.

Purchase

Order Delivery

Purchaser Request Finance Department Automated Finance Department

Order EDI Computer

Confirm

Purchaser Dept. EDI Computer Sales Department

Shipping Dept

Inventory, Godown Receiving Dept. Managing Dept.

Product

Delivery

Step1: Purchase order will be sent from buyers computer to seller’s computer.

Step2: Purchase order confirmation will be sent by seller’s computer to buyer’s computer.

Step3: Seller’s computer sends goods booking request to transport company’s computer.

Step4: Booking confirmation will be sent by transport company’s computers to the selling company’s

computer.

Step5: Advance ship notice will be sent by the selling company’s computer to buyer’s computer.

Step6: Transport company’s computer will send status to selling company’s Computer.

Step7: Receipt advice will be sent by the buyer’s company’s computer to selling Company’s Computer.

Step8: Invoice will be sent by seller’s computer to buyer’s computer.

Step9: Payment will be sent by the buyer’s computer to seller’s computer.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Electronic Payment System and E-Commerce:

Payment is an integral part of any transaction process. It claims, debits, credits of various company’s

individuals, banking sector and non banking sector are not balanced if the transaction of payment is delayed

then the entire business system will be affected .Hence an important fact of e-commerce is to provide fast

and secure payment, settlement of credit and debit claims, but the problem is that how the purchaser will pay

for goods and services and what currency he will pay as the medium of exchange.

Everyone agrees with the aspect that payment and settlement process is a most important factor in the fast

moving electronic commerce environment. If we are using payment methods such as cash, checks, drafts or

bill of exchange, these methods are not most suited for e-business. Therefore some advance methods are

needed in modern business to meet the emerging demand of e-commerce. But these new payment systems

must be secured and a low processing cost can be wide global. Modes of payments may be Credit cards,

Debit cards, Smart cards, EFT, E-money (e-cash, e-wallet).

Types of Electronic Payment System:

Electronic payment system is a high profile system. Nowadays it is preferred in banking, health care, retail,

online marketing and in government sector, where money needs to change hands. Organizations need to

deliver products and services more cost effective and to provide a high quality and fast service to customer,

then this method is more effective. A technology emerged in early 1970s, was electronic fund transfer

(EFT).The EFT can be defined as “Any transfer of fund through an electronic device, computer,

communication instrument or magnetic tape, so as to order to credit or debit an account”.

Working on EFT can be divided into three categories:

1. Banking and financial Management:

- large scale or whole-sale payments

- small scale or retail payments

- Home banking

2. Retail payments:

- Credit cards (master cards, visa)

- Private label cards

- Change cards

3. Online E-commerce payments:

• Token based payment systems

- E-cash

- E-checks

• Credit card based payment system (Encrypted credit cards for www, Third party

authentication number.)

Digital Token Based Electronic Payment System

“Electronic tokens” is a new financial instrument, in the form of electronic money or cash/checks .Electronic

tokens are designed as electronic analogs of different forms of payment supported by a financial institutions.

There are three types of Electronic tokens:

Cash or real-time: Transaction will be settled with exchange of electronic like electronic cash.

Debit or prepaid: Person will pay in advance for the privilege of accessing information. Smart cards and

electronic purses are the example of prepaid payment system.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Credit or post paid: In the case of post- paid first of the server authenticates the customer and verifies with

bank that funds are adequate before purchasing. Electronic checks and credit/debit cards are example of post

paid mechanism.

Modes of payment:

E-Cash

A new concept came in the area of online payment system is electronic cash (e-cash). E-cash gives security

and privacy with computerized convenience. E-cash having some extra characteristics that makes it good

alternative for payment system over network. E-cash has some special properties: monetary values, inter

operatively, and security. E-cash is based on cryptographic system called “Digital Signatures”.

Electronic Checks:

Electronic checks are another form of electronic tokens. They are developed to accommodate the many

individual and entities, that prefer to pay on credit or through the way other than cash. In this mechanism

buyer must be registered with a third party account server before they are able to write electronic checks. The

accounting server works as a billing service. If buyer is registered then buyer can contact the sellers of goods

and services. After transaction the buyer sends the checks to the seller using e-mail or by other transport

methods. After transition of goods and services the following step will be performed

Step1: Buyer’s sends a check to seller.

Step2: After receiving check seller sends it to the accounting server for verification.

Step3: Accounting server verifies the digital signature using authentication scheme.

Step4: After verification accounting server sends the check to bank for payment.

Transfer the Electronic Cheque

Buyer Seller

Forward for

Authentication

Deposit Cheque

Bank Accounting Server

Credit Card-Based Electronic Payment System:

Credit card is a new mechanism in the area of electronic payment system. In this process if consumer wants

to purchase a product or services then simply he can send the credit card details to service provider that is

involved in the credit card organization that will handle this payment system. The credit card payment on on-

line network can be divided into three categories.

• Payment using plain credit card details: In this method of payment a consumer can exchange the

unencrypted credit card over a public network such as telephone line or the internet.

• Payment using encrypted credit card details: In this payment system credit CSRD details will be

encrypted before sending them out.

• Payment using third party verification: This method provides the security on payment system. A third

party verifies the credit card details; a company collects and approves payments from one client to

another client. After verification a credit card transaction for total accumulated amount is completed.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Digital Wallet:

Digital wallets are originally developed to facilitate peer to peer transaction processing. Digital wallets third

party credit card processing providers enable merchants to accept credit Card payments indirectly, using

stored consumer funds, previously loaded on to digital wallet account.

Digital wallet third party credit card processing is an ideal merchant account alternative, avoiding the hassle

and high initial expenses, for startup business, business with a lower credit card acceptance turnover, or for

merchants with low ticket sales.

Pay Pal

Pay pal services allow users to send money and bills to anyone with e-mail. Electronic money (known as

electronic cash, electronic currency, digital currency, digital money, digital cash) refers to money which

exchanged only on network, the internet and digital value stored value system. Electronic fund transfer

(EFT) and direct deposit are examples of electronic money.

Pay pal was founded in 1998, Pay Pal is an eBay company which enables any individual or business with an

e-mail address to securely, easily and quickly send and receive payment online. Pay pal’s service builds on

the existing financial infrastructure of bank accounts and credit cards and utilizes the world’s most advanced

proprietary prevention system to credit a safe, global, real time payment solution. Pay Pal lets you accept

credit cards, banks transfers, debit cards, and more-at some of the lowest costs in the industry.

Epilogue: It is clear from the above mentioned statements that EDI transactions and modes of payment

system are a boom in the coming future, because electronic payment system provides security, time saving,

easy to handle facility. Therefore it is expected that in near future it will replace all the traditional method

involved. It is a challenge in front of us that how this revolutionary technology in the field of E-commerce

can be adopted in our Indian entrepreneurs, so that we can keep the pace with the developed countries.

Different companies involved in E-commerce have opened a massive opportunities for the entrepreneurs to

reach the door of the users of e-commerce.

Reference: [1] Agarwal, Harnessing Internet Power, the electronic times dated Nov. 3, 2005.

[2] Bhattacharya B.,E-commerce ,Strategy, Technologies and application. Tata McGraw Hill, New

Delhi.

[3] Bhatia B.S. and Gurcharan Singh,E-commerce- skirting the issues,the Indian Journal of

Commerce,Jan.-Jun. 2002.

[4] Chandra Manideep “taking the big step on line E-commerce its transaction procedure” Indian Journal

of Accounting, Dec.2002.

[5] Dewan Bhusan ,(2002) Managing Information Technology vikash publishing house pvt. Ltd. New

Delhi.

[6] Gavini Augustine , P. Rekha, impact of E-commerce on industry perceptions,The Indian Journal of

Commerce,Oct.-Dec.,2001.

[7] Jones Graham (1997) how to use the Internet,Jaico publishing house, Mumbai.

[8] Kalakota Ravi, Whinston, Andrew B.,(2004) electronic commerce, Manager’s Guide, Pearson

Education pvt. Ltd. Delhi.

[9] Maji M.M., electronic commerce: challenges and prospects ,The Indian Journal of Commerce,vol. 54

no. 4.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

[10] Sundram ,U.S. Shanmuga,E-commerce in the new millennium, the Indian Journal of

Commerce,Oct.-Dec, 2001.

[11] Verma Krishna Kumar-commerce: Demand of corporate world, Prabandh Journal of Management

Education & research-June 2006.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Applications of Data Mining in Healthcare System

Manish Pandey

Associate Professor, Dev Bhoomi Institute of Technology for Women

Dehradun (Uttarakhand)

[email protected]

Abstract:

Data mining has been applied with success to different fields of human endeavor, including marketing,

banking, customer relationship management, engineering and various areas of science. However, its

application to the analysis of medical data has until recently been relatively limited. This is particularly true

of practical applications in clinical medicine which may benefit from specific data mining approaches that

are able to perform predictive modeling, exploit the knowledge available in the clinical domain and explain

proposed decisions once the models are used to support clinical decisions. The widespread availability of

new computational methods and tools for data analysis and predictive modeling requires medical informatics

researchers and practitioners to systematically select the most appropriate strategy to cope with clinical

prediction problems.

The goal of predictive data mining in clinical medicine is to derive models that can use patientspecific

information to predict the outcome of interest and to thereby support clinical decision-making. Predictive

data mining methods may be applied to the construction of decision models for procedures such as

prognosis, diagnosis and treatment planning, which may be embedded within clinical information systems.

This paper illustrates data mining will enable clinicians and managers to find valuable new patterns in data,

leading to potential improvement of resource utilization and patient health. As the patterns are based on

recent clinical practice, they represent the ultimate in evidence-based care. This paper briefly introduces the

Clementine data mining system, which incorporates advanced machine learning technologies that extract

complex interrelationships and decision-making rules from the data.

Over the last few years, the term ‘data mining’ has been increasingly used in the medical literature. Decision

support systems (DSS) can now use advanced technologies such as On-Line Analytical Processing (OLAP)

and data mining to deliver advanced capabilities. This paper presents a clinical decision support system

which combines the strengths of both OLAP and data mining. It provides a rich knowledge environment

which is not achievable by using OLAP or data mining alone. In particular, the collection of methods known

as ‘data mining’ offers methodological and technical solutions to deal with the analysis of medical data and

construction of prediction models.

Introduction:

New computational techniques and information technologies are needed to manage these large repositories

of biomedical data and to discover useful patterns and knowledge from them. In particular, knowledge

management, data mining, and text mining techniques have been adopted in various successful biomedical

applications in recent years. Knowledge management techniques and methodologies have been used to

support the storing, retrieving, sharing, and management of multimedia and mission-critical tacit and explicit

biomedical knowledge. Data mining techniques have been used to discover various biological, drug

discovery, patient care knowledge, patterns using selected statistical analyses, machine learning, and neural

networks methods. Text mining techniques have been used to analyze research publications as well as

electronic patient records. Health care generates mountains of administrative data about patients, hospitals,

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

bed costs, claims, etc. Clinical trials, electronic patient records and computer supported disease management

will increasingly produce mountains of clinical data. This data is a strategic resource for health care

institutions. In this paper, we give a methodological review of data mining, focusing on its data analysis

process and highlighting some of the most relevant issues related to its application in clinical medicine. We

limit the paper’s scope to predictive data mining whose methods are methodologically ripe and often easily

available and may be particularly suitable for the class of problems arising from clinical data analysis and

decision support.

