Showing posts with label ijirst. Show all posts
Showing posts with label ijirst. Show all posts

Tuesday, April 9, 2019

IJIRST : Research Paper : Call For Paper : 2019


Call for Papers | Vol. 5 Issue 11 - April #2k19
Last date of Paper submission 25th March '19 
for More Info or Query Cont. us: 07405046536
Email us: ijirst.journal@gmail.com
Submit your Paper @ http://www.IJIRST.org


Tuesday, January 29, 2019

NCNICS'19 National Conference | IJIRST Conference on Networks, Intelligence & Computing Systems

NCNICS'19 - 11th National Conference on Networks, Intelligence & Computing Systems

IJIRST - International Journal for Innovative Research in Science & Technology

Call for Papers:
Original papers on all technical aspects of Networking, Intelligence and Advanced Computing are solicited for submission to NCNICS’19. Topics of interest for the various sessions of the conference include, but are not limited to:

Research Scholars: Rs.750/-
Academicians: Rs.750/-
Delegate from Industry: Rs.1500 /-
PG Students*: Rs. 600 /-
UG Students*: Rs. 350 /-
(*Students have to enclose bonafide certificate with registration form)
Fee includes the proceedings, lunch and tea on the conference day

Key Dates:
Paper Submission due : 26.02.2019
Intimation of Acceptance : 01.03.2019
Camera Ready Paper & Conference registration : 05.03.2019

Conference Date : 07.03.2019

Presents by SNS College of Technology (SNSCT)
For more Details Please visit: www.snsct.org
Email: snsctitdeptco@gmail.com


Wednesday, November 21, 2018

IJIRST | Implications of Correlations for Sandstone

IJIRST - International Journal for Innovative Research in Science & Technology

Helpful for & Research Area: Civil Engineering

Authors : Sachin Gupta; Dhirender Kumar; Arup Bandyopadhyay; S. L. Gupta

Volume 4 Issue - 9, 2018 

KEYWORDS: Sandstone, Laboratory, UCS, Wave Velocity, Modulus, Correlation

ABSTRACT:
The objective of this paper is to explore correlations for predicting Uniaxial Compressive Strength and Tangent Modulus - on the basis of compression and shear waves' velocities - for three Himalayan sandstones and implications of using the proposed equations. In this paper, the discussion is done in five stages. First, the representative values of different properties and parameters have been discussed, to have an understanding about the three variants of the sandstone. Second, complete spread of the actual data is shown. Third, correspondence of these values with the equations proposed for sandstone by other researchers has been assessed. Forth, correlations have been explored through regression analysis. Fifth, the implication of using the proposed correlations has been assessed on the same data and the sandstone data of other researchers. This assessment of implication is done by: (1) plotting of actual UCS and estimated UCS from the correlations, (2) calculating percentage error in estimating UCS through these equations, and, (3) assessing variation in the estimated range of values to that of actual. This work reaffirms that the correlations are rock type and location specific that too with certain percentage of errors; in present case percentage of error varies from 30 to 40. However, for preliminary stage of a project, a broad picture of the rock can be obtained using these equations, in the form of range. But, these or any correlations can never be an alternative for the investigation.

Download Article

For more Information & Helpful Papers Please visit: 






IJIRST – Submit Paper – Call for Paper – November 2018

INTERNATIONAL JOURNAL FOR INNOVATIVE RESEARCH IN SCIENCE AND TECHNOLOGY – IJIRST

CALL FOR PAPERS | VOL. 5 ISSUE 6 – November 2018

High Impact Factor: 4.371 | IC Value: 71.12
More Information & Query Contact us: 07405046536
Email us: ijirst.journal@gmail.com
Submit your Paper @ IJIRST.org


Wednesday, September 27, 2017

Call for Paper for October-2017

IJIRST : International Journal for Innovative Research in Science & Technology

#IJIRST Journal: Call for paper
Volume 4 Issue 5 October 2017
Impact Factor: 4.371

For more details : http://ijirst.org/

Wednesday, August 30, 2017

Call for Paper for September Issue-2017

IJIRST : International Journal for Innovative Research in Science & Technology

#IJIRST Journal: Call for paper
Volume 4 Issue 4 September 2017
Impact Factor: 4.371

For more details : http://ijirst.org/

Wednesday, April 12, 2017

IJIRST Journal new Impact factor : 4.371

IJIRST Journal: International Journal for Innovative Research in Science & Technology



