Category Archives: Uncategorized

IJSRET Volume 1 Issue 6, November-2015

Uncategorized

Control the Chaotic Rikitake System by PID Controller [106-109]

Author: Mojtaba Chavooshi Zade

Increasing the Strength of a Concrete Mix by Applying a Useful Micro-Organism (Bacteria) in It [110-111]

Author: Aashish Kumar Jain

An Art to Protect Originality of Digital Data: Digital Watermarking [112-115]

Author: Pravesh Chaubey, Ashish Singhadia

BCH Encoded DWT Based Watermarking Scheme Based on Singular Value Decomposition for Higher PSNR Ratio [116-120]

Author: Pravesh Chaubey, Ashish Singhadia

Experimental Investigation on Hybrid Fibre Reinforced Concrete Beams [121-125]

Author: K. Kartheek Babu, K. Rushi Kesava Reddy, A. Annadurai

Review: Efficient and Scalable Multiple Class Classification [126-129]

Author: Esha Shrivastava, Yogdhar Pandey

Published by:

IJSRET Volume 1 Issue 5, September-2015

Uncategorized

Improving Congestion Control in Internet Networks using Fuzzy Logic Congestion Controller [78-81]

Author: C . A. Mgbachi, I. I. Eneh, and Ameh, E. M

A Novel Technique to Determine the Controlling Unstable Equilibrium Point in Power Systems [82-89]

Author: Wagdy M. MANSOUR, Mohamed A. ALI, Nader SH. ABDELHAKEEM

Multi-agent Model Predictive Control of Nonlinear Interconnected Hydro-Thermal System Load Frequency Control Based on Bat Inspired Algorithm [90-99]

Author: M. Elsisi, M. A. S. Aboelela, M. Soliman, W. Mansour

Electrical Characteristics of XLPE Cables Containing Different Levels of Calcium Carbonate Filler[100-105]

Author: Loai Nasrat, Mamdouh Abd El-Akher, Shaymaa Qenawy


A Trust Model Approach In Internet Of Things
Authors: Prabal Kumar Joshi

Published by:

IJSRET Volume 1 Issue 4, July-2015

Uncategorized

A Comprehensive Study on Solar Power Plant at Educational Institute Level [42-49]

Author: P. V. Ramana, B. Sudheerprem Kumar, D. Maheswar

Online Modern Philosophy for Stability Detection Based on Critical Energy of Individual Machines [50-57]

Author: Wagdy M. MANSOUR, Mohamed A. ALI, Nader SH. ABDELHAKEEM

Implementing Behavior Prediction using Frequent Pattern Tree using Data Mining Technique in Smart Home [58-61]

Author: Ms. Sonam Sheikh, Prof. Vaidehi Baporikar

Artificial Neural Network Approach to Distribution Transformers Maintenance [62-70]

Author: Uhunmwangho Roland, Omorogiuwa Eseosa

A Comprehensive Review Of Schiff Base Transition Metal Complexes: Synthetic Strategies, Structural Insights, And Biological Applications

Authors: Niranjan Kumar Mandal, Ranjan Kumar

Abstract: Schiff base transition metal complexes have emerged as a pivotal class of compounds in coordination chemistry due to their structural diversity, facile synthesis, and broad-spectrum biological activities. This review critically compiles and analyzes literature from 2000 to 2013, emphasizing synthetic methodologies, coordination behavior, and characterization techniques of Schiff base ligands and their complexes with transition metals. Particular attention is given to their promising applications in antimicrobial, antioxidant, anticancer, and catalytic domains. The role of the azomethine (-C=N-) functional group in ligand-metal binding and its impact on physicochemical properties is discussed in detail. Advances in understanding structure-activity relationships highlight how metal ion identity and ligand substituents influence bioactivity and selectivity. Challenges such as limited substrate scope and stability issues are also addressed, alongside prospects for future research involving novel Schiff base frameworks and sustainable synthesis routes. This comprehensive overview serves as an essential resource for scientists exploring Schiff base complexes in bioinorganic and medicinal chemistry.

DOI: https://doi.org/10.5281/zenodo.17157634

 

A Review On Schiff Base Metal Complexes: Synthesis, Characterization, And Applications

Authors: Ranjan Kumar, Niranjan Kumar Mandal

Abstract: Schiff base metal complexes have garnered significant attention in coordination chemistry due to their diverse structural features, catalytic properties, and biological activities. These complexes, synthesized via the condensation of primary amines with carbonyl compounds (e.g., salicylaldehyde, acetylacetone), form stable chelates with transition metals (e.g., Cu(II), Ni(II), Co(II), Zn(II)), exhibiting a wide range of coordination geometries (e.g., square planar, tetrahedral, octahedral). Their structural adaptability allows for tailored electronic environments, making them excellent candidates for catalytic processes such as asymmetric synthesis, C–C coupling, and oxidation reactions. Additionally, their interactions with biological macromolecules (e.g., DNA, proteins) have spurred interest in their use as antimicrobial, anticancer, and diagnostic agents. This review highlights the synthesis (e.g., template methods, solvent-free routes), characterization techniques (e.g., UV-Vis, IR, XRD, EPR), and applications of Schiff base metal complexes, emphasizing their relevance in medicinal chemistry (e.g., bioinorganic drug design), catalysis (e.g., industrial and green chemistry), and material science (e.g., luminescent materials, MOFs). By consolidating key findings from the literature before 2014, this work provides a comprehensive understanding of these versatile compounds, identifying gaps in current knowledge and suggesting future research avenues for optimizing their functional utility.