The Clinical Data Warehouse should:

• Investigate innovative ways to address the problems of handling large volumes of patient data;

• Improve communications and data capture between disparate databases and complex medical

machinery via electronic linking;

• Integrate and display data in a way that would facilitate the ability of clinicians to recognize new

disease patterns.

All these have prompted the nee for intelligent data analysis methodologies, which could discover useful

knowledge from data. The term KDD refers to “knowledge discovery in databases”. Data mining is a

particular of step in the process, involving the application process, such as data preparation prior knowledge,

and proper interpretation of the results of KDD systems that useful knowledge is derived from the data.

KDD systems incorporate theories, algorithms, and methods from all these fields. Many successful

applications have been reported from varied sectors such as marketing, finance, healthcare, insurance,

banking, manufacturing, and telecommunications. Databases theories, applications and tool provide the

necessary infrastructure to store, access and manipulate data.

Health care generates mountains of administrative data about patients, hospitals, bed costs, claims, etc.

Clinical trials, electronic patient records and computer supported disease management will increasingly

produce mountains of clinical data. This data is a strategic resource for health care institutions.

Literature Review:

Our review covered three areas: On-Line Analytical Processing (OLAP), Application of data mining in

healthcare and, Data Mining and Knowledge Discovery in Databases (KDD). It is revealed that organizations

generally use OLAP rather than OLTP to build DSS [14, 32- 33, 31, 28]. The trend now is to employ the

combination of all the three approaches. Jonathan et al. [16] used data mining to identify factors contributing

to prenatal outcomes as well as quality and cost of prenatal care. Margaret et al. [18] explored the use of

artificial neural networks to predict length of hospital stay and its effectiveness in resource allocation. There

was very little discussion on the use of data mining in decision support. Hedger [15] used an advanced data

mining system to evaluate healthcare utilization costs for GTE’s employees and dependents. He also

explored the use of IDIS (Intelligence Ware) to discover factors leading to success or failure in back

surgeries. Literature on data warehouse [5, 31, 30], OLAP [9, 14, 22, 27], data mining [7, 12, 19] and data

warehouse and OLAP integration [26, 32, 33] abounds. Bansal et al. [1] used recurrent neural networks to

predict sales forecast for a medical company. Parsaye [20] examined the relationship between OLAP and

data mining and proposed an architecture integrating OLAP and data mining and discussed the need for

different levels of aggregation for data mining. Han [10, 12] explained the need for different levels of

aggregation for pattern analysis and focused his work on OLAP mining.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Probabilistic and Statistical Models

Probabilistic and statistical analysis techniques and models have the longest history and strongest theoretical

foundation for data analysis. Although it is not rooted in artificial intelligence research, statistical analysis

achieves data analysis and knowledge discovery objectives similar to machine learning. Popular statistical

techniques, such as regression analysis, discriminant analysis, time series analysis, principal component

analysis, and multi-dimensional scaling, are widely used in biomedical data analysis and are often considered

benchmarks for comparison with other newer machine learning techniques.

Clinical Data Complexity:

Analysis data structures in clinical projects do not completely conform to normalization in real life for many

reasons. Main reasons are attributed to the way programmers and statisticians use the data at that stage to

create the reports and the nature and the source of data. Normalization, as discussed in the previous section,

makes the task of updating and modification in the original data tables easier as it eliminates duplication of

information. However, the main place of update and modification of data is the original CDBS and not the

analysis database. The other important reason is that statistical programming needs not the completely

normalized structure in the analysis data structure. This will pose an extra overhead of combining data sets to

create meaningful and workable data sets for the production of Tables and Listings. Thus, it leads to

normalization and de-normalization at the same time. Also, it is better to keep some basic information such

as visit number, visit date, etc. in every analysis data set.

Data Mining for Health care:

Because of their predictive power, data mining techniques have been widely used in diagnostic and health

care applications. Data mining algorithms can learn from past examples in clinical data and model the

oftentimes non-linear relationships between the independent and dependent variables. The resulting model

represents formalized knowledge, which can often provide a good diagnostic opinion. Classification is the

most widely used technique in medical data mining. Dreiseitl et al. [6] compare five classification algorithms

for the diagnosis of pigmented skin lesions. Their results show that logistic regression, artificial neural

networks, and support vector machines performed comparably, while k-nearest neighbors and decision trees

performed worse. This is more or less consistent with the performances of these classification algorithms in

other applications [36]. Classification techniques are also applied to analyze various signals and their

relationships with particular diseases or symptoms. Data mining is also used to extract rules from health care

data. For example, it has been used to extract diagnostic rules from breast cancer data [17]. The rules

generated are similar to those created manually in expert systems and therefore can be easily validated by

domain experts. Data mining has also been applied to clinical databases to identify new medical knowledge

[24].

Objectives:

The following objectives have been identified for Clinical Research Data Warehouse:

• Automated Reporting providing continuous stream snapshot readings from all the attached monitors

and equipment.

• Remote Viewing of the monitors and equipment.

• Central Repository for Data Collection.

• Seamless Movement of Patient Records.

• Ability to generate a Discharge Letter.

• Access to Historical Data for research and analysis purposes.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

• Reports and futuristic analysis.

Fig: Proposed Model for Clinical Data Warehouse

Conclusion:

The use of data mining has focused on evidence-based patterns from previous patient treatment. In all

likelihood, the absence of automated discovery of patterns would leave many questions unasked. These

questions, if asked, would benefit not only the resource utilization for patient treatment, but also the health of

the patient. Further work can be done to enhance the system. For example, features can be added to allow

doctors to query data cubes on business questions and automatically translate these questions to

multidimensional queries. The model can also include complex data objects, spatial data and multimedia

data. Besides decision tree, the use of other data mining techniques can also be explored.

References:

[1] Bansal, K., Vadhavkar, S., and Gupta, A., Neural Networks Based Data Mining Applications for Medical

Inventory Problems, International Journal of Agile Manufacturing, 2(1), 187-200, 1998.

[2] Bill, G. F., Huigang, L. and Kem, P. K., Data Mining for the Health System Pharmacist. Hospital

Pharmacy, 38(9), 845- 850, 2003.

[3] Blake, C.L. & Merz, C.J., UCI Repository of Machine Learning Databases, University of California,

Department of Information and Computer Science, 1998.

Available:http://www.ics.uci.edu/~mlearn/MLRepository.html

[4] David K. and Daniel O'Leary, Intelligent Executive Information Systems. IEEE Expert, 11(6), 30-35,

Dec. 1996.

[5] Donald, J.B., John, W.F., Alan, R.H., James, S., Healthcare Data Warehousing and Quality Assurance,

IEEE Computer,56-65, 2001, December.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

[6] Dreiseitl, S., Ohno-Machado, L., Kittler, H., Vinterbo, S., Billhardt, H., Binder, M. (2001). “A

Comparison of Machine Learning Methods for the Diagnosis of Pigmented Skin Lesions,” Journal of

Biomedical Informatics, 34, 28-36.

[7] Fayyad, U., Gregory, P.-S. and Smyth, P., From Data Mining to Knowledge Discovery in Databases, AI

Magazine, 37(3), 37-54, 1996.

[8] Fong, A.C.M, Hui, S.C., and Jha, G., Data Mining for Decision Support, IEEE IT Professional, 4(2), 9-

17, March/April, 2002.

[9] George, C., OLAP, Relational and Multidimensional Database Systems, Acm Sigmod Record, 25(30),

64-69, Sept. 1996.

[10] Han, J., Chiang, J.Y., Chee, S., Chen, J., Chen, Q., Cheng, S. & et al., DBMiner: A System for Data

Mining in Relational Databases and Data Warehouses, Proceedings of the 1997 Conference of the Centre for

Advanced Studies on Collaborative research, Ontario, Canada, 1-12, November, 1997.

[11] Han, J., Kamber, M., Data Mining Concepts and Techniques, San Diego, USA: Morgan Kaufmann

Publishers, pp. 294-296.

[12] Han, J., OLAP Mining: An Integration of OLAP with Data Mining, Proceedings of 1997 IFIP

Conference on Data Semantics (DS-7), Leysin, Switzerland, 1-11, 1997, October.

[13] Hripcsak, G. (1993). “Monitoring the Monitor: Automated Statistical Tracking of a Clinical Event

Monitor,” Computers and Biomedical Research, 26(5), 449-466.

[14] Helen, H. and Peter, H., Using OLAP and Multidimensional Data for Decision Making, IEEE IT

Professional, 44-50, 2001, October.

[15] Hedger, S.R., The Data Gold Rush, Byte, 20(10), 83-88, 1995.

[16] Jonathan, C.P., Lobach, D.F., Goodwin, L.K., Hales, J.W., Hage, M.L. and Hammond, W.E., Medical

Data Mining: Knowledge Discovery in a Clinical Data Warehouse, Proceedings of the American Medical

Informatics Association Symposium, Philadelphia, United States of America, 101-105, 1997.

[17] Kovalerchuk, B., Vityaev, E., and Ruiz, J. F. (2001). “Consistent and Complete Data and ‘Expert’

Mining in Medicine,” in Cios, K. J. (Ed.), Medical Data Mining and Knowledge Discovery, New York,

USA: Physica-Verlag.

[18] Margaret, R.K., Kevin, C.D., and Ida, A., Data Mining in Healthcare Information Systems: Case Study

of a Veterans' Administration Spinal Cord Injury Population, Proceedings of the 36th Hawaii International

Conference on System Sciences (HICSS'03), Hawaii, United States of America, IEEE Computer, 159-167,

2002.

[19] Ming-Syan, C., Jiawei, H. and Philip, S.Y., Data Mining: An Overview From a Database Perspective,

IEEE Transactions on Knowledge and Data Engineering, 8(6), 866-883, 1996, December.

[20] Parseye, K., OLAP and Data Mining: Bridging the Gap. Database Programming and Design, 10, 30-37,

1998.

[21] Palaniappan, Sellappan, Chua Sook Ling Clinical Decision Support Using OLAP With Data Mining,

IJCSNS International Journal of Computer Science and Network Security, 290 VOL.8 No.9, September

2008.

[22] Panos, V., and Timos, S., A Survey on Logical Models for OLAP Databases. ACM Sigmod Record,

28(4), 64-69, Dec.1999.

[23] Philip Baylis, Better health care with data mining, SPSS white paper1999 SPSS Inc. WPDMHC-0699.

[24] Prather, J. C., Lobach, D. F., Goodwin, L. K., Hales, J. W., Hage, M. L., and Hammond, W. E. (1997).

“Medical Data Mining: Knowledge Discovery in a Clinical Data Warehouse,” in Proceedings of the AMIA

Annual Symposium Fall 1997, 101-105.

