Time filter

Source Type

Tiruchirappalli, India

Muruganandam L.,Saranathan College of Engineering | Krishnakumar K.,National Institute of Technology Tiruchirappalli
E-Journal of Chemistry | Year: 2012

A new Mannich base N-[morpholino(phenyl)methyl]acetamide (MBA), was synthesized and characterized by spectral studies. Chelates of MBA with cobalt(II), nickel(II) and copper(II) ions were prepared and characterized by elemental analyses, IR and UV spectral studies. MBA was found to act as a bidentate lig and , bonding through the carbonyl oxygen of acetamide group and CNC nitrogen of morpholine moiety in all the complexes. Based on the magnetic moment values and UV-Visible spectral data, tetracoordinate geometry for nitrato complexes and hexacoordinate geometry for sulphato complexes were assigned. The antimicrobial studies show that the Co(II) nitrato complex is more active than the other complexes. Source

Arivazhagan M.,Aa Government Arts College | Kavitha R.,Saranathan College of Engineering
Journal of Molecular Structure | Year: 2012

The FT-IR and FT-Raman spectra of 4-methyl-3-nitro benzyl chloride (MNBC) molecule have been recorded in the range of 4000-400 cm -1 and 3500-50 cm -1 respectively. The molecular geometry and vibrational frequencies in the ground state are calculated using the DFT/B3LYP method with 6-311+G (d, p) and 6-311++G (d, p) basis sets. The computed values of frequencies are scaled using a suitable scale factor to yield good coherence with the observed values. Most of the modes have wavenumbers in the expected range. The calculated HOMO-LUMO energy gap shows that charge transfer occur within the molecule. NBO analysis has been performed in order to elucidate charge transfers or conjugative interaction, the intra-molecule rehybridization and delocalization of electron density within the molecule. From the result of Mulliken population analysis, it is clear that the substitution of CH 2Cl atoms in the aromatic ring leads to a redistribution of electron density. The total energy distribution (TED) has also been calculated for each mode of the vibration of the molecule. © 2011 Elsevier B.V. All rights reserved. Source

Ganapathy R.,Saranathan College of Engineering
Journal of Heat Transfer | Year: 2012

Free convective heat and mass transfer from a sphere of constant temperature and concentration buried in an unbounded porous medium is studied analytically assuming the validity of the Darcy flow model. Using a regular perturbation analysis, transient and steady-state solutions have been obtained in the form of series expansions in terms of a thermal Rayleigh number, which is based on the temperature of the heated sphere and the medium permeability. The results are exemplified by drawing the streamlines at various times. Of special significance is the emergence of a downward flow in the transient state when the two buoyancy mechanisms are opposed. These results apply as well to the case of buoyancy-induced flows from a sphere generating simultaneously two different chemical components. Copyright © 2012 by American Society of Mechanical Engineers. Source

Arivazhagan M.,College | Kavitha R.,Saranathan College of Engineering
Indian Journal of Pure and Applied Physics | Year: 2012

The Fourier Transform Infrared (FTIR) and FT-Raman spectra of 4-bromoveratrole (4BV) have been recorded in the region 4000-400 cm -1 and 3500-50 cm -1 , respectively. The experimental vibrational frequencies are compared with the wave numbers obtained theoretically by ab-initio HF and DFT-B3LYP gradient calculations employing the standard 6-31 1++G(d,p) basis set for the optimized geometry of 4BV. The values of the first-order hyperpolarizability (β) of the investigated molecule are computed using DFT quantum mechanical calculations. The calculation results also show that the molecule might have microscopic nonlinear optical (NLO) behaviour with non-zero values.NBO analysis has been carried out at DFT level. NBO study explains charge delocalization of the molecule. Mulliken's net charges have been calculated and compared with the atomic natural charges. Source

Hariprasath S.,Saranathan College of Engineering | Prabakar T.N.,Oxford Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

A Biometric system is essentially a pattern recognition system that makes use of biometric traits to recognize individuals. Authentication systems built on only one biometric modality may not fulfill the requirements of demanding applications in terms of properties such as performance, acceptability and distinctiveness. Most of the unimodal biometrics systems have problems such as noise in collected data, intra-class variations, inter-class variations, non universality etc. Some of these limitations can be overcome by multiple source of information for establishing identity; such systems are known as multimodal biometric systems. In this paper a multi modal biometric system of iris and palm print based on Wavelet Packet Analysis is described. The most unique phenotypic feature visible in a person's face is the detailed texture of each eye's iris. Palm is the inner surface of a hand between the wrist and the fingers. Palmprint is referred to principal lines, wrinkles and ridges on the palm. The visible texture of a person's iris and palm print is encoded into a compact sequence of 2-D wavelet packet coefficients, which generate a "feature vector code". In this paper, we propose a novel multi-resolution approach based on Wavelet Packet Transform (WPT) for texture analysis and recognition of iris and palmprint. The development of this approach is motivated by the observation that dominant frequencies of iris texture are located in the low and middle frequency channels. With an adaptive threshold, WPT sub images coefficients are quantized into 1, 0 or 1 as iris signature. This signature presents the local information of different irises. By using wavelet packets the size of the biometric signature of code attained is 960 bits. The signature of the new pattern is compared against the stored pattern after computing the signature of new input pattern. Identification is performed by computing the hamming distance. © 2012 Pillay Engineering College. Source

Discover hidden collaborations