New Impact Factor Received.
Latest Impact Factor : 4.371(Year-2016) 
International Journal for Innovative Research in Science & Technology
Click here for more Details : www.ijirst.org

Saturday, March 4, 2017

#IJIRST : NETWORKS, INTELLIGENCE & COMPUTING SYSTEMS (NCNICS’17)

This conference is intended provide a forum for researchers, faculty members, students and practitioners to present their contributions in various IT related fields like networks, intelligence and computing systems. This conference aims to bring together innovative experts from all over the nation, for the discussion of theoretical, numerical and experimental investigations done by scholars.
Original papers on all technical aspects of Networking, Intelligence and Advanced Computing are solicited for submission to NCNICS’17. Topics of interest for the various sessions of the conference include, but are not limited to:
Networks, Web and Multimedia Security
  • Network Intrusion Detection, prevention, Firewalls, Packet Filters
  • Web Services and Enterprise Security
  • Steganography and Digital Watermarking
  • Security & Cryptography
  • Biometrics and Embedded System Security
Mobile Computing, Distributed Computing and wireless systems
  • Sensor and Vehicular networks
  • Peer-to-peer communications
  • Mobility and Handoff Management
  • Network protocols for Mobile Networks
  • Cloud, cluster and scalable computing
  • Smart Grid Technologies and Networking
Knowledge Data Engineering
  • Big Data Analytics
  • Database and Data Mining
  • Machine Learning
  • Rule-Based Algorithms
  • Knowledge Management Methods
Artificial Intelligence
  • Internet on things
  • Bioinformatics and Scientific Computing
  • Computational Intelligence
  • Expert Systems
  • Intelligent Information & Database Systems
Multimedia and Image Processing
  • Pattern recognition and analysis
  • Content-based Image retrieval
  • Watermarking
  • Distributed Multimedia Models and Systems

NCNICS’17
Department of Information Technology
SNS College of Technology
SNS Kalvi Nagar, Sathy Main Road,
Saravanampatti Post, Coimbatore -641 035,
Tamil Nadu. India
Ph: 9944713399, 9942878501.
E-mail : snsctitdeptco@gmail.com
www.snsct.org

Tuesday, September 15, 2015

#IJIRST Journal

IJIRST Journal's Poster

Top Rated International Journal  Recommended By Most of University

Impact Factor : 1.638

ISSN : 2349-6010

Publish Your Research article with ijirst.org

We Accept Only Quality Papers...

No Profit No loss International Journal to Promote Research Scholar..

www.facebook.com/ijirst

submit Your Article : www.ijirst.org


Monday, September 14, 2015

Impact of Boiler Water Chemistry on Waterside Tube Failures#IJIRST

IJIRST Journal published this paper in our journal. so kindly check it on our website.

Manuscript Title: Impact of Boiler Water Chemistry on Waterside Tube Failures

Abstract: This paper emphasis on the study of typical premature failure of water wall tubes of two thermal power plant boiler of same capacity (250 MW) and same operational parameter but with different boiler water chemistry.  The investigation concludes on the waterside corrosion in both of the case.  One boiler is running with coordinated phosphate treatment (CPT) and another with all volatile treatment (AVT).  The causes of corrosion were discovered and proposed measures for their elimination were given. Visual examination, chemical analysis of deposits, oxide scale thickness measurement and micro structural examination were carried to ascertain the probable cause/causes of failure. From the investigation, it was finally concluded that the combination of localized high tube metal temperature and wall thinning due to under deposit corrosion led to the premature tube failure in boiler running with coordinated phosphate treatment and localized pitting corrosion in boiler running with AVT. Based on the results and discussions, a possible way to combat the corrosion was proposed.
Keywords: Boiler Water Chemistry, Boiler Tube Failure, Caustic Gauging Corrosion, Pitting Corrosion, Boiler Deposits