[25] Raymond P.D., Knowledge Management as a Precursor Achieving Successful Information Systems in

Complex Environments. Proceedings of SEARCC Conference 2004, 127-134, Kuala Lumpur, Malaysia.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

[26] Ralph, K. and Margy, R., The Data Warehouse Toolkit. The Complete Guide to Dimensional Modeling

(2nd ed.), Canada: John Wiley & Sons, Inc, 2002.

[27] Robert, S.C., Joseph, A.V. and David, B., Microsoft Data Warehousing: Building Distributed Decision

Support Systems, London: Idea Group Publishing, 1999.

[28] Sarwagi, S., Explaining Differences in Multidimensional Aggregate, Proceedings of the 25th

International Conference on Very Large Data Bases, Scotland, United Kingdom, 42-53, September, 1999.

[29] Sellappan, P., Chua, S.L., Ng, Y.H., Ng, Y.M., Healthcare Information Services - The Application

Service Provider (ASP) Model, Proceedings of SEARCC Conference 2004, Kuala Lumpur, October, 2004.

[30] Shim, J.P., Warkentin, M., Courtney, J.F., Power, D.J., Ramesh, S., and Christer, C., Past, Present and

Future of Decision Support Technology, Elsevier Science B. V., 33, 111-126, 2002.

[31] Surajit, C., Umeshwar, D., and Ganti, V., Database Technology for Decision Support Systems, IEEE

Computer, 34(12), 48-55, Dec. 2001.

[32] Surajit, C. and Umeshwar, D., An Overview of Data Warehousing and OLAP Technology, ACM

Sigmod Record,26(1), 65-74, 1997.

[33] Torben, B.P. and Christian, S.J., Multidimensional Database Technology, IEEE Computer, 34(12), 40-

46, 2001, December.

[34] Usama, M. F., Data Mining and Knowledge Discovery: Making Sense Out of Data, IEEE Expert, 20-25,

1996, October.

[35] Usama F., Data Mining and Knowledge Discovery in Databases: Implications for Scientific Databases.

Proceedings of the 9th International Conference on Scientific and Statistical Database Management (SSDBM

’97), Olympia, WA., 2-11, 1997.

[36] Yang, Y. and Liu, X. (1999). “A Re-examination of Text Categorization Methods, in Proceedings of the

22nd Annual International ACM Conference on Research and Development in Information Retrieval

(SIGIR’99), 1999, pp. 42-49.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

A Traditional Development Life Cycle Methodology for Customer-Agent Based Model

Development

Komal Chandra Joshi

Lecturer, Shriram Institute of Management & Technology,

Kashipur (USN), Uttarakhand

Abstract:

In a Traditional Development System of Kumaon culture people face lot of problem while developing the

Traditional system in the form of Agent based Model in this paper we are following the TDLC Methodologies

and a Traditional Development Life Cycle (TDLC) Methodologies, which is providing a means of planning and

executing a wide variety of software development efforts, ranging from traditional custom application

development to rapid application development using prototyping. As the development of Agent Based

Models (ABM) [1] takes its place in the list of capabilities of custom software development companies, a

variation on the traditional SDLC will be needed to control the process. This paper presents a methodology

for the development of an Agent Based Model by including some facts of Kumaon folk dances, defining the

phases, activities and deliverables of the process, and provides some insights and comments on favorable

circumstances for the application of an ABM.

Introduction:

Traditional Development Life Cycle (TDLC) methodologies are mechanisms to assure that software systems

meet established requirements and also sometimes fall short in the new e-business software environment.

These methodologies impose various degrees of discipline to the software development process with the goal

of making the process more efficient and predictable. In response to this problem, so called “light” TDLC

methodologies have recently been developed and put to use. They are considered light because of the

reduced documentation and managerial effort required. For the purpose of discussion in this paper, TDLC

methodologies are divided into two groups (traditional and lightweight). Along the way the size and

complexity of the projects we will find ourselves facing a problem of structure and organization that is the

precise parallel of the issues that have always faced computer application development projects, namely,

how to manage and control the Traditional systems development life cycle (TSDLC). In response to this

problem, so called “light” TDLC methodologies have recently been developed and put to use. In this

discussion, methods such as Adaptive Software Development (ASD), Agile Software Process (ASP),

Crystal, Feature Driven Development (FDD), Rational Unified Process (RUP), and others were explored.

The paper concluded with a summary of lightweight TDLC methods along with recommendations for their

use.

The Business & Technical Study for TSDLC:

The Kumaon is enriched with local traditions but least technical advancement like the early efforts in a de-

regulating traditional system, we are in the early stages of investigation of the nature and capability of

ABM's by following the major and minor fields (as the fields taken in the table, given below) of local

traditions, and in our ability to build them effectively and efficiently. By the end of the decade, business

management, information systems, and biological concepts and technologies will converge around a

common view of how change happens in this modernizations relay race.” Whether ABM's will indeed fulfill

their promise of a whole new generation of systems that are able to adapt themselves to the environment by

following our local traditions. The business case requirements:

. Business Case Outline, Executive Summary, Project Purpose, Schedule, Risk Assessment

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

· Current Process, Future Process, Technology Assessment, Verification

· Change Analysis, Cost Estimate, Cost/Benefit Analysis

Now Technically it is Implementing an enterprise application lifecycle management system is very different

from giving your developers a new version control system to put their source code in. Application Lifecycle

Management (ALM) [10] encompasses the processes and tools employed at all stages of development: from

project inception and requirements gathering to deployment and maintenance. It is my observation that the

developers of ABM's are often writing “Programs”, and the customers are often expecting “Programming

System Products”, and the lack of some fundamental best practices within the project sometimes delays the

discovery of this miscommunication until it has escalated into a major problem. Project planning, work plan

development, project team training, scheduling, requirements gathering, module design and testing, data

architecture development, training and implementation, all are traditional areas of focus, and deserve the

attention of the ABM developer. ABM model development project has all of the old issues, plus some new

ones, and that will be the key to our ongoing success is educating our customer are linked with the traditional

system portals.

Methodologies:

The need for methodology to control the ABM development process emerged immediately with the first few

major assignments in my involvement with the discipline. It was not, and is not, an effort to control the

creative process of the developer, but to align that process with the expectations of the customer, a customer

who is used to doing business like web portal or else, a certain way as it relates to controlling software

projects.

(a) Traditional Methodologies for TDLC:

When we had no methodologies or formal guidelines for developing systems, data processing was an art

rather than a science. If the process was an art, the practitioners were definitely artists. The systems analysts

gathered customer requirements and gave them to the programming staff, Although Six Sigma had not

become part of the business vocabulary, and the goal of an SDLC was one of the Six Sigma tenets: the desire

to reduce variation. In its simplest form, an SDLC divides the software development process into a number

of clearly defined phases, each of which is further divided into steps. Because the phases were viewed as

sequential steps, with the output from one phase becoming the input to the next, a traditional SDLC was

often called “a waterfall.” And, like water flowing over a precipice, the underlying premise of the waterfall

approach to system development was that all motion was forward. Once a phase was completed, there was

no returning to it. Exhibit 1.1 shows the phases in a typical traditional SDLC.

[11]Exhibit 1.1, Traditional SDLC (The Waterfall)

Project Initiation → System Analysis → System Design →

Construction → Testing and Quality Assurance → Implementation

So after following these steps we can convert the traditional system especially the folk dances of Kumaon

region in the tabular form like:

Elementary Table of Folk Dances:

A table View of Traditional Database of Kumaon traditional Dances:

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Sr.

No.

Name of

Dance

Meaning Dress and

Supporting

Instruments

Occasion Method

1 Jhora This word

basically is

“Joda” which, in

Hindi, relates to

“Jhukna” (bow

down) or

“Jhoolna” (to

swing). In

Kumaoni it is

very common to

pronounce the

sound

J as Jh.

Salwar, Suit,

Sari

Jhaanch,

Hurka

Navratras,

Nandadevi

In this all the dancers form a circle

by holding one another’s hand and

swing with fast moment’s feet while

singing along with their head bowed

down. Also these songs are named

such as these are also sung by

dividing the entire singing dancing

group in two parts and are also sung

in pairs.

Participation of a minimum of 5-6

and maximum of dancers upto 150-

200. Initially gents sing the first line

of the song and then the groups of

ladies repeat it while dancing.

2 Chanchari

The word

“Chaunchari” is

related to the

word “Charchari”

in Sanskrit

Colorful and

different style

of dresses

Jhaanch,

Hurka,

Manjeera,

Vinai

Uttarayni ‘Chanchari’ is also sung in question

answer form between two singers.

Two semicircles – one formed by

ladies and other by gents are joined

to make a full circle. ‘Chanchari’ is

the oldest form of ‘Jhora’ and is still

called so in Nainital. The foot

movement is comparatively slow in

it and also ascend and descend of

musical notes is a bit different.

3 Chapeli

The word

‘Chapeli’ is a

combination of

the word ‘Chpp’

(‘Chay’ in

Sanskrit) and

‘Ali’. ‘Chpp’ or

‘Chay’ means

‘Khyaipan’ or

‘Khispr Gati’.

A male

dressed as

lady has now

replaced the

female. In his

one hand and

a handke-

rchief

Hurka,Vinai,

Kasen ke

Thali, Jhach,

Kchangara,

Damau

Festivals,

fairs and

marriages

In this we have one main singer, one

dancer and a group of singers. In

earlier days the dancer used to be a

female. The male and the female

used to enact love scene. A male

dressed as lady has now replaced the

female. This is a dance of a loving

couple. Being the dance of a lover of

beauty or an admirer it is called as

“Chapeli”. Grabbing an opportunity

during the fair, the young admirer of

beauty joins the dance with the

mirror in his one hand and a

handkerchief in the other. In this the

male and female singers sing in

question answer form to rely to each

other’s question and in case of

argument they ignore the question

and go in their own ways. It includes

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

on “Hurka” singer also. “Chapeli” is

also sung in “Cholia” dance. These

depict description of beauty,

persuasion, humour and

comradeship.

(b) Lightweight Methodologies for TDLC [8]:

In response to traditional approaches to software development, new lightweight methodologies have

appeared. A high percentage of software development efforts have no process and might best be described as

a chaotic “code and fix” activity. Light SDLC techniques are a compromise between no process and too

much process. . These are Adaptive Software Development (ASD), Agile Software Process (ASP), Crystal,

Feature Driven Development (FDD), and Rational Unified Process (RUP). And few we are discussing here:

ASP: The Agile Software Process (ASP) [2] was first proposed at the 1998 International Conference on

Software Engineering in Kyoto Japan. Unlike traditional software process models based on volume, the ASP is

time-based and quickly delivers software products. The model accomplishes this by integrating lightweight

processes, modular process structures, and incremental and iterative process delivery. The ASP methodology

offers five major contributions to the field. These include:

1. A new process model with a time-based inaction mechanism.

2. A software process model that provides evolutional delivery.

3. A software process architecture that integrates concurrent and asynchronous processes.

4. A process-centered software engineering environment.

5. Experience and lessons learned from the use of ASP for the five-year development of a large-scale

software system.

However, ASP is a complex process and is therefore more vulnerable to disruption than are other lightweight

and traditional SDLC methodologies. Benefits of the ASP process are its ability to efficiently manage large-scale

software development efforts [3].