DOI: https://doi.org/10.5281/zenodo.17157735

 

Published by:

IJSRET Volume 1 Issue 3, May-2015

Uncategorized

Investigation of Dependent Rikitake System to Initiation Point [33-36]

Author: Yousof Gholipour, Amin Ramezani, Mahmood Mola

Estimation of Progression Deviation of Dynamic RAM Memory Architecture [37-41]

Author: Amit Shhivhare, Vivek Dubey

Java Virtual Machine (JVM): Architecture, Goals, and Tuning Options
Authors:-RamaKrishna Manchana

Abstract-The Java Virtual Machine (JVM) plays a pivotal role in Java’s platform-independent execution, providing a runtime environment that translates Java bytecode into machine-specific instructions. This paper explores the architecture of the JVM, detailing its core subsystems, execution strategies, and tuning options available as of 2017. By examining the association between the JVM, JRE, and JDK, alongside advanced tuning techniques, this paper provides insights into optimizing performance metrics such as latency, throughput, and memory usage for various application needs.

DOI: 10.61137/ijsret.vol.1.issue3.42

Published by:

IJSRET Volume 1 Issue 1, January-2015

Uncategorized

ALARC Approach for Litho Friendly Standard Cell Layout Design [1-4]

Author: Praveen Chadhokar

Effect of Inhibitors on the Corrosion Behaviour of Cold-Rolled Mild Steel [5-8]

Author: Okonji, P. O.; Okonji, R.E. and Odo J. U.

Effect of Welding Current and Filler Metal Types on Macrostructure and Tensile Strength of Gtaw Welded Stainless Steel Joints [9-12]

Author: Okonji, P. O.; Nnuka, E. E. and Odo J. U.

PV Parameters Estimation using a Developed Iterative Method [13-17]

Author: Tarek M. El-Sayed, Abd El-Shafy A. Nafeh, Faten H. Fahmy, Hosam K. M. Yousef

Description of the Natural Properties, Geomorphologic Aspects and Human Activity in Matammah Area–Northern Sudan (Application of GIS) [18-20]

Author: Muhammed Ali Hassan Dahab,Dafalla Siddig Dafalla Wadi

Published by:

IJSRET Volume 1 Issue 2, March-2015

Uncategorized

Effect of Ni-additions on the Microstructure and Mechanical Properties of Fe-based Chill-Cast Al-Si Alloys for Production of Pistons for Automobile Engine Applications[21-24]

Author: N. E. Nwankwo, V. U. Nwoke and E. E. Nnuka

On Complement of Distinct Approximations of Fuzzy Number [25-32]

Author: D. Stephen Dinagar, K.Jivagan

Published by:

Optimizing Healthcare Data Warehouses for Future Scalability: Big Data and Cloud Strategies

Uncategorized

Optimizing Healthcare Data Warehouses for Future Scalability: Big Data and Cloud Strategies
Authors:Srinivasa Chakravarthy Seethala

Abstract:Healthcare organizations generate vast amounts of data, driven by regulatory compliance, patient care needs, and advances in medical technology. Legacy data warehouses, while central to healthcare data management, often struggle to accommodate escalating data volumes, new data types, and real-time processing demands. This paper presents strategic insights into leveraging Big Data and cloud computing to modernize healthcare data warehouses for future scalability. We examine technical approaches, review cloud and Big Data integration techniques, and propose a roadmap for healthcare data scalability, addressing concerns of security, compliance, and data interoperability.

DOI: 10.61137/ijsret.vol.3.issue6.201

Published by:

Optimizing Material Management through Advanced System Integration, Control Bus, and Scalable Architecture

Uncategorized

Optimizing Material Management through Advanced System Integration, Control Bus, and Scalable Architecture
Authors:RamaKrishna Manchana

Abstract:This paper presents an advanced approach to material management by leveraging modern system integration techniques and scalable microservices architecture. The proposed solution addresses the limitations of traditional monolithic systems by introducing microservices, control bus mechanisms, and event-driven designs that enhance operational efficiency and scalability. By utilizing advanced integration patterns, including synchronous and asynchronous services, the system improves real-time data processing and decision-making capabilities. This document outlines the technical architecture, key components, integration designs, and implementation strategies that underpin a robust and adaptable material management system, demonstrating significant improvements in scalability, performance, and responsiveness.

DOI: 10.61137/ijsret.vol.3.issue6.200

Published by:

A Trust Model Approach In Internet Of Things

Uncategorized

Authors: Prabal Kumar Joshi

Abstract: IoT (internet of things) is defined as a worldwide framework for information world, which provides advanced services by connecting physical and virtual things through information technology and adoptable communication available in the evolution process. IoT is just applied to overcome the concerns related to safety. Sharing information among different devices can affect the private information of users. Therefore, a proper approach mechanism is required to prevent the risk of malicious and vulnerable failures. Multi-services IoT is vulnerable to many types of malicious attacks. Trust management provides a potential solution for safety issues of distributed networks. In this article, an algorithm is designed in order to calculate trust, which does not calculate the amount of trust for all neighbors and just calculates it for suspicious neighbors located in the list of suspicious nodes. Subsequently, energy consumption in comparison to the approach of basis article has so much decrease.

DOI: http://doi.org/10.5281/zenodo.17034568

Published by:
× How can I help you?