I.       Introduction

Thermal power plants contribute about 75% to all India installed capacity of electric power generating stations. In worldwide energy sector, about 37% of electricity is produced by combusting coal [1-2]. Most of the Indian industrial boilers has been a prominent problem of boiler tube failure (BTF).  The tube failure causes loss in generation and which in turn responsible for massive economic loss. All type of boiler tubes have their defined life period and can fail due to various failure mechanisms. So, Successful and reliable operation of steam generating equipment needs the use of the best available methods to prevent scale and corrosion. In the boiler feed water cycle the ingress of contaminants, deposition of contaminants, and corrosion were found as the major carriers of potential problems who may have major role for the analysis of boiler tube failures. Failure can occur in all boiler areas: economizers, waterwalls, super-heaters (SH) and re-heaters (RH). Figure 1 shows simplified schematic of a coal fired sub critical boiler. The boiler tubes are of various sizes and thickness depending upon the pressure and mid wall metal temperature. According to the failures by location, water wall tubes are the second highest failure location after superheater tubes. However, according to the failures by material, carbon steel tubes statistically lead as the most frequent material causing failures. Correct tube material selection to resist the surrounding temperature is also one other decisive factor to stop the chances of BTF. Normally the water touched areas like economizer and waterwalls are made of boiler grade carbon steel. Superheater and reheater will have combination of low alloy tubes of stainless steels tubes. Figure 2[a] and [b] show the schematics of   heat transfer modes in the radiant and convective section of coal fired boiler. When the tube metal is in contact with the steam over period of time, the oxidation process may begin to form a layer of protective magnetite (Fe3O4) scale. Ferrous hydroxide [Fe (OH) 2] is believed to be an intermediate in this process, converting to magnetite above 100°C according to the Schikorr reaction:
Fe + 2 H2O → Fe (OH) 2 + H2
Followed by reaction:
3Fe (OH) 2 → Fe3O4 + 2 H2O + H2

For more information Click Here

Friday, September 11, 2015

A Novel High Resolution Adaptive Beam Forming Algorithm for High Convergence

Abstract: This paper introduces a new robust four way LMS and variable step size NLMS beam forming algorithm to reduce interference in a smart antenna system. This algorithm is able to resolve signals arriving from narrowband sources propagating plane waves close to the array end fire. The results of previously used adaptive algorithm have the fixed step size NLMS will result in a trade-off issue between convergence rate and steady-state MSE of NLMS algorithm. This issue is solved by using four way LMS and VSSNLMS which will improve the efficiency of the convergence point. The proposed algorithm implemented reduces the mean square error (MSE) and shows faster convergence rate when compared to the conventional NLMS.
Keywords: Adaptive Antenna, Beamforming, Means Square Error (MSE), Convergence

I.   Introduction

A.      Introduction

In today’s world numbers of mobile users are increasing day by day, hence it is necessary to serve such a huge market of mobile users with high QOS even though the spectrum is limited. This becomes a major challenging problem for the service providers to solve. A major limitation in capacity and performance is co-channel interference caused by the increasing number of users and the multipath fading and delay spread. Research efforts investigating effective technologies to mitigate such effects have been going on and among these methods Adaptive antenna employment is the most promising technology. This project works on Adaptive Antenna which ensures high capacity providing with the same Quality of Service(QOS).In a normal scenario currently the mobile towers employ parabolic dish or a horn antenna but this suffers if the SNR is low the signals have to be repeatedly retransmitted from mobile station to base station. The use of Adaptive Antenna considers an array of antennas in which the antenna will receive the delayed versions of the electromagnetic wave and adds them to achieve high SNR.

B.      Problem Statement

In the earlier antenna radiation was directed based on frequency or time, Therefore spectrum was not utilized efficiently because as the number of users increases the quality of service decreases. Hence, in this work a solution to use the Adaptive antenna frameworks have been proposed and used as an efficient means to meet the quickly expanding the  traffic volume. This issue of Technology has discusses the importance of various advanced antenna schemes for improving the same amount of spectrum and provides service to the large amount of mobile users is deduced. This is done by separating the users with respect to direction.

II.                Adaptive antenna

Adaptive antenna is the one which adapts itself to pick the user signal in any direction without user intervention , basically it undergoes through a two phase process:
-         Direction detection Estimation (DDE) using a suitable algorithm and sensor data.
-         Beam forming which forms a beam in the desired direction and nulls in the interference direction.
Direction Detection Estimation (DDE) methods are used to detect the incoming wave and the other signals which arrive from different parts of the space can be processed to extract different type of data including direction desired incoming signal falling on the antenna array.