Crystal: The Crystal family of lightweight SDLC methodologies is the creation of Alistair Cockburn. Crystal is

comprised of more than one methodology because of Cockburn’s belief that differing project types require

differing methodologies. Project types are classified along two lines: the number of people on the

development team and the amount of risk (e.g. a 30 person project that is at risk to lose discretionary money

requires a different methodology than a four person life-critical project). Crystal methodologies are divided

into color-coded bands [6]. “Clear” Crystal is the smallest and lightest. “Yellow”, “Orange”, “Red”, “Maroon”,

“Blue”, and “Violet” follow for use with larger groups using more complex methodologies. Each color has

its own rules and basic elements. Each methodology is as light as possible and is tuned to the current project

using techniques developed by Cockburn. These techniques are based on the following four principles:

1. Use larger methodologies for larger teams.

2. Use denser methodologies for more critical projects

3. Interactive, face-to-face communication is most effective.

4. Weight is costly.

For example, Crystal “Clear” is the lightest band and is suitable for use with development teams of up to six

people. Rules for this band are [6]:

1. Required roles are sponsor, senior designer, designer, and user.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

2. There is only one team.

3. Software is delivered through quality assurance every three months.

4. Fewer work products are required.

5. Work product templates, coding style, and other standards are determined by the team.

6. Individual techniques are determined by the individual and the team.

Finally, Crystal methodologies are based on the premise that people issues can easily determine a project’s

results [6]. Software development methodologies should recognize this and take the characteristics of people

into account.

FDD: Feature Driven Development (FDD) is a model-driven short-iteration software development process

[5]. The FDD process starts by establishing an overall model shape. This is followed by a series of two-week

“design by feature, build by feature” iterations. FDD consists of five processes: develop an overall model,

build a features list, plan by feature, and design by feature, and build by feature. There are two types of

developers on FDD projects: chief programmers and class owners [5]. The chief programmers are the most

experienced developers and act as coordinator, lead designer, and mentor. The class owners do the coding.

One benefit of the simplicity of the FDD process is the easy introduction of new staff. FDD shortens learning

curves and reduces the time it takes to become efficient.

Finally, the FDD methodology produces frequent and tangible results. The method uses small blocks of user-

valued functionality.

RUP: The Rational Unified Process (RUP) works well with cross-functional projects [4]. Published by

Rational Software, RUP contains six best practices: manage requirements, control software changes, develop

software iteratively, use component-based architectures, visually model, and verify quality. RUP is a process

framework and can be used in either a traditional (e.g. waterfall style) or a lightweight manner. The process

was designed for developers that have to use RUP, but would prefer to use XP.

Finally, although RUP was originally intended to help manage software projects, its flexible design makes it

applicable to large e-business transformation projects [4].

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

[9].

These models are often viewed as cumbersome, bureaucratic, and unsuited to the rapid pace of many

software development projects. This discussion was followed by a review of new lightweight SDLC

methodologies. Lightweight methodologies were developed to efficiently manage software projects

subjected to short timelines and excessive uncertainty and change.

Conclusion:

By the discussing the entire system I have taken the example of our tradition of Kumoan region and from

that obviously, what I have presented here is the framework of a methodology. My motivation for

developing it is that the lack of its existence has on occasion caused difficulty and miscommunication

between an customer and a developer. It seems that the larger and more important the opportunity, the more

likely that issues would arise between the customers technical community and the developer and sometimes

dampening the momentum of the effort.

And we have seen different methodologies and the best use of a methodology, in my opinion, is not simple

as a time pass, in which every step must be observed, but as a library, from which those things that are

important to the effort at hand are extracted. Traditional SDLC methodologies are often regarded as the

proper and disciplined approach to the analysis and design of software applications. Lightweight

methodologies on the other hand are a compromise between no process and too much process. These new

methods were developed to efficiently manage software projects in a short timelines. Nine types of

lightweight SDLCs are Adaptive Software Development (ASD), Agile Software Process (ASP), Crystal,

Feature Driven Development (FDD), and Rational Unified Process (RUP) etc. Strengths of these new light

methodologies include their simpler processes and easier acceptance by developers who are only familiar

with code and fix techniques. In addition, these lightweight SDLCs aid developers in thinking clearly about

the end products they are creating. Disadvantages include their inability to handle large development teams.

Lightweight methodologies are most appropriate when there are uncertain and volatile requirements,

responsible and motivated developers, and customers who wish to become involved. On the other hand,

lightweight methods are inappropriate with teams of more than fifty and/or the project has a fixed scope.

These methodologies I discussed here because between taking the data and designing process (according

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

waterfall model) while traditional system developing into a proper application forms (Agent Based), the

number of lightweight methodologies can be used.

References:

[1] A Systems Development Life-Cycle Methodology For Agent-Based Model Development , R. L. SIPE,

New Science Partners, Houston , Texas

[3] Aoyama, M. (1998b). Web-based agile software development. IEEE Software, 15(6), 56-65.

[4] Bloomberg, J. (2001, January). Using the RUP for Enterprise e-business Transformation. WaveBend

Solutions.

[5] Coad, P. (1999). Feature-Driven Development. Object International. Retrieved April 8,2001,

from the World Wide Web: http://www.togethersoft.com/jmcu/chapter6.PDF.

[6] Cockburn, A. (2000, July/August). Selecting a project's methodology. IEEE Software, 17(4), 64-71.

[7] DISS 725 – System Development: Research Paper 1, SDLC on a Diet, by Ronald G. Wolak

[8] North, Michael, 2002, “The ABMS Paradigm”, Proceedings from “Capturing Business Complexity with

Agent-Based Modeling and Simulation: Useful, Usable and Used Techniques”.

[9] Use Cases and Implementing Application Lifecycle Management Systems, Paul Bowden MKS Systems.

[10]Software development life cycle ...en.wikipedia.org/wiki/Software_development_process

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Wireless Communications – A Review

Pramod Kumar Joshi1, Sadhana Rana

2

1,2

Lecturer, Amrapali Institute, Haldwani, Nainital, Uttrakhand

[email protected], [email protected]

Abstract: Wireless communications are everywhere. People around the world regularly send and receive messages

wirelessly, that is, transmitted through the air. Three types of wireless communications include wireless

messaging services, wireless Internet access points and global positioning systems. People use mobile

phones, PDAs, and other mobile devices to access text messaging, instant messaging, and picture messaging

services.Through text messaging services, users send and receive short text messages, which usually consist

of fewer than 300 characters. Wireless instant messaging is an Internet communications service that allows a

wireless mobile device to exchange instant messages with one or more mobile device or online personal

computers. Users send graphics, pictures, video clips, sound files, and short text messages with picture

messaging services.

In many public locations, people connect to the Internet through a wireless Internet access point using mobile

computers and devices. A global positioning system (GPS) is a navigation system that consists of one or

more earth-based receivers that accept and analyze signals sent by satellites in order to determine the

receiver’s geographical location, according to Shelly and Cashman (How a GPS Works). A GPS receiver is a

handheld, mountable, or embedded device that contains an antenna, a radio receiver, and a processor. Many

mobile devices, such as a mobile phones and PDAs, have GPS capability .

Introduction:

Wireless communication is the transfer of information over a distance without the use of electrical

conductors or " [wire] s". The distances involved may be short (a few meters as in television remote control)

or very long (thousands or even millions of kilometers for radio communications). When the context is clear

the term is often simply shortened to "wireless". Wireless communications is generally considered to be a

branch of [telecommunications]. It encompasses various types of fixed, mobile, and portable [two way radio]

s, [cellular telephone] s, [personal digital assistant] s (PDAs), and [wireless network] ing. Other examples of

wireless technology include [GPS] units, [garage door openers and or garage doors] , wireless [computer

mice] , [keyboard] s and [headsets] , [satellite television] and cordless [telephone]

Background: In the history of [wireless technology], the demonstration of the theory of [electromagnetic wave] s by

[Heinrich Rudolf Hertz] in 1888 was important. The theory of electromagnetic waves were predicted from

the research of [James Clerk Maxwell] and [Michael Faraday] . Hertz demonstrated that electromagnetic

waves could be [transmitted] and caused to travel through space at straight lines and that they were able to be

[received] by an experimental apparatus. The experiments were not followed up by Hertz and the practical

applications of the wireless communication and remote control technology would be implemented by

[Nikola Tesla] .

Wireless:

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Wireless operations permits services, such as long range communications, that are impossible or impractical

to implement with the use of wires. The term is commonly used in the telecommunications industry to refer

to telecommunications systems (e.g., radio transmitters and receivers, remote controls, computer networks,

network terminals, etc.) which use some form of energy (e.g. [radio frequency] (RF), [infrared] light, [laser]

light, visible light, acoustic energy, etc.) to transfer information without the use of wires. Information is

transferred in this manner over both short and long distances.

Wireless communication The term "wireless" has become a generic and all-encompassing word used to describe communications in

which electromagnetic waves or RF (rather than some form of wire) carry a signal over part or the entire

communication path.

Common examples of wireless equipment in use today include:

• Professional LMR (Land Mobile Radio) and SMR (Specialized Mobile Radio) typically used by

business, industrial and Public Safety entities

• Consumer Two Way Radio including FRS (Family Radio Service), GMRS (General Mobile Radio

Service) and Citizens band ("CB") radios

• The Amateur Radio Service ( Ham radio )

• Consumer and professional Marine VHF radios

• Cellular telephones and pagers: provide connectivity for portable and mobile applications, both personal

and business.

• Global Positioning System (GPS): allows drivers of cars and trucks, captains of boats and ships, and

pilots of aircraft to ascertain their location anywhere on earth.

Applications of Wireless networking: Wireless networking (i.e. the various flavors of unlicensed 2.4 GHz WiFi devices) is used to meet a variety

of needs. Perhaps the most common use is to connect laptop users who travel from location to location.

Another common use is for mobile networks that connect via satellite. A wireless transmission method is a

logical choice to network a LAN segment that must frequently change locations. The following situations

justify the use of wireless technology:

- To span a distance beyond the capabilities of typical cabling,

- To avoid obstacles such as physical structures, EMI, or RFI,

- To provide a backup communications link in case of normal network failure,

- To link portable or temporary workstations,

- To overcome situations where normal cabling is difficult or financially impractical, or

- To remotely connect mobile users or networks.

Applications may involve [point-to-point communication] , [point-to-multipoint communication],

[broadcasting] , [cellular network] s and other [wireless network] s.

Applications of wireless technology

Security systems Wireless technology may supplement or replace hard wired implementations in security systems for homes

or office buildings.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Television remote control Modern televisions use wireless (generally infrared) remote control units. Now radio waves are also used.

Cellular telephony (phones and modems)

Perhaps the best known example of wireless technology is the [cellular telephone] and [modems]. These

instruments use radio waves to enable the operator to make phone calls from many locations world-wide.

They can be used anywhere that there is a cellular telephone site to house the equipment that is required to

transmit and receive the signal that is used to transfer both voice and data to and from these instruments.

