Combination and classification of ZnO Nano Particles using massive drink Wort leaves using by Green Chemical Reduction Method
Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 4
Abstract
In attendance study focuses on the removal of ZnO nano particles by green chemical reduction method from the bio components of leaves extract of Gigantic-Swallow-Wort. X-Ray Diffraction (XRD), FT-IR Spectroscopy characterizations was done for synthesized ZnO nanoparticles. X- ray diffraction studies showed that the particles are hexagonal in scenery.
Landscape Pattern Mining using Machine Learning Intelligence
The complexity of landscape pattern mining is well stated due to its non-linear spatial image formation and inhomogeneity of the satellite images. Land Ex tool of the literature work needs several seconds to answer input...
Dynamic Power reduction of synchronous digital design by using of efficient clock gating technique
Clock gating is an effective method of reducing the dynamic power consumption in synchronous circuits. One of the ways to achieve this is by masking the clock that goes to the idle portion of the circuit. In This paper w...
Receiver Initiated Asynchronous Duty-Cycle MAC protocol For Burst Traffic
Many energy-efficient Receiver Initiated Asynchronous Duty-Cycle MAC protocol for wireless sensor networks (WSNs) have been proposed. Most nodes suffer from significant performance Degradation for burst traffic, due to r...
Performance Analysis Of Domestic Refrigerator By Using 662 S- Silicone Grease Coating On The Evaporator
In present days, Refrigerators are cyclic devices working fluid in refrigerator is called Refrigerant. The performance of refrigerators is expressed in terms of coefficient of Performance. And the cooling capacity of a r...
Performance Study of Intrusion Detection Techniques in Mobile AD Hoc Networks
The mobile ad hoc network is an infrastructure less system of mobility appliance connected by wireless. The system protection violate cannot be prohibited using access and information flow control. This violate may be ou...