Beam forming is a process of forming the Main beam in the desired direction and nulls in the direction of jammers direction. The block diagram is shown in  Figure1 shows an adaptive antenna structure with N antenna elements, DDE blocks, Adaptive signal processor algorithms to make adaptive antenna system smart, where incoming signal is processed by beam forming algorithms the figure also shows main beam formed in the direction of desired signal and nulls in the jammers direction.
Fig. 1: Adaptive Antenna
http://ijirst.org/Article.php?manuscript=IJIRSTV2I3036
ijirst.org

Tuesday, September 8, 2015

IJIRST Journal

Top Rated International Journal  Recommended By Most of University

Impact Factor : 1.638

ISSN : 2349-6010

Publish Your Research article with ijirst.org

We Accept Only Quality Papers...

No Profit No loss International Journal to Promote Research Scholar..

www.facebook.com/ijirst

submit Your Article : www.ijirst.org

Monday, August 24, 2015

Automatic Vs. Selective Criteria based Policy Network Extraction over Routers Data

Abstract:- Policy networks are generally utilized by political scientists and economists to clarify different financial and social phenomena, for example, the advancement of associations between political elements or foundations from diverse levels of administration. The examination of policy networks requires a prolonged manual steps including meetings and polls. In this paper, we proposed an automatic procedure for evaluating the relations between on-screen characters in policy networks utilizing web documents of other digitally documented information gathered from the web. The proposed technique incorporate website page information extraction, out-links. The proposed methodology is programmed and does not require any outside information source, other than the documents that relate to the political performers. The proposal assesses both engagement and disengagement for both positive and negative (opposing) performer relations. The proposed algorithm is tested on the political science writing from routers document database collections. Execution is measured regarding connection and mean square error between the human appraised and the naturally extricated relations.
Keywords: Policy Networks, Social Networks, Relatedness Metrics, Similarity Metrics, Web Search, Policy Actors, Link Analysis

I.       Introduction

The expression "network" is much of the time used to depict groups of various types of actor who are connected together in political, social or economic concerns. Networks may be loosely organized but must be capable for spreading data or participating in aggregate activity. The structure of these networks are frequently unclear or dynamic, or both. In any case developing such networks are required because it reflects how present day society, society and economy are related. Linkages between different organizations, have turned into the important aspect for some social scientists. The term policy network implies “a  cluster  of  actors,  each  of  which  has  an  interest,  or “stake” in a given…policy sector and the capacity to help determine policy success or failure” [1] on other words definition of a policy network, “as a set of relatively stable relationships which are of non-hierarchical and interdependent nature linking a variety of actors, who share common interests with regard to apolicy and who exchange resources to pursue these shared interests acknowledging that co-operations the best way to achieve common goals” [3]. Examiners of governance are often try to clarify policy results by examining that how networks, which relates between stakeholders over policy plan and point of interest, are organized in a specific segment. The policy networks are also acknowledged as to be an important analytical tool to analyze the relations amongst the actors who are interacting with each other in a selected policy area. Furthermore it can also be used as a technique of social structure analysis. Overall it can be said that policy networks provide a useful toolbox for analyzing public policy-making[2]. Although the policy networks are required for analysis of different relations however it is difficult to extract it because of the fact that policymaking involves a large number and wide variety of actors, which makes this taskvery time consuming and complex task.Considering the importance of policy networks and knowing that there is not any computational technique available for efficiently and automatically extracting the policy network in this paper we are presenting an efficient approach for it.

II.    Related work on policy network

The application of computational analysis for large sized datasetasgaining popularity in the recent past. Because of most of the relation documents are available in digital format and also it makes the process automated and fast. Since the policy networks is a kind of structure which presents the relations amongst the actors which are presented in documents as “name” or known words and the sentence in the text describes the relations between them hence the extraction technique in the basic form contains text data mining techniques, or it can be said that it is an extension of text and web mining, like Michael Laver et al [14] presented a new technique for extracting policy relations from political texts that treats texts not as sentences to be analyzed but rather, as data in the form of individual words. Kenneth Benoit et al [13] presented the computer word scoring for the same task. Their experiment on Irish Election shows that a statistical analysis of the words in related texts in terms of relations are well able to describe the relations amongst the parties on key policy considerations. They also evaluated that for such estimations the knowledge of the language in which the text were written is not required, because it calculates the mutual relations not the meaning of words. The WORDFISH scaling algorithm to estimate policy positions using the word counts in the related texts. This method allows investigators to detect position of parties in one or multiple elections. Their analysis on German political parties from 1990 to 2005 using this technique in party manifestos shows that the extracted positions reflectchanges in the party system very precisely. In addition, the method allows investigators to inspect which words are significant for placing parties on the opposite positions finally the words with strong political associations are the best for differentiate between parties. As already discussed that Semantic difference of documents are important for characterizing their dierences and is also useful in policy network extraction. Krishnamurthy KoduvayurViswanathanet al [7] describe several text-based similarity metrics to estimate the relation between Semantic Web documents and evaluate these metrics for specific cases of similarity.Elias Iosif et al [6] presented web-based metrics for semantic similarity calculation between words which are appeared on the web documents. The context-based metrics use a web documents and then exploit the retrieved related information for the words of interest. The algorithms can be applied to other languages and do not require any pre-annotated knowledge resources.