Wi-Fi Wi-Fi is the trademark for the popular wireless technology used in home networks, mobile phones, video

games and other electronic devices that require some form of wireless networking capability. In particular, it

covers the various IEEE 802.11 technologies (including 802.11a, 802.11b, 802.11g, and 802.11n). Wi-Fi

technologies are supported by nearly every modern personal computer operating system, most advanced

game consoles, laptops, smartphones and many printers and other peripherals.

Wireless energy transfer

Wireless energy transfer is a process whereby electrical energy is transmitted from a power source to an

electrical load that does not have a built-in power source, without the use of interconnecting wires.

Categories of wireless implementations, devices and standards:

• Radio communication system.

• Broadcasting.

• Amateur radio.

• Land Mobile Radio or Professional Mobile Radio: TETRA, P25, OpenSky, EDACS, DMR, dPMR.

• Communication radio.

• Cordless telephony: DECT (Digital Enhanced Cordless Telecommunications).

• Cellular systems:0G, 1G, 2G, 3G, Beyond 3G (4G), Future wireless.

• List of emerging technologies.

• Short-range point-to-point communication : Wireless microphones, Remote controls, IrDA, RFID

(Radio Frequency Identification), Wireless USB, DSRC (Dedicated Short Range Communications),

EnOcean, Near Field Communication.

• Wireless sensor networks : ZigBee, EnOcean; Personal area networks, Bluetooth, Ultra-wideband

(UWB from WiMedia Alliance).

Wireless security

It is the prevention of unauthorized access or damage to computers using [wireless] networks. [Wireless]

networks are very common, both for organizations and individuals. Many laptop computers have [wireless

card] s pre-installed. The ability to enter a network while mobile has great benefits. However, wireless

networking has many security issues. [Hackers] have found wireless networks relatively easy to break into,

and even use wireless technology to crack into wired networks. As a result, it's very important that

enterprises define effective wireless security policies that guard against unauthorized access to important

resources.

The risks to users of wireless technology have increased as the service has become more popular. There were

relatively few dangers when wireless technology was first introduced. Crackers had not yet had time to latch

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

on to the new technology and wireless was not commonly found in the work place. However, there are a

great number of security risks associated with the current wireless protocols and [encryption] methods, and

in the carelessness and ignorance that exists at the user and corporate IT level. Cracking methods have

become much more sophisticated and innovative with wireless. Cracking has also become much easier and

more accessible with easy-to-use [Windows] -based and [Linux] -based tools being made available on the

web at no charge

Wireless access point

In [computer networking] , a wireless access point ( WAP or AP ) is a device that allows wireless

communication devices to connect to a [wireless network] using [Wi-Fi], [Bluetooth] and related standards.

The WAP usually connects to a [wired network], and can relay data between the wireless devices (such as

computers or printers) and wired devices on the network.

Prior to [wireless networks] , setting up a computer network in a business, home, or school often required

running many cables through walls and ceilings in order to deliver network access to all of the network-

enabled devices in the building. With the advent of the Wireless Access Point, network users are now able to

add devices that access the network with few or no new cables. Today's WAPs are built to support a standard

for sending and receiving data using radio frequencies rather than cabling. Those standards, and the

frequencies they use are defined by the [IEEE]. Most WAPs use [IEEE 802.11] standards.

Common WAP Applications

typical corporate use involves attaching several WAPs to a wired network and then providing wireless access

to the office [LAN] . Within the range of the WAPs, the wireless end user has a full network connection with

the benefit of mobility. In this instance, the WAP functions as a gateway for clients to access the wired

network.

A [Hot Spot] is a common public application of WAPs, where wireless clients can connect to the [Internet]

without regard for the particular networks to which they have attached for the moment. The concept has

become common in large cities, where a combination of [coffeehouse] s, libraries, as well as privately owned

open access points, allow clients to stay more or less continuously connected to the Internet, while moving

around. A collection of connected Hot Spots can be referred to as a [lily-pad network] .

The majority of WAPs are used in [Home wireless networks] . Home networks generally have only one

WAP to connect all the computers in a home. Most are [wireless router] s, meaning [converged device] s that

include a WAP, router, and often an ethernet switch in the same device. Many also converge a broadband

modem. In places where most homes have their own WAP within range of the neighbors' WAP, it's possible

for technically savvy people to turn off their encryption and set up a [wireless community network] , creating

an intra-city communication network without the need of wired networks.

A WAP may also act as the network's arbitrator, negotiating when each nearby client device can transmit.

However, the vast majority of currently installed [IEEE 802.11] networks do not implement this, using a

distributed pseudo-random algorithm called [CSMA/CD] instead.

Wireless Access Point vs. Ad-Hoc Network

Some people confuse Wireless Access Points with [Wireless Ad-Hoc networks] . An Ad-Hoc network uses a

connection between two or more devices without using an access point: the devices communicate directly.

An Ad-Hoc network is used in situations, such as for a quick data exchange, or for a Multiplayer LAN game,

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

because it is easy to set up and does not require an access point. Due to its peer-to-peer layout, Ad-Hoc

connections are similar to [Bluetooth] ones, and are generally not

ecommended for a parmanent installation. [Internet access] via [Ad-Hoc networks] , using features like

Windows' [Internet Connection Sharing] , may work well with a small number of devices that are close to

each other, but Ad-Hoc networks don't scale well. Internet traffic will converge to the nodes with direct

internet connection, potentially congesting these nodes. For internet-enabled nodes, Access Points have a

clear advantage, being designed to handle this load.

Limitations:

One [IEEE 802.11] WAP can typically communicate with 30 client systems located within a [radius] of 100

m. However, the actual range of communication can vary significantly, depending on such variables as

indoor or outdoor placement, height above ground, nearby obstructions, other electronic devices that might

actively interfere with the signal by broadcasting on the same frequency, type of [antenna] , the current

weather, operating [radio frequency] , and the power output of devices. Network designers can extend the

range of WAPs through the use of [repeater] s and [reflector] s, which can bounce or [amplify] radio signals

that ordinarily would go un-received. In experimental conditions, wireless networking has operated over

distances of several [kilometer].

Most jurisdictions have only a [limited number of frequencies] legally available for use by wireless

networks. Usually, adjacent WAPs will use different frequencies to communicate with their clients in order

to avoid [interference] between the two nearby systems. Wireless devices can "listen" for data traffic on

other frequencies, and can rapidly switch from one frequency to another to achieve better reception.

However, the limited number of frequencies becomes problematic in crowded downtown areas with tall

buildings using multiple WAPs. In such an environment, signal overlap becomes an issue causing

interference, which results in signal dropage and data errors. Wireless networking lags behind wired

networking in terms of increasing [bandwidth] and [throughput] . While (as of 2004) typical wireless devices

for the consumer market can reach speeds of 11 Mbit/s ( [megabit] s per second) ( [IEEE] [802.11b] ) or 54

Mbit/s ( [IEEE] [802.11a] , [IEEE] [802.11g] ), wired hardware of similar cost reaches 1000 Mbit/s (

[Gigabit Ethernet] ). One impediment to increasing the speed of wireless communications comes from [Wi-

Fi] 's use of a shared communications medium, so a WAP is only able to use somewhat less than half the

actual over-the-air rate for data throughput. Thus a typical 54 MBit/s wireless connection actually carries

[TCP/IP] data at 20 to 25 Mbit/s. Users of legacy wired networks expect faster speeds, and people using

wireless connections keenly want to see the wireless networks catch up.

Wireless access has special [security] considerations. Many wired networks base the security on physical

access control, trusting all the users on the local network, but if wireless access points are connected to the

network, anyone on the street or in the neighboring office could connect. The most common solution is

wireless traffic encryption. Modern access points come with built-in encryption. The first generation

encryption scheme [WEP] proved easy to crack; the second and third generation schemes, [WPA] and

[WPA2] , are considered secure if a strong enough [password] or [passphrase] is used.

Some WAPs support hotspot style authentication using [RADIUS] and other [authentication server] s. For

example, [DD-WRT] v24 supports [Chilisoft] hotspot authentication which separates the WLAN from the

hard wired LAN so that your guests cannot browse the local wired network.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Environmental concerns and health hazard:

“In recent times, there have been increased concerns and research linking usage of wireless communications

with poor concentration, memory loss, nausea, premature senility and even cancer. Questions of safety have

been raised, citing that long term exposure to electromagnetic radiation of the sort emitted by wireless

networks may someday prove to be dangerous.”

References:

[1] The SINTEF Group, The Foundation for Scientific and Industrial Research at the Norwegian Institute of

Technology

[2] "Wireless Communication". sintef.no. Retrieved on 2008-03-16.

[3] ATIS Telecom Glossary 2007". atis.org. Retrieved on 2008-03-16.

[4] Story, Alfred Thomas (1904). A story of wireless telegraphy, New York, D. Appleton and Co..

[5] Heinrich Rudolf Hertz". chem.ch.huji.ac.il. Retrieved on 2008-03-16.

[6] Römer, Kay; Friedemann Mattern (December 2004). "The Design Space of Wireless Sensor Networks".

IEEE Wireless Communications 11 (6): 54–61. doi:10.1109/MWC.2004.1368897.

http://www.vs.inf.ethz.ch/publ/papers/wsn-designspace.pdf.

[7] Thomas Haenselmann (2006-04-05). "Sensornetworks". GFDL Wireless Sensor Network textbook.

Retrieved on 2006-08-29.

[8] Hadim, Salem; Nader Mohamed (2006). "Middleware Challenges and Approaches for Wireless Sensor

Networks". IEEE Distributed Systems Online 7 (3): 1. doi:10.1109/MDSO.2006.19.

http://dsonline.computer.org/portal/pages/dsonline/2006/03/o3001.html. art. no. 0603-o3001.

[9] WirelessHART Standard Approved and Released

[10] RFC 4944 - Transmission of IPv6 Packets over IEEE 802.15.4 Networks

[11] TinyOS Community Forum || An open-source OS for the networked sensor regime

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Note on Vorticity Unsteady Conducting Dusty Flow through the Annular Space

between two Circular Cylinder in Presence of a Transverse Magnetic Filed

P.K. Mittal1, M.P. Singh

2, Alok Darshan Kothiyal

3

1Professor & Head, Department of Mathematics, Graphic Era University, Dehradun

2Professor & Head, Department of Mathematics, K.L.D.A.V. P.G. College, Roorkee

3Department of Mathematics, Graphic Era University, Dehradun

Abstract:

The present Paper deals with the steady annular flow of an electrically conducting dusty viscoelastic fluid of

Rivlin – Eriksen model with inner and outer cylinders moving axially with the velocities increasing

exponentially with time in the presence of transverse magnetic field. The influence of the parameter M, 1f ,

and β on the vorticity distribution of the conducting dusty gas 1ζ and of dust particles 2ζ , has been studied

numerically and graphically.

Introduction:

The fundamental equation of motion of Saffman [8], for the laminar flow of a dusty gas, Mitra [2]

considered the unsteady dusty viscous flow of gas through the annular space between two concentric co-axial

circular cylinders, when they move with velocity increasing exponentially with time. In the present paper, we

have considered the same problem for an electrically conducting gas suspended with non-conducting small

solid spherical dust particles, in the presence of a uniform transverse magnetic field. Expressions for vorticity

of gas and the rotation of the dust particles have been found and depicted graphically. Some important

conclusions have been drawn from these expressions and graphs.

