Time filter

Source Type

Gaikwad R.W.,Pravara Rural Engineering College
Electronic Journal of Environmental, Agricultural and Food Chemistry | Year: 2010

Acid mine drainage (AMD), characterized by low pH and high concentrations of sulfate and heavy metals, is an important and widespread environmental problem related to the mining industry. Active treatments have received much attention lately as promising method for AMD treatment. They offer advantages such as high metal removal at low pH, stable sludge, and recovery of metals. Ion Exchange is the desired mechanism of contaminant removal; however, many mechanisms including adsorption reverse osmosis of metal occur in active treatments. The efficiency of active treatment is high. The most important component is the selection of resins and operating parameters. The performance of field ion exchangers can also be limited by AMD load and metal toxicity. Several studies conducted to find the bestsuited resin are reviewed. Moreover, critical parameters for design and long-term operation are discussed. Additional work needs to be done to properly assess the long-term efficiency of Ion exchanger and the metal removal mechanisms.

Talnikar V.D.,Pravara Rural Engineering College | Talnikar V.D.,Dr. Babasaheb Ambedkar Technological University | Mahajan Y.S.,Dr. Babasaheb Ambedkar Technological University
Korean Journal of Chemical Engineering | Year: 2014

Chemical process industries convert raw materials into useful products. Acids, among other chemicals, are used in many industries as reactants, solvents and also as catalysts in a few instances as well. Resulting streams are dilute, from which the acids must be recovered. For recovery, many technologies can be used by which acids can be regained as such or can be converted into other value-added products like esters. Membrane processes and biological processes are being researched academically and practiced industrially. These have their own advantages and disadvantages in view of conversion, energy consumption etc. These are not always advantageous and hence an alternate process technology is necessary like reactive separation (RS). RS is advantageous especially when the acid is to be converted to other useful products by reaction, due to additional advantages or because no other technology is well suited or due to cost considerations alone. Conventional process technologies use the reactor configuration followed by the subsequent separation sequence. This approach can sometimes suffer from lesser conversion, difficulties in separation etc. To overcome these problems, RS has an edge over other processes in terms of the recovery of the useful compounds. Reactive distillation (RD), reactive extraction (RE) and reactive chromatography (RC) are the separation technologies that can be useful for acid recovery in an economically feasible way. This review covers the various processes of acid recovery along with the recent work in the field of reactive separations. © 2014, Korean Institute of Chemical Engineers, Seoul, Korea.

Kadu C.B.,Pravara Rural Engineering College | Patil C.Y.,College of Engineering, Pune
2015 International Conference on Industrial Instrumentation and Control, ICIC 2015 | Year: 2015

In this paper we designed a Fractional order controller for level control system. Based on experimental model of the process, the different tuning rules have been computed and compared in order to minimize the integral square error with a constraint on the maximum sensitivity. To assess the controller performance with achieved performance, we tested the robustness of the system for process model stability. By comparing the results obtained for integer order controller (IOC) and fractional order controller (FOC), it is shown that fractional order controller gives better result for an obtained process model. © 2015 IEEE.

Nehe N.S.,Pravara Rural Engineering College | Holambe R.S.,Shri Guru Gobind Singhji Institute of Engineering and Technology
Eurasip Journal on Audio, Speech, and Music Processing | Year: 2012

In this article, new feature extraction methods, which utilize wavelet decomposition and reduced order linear predictive coding (LPC) coefficients, have been proposed for speech recognition. The coefficients have been derived from the speech frames decomposed using discrete wavelet transform. LPC coefficients derived from subband decomposition (abbreviated as WLPC) of speech frame provide better representation than modeling the frame directly. The WLPC coefficients have been further normalized in cepstrum domain to get new set of features denoted as wavelet subband cepstral mean normalized features. The proposed approaches provide effective (better recognition rate), efficient (reduced feature vector dimension), and noise robust features. The performance of these techniques have been evaluated on the TI-46 isolated word database and own created Marathi digits database in a white noise environment using the continuous density hidden Markov model. The experimenta results also show the superiority of the proposed techniques over the conventional methods like linear predictive cepstral coefficients, Mel-frequency cepstral coefficients, spectral subtraction, and cepstral mean normalization in presence of additive white Gaussian noise. © 2012 Nehe and Holambe; licensee Springer.

Al Maskari S.,Sohar University | Kumar Saini D.,Sohar University | Raut S.Y.,Pravara Rural Engineering College | Hadimani L.A.,Caledonian College of Engineering
Proceedings of the World Congress on Engineering 2011, WCE 2011 | Year: 2011

The paper deals with security architecture and its possible implementation for a campus network and vulnerability analysis. In the paper an attempt is made to identify the critical points in the campus network for identifying the possible vulnerability and attack points. Vulnerability analysis is very helpful to secure the critical information and data in the campus network and servers. An attempt is made to engineer the architecture. We identify all the possible discrete points and give the detailed specifications to implement the security measures on them.

Discover hidden collaborations