III.  Similarity computation techniques in documents

Metrics that live linguistics similarity between words or terms will be classified into four main classes relying if information resources area unit used or not[5]:
-        Supervised resource based mostly metrics, consulting solely human-built data resources, like ontologies.
-        Supervised knowledge-rich text-mining metrics, i.e., metrics that perform text mining relying conjointly on data resources,
-        Unsupervised co-occurrence metrics, i.e., unsupervised metrics that assume that the linguistics similarity among words or terms will be expressed by associate association quantitative relation that could be a measure of their co-occurrence.
-        Unsupervised text-based metrics, i.e., metrics that square measure absolutely text-based and exploit the context or proximity of words or terms to cipher linguistics similarity.
The last 2 classes of metrics don't use any language resources or skilled data, each rely solely on mutual relations, hence in this sense, the metrics are brought up as “unsupervised”; no linguistically labeled human-annotated information is needed to calculate the semantic distance between words or terms.
Resource-based and knowledge-rich text mining metrics, however, use such knowledge, and square measure henceforward stated as “supervised” metrics. Many resource-based strategies are planned within the literature that use, e.g., Word-Net, for linguistics similarity computation.

This paper is published in our journal for more information about this paper go on to below link

http://ijirst.org/Article.php?manuscript=IJIRSTV2I2001

http://ijirst.org/index.php?p=SubmitArticle





Saturday, August 22, 2015

Modeling of Student’s Performance Evaluation


Abstract:- We proposed a Fuzzy Model System (FMS) for student performance evaluation. A suitable fuzzy inference mechanism has been discussed in the paper. We mentioned how fuzzy principal can be applying in student performance prediction. This model can be useful for educational organization, educators, teachers, and students also. We proposed this model especially for first year students who need some extraordinary monitoring to their performance. Modeling based on the past academic result and on some information they earlier submitted for admission purposes.

Keywords: Fuzzy Logic, Membership Functions, Academic Evaluation

I.       Introduction

Success rate of any Educational Institute or Organization may depend upon the prior evaluation of student’s performance. They use different method for student’s performance evaluation usually any educational organization use grading system on the basis of academic performance especially higher education. We can involve other key points to evaluating student performance such as communication skill, marketing skill, leadership skill etc.
Performance evaluation can provide information. Information generated by evaluation can be helpful for students, teachers, educators etc. to take decisions.[6] In corporate field employers highly concern about all mentioned skill. If an educational institute involve other than academic performance for evaluation then it will be beneficial for students as well as organization also.

A.      Traditional Evaluation Method

Traditionally student’s performance evaluate done by academic performance like class assignment, model exams, Yearly etc. This Primary technique involves either numerical value like 6.0 to 8.0 which may call grade point average or 60% to 80% i.e average percentage. Some organization also using linguistic terms like pass, fail, supply for performance evaluation. Such kind of evaluation scheme depends upon criteria which are decided by experienced evaluators. So that evaluation may be approximate.
The objective of this paper is to present a model .which may be very useful for teachers, organization and students also. It helps to better understanding weak points which acts as a barrier in student’s progress.

B.      Method Used

Fuzzy logic can be described by fuzzy set. It provide reasonable method / technique through input and output process fig[1].Fuzzy set can be defined by class of object, there is no strident margins for object[1].A fuzzy set formed by combination of linguistic variable using linguistic modifier.
Linguistic Modifier is link to numerical value and linguistic variable [2]. In our work linguistic variable is performance and linguistic modifiers are good, very good, excellent, and outstanding.