Mathematical Formulation:

An electrically conducting dusty gas of viscosity µ and electrical conducting σ is contained between two

long co-axial circular cylinders of radii 1r and 2r in presence of an imposed transverse magnetic field of

strength 0B .The inner and outer cylinders are moving with velocities t

e21

1

λµ and t

e21

2

λµ respectively.

We take Z-axis along the axis of cylinders. We choose a cylindrical system (r,θ , z). The flow of the

conducting dusty gas is produced by the motion of the cylinders which move parallel to the z-axis and so

there is no displacement of the conducting dusty gas and dust particles in the direction of the r and θ

respectively. Then the modified Saffman [8] equation for the conducting dust gas and non conducting dust

particles for the present problem are:

zzzzzz u

Buv

kN

r

u

rr

uv

t

u

ρσ

ρ

2

00

2)()

1( −−+

∂∂

+∂∂

=∂

∂ ………………… (1)

Changing it to non-dimensional form by substituting

1

*

r

rr = ,

2

1

*

r

vtt = ,

vr

ruu z

2

1

1* = , v

rvv z 1* =

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

On omitting the asterisks, the dimensional forms of the equations of motion of the conducting dusty gas, and

non-conducting dust particle are:

uMuvfr

u

rr

u

t

u 2

2

2

)()1

( −−+∂∂

+∂∂

=∂∂

………………….. (2)

)( vut

u−=

∂∂

λ …………………. (3)

Where, 2

1

2

10

f

f

v

rkNf ==

ρ. Where

ρ0mN

f = mass concentration of the dust particles,

ρ0mN

f = ,2

1

f=λ , µ

σ.10rBM = = The Hartmann number.

The boundary conditions are:

21.),( 1

λµ etru = at r = 1

21.),( 2

λµ etru = at β==1

21

r

rr (say)

Let us choose the solution of (2) and (3) respectively as.

t

erFu21).(

λ= .…………………….. (4)

t

erGv21).(

λ= ……………………… (5)

On using (4) and (5) , equations (2) and (3), on eliminating v, are combined into a single ordinary differential

equation as:

0.1 2

2

2

=−+ Fndr

dF

rdr

Fd ……………………. (6)

Where,

λλλλλλ

+++++

=2

1

222

1

2

12 )( MMfn …………………….. (7)

Equation (6) is the modified Bessel equation and its solution is.

)()(.)( 00 nrBKnrIArF += …………………….. (8)

Where 0I and 0K denote respectively the modified Bessel function of the first and second kind of order zero.

Also from (3) & (5) we get,

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

)().()(2

1

rFrGλλ

λ+

= …………………… (9)

Thus from (4) and (5), the velocities of the conducting dusty gas and dust particle are respectively.

)]()(.[ 00 nrBKnrIAu += te

21.

λ ……………………. (10)

)]()(.)[( 002

1

nrBKnrIAv ++

=λλ

λ te

21.

λ ……………………. (11)

Applying the boundary condition, the values of A and B from (10) and (11) are obtained as:

)().()().(

)(.)(.

0000

0201

nKnInKnI

nKnrKA

ββµµ

−−

= …………………….. (12)

)().()().(

)(.)(.

0000

0102

nKnInKnI

nInIB

βββµµ

−= ……………………. (13)

The vorticity of dusty gas and dust particle are respectively given by,

)](.)(.[ 111 nrKBnrIAn +=ζ te

21.

λ …………………….. (14)

)]()(.[).( 112

1

2 nrBKnrIAn ++

=λλ

λζ t

e21.

λ ……………………. (15)

Numerical Results and Discussion:

Table-1

Vorticity distribution of the conducting dust gas for different values of M with 2

1λ = 0.5, 1f = 0.1, 2f = 0.5, t = 1, 22 =µ , 2=β

r

M

1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0

M=0.0 -0.059 0.069 0.375 0.571 0.670 0.670 0.809 0.809 0.930 1.316

M=0.5 -0.096 -0.040 0.025 0.062 0.108 0.108 0.153 0.153 0.239 0.283

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

M=1.5 2.425 2.355 2.388 2.503 2.725 2.910 3.116 3.402 3.618 3.911

Table-2

Vorticity distribution of the conducting dust particle for different values of M with 2

1λ = 0.5, 1f = 0.1, 2f =

0.5, t = 1, 22 =µ , 2=β

r

M

1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0

M=0.0 -0.047 0.054 0.030 0.475 0.536 0.536 0.647 0.647 0.744 1.053

M=0.5 -0.077 -0.032 -0.020 0.049 0.086 0.086 0.122 0.122 0.191 0.226

M=1.5 1.940 1.884 1.910 2.002 2.180 2.328 2.493 2.722 2.894 3.129

-0.5

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

0 0.5 1 1.5 2 2.5

Fig.1, The VortiCity profile dust gas

M=0.5

M=0.0

M=1.5

r→

↑1ζ

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

-0.5

0

0.5

1

1.5

2

2.5

3

3.5

0 0.5 1 1.5 2 2.5

Fig.2, The Vorticity profile dusty particle

M=0.0

M=0.5

M=1.5

→r

It is clear from the Tables and graphs:

(i) When there is no magnetic field (M=0), there exists a region of no vorticity, i.e., the region of

irrotational motion of dusty gas near the wall of the inner cylinder. Also, nearby it, the rotation of

dust particles also ceases. Beyond that region the vorticity of gas and rotation of particles increases

continuously and steadily.

(ii) As the small magnetic field (M ≤ 1) is applied , the regions of no vorticity and irrotationality of dusty

gas and dust particles shift towards the outer tube.

(iii) When moderately high magnetic field is applied then vorticity of dusty gas and rotation of dust

particles both increase and we can have no region of irrotationality within the tubes.

Thus, removal of dust particles is only possible when there is no magnetic field or avery small magnetic

foield.

References:

[1] Arnold, V. I., Mathematical methods of classical mechanics, Springer, New York (1978).

[2] Mitara, P., Bull. Cal. Math. Soc., 78, 197-205, (1986)

[3] Mittal. P. K., and Raina, Acta Ciencia Indica 21, 2M (1995), 253-263.

[4] Mittal. P. K., and Raina, Acta Ciencia Indica, 33, 2M, 99(1997)

[5] Mittal, P. K., and Mukesh Bijalwan, JNABHA, Vol. 35. 107-115, (2005).

[6] Pal, S. I. Magnetogasdynamics and plasma dynamics, Wien-Springer-Verlag, 34

[7] Ramanaiah, G., Jour. Sci. Engi. Res., XIII, 128

[8] Saffmann, P. G., J. Fluid Mech., 13, 120, (1962).

[9] Sanyal, D. C., and Ghosh, S., Mathematical education, 29, (1987),

[10] Sanyal, D. C., and Bhattacharya, S. Acta Ciencia Indica, XXIVM, No. 3, 249-254, (1998),

[11] Sharma R. G. and Kapur J. P., Acta Ciencia Indica, XII M, No. 3 (1987), 95-100.

[12] Singh, K. K., Indian J. Pure Appl. Math. 8/9, 1129, (1977)

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

[13] Vortex, Yearbook of Science and Technology, McGraw Hill, (1996).

Small Remedies: Bold and Assertive Women Prabha Pant

1, Anita Parihar

2

1Assistant Professor, Department of Humanities & Social Science. GB Pant University of Agriculture and

Technology, Pantnagar.

2Professor & Head in the department of English. DSB Campus. Kumaon University. Nainital.

Abstract:

Shashi Deshpande an eminent writer aims to project a move of conservative, traditional, suppressed & silent

women from tradition to modernity in her novels. In Small Remedies Deshpande has focused bold and

assertive women, who does not care for the societal norms and come out of the four walls of their houses to

excel in their respective fields. The protagonist, Savitribai, is projected as an out and out rebel unlike others

who are pictured as involved in the family affairs. Savitribai is revealed as an educated middle class woman

who comes out of the restricted traditional norms to hone her skill of music to perfection. She concentrates

only in her professional advancement and keeps herself away from the traditional environment and fulfils her

desire to become a great musician.

………………………………………………………………………………………………………………

Shashi Deshpande , a contemporary woman novelist writes about women with a positive attitude in her

novels. She places all her protagonists in a patriarchal society and shows them as suffering women,

rebellious women and as an enlightened woman. Her protagonists belong to the educated middle class who

tries to come out of the restricted relationship to hone their skills to perfection. Deshpande in an interview

with Vanamala Vishwanatha stressed the various relationships that a woman co-exists with. She said:“It is

necessary for women to live within relationships. But if the rules are rigidly laid that as a wife or mother you

do this and no further, then one becomes unhappy. This is what I have tried to convey in my writing”. [13]

The novelist through her characters Jaya, Indu, Sarita,Urmi,and Sumi projects a move from the age old

traditional set up to the modern set up and each rebels to prove her worth. But Savitribai in Small Remedies

stands in contrast to Deshpande’s other protagonists because she is an out and out rebel unlike the others

who are pictured as involved in family affairs. Savitribai is never pictured in such a role and even though she

has a daughter Munni, she is never shown in a parental role. Infact, there is no scene in the whole book

which brings the mother and daughter together. She does not even mention her name once. Further, the other

protagonists pursue a career and are shown in various family relationships but Savitribai is only shown

pursuing her career in music. She had a different bent of mind. Since, childhood she had great fascination for

music. On her insistence she was sent to learn music by her mother but the father was furious, “‘Do you want

your daughter to be one of those women?’” Naturally women who were musicians were looked down upon

during her days. However, as the father was “the head of the family, what he said or did mattered to

everyone” (62) but despite this ban on her ‘‘she never gave up’’ (124). A rebel at heart she tells Madhu how

she had pursued Pandit Kashinath, who being “a traditional man, did not want to encourage her to step out of

her traditional role.” She goes to the extent of telling her, “…it became a curse, my being a Brahmin woman.

My belonging to a respectable family.” (130) The caste factor and the family status both stand in her way but

she rebels against these socially imposed barriers and pursues her career. She not only pursues the forbidden

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

career for a Brahmin from a respectable family but also dares to live with a Muslim tabla player Ghulam Ali

and thereby dares to defy convention due to which people are shocked. Madhu realizes that there were

similarities between her father’s lifestyle and that of Savitribai’s but her father’s ways were accepted while

Savitribai’s were shockingly disapproved of:

I see as the real uniting factor between us: both Munni and I were outsiders. In

the conventional society of Neemgaon, where each family had its place marked

out for it according to religion, caste, money, family background, etc., our

families, Munni’s and mine, were difficult to place, not conforming to the

norms. In a sense, neither of us belonged. Munni’s family, with her singer

mother, absent father and another man- a Muslim-sharing the home, was of

course radically, shockingly different. But my father, with his unorthodox

ways, was an oddity in Neemgaon as well. But my father was

accepted…because he was a doctor…. And of course, being a man, he could

get away with much. He could live the way he wanted, without open censure or

disapproval. It was not so with Munni’s mother. As Savitribai Indorekar the

singer- woman, some oddities in her behaviour were permitted, possibly

tolerated, but it didn’t take away the aura of disapproval…. (138 –139).

Savitribai’s father-in-law had a mistress and the family and the society, accepted it. Again Madhu learns

about her father’s mistress from Munni who told her, “‘He goes to a woman’” and another time she put it as

a question to her, “‘Do you know he goes to a woman at night?’” (139) And of course, the Neemgaon society

doesn’t mind. Therefore, Savitribai is revealed as a great rebel as she leaves her husband and in-laws and

lives with a lover and that too a muslim lover. She is least bothered about the society and whether they

approve of her action or not. She was well aware of the social discrimination and cannot accept such

discrimination, which would permit her father-in-law to keep a mistress while she was not permitted to learn

music. Madhu cannot help remarking that her relationship with a muslim must have been “not only

unimaginable, but the height of criminality.”(220) Perhaps a criminal act as a daughter-in-law had to “carry

the weight of the honour of the family, its reputation, its izzat”(220) Savitribai rebelled as a daughter-in-law

and as a woman. Meenakshi Mukherjee has rightly pointed out:

Savitribai-a great ‘rebel who defies the contentious of her time. The feminist

who lived her life on her own terms. The great artists who sacrificed everything

for the cause of her art or the impetuous loves who abandoned a secure married

life in a Brahmin household to live with her Muslim accompanist. (40)

Bai tells Madhu during an interview, “‘sometimes I wished,’” she says “‘that I had been born in one of those

musicians’ families, in which I would naturally have become a singer. In those families, you’re born into the

profession. There is never any problem even for women.’” But at the same time she was aware that even

these women were discriminated against as “they, unlike the men in the same families, were outside the

circle of respectable society, their futures marked out for them, the ordinary life of ordinary women denied to

them because of their birth.”(221) So women born into a higher caste or into a higher class were not the only

ones who suffered. She is well aware of the social norms, which stand as a barrier preventing her from

fulfilling her dream. Once she pulls down this barrier she surges ahead and breaks all social restrictions.

Apart from Savitribai, Madhu narrates about her aunt Leela who is “ahead not only of her generation, but the

next one as well.” (100) A Brahmin widow who marries Joe, a Christian, thus establishing at once her non-

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

acceptance of a society divided on religious lines. This spirit to rebel against the norms of a rigid traditional

society is seen in her when she found the ridiculous treatment of the bangle-woman. As a young woman She

even participated in the Quit India movement, but strongly opposed Gandhiji’s principles of ahimsa and

satyagraha. She believed that there was “something ridiculous about letting oneself be beaten up.”(97) She

resigned from the party when she felt that the party’s reaction to the political situations was not justified.

Leela a social activist also raised her voice against the male party workers when the need arose. She was

bold enough to rebel against male domination. But even after putting in years of hard work for the party, she

was sidelined and could not reach the top of the hierarchy, whereas men who worked under her were

promoted. Once, a widow of a sitting member, was given a ticket for a by-election and this provoked her to

comment, “‘it seems you’re got to become a widow for them to remember that you exist.’” (224) Madhu

writes after learning of Leela’s political struggle , Leela and Savitribai both set aside the social norms and

enter the world dominated by men and disturb the social order. P.G. Joshi has rightly commented:

In marrying her accompanist and Tabla player Ghulam Saab, she decolonises

the patriarchy in more ways than one. Firstly, she is already a married woman

from a respectable Brahmin family of Pune. Secondly, the man she married is a

Muslim. Leela too marries out of her caste and her religion and decolonises the

patriarchy. ( 112-113).

Therefore we see that Leela is found to be busy in her party politics, Savitribai in her music and Madhu in

her writings. All belonged to an educated class, making efforts to rise professionally and in this race ignore

their female traditional roles. Deshpande has concentrated only in the professional advancement of her

protagonists, and has made her protagonist come a long way from the traditional environment .Her women

are rebellious because that is the only way they can achieve what they desire and Savitribai is exemplary of

this.

References:

[1] Deshpande, Shashi. Small Remedies. New Delhi : PenguinBooks, 2000.

[2] Deshpande, Shashi. Interview with Vanamala Vishwanatha, “A Woman's World...All the Way”.

Literature Alive,vol.1,No.3,Dec.1987. 8-14.

[3] Joshi,P.G. " Post-Colonialism and Shashi Deshpande's Novels". Shashi Deshpande's Fiction A Study in

Women Empowerment and Postcolonial Discourse. New Delhi:Prestige, 2003.112-114.

[4] Mukherjee,Meenakshi. “On her own terms” Review of Small Remedies, 2000,.40-42 (The Hindu,

May 07,2000 . http/www.hinduonnet.com.)

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Problematizing Issues about Home, Homeland, Diaspora and Belongingness in the

Works of Uma Parmeswaran

Shweta Arora1, Anita Parihar

2

1Lecturer, Apex Institute of Technology, Bilaspur, Rampur

2Professor and Head, Department of English, DSB Campus, Kumaon University, Nanital

Abstract:

The paper aims to analyze the issues of home, homeland, diaspora and belongingness raised and

problematized by Uma Parmeswaran in her works. Parmeswaran’s works like Trishanku, The Door I Shut

Behind Me, Rootless but Green are the Boulevard Trees, Dear Deedi, My Sister and Sons Must Die and

Other Plays involve dual consciousness: where immigrants are frequently shown shifting back and forth

between Canada and their native land. This double consciousness enables Parmeswaran to portray the state

of homelessness, displacement, exile, marginalization and lack of belongingness being experienced by the

immigrants.

‘Diaspora’ signifies all migrations, settlements, journeys and movements-“voluntary or forcible”-of people

and communities “from their homelands into new regions” (68) across the world, both from the Third to the

First World and vice-versa, from North to South and East to West. The diasporic experience engenders the

pain of uprooting and the unexpected problems of re-settling in an alien world e.g. identity crisis, cultural

conflicts, racial discrimination, yearning for home and homeland, etc. One distinct feature of immigrants is

that they physically live in one country but through memory and imaginations are eternally caught in a state

of nostalgia and “acknowledge that the old country-a nation often buried deep in language, religion, custom

or folklore-always has some claim on their loyalty and emotions,” remarks Robert Cohen (ix). Thus migrants

according to Rushdie, “straddle two cultures….fall between two stools” [10]. The tensions with which

diasporic consciousness is marked have been aptly enlisted by Swaraj Raj:

Curious accretion of a homing desire and a state of homelessness; a state of belonging and the

awareness of not being able to belong;; the contradictory pulls the nostalgic longing for the home left

behind and the desire to feel at home in the new dwelling; and the discrepant centrifugal pull of

staying at the margins of the centre to maintain cultural difference and the centripetal seductions of

assimilation in the adopted culture. (17)

In diasporic imagination ‘home’ remains “a mythic place of origin and of radical lack” and as Avtar Brah

states: “The concept of diaspora places the discourse of ‘home’ and ‘dispersion’ in creative tension,

inscribing a homing desire while simultaneously critiquing discourses of fixed origins” (Barh 192-193).

These issues and tensions have been explored in Parmeswaran’s works from multiple angles. Moreover,

“Home has become such a scattered, damaged, precarious concept in our present travails,” says Rushdie

(East, West 1994), as different people relate differently to this space in different locales and situations, here,

elsewhere and also in imaginary spaces.

Referring to the concept of “home-ness” in diasporic psyche Vijay Mishra remarks that diasporas connect

themselves with the ideas of home and the homeland or ‘desh’ against which the ideas of other lands are

foreign or ‘videsh’ and carry their homelands in the form of a series of objects and fragments of narratives

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

and memories in their heads or in their suitcases, and struggle hard to preserve them in other lands and

cultures (67-68) Parmeswaran makes an effort to recreate through memory the life of the native community

by the use of history, rituals and myths. For instance a cultural gulf between the Indian way of life and the

Canadian life-style comes into existence as Tara’s Mother-in-law is disgusted when she finds “no rangoli

designs on porch steps / To say please come in” (66). Although expecting rangoli, a cultural symbol in the

poem, at the doorstep may seem absurd in an alien country but for an elderly woman, like Tara’s mother-in-

law, who was supposedly born and brought up in India and who had spent the main part of her life there, it

was but natural to nostalgically miss this rich cultural heritage. Rangoli was part of her life and to be

nostalgic about it is but natural. She finds the processed food in Canada unpalatable and so she nostalgically

relives the cooking experience of an Indian kitchen when she tells her son about “The leaping aromas / of

turmeric and green coriander/ and mustard seeds popped in hot oil/ that flavor food, not stink up the air”

(66). She prolongs the nostalgic moment when she complains that Lakshmi, the goddess of wealth and health

will not bless them if they have stale, stored food in cans: “She’ the lotus-seated consort/ of him who

reposes/ on the primeval ocean of milk./You think they’ll bless this food/ three days old/ you store in cans

and ice-cupboard? (66)

Such sensitive migrants are unable to cope with the existential miseries of the foreign land, and refuse to lead

fake versions of life. Feeling homesick, they wish to return home to lead a peaceful life: “Open the window,

son/ And let me go back/ To sun and air/ And sweat and even flies and all/ But not this, not this” (66-67).

Parmeswaran reveals the pangs of displacement, homelessness, unbelongingness and nostalgia for home and

homeland suffered by most of the immigrants in the foreign land. Commenting on this trait of diasporic

existence, Mike Featherstone observes that “the difficulty in handling increasing levels of cultural

complexity, and the doubts and anxieties…often engender ‘the feeling of ‘localism’ in their hearts,” and “the

desire to return home, becomes an important theme” in their psyche, “regardless of whether the home is real

or imaginary, temporary, syncretized, or simulated, or whether it is manifest in a fascination with a sense of

belonging, affiliation, and community attributed to the homes of others” ( 47)

Some migrants like Chaman Lal Dwivedi in Tishanku do not lament or feel the pangs of loss of the

homeland and adapt themselves very well to the requirements of the foreign land. Dwivedi realizes that

“[o]ne must make adjustments.”(77). He comments, “[. . .]At first/ I thought this was rakshasa land/ where

everything is opposite-/ where people monstrously huge/ make night day/ and sleep till noon./ Where women

chase men,/ like Surpanaka of old/ It was difficult at first/ to eat meat and drink liquor-/ But the rishis did

both/ in older days; sruti, word of God,/ Unchangeable, smriti, customs/ that society accretes and sheds/ for

change of times (77). These instances only show acculturation at the social level. But a study of her other

works and her views on assimilation bear out the fact that the writer never intends to show complete

assimilation.

The second generation in the play Rootless but Green are the Boulevard Trees feels that their home is

Canada. This stands in contrast to the first generation immigrants like Sharad who feels that they are rootless

like the Ontario poplars which are not native to Manitoba: “Roots, son, roots. Can we really grow roots

here?” He is apprehensive “they’d dry up one winter” and if “it doesn’t bloom this spring, well, we’ll have to

cut it down. And if an Ontario poplar can’t grow and survive in Manitoba soil, what chance do we have?”