For more information go to below link.

http://ijirst.org/Article.php?manuscript=IJIRSTV2I3022

http://ijirst.org/index.php?p=SubmitArticle

ijirst.org

Saturday, November 1, 2014

Know about it : Big Data is Transforming Sports #IJIRST

This article was originally published on The Conversation. The publication contributed this article to Live Science's Expert Voices: Op-Ed & Insights.
In sport we don’t just want to know who won. We now want to know how to replicate success and then improve on it. And to do this, we’re using data – and lots of it. The field of “big data” analytics has come to sport and athletics, with massive implications for sport as we know it.
Featured image
The Women’s Tennis Association recently approved real-time data capture, which means that court-side coaches can now advise their players during a match on best shot placement or serve direction using little more than a smartphone or tablet. It could be argued that this detracts from a player using their instincts to make their own decisions. But it means that to tennis fans watching, it’s easier to understand what makes a good player great and why their opponent lost, while players have an even keener competitive edge.
International Journal for Innovative Research in Science and Technology (IJIRST) is a one of the popular international multidisciplinary, open access, peer-reviewed, fully refereed journal. It is an international journal that aims to contribute to the constant innovative research and training, so as to promote research in the field of science and technology.

Friday, October 31, 2014

New Camera Sensor Eliminates Need for Flash #IJIRST

No flash? No problem. A new imaging sensor could soon make it possible for photographers to take clear, sharp photos, even in dim lighting.
Featured image
for more detail click here: #IJIRST
Created by a team of researchers at Nanyang Technological University (NTU) in Singapore, the new sensor is highly sensitive to both visible and infrared light, which means it could be used in everything from the family Nikon to surveillance and satellite cameras.
IJIRST - IMPACT FACTOR 1.638
The sensor, which is 1,000 times more sensitive to light than the imaging sensors of most of today's cameras, gets this high photoresponse from its innovative structure.
main article of this post : click here

Tuesday, October 14, 2014

Evolution of extreme parasites explained by scientists

Extreme adaptations of species often cause such significant changes that their evolutionary history is difficult to reconstruct. Zoologists at the University of Basel in Switzerland have now discovered a new parasite species that represents the missing link between fungi and an extreme group of parasites. Researches are now able to understand for the first time the evolution of these parasites, causing disease in humans and animals. The study has been published in the latest issue of the scientific journal Proceedings of the National Academy of Sciences (PNAS).
Parasites use their hosts to simplify their own lives. In order to do so, they evolved features that are so extreme that it is often impossible to compare them to other species. The evolution of these extreme adaptations is often impossible to reconstruct. The research group lead by Prof. Dieter Ebert from the Department of Environmental Science at the University of Basel has now discovered the missing link that explains how this large group of extreme parasites, the microsporidia, has evolved. The team was supported in their efforts by scientists from Sweden and the U.S.
Between fungi and parasite
The team of zoologists lead by Prof. Dieter Ebert has been studying the evolution of microsporidia for years. When they discovered a new parasite in water fleas a couple of years ago, they classified this undescribed species as a microsporidium, mostly because it possessed the unique harpoon-like infection apparatus (the polar-tube), one of the hallmarks of microsporidia. The analysis of the entire genome had several surprises in store for them: The genome resembles more that of a fungi than a microsporidium and, in addition, also has a mitochondrial genome. The new species, now named Mitosporidium daphniae, thus represents the missing link between fungi and microsporidia.
Source:
The above story is based on materials provided by Universität BaselNote: Materials may be edited for content and length.

For more details click here: IJIRST




Saturday, September 13, 2014

IJIRST.org | Energy Efficient Compressed Air Production System

 Energy Efficient Compressed Air Production System
-------------------------------------------------------------------------------------------------------------------
Compressed air is often referred to as the fourth utility. We all know the generation of compressed air consumes energy but at the same time the compressor and downstream components are often neglected, which means there are significant savings to be made. It is suggested that savings of around 33 % on average in a compressed air system are possible. It follows that cost effective compressed air production is energy efficient compressed air production, as energy is by far the biggest lifetime cost factor.Many of the different levers for cost reduction may be known, but just not applied, due to lack of knowledge about the financial savings possible. This paper shows and explains the different ways to efficient compressed air production (leakages, compressor selection, pressure losses) and gives simple calculation examples that are easy to follow and to be reproduced in your compressed air stations.

For more Details 
click Here.
or 
HERE