(104). There is a note of hope, however, which surfaces throughout this play; hope projected by the younger

generation immigrants. For instance, Jayant, admits that the immigrants in Canada were “rootless” but he

feels that they should “face it” and he opines that “no one, but no one has roots anywhere because that’s the

way things are in 1979 A.D. But we stand tall, man, and live each day for all it’s godamed worth and ours”

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

(142). It is not an easy task to survive without roots yet he does not mind staying in Canada as long as they

are flourishing in this land. Drawing a parallel with the tree he says, “What does it matter how long it stands?

The point is that it is there, beautiful and green for the length of its life. A day, a hundred thousand days, it is

a question of what we do and are, during that time. This evergreen doesn’t have one Christly use-it isn’t even

good as firewood-but it is there and it is green, it is beautiful.” He gives an example of the surviving trees

“all set up overnight” which were “flourishing like crazy” in “The monstrous new apartment block”. He is

aware that immigration is a global phenomenon and has an individualistic approach to the issue: “Our

people, our old country, dad, there’s no “our people” and no “old country” for anyone in the world any more,

least of all for us. This is our land and here we shall stay” (104). Vithal is furious when Dilip suggests that

they should “try to assimilate” and retorts: Assimilate, my ass. They don’t want us to assimilate. They want

us out. We’ll be squashed like bugs soon [. . .]. They’ve never wanted us and now we are a threat[…].We

have to stay together within and we’ve got to show them that we have as much right here as the pissed-off

whites….Ghettoes is right…look at Jews…only in ghetto can unity thrive […].(117) The status of the

immigrant is clear from what Vithal says. The above brings out the fact that the immigrants of the second

generation have also not assimilated completely because they do not feel a sense of belongingness. By

applying the technique of multiple voices to portray the complex experiences of characters in various

situations, Parmeswaran problematizes the issues of home, homeland, diaspora and belongingness, treating

them not as the fixed but as fluid concepts ever shifting with the changing personality of the subject positions

of individuals and communities in other cultures and communities with the changes in the socio-cultural

scenarios of home and abroad.

Dear Deedi, my Sister: Performance Piece for Voices and Rootless but Green are the Boulevard Trees centre

on discrimination against immigrants in Canada. The characters undergo cultural shock because they have

never faced this kind of racial discrimination in their own country and moreover they have come with dreams

and so this kind of treatment in an alien country puts them under great agony. Sekoni, an immigrant, seated

in a bus, surrounded by fellow passengers ponders over his life in a hostile Canada: “Who are these faceless

people/ among whom my life is oozing away?/ each is so self-assured,/glancing swiftly but completely/

through me, wordlessly asking:/ Why are you here?/ And the bus moves on, and we (65). The chorus of all

the adult speakers at the end of the play Dear Deedi, My Sister also bring out their agonizing state of

immigrants because of cultural shock; they suffer from a sense of isolation, frustration, fear, loneliness and a

sense of intense insecurity: “What we were not told, never guessed,/ Is written on our children’s faces/

Furrowed with tears because of our race,/ Or colour, or tongue that stumbles/ Over words so alien to the

many places/ From which we’ve come. (73)

Some of the Indian migrant characters in her works are shown with an intense desire to create a ‘home’ in

their living space with religious icons. For instance in Trishanku Vithal says: “We shall build our temple/

Here where the Assiniboine/ Flows into the Red./ And I shall bring Ganga,/ As Bhagiratha did of old,/ To

our land/ our Assiniboine/ And the fluteplayer/ Dark as kaya blossom/ Shall dance on the waters of La

Salle.(82) And again in the play Rootless but Green are the Boulevard Trees Vithal echoing his own

namesake says, “[…].We shall build our temple at the confluence of the Red and Assiniboine and then we

shall say Okay, we are ready to assimilate. Not here not now […].” (118) Preserving one’s identity is very

essential in Parmeswaran’s plan of re-rooting in an alien land. Vithal’s view of living in ghettoes is what

Rajen points out is “multiculturalism here” (117) and this is what the writer advocates. Parmeswaran’s view

on the immigrant view fits in very well with Canada’s Multicultural Policy:

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

The situation of a ‘mosaic’ as against ‘a melting pot’ in the U.S.A. makes Canada a better sought-

after destination as compared to America. Canada also occupies a unique position owing to the fact

that it is one of those very few countries that have exhibited much courage in officially putting on

their statute book A Multicultural Policy and A Multicultural Act. In fact, the Policy and the Act are

significant government initiatives aimed at efficient management of their ethno-cultural diversity.

Used prescriptively, multiculturalism in Canada encompasses a relatively coherent set of ideas and

ideals in defense of ‘celebrating diversity’ as a positive, central and valued component of the

Canadian mosaic. The Policy and the Act have emerged due to five hundred years of continuous

immigration to Canada. As a natural consequence of this, preserving of linguistic, cultural and

literary heritage has endowed the Canadian society with a vibrancy and richness that several other

societies lack. (12)

To sum up, portraying through many situations, experiences and ambivalent stands of different characters,

we find that Parmeswaran foregrounds the idea of home not as a fixed site but as a transitional and

ambivalent location where different migrants relate differently to the concept of home, homeland and the

land of adoption as per their situations, settlements and attitudes.

Reference:

[1] Aschcroft, Bill, Gareth Griffiths and Helen Tiffin eds. Key Concepts in Post- Colonial Studies.

Routledge, 1998.

[2] Brah, Avtar. Cartographies of Diaspora: Contesting Identities. Routledge, 1997.

[3] Cohen, Robert. Global Diasporas: An Introduction. UCI, 1997. [4]Dhawan, R.K. “India in Canadian Imagination.” India in Canadian Imagination: A Literary Response. Eds. R.K.

Dhawan, D.K. Pabby & S.S. Sharma. New Delhi: Prestige, 2003.

[5] Featherstone, Mike. “Localism, Globalism, and Cultural Identity.” Global/Local: Cultural Productions

and the Transnational Imaginar. Eds., Wilson and Wimal Dissanayake. Durham: Duke UP, 1996.

[6] Mishra, Vijay. “New Lamps for Old: Diasporas Migrancy Border.” Interrogating Post-Colonialism:

Theory, Text and Context. Eds., Harish Trivedi and Meenakshi Mukherjee. Simla: IIAS, 1996.

[7] Parmeswaran, Uma. “The Door I Shut Behind Me”, “Trishanku”, “Rootless but Green are the Boulevard

Trees” The Door I Shut Behind Me: Selected Fiction, Poetry, Drama. Madras:Affiliated East-West Press,

1990.

[8] Parmeswaran, Uma. “Sons Must Die and Other Plays”, “Meera: A Dance Drama”, “Sita’s Promise: A

Dance Drama”, “Dear Deedi, My Sister: A Performance Piece for Voices” Sons Must Die and Other Plays.

New Delhi: Prestige, 2003.

[9] Raj, Swaraj. “Theorizing Diaspora Poetics and Diaspora Literature.” Perspectives on Diaspora Indian

Fiction in English eds., Tejinder Kaur and N.K Neb. Jalandhar: Nirman, 2005.

[10] Rushdie, Salman. Imaginary Homelands. London: Granta Books, 1999.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

Studies on Clarification of Apple Juice

Prity Pant

College of IT and Management, Haldwani, Uttarakhand

Introduction:

Apple (Malus Pumilia or Malus Sylvestris) is a common fruit grow extensively over the temperate regious of

Northern India. A few verities are cultivated in India in over 1200 hectares (Singh, 1969), of them Red

Delicious is good for table purpose with of excellent quality.

One of the most desirable ways of utilizing is the production of juice from the raw material. In the

conventional process of manufacturing apple juice, the fruits are milled, macerated and the juice is pressed

out through an inverted ram hydraulic press. This extraction of juice from the fruits does not give a clear

juice. Normally, extracted raw juice is treated with enzyme for clarification.

Apple contains considerable amount of pectin which is a valuable byproduct of fruit juice industry. Studies

were carried out to develop an engymatic process by which clear juice could be obtained and at the same

time maximum quantity of pectin could be recovered. Red delicious variety was evaluated for its suitability

for juice preparation.

Material and Methods:

Red delicious variety of apple is purchased from the local market. The fruits were washed in running tap

water and pulped. The pulp was heated to 65° C for 10 minuets and cooled immediately to room

temperature. Potassium metabisulphite was added to the pulp (75 – 100 ppm SO2). Pectin was estimated by

Carre and Hynes Method (1922) as Calcium Pectate. Acidity was determined as Malic Acid by AOAC

(1984). Total soluble solids were recorded as °Brix and the pH determined by digital pH meter. Reducing

sugars were determined by Ranganna (1991) and moisture content by AOAC procedure. Pectinolytic enzyme

concentrate (PEC) was used for juice treatment.

Fruits

Washing

Pulping

Extraction

Juice

Filtration

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © IJTT – 2010

Pasteurization

Physico – Chemical Characteristics of Apple Juice:

°Brix 15

Total Sugar % 10.75

Pectin % 00.33

Acidity % 00.175

pH 4.1

Hydraulic Press Enzyme

% Pomace 59.2 15

% Yield 40.6 86

°Brix 15 15.4

Acidity 0.175 0.22

% Pectin 0.68 nil

Effect of Enzyme Concentration (%) on Yield (%) and Physico – Chemical Composition of Apple

Juice:

Enzyme

Dose

Pomace %

Yield

Pectin in

Pomace %

Filtered

Juice

Yield %

Acidity % ° Brix pH Clarity

Control 40 1.55 28.8 0.175 15.0 4.2 Turbid

0.02 22 0.80 72.5 0.225 15.1 4.1 Moderate

0.04 17 0.75 78.5 0.250 15.1 3.9 Good

0.06 15 0.71 79.0 0.268 15.2 3.9 Good

0.08 14 0.65 81.5 0.290 15.3 3.9 Very Good

0.10 14 0.58 82.0 0.312 15.4 3.8 Very Good

Results and Discussion:

On comparison of characteristics of apple juice obtained by hydraulic press and enzyme treatment yield

increased from 40.6% to 86%, while pomace decreased from 59.2% to 15%. Pectin was obtained 0.86% in

hydraulic press while nil in enzyme treatment juice.

Effect of enzyme concentration on yield and physico – chemical composition of apple juice shows that on

increasing enzyme dose from control to 0.1 pomace yield decreased from 40% to 14%, pectin decreased

from 1.55% to 0.58%, and filtered juice yield increased from 28.8% to 82.0%. Juice clarity was turbid in

control sample while very good in 0.1 enzyme dose.

References:

[1] AOAC 1984. Official Methods of Analysis. 14th

ed., Edited by Sidney Williams. Published by the

association of official analytical chemists, Inc. Arlungton, Virginia 222091, New York.

[2] Carre, M.H. and Hynes, I, Biochemistry Journal.1922, 16, 60.

[3] Ranjeet Singh 1969 in fruits, National Book Trust, New Delhi, India, pp 213.

International Journal of Technical Teachers (IJTT); May-2010

Institution of Technical Teachers (ITT), India

www.ittonline.co.in,

Copy Right © ITT – 2010

[4] Ranganna, R. 1986. Hand Book of Analysis and Quality Control for fruits and Vegitable Products. Tata

Mc. Graw – Hill Publication Co. Ltd., New Delhi, 110012.


Recommended